Science, Technology, Engineering and Mathematics.
Open Access

ARTIFICIAL INTELLIGENCE AND CYBER DEFENSE SYSTEMS FOR THE EXAMINATION COUNCIL OF ZAMBIA: A QUALITATIVE STUDY ON AI APPLICATIONS AND CHALLENGES

Download as PDF

Volume 3, Issue 1, Pp 1-9, 2025

DOI: https://doi.org/10.61784/wjit3011

Author(s)

Stephen Kelvin Sata

Affiliation(s)

ICOF Global University, Lusaka, Zambia.

Corresponding Author

Stephen Kelvin Sata

ABSTRACT

In the modern digital environment, when protecting sensitive data and maintaining the integrity of organizational operations are crucial, the incorporation of artificial intelligence (AI) into cyber defense systems has grown in importance. This study explores the use of artificial intelligence (AI) to improve cyber defense systems at the Examination Council of Zambia (ECZ), an organization in charge of overseeing national exams that are vital to the socioeconomic and educational advancement of the nation. In addition to identifying the obstacles that prevent the successful deployment of AI-based solutions, the research attempts to investigate the potential of AI-driven technologies to mitigate cyber risks, enhance system resilience, and safeguard the integrity of examination data.

Using a qualitative research approach, the study analyzed documents of current cybersecurity frameworks and AI-related legislation in addition to conducting in-depth interviews with important stakeholders, such as administrators, legislators, and IT experts. The results show that by proactively detecting, anticipating, and reducing cyberthreats in real time, artificial intelligence (AI) techniques including machine learning algorithms, anomaly detection systems, and predictive analytics have enormous potential to improve cyber security mechanisms. By preventing data breaches, cyberattacks, and illegal access to examination systems, these skills can greatly improve the ECZ's capacity to uphold the security and integrity of examination procedures.

The report does, however, also point out a number of obstacles to the successful application of AI in the ECZ, such as a lack of technological and financial resources, a lack of qualified staff with experience in cybersecurity and AI, and worries about the moral and legal ramifications of AI use. Additionally, attempts to incorporate these cutting-edge technologies into current systems are made more difficult by the lack of comprehensive policies and frameworks designed for AI adoption.

The study highlights the pressing need for focused capacity-building programs to upskill staff, strategic investments in AI infrastructure, and the creation of strong regulatory frameworks to guarantee the moral and responsible application of AI in cybersecurity. By tackling these issues, legislators, stakeholders in education, and IT specialists may cooperate to fully utilize AI's revolutionary potential in building a safe and robust exam administration system. By providing practical suggestions for improving data security and institutional readiness in developing nations like Zambia, this study adds to the expanding corpus of research on artificial intelligence and cybersecurity in education.

KEYWORDS

Artificial intelligence; Cyber defense; Examination systems; AI applications & qualitative study

CITE THIS PAPER

Stephen Kelvin Sata. Artificial intelligence and cyber defense systems for the examination council of Zambia: a qualitative study on AI applications and challenges. World Journal of Information Technology. 2025, 3(1): 1-9. DOI: https://doi.org/10.61784/wjit3011.

REFERENCES

[1] Sarker I H, Kayes A S M, Badsha S. A review on machine learning for cybersecurity: Current research and future directions. Journal of Big Data, 2021, 8(1): 1–37.

[2] Berman D S, Buczak A L, Chavis J S, et al. A survey of deep learning methods for cyber security. Information, 2019, 10(4): 122.

[3] Kumar S, Abraham A, Sangaiah A K. Cybersecurity in smart environments: A machine learning perspective. International Journal of Computational Intelligence Systems, 2020, 13(1): 313–330.

[4] Sharma S, Kalita H K, Borah B. Deep learning applications for cybersecurity: An overview. Journal of Cybersecurity Technology, 2021, 5(3): 135–157.

[5] Luo J, Qin L, Zhu Y. Deep learning-based cybersecurity threat detection: A survey and future directions. IEEE Access, 2021, 9: 21704–21730.

[6] Zhang J, Yang X, Zhou Y, et al. AI-driven cloud security frameworks for educational institutions: A review of approaches and challenges. IEEE Transactions on Cloud Computing, 2021, 9(3): 945–957.

[7] Shaukat K, Luo S, Varadharajan V, et al. A survey on machine learning techniques for cybersecurity. Journal of Network and Computer Applications, 2020, 165: 102730.

[8] Mutisya M, Rotich G. Cybersecurity challenges in educational institutions: A case of developing countries. International Journal of Information Security and Cybercrime, 2021, 10(2): 72–85.

[9] Abiodun O I, Jantan A, Omolara A E, et al. State-of-the-art in artificial neural network applications: A survey. Heliyon, 2020, 6(11): e04860.

[10] Brecht H, Chavula J, Iannacci F. Cybersecurity in education: Addressing vulnerabilities in the digital transformation of higher education institutions. Computers & Security, 2020, 96: 101921.

[11] Kshetri N, Voas J. The economics of ransomware. IEEE IT Professional, 2019, 21(3): 9–11.

[12] Gallagher S. University of California pays $1.14 million ransom after ransomware attack. Ars Technica, 2020. https://arstechnica.com.

[13] Ochieng F. Cyber attack disrupts university examination systems. Business Daily Africa, 2020. https://www.businessdailyafrica.com.

[14] Mourtzis D, Fotia S, Vlachou E, et al. A Lean PSS design and evaluation framework supported by KPI monitoring and context sensitivity tools. International Journal of Advanced Manufacturing Technology, 2020, 94(5–8): 1623–1637.

[15] Cervone H F. Cybersecurity challenges for higher education institutions in integrating technology. Information Systems and Technology, 2020, 25(2): 230–245.

[16] Kayes A S M, Badsha S. Security and privacy challenges in modern educational environments. Computers, 2021, 10(5): 53.

[17] Olabode O, Ibrahim Y, Olatunji I. Adoption of artificial intelligence to mitigate cybersecurity challenges in Africa. Journal of Emerging Technologies and Innovative Research, 2021, 8(7): 41–49.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2025 Science, Technology, Engineering and Mathematics.   All Rights Reserved.