Harnessing Emerging Technologies to Construct an Afrocentric Cybersecurity Threat Model

Authors

  • Dr. Joy Kibor Zetech University

DOI:

https://doi.org/10.47604/ijts.3752

Keywords:

Afrocentric Cybersecurity, Artificial Intelligence, Big Data, Cloud Computing, Mobile Money, SIM-Swap Fraud, USSD Vulnerabilities, Africa, 4IR

Abstract

Purpose: This study examines the rising cybersecurity threats in Africa, where digital transformation particularly mobile money platforms has exposed vulnerabilities such as SIM-swap fraud, USSD attacks, and identity-driven intrusions. Reported losses, including approximately Kshs. 11 billion in Kenya in 2023 and USD 500 million in Nigeria in 2022, underscore the need for contextually relevant cybersecurity strategies. The study proposes an Afrocentric approach integrating Artificial Intelligence (AI), Big Data, and Cloud Computing to enhance threat detection, intelligence sharing, and adaptive defense mechanisms.

Methodology: A Systematic Literature Review (SLR) guided by PRISMA principles was conducted, examining peer-reviewed studies, industry reports, and policy documents from 2020 to 2025 across IEEE Xplore, Scopus, ScienceDirect, and SpringerLink. The review focused on African cybersecurity challenges, applications of emerging technologies, and culturally relevant digital governance frameworks. Thematic synthesis identified gaps and informed the development of a conceptual Afrocentric cybersecurity model.

Findings: Current Western-centric frameworks inadequately address Africa’s mobile-first digital ecosystem. The proposed Afrocentric model integrates AI-driven analysis of mobile transactions, Big Data analytics for real-time threat intelligence, and cloud infrastructure designed for localized data governance. The framework embeds collective intelligence sharing inspired by Ubuntu philosophy and emphasizes Managed Shared Responsibility to overcome technical literacy gaps in SMEs.

Unique Contribution to Theory, Practice and Policy: African governments, industry, and policymakers should adopt Afrocentric cybersecurity strategies prioritizing mobile ecosystems, develop local AI and Big Data capacity, and establish secure cloud infrastructures. Future research should empirically test the model to strengthen digital resilience across African economies.

Downloads

Download data is not yet available.

References

360 Advanced. (2025, February 26). The dark side of AI: New cybersecurity challenges for organizations. https://360advanced.com/the-dark-side-of-ai-new-cybersecurity-challenges-for-organizations/

African Union. (2020). African Union policy on cyber security. Addis Ababa, Ethiopia: African Union Commission.

African Union. (2024). Continental artificial intelligence strategy. African Union Commission. https://au.int

African Union. (2025). Cybersecurity in Africa: Annual report on threats, vulnerabilities, and responses. AU Digital Economy & Cybersecurity Division. https://au.int/en

Akinyemi, O., Oladejo, O., & Adekunle, A. (2020). Artificial intelligence and cybersecurity in Africa: Prospects and challenges. Journal of Information Security and Applications, 55, 102615. https://doi.org/10.1016/j.jisa.2020.102615

Angin, P. (2019). Big data analytics for cyber security. Published Special Issues. https://doi.org/10.13140/RG.2.2.32403.66086

Anyoha, R. (2017). The history of artificial intelligence. Science in the News, Harvard University, 1–19.

Armbrust, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58. https://doi.org/10.1145/1721654.1721672

Asante, M. K. (1987). The Afrocentric idea. Temple University Press.

Chen, H., Chiang, R. H. L., & Storey, V. C. (2021). Business intelligence and analytics: From big data to big impact. MIS Quarterly, 45(1), 1–13.

CIO Africa. (2025, June 30). Who's driving AI-powered cybersecurity in Kenya and Africa? https://cioafrica.co/whos-driving-ai-powered-cybersecurity-in-kenya-and-africa/

CIO Africa. (2025a, April 3). How cloud migration strengthens IT security for African businesses. https://cioafrica.co/how-cloud-migration-strengthens-it-security-for-african-businesses/

CIO Africa. (2025b, March 6). The benefits of cloud computing for your business. https://cioafrica.co/the-benefits-of-cloud-computing-for-your-business/

Cisco Systems. (2024). Cisco Annual Cybersecurity Report 2024. Cisco. https://www.cisco.com/c/en/us/products/security/security-reports.html

Cobalt. (2025, December 23). Top cybersecurity statistics for 2025. https://www.cobalt.io/blog/top-cybersecurity-statistics-2025

Cybersecurity Ventures. (2025). Cybercrime report: Global damages reaching $10.5 trillion by 2025. Cybersecurity Ventures.

De Villiers, I. (2024). The future of cyber security in Africa: Automating and predicting threats. Cybersecurity Journal of Africa, 12(3), 45–60.

Dumitras, T., & Shou, D. (2011). Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (pp. 89–96). Salzburg. https://doi.org/10.1145/1978672.1978683

Ekonde, D. (2025). Africa and the AI race. The Elephant. https://www.theelephant.info/ideas/2025/africa-and-the-ai-race

Ezekwueme Augustine, E., & Sunday, A. D. (2025). Cybersecurity as a Pillar of Digital Sovereignty: A Scoping Review in Rethinking Governance in Nigeria and West Africa.

Ezugwu, C. (2021). Artificial intelligence for cybersecurity in cloud computing: A review of recent advances. IEEE Access, 9, 323–337. https://doi.org/10.1109/ACCESS.2020.3049148

Hussain, F., & Alqahtani, S. (2021). Artificial intelligence for cybersecurity: Threats, challenges, and solutions. Computers & Security, 104, 102163. https://doi.org/10.1016/j.cose.2021.102163

IBM Security. (2025). IBM X-Force Threat Intelligence Index 2025: Cybersecurity trends in emerging markets. IBM. https://www.ibm.com/security/data

International Telecommunication Union. (2025). Global cybersecurity index 2025: Africa regional report. ITU. https://www.itu.int/en/ITU-D/Cybersecurity

Interpol. (2025, June 23). New INTERPOL report warns of sharp rise in cybercrime in Africa. https://www.interpol.int/News-and-Events/News/2025/New-INTERPOL-report-warns-of-sharp-rise-in-cybercrime-in-Africa

Kaopiz. (2025, April 8). 10 key benefits of cloud computing for businesses in 2025. https://kaopiz.com/en/articles/10-key-benefits-of-cloud-computing-for-businesses-in-2025/

Kaur, R., et al. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804

Kearney, A. (2024). Cybersecurity challenges in Africa: Mobile Money and beyond. Kearney Consulting.

Kinyua, G., & Kute, D. (2023). Empowering Africa: An in-depth exploration of the adoption of artificial intelligence across the continent. arXiv:2401.09457v1. https://arxiv.org/abs/2401.09457

KPMG International. (2023). KPMG global cyber security outlook 2023: Navigating cyber risks in a complex environment. KPMG. https://kpmg.com

Kumar, R., & Singh, S. (2020). Cyber threats to cloud computing: A comprehensive review. Journal of Information Security and Applications, 55, 102118.

Mbuyu, M. (2021). Digital transformation and cloud computing in Africa. African Digital Economy Journal, 5(2), 67–81.

McKinsey. (2025, May 15). AI is the greatest threat and defense in cybersecurity today. Here's why. https://www.mckinsey.com/about-us/new-at-mckinsey-blog/ai-is-the-greatest-threat-and-defense-in-cybersecurity-today

MITRE. (2023). Explainable AI in cybersecurity: Best practices and considerations. MITRE Corporation. https://www.mitre.org/publications

Msukwa, L., & Dlodlo, N. (2021). Towards an Afrocentric cybersecurity framework for critical infrastructure in Southern Africa. Journal of Cyber Security Technology, 5(2), 89–105.

Organisation for Economic Co-operation and Development. (2023). Enhancing the digital security of SMEs. OECD Publishing. https://www.oecd.org

Palo Alto Networks. (2025). Unit 42 Threat Report 2025. Palo Alto Networks. https://www.paloaltonetworks.com/resources

Rao, A. S., & Verweij, G. (2017). Sizing the prize: What’s the real value of AI for your business and how can you capitalise? PwC. https://www.pwc.com/gx/en/issues/analytics/assets/pwc-ai-analysis-sizing-the-prize-report.pdf

Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020). Machine learning and deep learning techniques for cybersecurity: A review. In Advances in Intelligent Systems and Computing (pp. 50–57). Springer. https://doi.org/10.1007/978-3-030-44289-7_5

StationX. (2025, April 25). 10 examples of AI in cyber security (latest research). https://www.stationx.net/examples-of-ai-in-cyber-security/

Tremhost, J. (2025). Mobile money fraud trends and mitigation in sub-Saharan Africa. FinTech Security Review, 12(1), 33–50.

World Bank. (2022). Digital development in Africa: Infrastructure and cloud adoption trends. World Bank Group. https://www.worldbank.org

World Economic Forum. (2025). Global risks report 2025: Technology and cybersecurity. World Economic Forum. https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf

Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592

Downloads

Published

2026-05-11

How to Cite

Kibor, J. (2026). Harnessing Emerging Technologies to Construct an Afrocentric Cybersecurity Threat Model. International Journal of Technology and Systems, 11(1), 35–52. https://doi.org/10.47604/ijts.3752

Issue

Section

Articles