Harnessing Emerging Technologies to Construct an Afrocentric Cybersecurity Threat Model
DOI:
https://doi.org/10.47604/ijts.3752Keywords:
Afrocentric Cybersecurity, Artificial Intelligence, Big Data, Cloud Computing, Mobile Money, SIM-Swap Fraud, USSD Vulnerabilities, Africa, 4IRAbstract
Purpose: This study examines the rising cybersecurity threats in Africa, where digital transformation particularly mobile money platforms has exposed vulnerabilities such as SIM-swap fraud, USSD attacks, and identity-driven intrusions. Reported losses, including approximately Kshs. 11 billion in Kenya in 2023 and USD 500 million in Nigeria in 2022, underscore the need for contextually relevant cybersecurity strategies. The study proposes an Afrocentric approach integrating Artificial Intelligence (AI), Big Data, and Cloud Computing to enhance threat detection, intelligence sharing, and adaptive defense mechanisms.
Methodology: A Systematic Literature Review (SLR) guided by PRISMA principles was conducted, examining peer-reviewed studies, industry reports, and policy documents from 2020 to 2025 across IEEE Xplore, Scopus, ScienceDirect, and SpringerLink. The review focused on African cybersecurity challenges, applications of emerging technologies, and culturally relevant digital governance frameworks. Thematic synthesis identified gaps and informed the development of a conceptual Afrocentric cybersecurity model.
Findings: Current Western-centric frameworks inadequately address Africa’s mobile-first digital ecosystem. The proposed Afrocentric model integrates AI-driven analysis of mobile transactions, Big Data analytics for real-time threat intelligence, and cloud infrastructure designed for localized data governance. The framework embeds collective intelligence sharing inspired by Ubuntu philosophy and emphasizes Managed Shared Responsibility to overcome technical literacy gaps in SMEs.
Unique Contribution to Theory, Practice and Policy: African governments, industry, and policymakers should adopt Afrocentric cybersecurity strategies prioritizing mobile ecosystems, develop local AI and Big Data capacity, and establish secure cloud infrastructures. Future research should empirically test the model to strengthen digital resilience across African economies.
Downloads
References
360 Advanced. (2025, February 26). The dark side of AI: New cybersecurity challenges for organizations. https://360advanced.com/the-dark-side-of-ai-new-cybersecurity-challenges-for-organizations/
African Union. (2020). African Union policy on cyber security. Addis Ababa, Ethiopia: African Union Commission.
African Union. (2024). Continental artificial intelligence strategy. African Union Commission. https://au.int
African Union. (2025). Cybersecurity in Africa: Annual report on threats, vulnerabilities, and responses. AU Digital Economy & Cybersecurity Division. https://au.int/en
Akinyemi, O., Oladejo, O., & Adekunle, A. (2020). Artificial intelligence and cybersecurity in Africa: Prospects and challenges. Journal of Information Security and Applications, 55, 102615. https://doi.org/10.1016/j.jisa.2020.102615
Angin, P. (2019). Big data analytics for cyber security. Published Special Issues. https://doi.org/10.13140/RG.2.2.32403.66086
Anyoha, R. (2017). The history of artificial intelligence. Science in the News, Harvard University, 1–19.
Armbrust, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58. https://doi.org/10.1145/1721654.1721672
Asante, M. K. (1987). The Afrocentric idea. Temple University Press.
Chen, H., Chiang, R. H. L., & Storey, V. C. (2021). Business intelligence and analytics: From big data to big impact. MIS Quarterly, 45(1), 1–13.
CIO Africa. (2025, June 30). Who's driving AI-powered cybersecurity in Kenya and Africa? https://cioafrica.co/whos-driving-ai-powered-cybersecurity-in-kenya-and-africa/
CIO Africa. (2025a, April 3). How cloud migration strengthens IT security for African businesses. https://cioafrica.co/how-cloud-migration-strengthens-it-security-for-african-businesses/
CIO Africa. (2025b, March 6). The benefits of cloud computing for your business. https://cioafrica.co/the-benefits-of-cloud-computing-for-your-business/
Cisco Systems. (2024). Cisco Annual Cybersecurity Report 2024. Cisco. https://www.cisco.com/c/en/us/products/security/security-reports.html
Cobalt. (2025, December 23). Top cybersecurity statistics for 2025. https://www.cobalt.io/blog/top-cybersecurity-statistics-2025
Cybersecurity Ventures. (2025). Cybercrime report: Global damages reaching $10.5 trillion by 2025. Cybersecurity Ventures.
De Villiers, I. (2024). The future of cyber security in Africa: Automating and predicting threats. Cybersecurity Journal of Africa, 12(3), 45–60.
Dumitras, T., & Shou, D. (2011). Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (pp. 89–96). Salzburg. https://doi.org/10.1145/1978672.1978683
Ekonde, D. (2025). Africa and the AI race. The Elephant. https://www.theelephant.info/ideas/2025/africa-and-the-ai-race
Ezekwueme Augustine, E., & Sunday, A. D. (2025). Cybersecurity as a Pillar of Digital Sovereignty: A Scoping Review in Rethinking Governance in Nigeria and West Africa.
Ezugwu, C. (2021). Artificial intelligence for cybersecurity in cloud computing: A review of recent advances. IEEE Access, 9, 323–337. https://doi.org/10.1109/ACCESS.2020.3049148
Hussain, F., & Alqahtani, S. (2021). Artificial intelligence for cybersecurity: Threats, challenges, and solutions. Computers & Security, 104, 102163. https://doi.org/10.1016/j.cose.2021.102163
IBM Security. (2025). IBM X-Force Threat Intelligence Index 2025: Cybersecurity trends in emerging markets. IBM. https://www.ibm.com/security/data
International Telecommunication Union. (2025). Global cybersecurity index 2025: Africa regional report. ITU. https://www.itu.int/en/ITU-D/Cybersecurity
Interpol. (2025, June 23). New INTERPOL report warns of sharp rise in cybercrime in Africa. https://www.interpol.int/News-and-Events/News/2025/New-INTERPOL-report-warns-of-sharp-rise-in-cybercrime-in-Africa
Kaopiz. (2025, April 8). 10 key benefits of cloud computing for businesses in 2025. https://kaopiz.com/en/articles/10-key-benefits-of-cloud-computing-for-businesses-in-2025/
Kaur, R., et al. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804
Kearney, A. (2024). Cybersecurity challenges in Africa: Mobile Money and beyond. Kearney Consulting.
Kinyua, G., & Kute, D. (2023). Empowering Africa: An in-depth exploration of the adoption of artificial intelligence across the continent. arXiv:2401.09457v1. https://arxiv.org/abs/2401.09457
KPMG International. (2023). KPMG global cyber security outlook 2023: Navigating cyber risks in a complex environment. KPMG. https://kpmg.com
Kumar, R., & Singh, S. (2020). Cyber threats to cloud computing: A comprehensive review. Journal of Information Security and Applications, 55, 102118.
Mbuyu, M. (2021). Digital transformation and cloud computing in Africa. African Digital Economy Journal, 5(2), 67–81.
McKinsey. (2025, May 15). AI is the greatest threat and defense in cybersecurity today. Here's why. https://www.mckinsey.com/about-us/new-at-mckinsey-blog/ai-is-the-greatest-threat-and-defense-in-cybersecurity-today
MITRE. (2023). Explainable AI in cybersecurity: Best practices and considerations. MITRE Corporation. https://www.mitre.org/publications
Msukwa, L., & Dlodlo, N. (2021). Towards an Afrocentric cybersecurity framework for critical infrastructure in Southern Africa. Journal of Cyber Security Technology, 5(2), 89–105.
Organisation for Economic Co-operation and Development. (2023). Enhancing the digital security of SMEs. OECD Publishing. https://www.oecd.org
Palo Alto Networks. (2025). Unit 42 Threat Report 2025. Palo Alto Networks. https://www.paloaltonetworks.com/resources
Rao, A. S., & Verweij, G. (2017). Sizing the prize: What’s the real value of AI for your business and how can you capitalise? PwC. https://www.pwc.com/gx/en/issues/analytics/assets/pwc-ai-analysis-sizing-the-prize-report.pdf
Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020). Machine learning and deep learning techniques for cybersecurity: A review. In Advances in Intelligent Systems and Computing (pp. 50–57). Springer. https://doi.org/10.1007/978-3-030-44289-7_5
StationX. (2025, April 25). 10 examples of AI in cyber security (latest research). https://www.stationx.net/examples-of-ai-in-cyber-security/
Tremhost, J. (2025). Mobile money fraud trends and mitigation in sub-Saharan Africa. FinTech Security Review, 12(1), 33–50.
World Bank. (2022). Digital development in Africa: Infrastructure and cloud adoption trends. World Bank Group. https://www.worldbank.org
World Economic Forum. (2025). Global risks report 2025: Technology and cybersecurity. World Economic Forum. https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Dr. Joy Kibor

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.