top of page
🧍 People
The Human Equation | Motivation, Identity & Behavior | Why We Do What We Do


How do we control college buffet-style on the road to food waste reduction in the united states?
Two years ago, while studying and working with the sustainability department of South Dakota State University in Brookings, SD, USA, we conducted a food waste audit. The audit revealed that the buffet-style dining area at The Commons had a significantly higher percentage of food waste compared to the a la carte style at the Union area, despite the high number of restaurants (4) at the union. Students gather around a busy buffet line This audit finding is consistent with the U

Chrisantus Wamalwa
Dec 42 min read


Why Raila Odinga’s Vision Outlived His Victories
Raila Amolo Odinga has never been easy to box in. Table of Contents The making of a dissident Visionary ideals: Democracy, Social justice, & Constitutionalism Pan‑Africanism and infrastructure A mirror of Kenya’s promises and contradictions Why his vision outlived his victories 1. Institutional reforms and constitutional legacy 2. Normalising protest and opposition politics 3. Pan‑African infrastructure and continental connectivity 4. The Pan‑African imagination 5. Mentorship

Darn
Oct 1711 min read


Why Raila Odinga Is an Enigma in Kenyan Politics
Few figures in Kenya’s political history have inspired as much admiration, controversy, and curiosity as Raila Odinga. Loved, feared, and endlessly analyzed, he remains the puzzle that every election tries, and fails, to solve. Table of Contents The making of the enigma Born into power but schooled in rebellion Opposition firebrand and constitutional reformer Perennial presidential candidate Master of handshake politics Handshakes as crisis management and self‑preservation Ho

Darn
Oct 1613 min read


Why AI is Crucial for Enhancing Cybersecurity in the Modern World
Introduction Amid an unrelenting surge in cyber‑attacks, the tools defending our networks need to be as dynamic and adaptable as the threats they face. Artificial intelligence (AI) is increasingly being deployed on both sides of this invisible war, helping criminals automate phishing campaigns while providing defenders with powerful analytics to spot anomalies and patch vulnerabilities. A recent IBM Cost of a Data Breach report found that generative AI‑driven attacks were pre

Darn
Sep 248 min read


Why Consumer Behavior Changes with Inflation
Inflation’s Invisible Hand at the Checkout A busy city street at dusk, with towering buildings, blurred silhouettes of pedestrians and...
Mia Bennett
Sep 237 min read


Why New H5N1 Cases Are Raising Pandemic Alarms
Are we on the brink of another global health crisis? Recent outbreaks of the H5N1 avian influenza virus in cows, poultry workers, and...

Darn
Jun 266 min read


Why is Gen Z redefining success and rejecting traditional career paths?
Remember when success meant a crisp handshake, a gold watch, and a cubicle that slowly morphed into a corner office? Gen Z just swiped...

Darn
Jun 173 min read
bottom of page
