Impact of Artificial Intelligence on Cybersecurity in Nigeria
DOI:
https://doi.org/10.47672/ajce.2251Keywords:
Artificial, Intelligence, CybersecurityAbstract
Purpose: The aim of the study was to assess the impact of artificial intelligence on cybersecurity in Nigeria.
Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.
Findings: The impact of artificial intelligence (AI) on cybersecurity has been profound, transforming how organizations detect, prevent, and respond to cyber threats. AI enhances threat detection capabilities by analyzing vast amounts of data to identify patterns and anomalies indicative of malicious activities, significantly reducing response times and improving accuracy. Machine learning algorithms continuously learn from new threats, enabling adaptive defenses that evolve with the threat landscape. Additionally, AI-driven automation streamlines routine security tasks, freeing up human analysts to focus on more complex issues. However, the adoption of AI in cybersecurity also introduces challenges, such as the potential for adversarial attacks where cybercriminals manipulate AI systems, and the ethical implications of increased surveillance and data privacy concerns.
Implications to Theory, Practice and Policy: Complexity theory, sociotechnical systems theory and cognitive load theory may be used to anchor future studies on assessing the impact of artificial intelligence on cybersecurity in Nigeria. In the realm of practical application, industry-academia partnerships play a pivotal role. These partnerships should focus on developing and deploying AI-driven cybersecurity solutions tailored to diverse organizational contexts, challenges, and resource constraints. On the policy front, advocating for regulatory frameworks and standards is imperative.
Downloads
References
Adebayo, A. (2018). Cybersecurity challenges in Nigeria: Trends and policies. Journal of Cyber Policy, 3(2), 123-135. https://doi.org/10.1080/23738871.2018.1479311
Baxter, G., & Sommerville, I. (2018). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 30(4), 271-283. https://doi.org/10.1093/iwc/iwx018
Brown, T. (2019). Biometric and behavioral analytics: AI advancements in cybersecurity. Journal of Information Security and Applications, 47, 102387. https://doi.org/10.1016/j.jisa.2019.102387
Chen, L. (2019). Adaptive cybersecurity using AI: A new paradigm. Journal of Cybersecurity, 6(1), 11-25. https://doi.org/10.1093/cybsec/tyz012
da Silva, R. (2019). Cybersecurity in Brazil: Issues and progress. International Journal of Information Security, 18(4), 289-302. https://doi.org/10.1007/s10207-019-00434-8
Dlamini, Z. (2021). South Africa's cybersecurity landscape: Progress and challenges. Journal of Cybersecurity and Privacy, 3(1), 22-36. https://doi.org/10.3390/jcp3010003
Garcia, M. (2020). The impact of AI on cybersecurity: Enhancing detection and response. Cybersecurity Journal, 5(2), 65-78. https://doi.org/10.1080/21683565.2020.1837492
Garcia, M. (2021). The impact of AI on cybersecurity: Enhancing detection and response. Cybersecurity Journal, 5(2), 65-78. https://doi.org/10.1080/21683565.2020.1837492
Johnson, A. (2020). Predictive analytics in cybersecurity: Leveraging AI for proactive defense. Journal of Information Security and Cybercrime, 9(3), 89-104. https://doi.org/10.1080/23742917.2021.1875592
Johnson, M. (2021). Enhancing cybersecurity in the UK: A case study of public-private collaboration. Cybersecurity Journal, 5(1), 45-58. https://doi.org/10.1080/21683565.2021.1875491
Kagire, E. (2021). Cybersecurity advancements in Rwanda: A case study. African Journal of Information Systems, 14(1), 45-60. https://doi.org/10.31920/1750-4562.2021.v14n1a3
Mensah, K. (2022). Cybersecurity in Ghana: Current status and future prospects. African Journal of Information Systems, 14(3), 198-214. https://doi.org/10.31920/1750-4562.2022.v14n3a1
Mitchell, M. (2021). Complexity: A Guided Tour. Oxford University Press.
Mwangi, P. (2019). Cybersecurity in Kenya: Current status and future prospects. African Journal of Information Systems, 11(2), 221-235. https://doi.org/10.31920/1750-4562.2019.v11n2a1
Nguyen, T. (2021). Proactive cybersecurity measures: The role of AI in predicting threats. Asia-Pacific Journal of Information Security, 18(2), 67-80. https://doi.org/10.1007/s10376-021-00187-6
Patel, R. (2020). Cybersecurity advancements in India: A comprehensive review. Journal of Cyber Security Technology, 4(3), 101-118. https://doi.org/10.1080/23742917.2020.1743421
Smith, J. (2019). Real-time threat detection using AI: Transforming cybersecurity. Journal of Information Security and Applications, 58, 102796. https://doi.org/10.1016/j.jisa.2021.102796
Smith, J. (2022). Real-time threat detection using AI: Transforming cybersecurity. Journal of Information Security and Applications, 58, 102796. https://doi.org/10.1016/j.jisa.2021.102796
Suryani, E. (2020). Cybersecurity in Indonesia: Challenges and developments. Journal of Southeast Asian Security, 15(1), 34-49. https://doi.org/10.1080/25740962.2020.1734562
Sweller, J. (2019). Cognitive load theory and educational technology. Educational Technology Research and Development, 67(2), 1-16. https://doi.org/10.1007/s11423-019-09692-3
Tanaka, H. (2019). Cybersecurity measures and their effectiveness in Japan. Asia-Pacific Journal of Information Systems, 29(1), 47-62. https://doi.org/10.1007/s10376-019-00029-5
Wang, Y. (2018). AI-powered automation in cybersecurity: Increasing efficiency and effectiveness. Journal of Cyber Security Technology, 4(3), 101-118. https://doi.org/10.1080/23742917.2020.1743421
Wang, Y. (2020). AI-powered automation in cybersecurity: Increasing efficiency and effectiveness. Journal of Cyber Security Technology, 4(3), 101-118. https://doi.org/10.1080/23742917.2020.1743421
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 David Mark
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.