11. Cupać, J. and Sienknecht, M. (2024). Regulate against the machine: How the EU mitigates AI harm to
democracy. Democratization, 31(5), pp.1–24. doi:https://doi.org/10.1080/13510347.2024.2353706.
12. Dimitriadis, D. (2025). US vs EU AI plans – A comparative analysis of the US and European approaches.
Available at: https://dcnglobal.net/posts/blog/us-vs-eu-ai-plans-a-comparative-analysis-of-the-us-and-
european-approaches [Accessed 5 Aug. 2025].
13. European Parliament (2025). EU AI Act: First regulation on artificial intelligence. Available at:
https://www.europarl.europa.eu/topics/en/article/20230601STO93804/eu-ai-act-first-regulation-on-
artificial-intelligence.
14. Gilbert, C. and Gilbert, M.A. (2024). The impact of AI on cybersecurity defense mechanisms: Future
trends and challenges. Global Scientific Journal, 12(9), pp.427–441.
doi:https://doi.org/10.11216/gsj.2024.09.229721.
15. Gstrein, O.J., Haleem, N. and Zwitter, A. (2024). General-purpose AI regulation and the European Union
AI Act. Internet Policy Review, 13(3). doi:https://doi.org/10.14763/2024.3.1790.
16. Isagah, T. and Dhaou, B. (2024). Artificial intelligence readiness in Africa: Status quo and future
research. Proceedings of the 2024 International Conference on AI Applications, pp.430–437.
doi:https://doi.org/10.1145/3680127.3680199.
17. Jørgensen, B.N. and Ma, Z.G. (2025). Impact of EU regulations on AI adoption in smart city solutions:
A review of regulatory barriers, technological challenges, and societal benefits. Information, 16(7),
p.568. doi:https://doi.org/10.3390/info16070568.
18. Kaur, R., Gabrijelčič, D. and Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature
review and future research directions. Information Fusion, 97(101804), pp.1–29.
doi:https://doi.org/10.1016/j.inffus.2023.101804.
19. Khan, M.I., Arif, A., Khan, A.R.A., Anjum, N. and Arif, H. (2025). The dual role of artificial intelligence
in cybersecurity: Enhancing defense and navigating challenges. International Journal of Innovative
Research in Computer Science and Technology, 13(1), pp.62–67.
doi:https://doi.org/10.55524/ijircst.2025.13.1.9.
20. Kharbanda, V., Seetharaman, A. and Maddulety, K. (2023). Application of artificial intelligence in
cybersecurity. International Journal of Security and Privacy in Pervasive Computing, 15(1), pp.1–13.
doi:https://doi.org/10.4018/ijsppc.318676.
21. Kumar, S. (2019). How AI & machine learning can help with government cyber security strategies. Xlpat.
30 July. Available at: https://en.xlpat.com/how-ai-machine-learning-can-helpwith-government-cyber-
security-strategies/
22. Ledbetter, L. (2022). Defense Advanced Research Projects Agency (DARPA). Webopedia. Available at:
https://www.webopedia.com/definitions/darpa/ [Accessed 26 Sep. 2025].
23. LG CNS (2016). Intelligence and security. LG CNS Blog. 7 November. Available at:
https://blog.lgcns.com/1247
24. Mary, B.J. (2025). Artificial intelligence as an anti-corruption tool (AI-ACT): Potentials and pitfalls for
top-down and bottom-up approaches. ResearchGate. Available at:
https://www.researchgate.net/publication/391662548_Artificial_Intelligence_as_an_Anti-
Corruption_Tool_AI-ACT_-Potentials_and_Pitfalls_for_Top-down_and_Bottom-up_Approaches.
25. Peredy, Z., Julaiti, K. and Laki, B. (2022). New opportunities of the Chinese companies in the big data
era. Employment, Education and Entrepreneurship (EEE-2022) Conference Proceedings. Available at:
https://www.researchgate.net/publication/364821564_New_Opportunities_of_the_Chinese_Companies
_in_the_Big_Data_Era.
26. Perlman, A. (2019). The growing role of machine learning in cybersecurity. Security Roundtable. 18
June. Available at: https://www.securityroundtable.org/the-growing-role-ofmachine-learning-in-
cybersecurity/
27. Perwej, Y., Abbas, S.Q., Dixit, J.P., Akhtar, N. and Jaiswal, A.K. (2021). A systematic literature review
on the cyber security. International Journal of Scientific Research and Management, 9(12), pp.669–710.
doi:https://doi.org/10.18535/ijsrm/v9i12.ec04.
28. Pina, E., Ramos, J., Jorge, H., Váz, P., Silva, J., Wanzeller, C., Abbasi, M. and Martins, P. (2024). Data
privacy and ethical considerations in database management. Journal of Cybersecurity and Privacy, 4(3),
pp.494–517. doi:https://doi.org/10.3390/jcp4030024.