Impact of Artificial Intelligence on Cybersecurity in Nigeria

Authors

  • David Mark Federal University of Technology Akure

DOI:

https://doi.org/10.47672/ajce.2251

Keywords:

Artificial, Intelligence, Cybersecurity

Abstract

Purpose: The aim of the study was to assess the impact of artificial intelligence on cybersecurity in Nigeria.

Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.

Findings: The impact of artificial intelligence (AI) on cybersecurity has been profound, transforming how organizations detect, prevent, and respond to cyber threats. AI enhances threat detection capabilities by analyzing vast amounts of data to identify patterns and anomalies indicative of malicious activities, significantly reducing response times and improving accuracy. Machine learning algorithms continuously learn from new threats, enabling adaptive defenses that evolve with the threat landscape. Additionally, AI-driven automation streamlines routine security tasks, freeing up human analysts to focus on more complex issues. However, the adoption of AI in cybersecurity also introduces challenges, such as the potential for adversarial attacks where cybercriminals manipulate AI systems, and the ethical implications of increased surveillance and data privacy concerns.

Implications to Theory, Practice and Policy:  Complexity theory, sociotechnical systems theory and cognitive load theory may be used to anchor future studies on assessing the impact of artificial intelligence on cybersecurity in Nigeria. In the realm of practical application, industry-academia partnerships play a pivotal role. These partnerships should focus on developing and deploying AI-driven cybersecurity solutions tailored to diverse organizational contexts, challenges, and resource constraints. On the policy front, advocating for regulatory frameworks and standards is imperative.

Downloads

Download data is not yet available.

References

Adebayo, A. (2018). Cybersecurity challenges in Nigeria: Trends and policies. Journal of Cyber Policy, 3(2), 123-135. https://doi.org/10.1080/23738871.2018.1479311

Baxter, G., & Sommerville, I. (2018). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 30(4), 271-283. https://doi.org/10.1093/iwc/iwx018

Brown, T. (2019). Biometric and behavioral analytics: AI advancements in cybersecurity. Journal of Information Security and Applications, 47, 102387. https://doi.org/10.1016/j.jisa.2019.102387

Chen, L. (2019). Adaptive cybersecurity using AI: A new paradigm. Journal of Cybersecurity, 6(1), 11-25. https://doi.org/10.1093/cybsec/tyz012

da Silva, R. (2019). Cybersecurity in Brazil: Issues and progress. International Journal of Information Security, 18(4), 289-302. https://doi.org/10.1007/s10207-019-00434-8

Dlamini, Z. (2021). South Africa's cybersecurity landscape: Progress and challenges. Journal of Cybersecurity and Privacy, 3(1), 22-36. https://doi.org/10.3390/jcp3010003

Garcia, M. (2020). The impact of AI on cybersecurity: Enhancing detection and response. Cybersecurity Journal, 5(2), 65-78. https://doi.org/10.1080/21683565.2020.1837492

Garcia, M. (2021). The impact of AI on cybersecurity: Enhancing detection and response. Cybersecurity Journal, 5(2), 65-78. https://doi.org/10.1080/21683565.2020.1837492

Johnson, A. (2020). Predictive analytics in cybersecurity: Leveraging AI for proactive defense. Journal of Information Security and Cybercrime, 9(3), 89-104. https://doi.org/10.1080/23742917.2021.1875592

Johnson, M. (2021). Enhancing cybersecurity in the UK: A case study of public-private collaboration. Cybersecurity Journal, 5(1), 45-58. https://doi.org/10.1080/21683565.2021.1875491

Kagire, E. (2021). Cybersecurity advancements in Rwanda: A case study. African Journal of Information Systems, 14(1), 45-60. https://doi.org/10.31920/1750-4562.2021.v14n1a3

Mensah, K. (2022). Cybersecurity in Ghana: Current status and future prospects. African Journal of Information Systems, 14(3), 198-214. https://doi.org/10.31920/1750-4562.2022.v14n3a1

Mitchell, M. (2021). Complexity: A Guided Tour. Oxford University Press.

Mwangi, P. (2019). Cybersecurity in Kenya: Current status and future prospects. African Journal of Information Systems, 11(2), 221-235. https://doi.org/10.31920/1750-4562.2019.v11n2a1

Nguyen, T. (2021). Proactive cybersecurity measures: The role of AI in predicting threats. Asia-Pacific Journal of Information Security, 18(2), 67-80. https://doi.org/10.1007/s10376-021-00187-6

Patel, R. (2020). Cybersecurity advancements in India: A comprehensive review. Journal of Cyber Security Technology, 4(3), 101-118. https://doi.org/10.1080/23742917.2020.1743421

Smith, J. (2019). Real-time threat detection using AI: Transforming cybersecurity. Journal of Information Security and Applications, 58, 102796. https://doi.org/10.1016/j.jisa.2021.102796

Smith, J. (2022). Real-time threat detection using AI: Transforming cybersecurity. Journal of Information Security and Applications, 58, 102796. https://doi.org/10.1016/j.jisa.2021.102796

Suryani, E. (2020). Cybersecurity in Indonesia: Challenges and developments. Journal of Southeast Asian Security, 15(1), 34-49. https://doi.org/10.1080/25740962.2020.1734562

Sweller, J. (2019). Cognitive load theory and educational technology. Educational Technology Research and Development, 67(2), 1-16. https://doi.org/10.1007/s11423-019-09692-3

Tanaka, H. (2019). Cybersecurity measures and their effectiveness in Japan. Asia-Pacific Journal of Information Systems, 29(1), 47-62. https://doi.org/10.1007/s10376-019-00029-5

Wang, Y. (2018). AI-powered automation in cybersecurity: Increasing efficiency and effectiveness. Journal of Cyber Security Technology, 4(3), 101-118. https://doi.org/10.1080/23742917.2020.1743421

Wang, Y. (2020). AI-powered automation in cybersecurity: Increasing efficiency and effectiveness. Journal of Cyber Security Technology, 4(3), 101-118. https://doi.org/10.1080/23742917.2020.1743421

Downloads

Published

2024-07-29

How to Cite

David Mark. (2024). Impact of Artificial Intelligence on Cybersecurity in Nigeria. American Journal of Computing and Engineering, 7(4), 1–11. https://doi.org/10.47672/ajce.2251

Issue

Section

Articles