Author
Abstract
Purpose: The aim of the study was to assess the impact of artificial intelligence on cybersecurity in Nigeria. Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries. Findings: The impact of artificial intelligence (AI) on cybersecurity has been profound, transforming how organizations detect, prevent, and respond to cyber threats. AI enhances threat detection capabilities by analyzing vast amounts of data to identify patterns and anomalies indicative of malicious activities, significantly reducing response times and improving accuracy. Machine learning algorithms continuously learn from new threats, enabling adaptive defenses that evolve with the threat landscape. Additionally, AI-driven automation streamlines routine security tasks, freeing up human analysts to focus on more complex issues. However, the adoption of AI in cybersecurity also introduces challenges, such as the potential for adversarial attacks where cybercriminals manipulate AI systems, and the ethical implications of increased surveillance and data privacy concerns. Implications to Theory, Practice and Policy: Complexity theory, sociotechnical systems theory and cognitive load theory may be used to anchor future studies on assessing the impact of artificial intelligence on cybersecurity in Nigeria. In the realm of practical application, industry-academia partnerships play a pivotal role. These partnerships should focus on developing and deploying AI-driven cybersecurity solutions tailored to diverse organizational contexts, challenges, and resource constraints. On the policy front, advocating for regulatory frameworks and standards is imperative.
Suggested Citation
David Mark, 2024.
"Impact of Artificial Intelligence on Cybersecurity in Nigeria,"
American Journal of Computing and Engineering, AJPO Journals Limited, vol. 7(4), pages 1-11.
Handle:
RePEc:bfy:ojajce:v:7:y:2024:i:4:p:1-11:id:2251
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
search for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bfy:ojajce:v:7:y:2024:i:4:p:1-11:id:2251. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://ajpojournals.org/journals/index.php/AJCE/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.