<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="nlm-ta">Rea Press</journal-id>
      <journal-id journal-id-type="publisher-id">null</journal-id>
      <journal-title>Rea Press</journal-title><issn pub-type="ppub">3009-4496</issn><issn pub-type="epub">3009-4496</issn><publisher>
      	<publisher-name>Rea Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">https://doi.org/10.22105/masi.v1i2.54</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group><subject>Cyber security, African businesses, Business, Artificial intelligence.</subject></subj-group>
      </article-categories>
      <title-group>
        <article-title>The Outlook of Cyber Security in African Businesses: Issues and Way-Out</article-title><subtitle>The Outlook of Cyber Security in African Businesses: Issues and Way-Out</subtitle></title-group>
      <contrib-group><contrib contrib-type="author">
	<name name-style="western">
	<surname> Adeniran</surname>
		<given-names>Adedayo Ayomide</given-names>
	</name>
	<aff>‎Department of Geography and Planning, University of Ibadan, Nigeria.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname> Adeniran</surname>
		<given-names>Adetayo Olaniyi</given-names>
	</name>
	<aff>‎Department of Transport Planning and Logistics, University of Ilesa, Nigeria.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Familusi</surname>
		<given-names>Olayemi Babawole </given-names>
	</name>
	<aff>‎Department of Research and Public Policy, University of Ibadan, Nigeria.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Adedayo</surname>
		<given-names>Oluwafemi </given-names>
	</name>
	<aff>‎Project Strategy and Business Management, University of Waterlo, Canada‎.</aff>
	</contrib></contrib-group>		
      <pub-date pub-type="ppub">
        <month>05</month>
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>05</month>
        <year>2024</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <permissions>
        <copyright-statement>© 2024 Rea Press</copyright-statement>
        <copyright-year>2024</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.5/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</p></license>
      </permissions>
      <related-article related-article-type="companion" vol="2" page="e235" id="RA1" ext-link-type="pmc">
			<article-title>The Outlook of Cyber Security in African Businesses: Issues and Way-Out</article-title>
      </related-article>
	  <abstract abstract-type="toc">
		<p>
			This study explores the outlook of cyber security in African businesses. Issues and ways out in a changing environment were highlighted. Cybersecurity measures need to be strengthened because cybercrime is estimated to cost the African continent about $10 billion annually. With just 20,000 certified cyber security specialists in Africa compared to over 1.3 million in the US, the study emphasizes African firms' low awareness and understanding. Based on empirical research and worldwide cyber security indexes, the paper analyzes the main obstacles to successful cyber security measures, such as resource limitations, knowledge gaps, and insufficient legislative frameworks. It also delved into real-world implementation problems, including disjointed infrastructure and linguistic hurdles. The report suggests cyber security awareness, utilizing technology, and encouraging cooperation through public-private partnerships to minimize these issues. The study further highlights the application of Artificial Intelligence (AI), which is revolutionizing cyber security defenses and promoting the adoption of cyber security in Africa. African businesses can negotiate the complicated cyber security landscape, resulting in a more reliable and secure digital environment and enormous potential for economic growth.   
		</p>
		</abstract>
    </article-meta>
  </front>
  <body></body>
  <back>
    <ack>
      <p>null</p>
    </ack>
  </back>
</article>