{"id":1325,"date":"2026-01-01T16:01:00","date_gmt":"2026-01-01T13:01:00","guid":{"rendered":"https:\/\/qiraatafrican.com\/journal\/?post_type=article&#038;p=1325"},"modified":"2026-01-14T17:00:28","modified_gmt":"2026-01-14T14:00:28","slug":"cyberterrorism-and-national-security-of-african-states-in-a-changing-environment","status":"publish","type":"article","link":"https:\/\/qiraatafrican.com\/journal\/article\/cyberterrorism-and-national-security-of-african-states-in-a-changing-environment","title":{"rendered":"Cyberterrorism and National Security of African States in a Changing Environment"},"content":{"rendered":"\n<div class=\"wp-block-group is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-left wp-container-content-1\" style=\"font-size:20px;font-style:normal;font-weight:300\"><strong>Publisher: <\/strong>Qira&#8217;at Afriqiyah Magazine<strong><br>Issue:<\/strong> 67, January 2026<br><strong>ISSN<\/strong>: 2634-131X<strong><br>Year :<\/strong> 22<strong><br>Pages: <\/strong>44-59<strong><br>Author<\/strong>: Dr. Mostafa Shafeq Allam &#8211; Egypt<br>DOI: <a href=\"https:\/\/doi.org\/10.64665\/qirat.2026.2206701\">10.64665\/qirat.2026.2206703<\/a><br><a href=\"https:\/\/qiraatafrican.com\/journal\/wp-content\/uploads\/2026\/01\/\u0627\u0644\u0625\u0631\u0647\u0627\u0628-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0642\u0648\u0645\u064a-\u0644\u0644\u062f\u0648\u0644-\u0627\u0644\u0625\u0641\u0631\u064a\u0642\u064a\u0629-\u0641\u064a-\u0628\u064a\u0626\u0629-\u0645\u062a\u063a\u064a\u0631\u0629.pdf\" data-type=\"page\" data-id=\"38\">Download pdf<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized is-style-default\"><a href=\"https:\/\/qiraatafrican.com\/journal\/wp-content\/uploads\/2026\/01\/\u0627\u0644\u0625\u0631\u0647\u0627\u0628-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0642\u0648\u0645\u064a-\u0644\u0644\u062f\u0648\u0644-\u0627\u0644\u0625\u0641\u0631\u064a\u0642\u064a\u0629-\u0641\u064a-\u0628\u064a\u0626\u0629-\u0645\u062a\u063a\u064a\u0631\u0629.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"945\" src=\"https:\/\/qiraatafrican.com\/journal\/wp-content\/uploads\/2026\/01\/\u0627\u0644\u0625\u0631\u0647\u0627\u0628-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0642\u0648\u0645\u064a-\u0644\u0644\u062f\u0648\u0644-\u0627\u0644\u0625\u0641\u0631\u064a\u0642\u064a\u0629-\u0641\u064a-\u0628\u064a\u0626\u0629-\u0645\u062a\u063a\u064a\u0631\u0629.jpg\" alt=\"\" class=\"wp-image-1307\" style=\"width:200px\" srcset=\"https:\/\/qiraatafrican.com\/journal\/wp-content\/uploads\/2026\/01\/\u0627\u0644\u0625\u0631\u0647\u0627\u0628-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0642\u0648\u0645\u064a-\u0644\u0644\u062f\u0648\u0644-\u0627\u0644\u0625\u0641\u0631\u064a\u0642\u064a\u0629-\u0641\u064a-\u0628\u064a\u0626\u0629-\u0645\u062a\u063a\u064a\u0631\u0629.jpg 650w, https:\/\/qiraatafrican.com\/journal\/wp-content\/uploads\/2026\/01\/\u0627\u0644\u0625\u0631\u0647\u0627\u0628-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0642\u0648\u0645\u064a-\u0644\u0644\u062f\u0648\u0644-\u0627\u0644\u0625\u0641\u0631\u064a\u0642\u064a\u0629-\u0641\u064a-\u0628\u064a\u0626\u0629-\u0645\u062a\u063a\u064a\u0631\u0629-206x300.jpg 206w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n<\/div>\n\n\n<pre class=\"wp-block-preformatted\" style=\"text-align: justify; padding: 15px 15px;\"><strong><span style=\"font-family: 'andale mono', monospace; font-size: 18pt; line-height: 50px;\"><a name=\"abstract\"><\/a>Abstract:<\/span><\/strong><span style=\"font-family: 'courier new', courier, monospace; font-size: 14pt;\"><bdo dir=\"ltr\" lang=\"en\"><br \/><\/bdo>     The study examined the impacts of cyberterrorism on national security in the African continent by analyzing the dimensions of the relationship between national security and cybersecurity, monitoring cybersecurity indicators according to the International Telecommunication Union (ITU), and assessing the risks of cyberterrorism in Africa. It then reviewed strategies for combating cyberterrorism on the continent before turning to an exploration of the future of African national security in light of the increasing cyberterrorism threats facing Africa. The study revealed that African countries suffer from weak cyber legal frameworks, fragile technical measures despite development efforts, the absence of effective regulatory mechanisms, weak cyber capacity building, and limited cyber cooperation both within and beyond the continent.\n   Africa faces numerous risks in this context, most notably the rising rates of cybercrime, cyberterrorist targeting of critical infrastructure, terrorists\u2019 exploitation of cyberspace for recruitment and propaganda, the use of cyberspace as a means of financing, and the growing reliance on alternative communication networks and remote-control technologies to evade government surveillance. Awareness of the dangers of cyberterrorism has increased across Africa, prompting states to improve legal frameworks and strengthen external cooperation to combat cyberterrorism, adopt approaches aimed at enhancing societal and institutional awareness of this form of terrorism, and employ artificial intelligence to counter cyberterrorism in Africa.\n   In this context, the importance of the African Union and regional groupings\u2014such as the Southern African Development Community (SADC), the Economic Community of West African States (ECOWAS), and the East African Community (EAC)\u2014is evident in building regional cybersecurity strategies, facilitating data exchange, and leading joint action. These efforts help mitigate cyberterrorism risks facing vulnerable states on the continent, enhance Africa\u2019s community-based security capabilities, and integrate African countries into a unified and comprehensive preventive defense line to confront cybersecurity threats at all levels.\n\n<\/span><\/pre>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pages: 44-59<\/p>\n","protected":false},"author":95,"featured_media":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[714,715,713,48],"issuem_issue":[704],"coauthors":[705],"class_list":["post-1325","article","type-article","status-publish","format-standard","hentry","tag-cybersecurity","tag-cyberterrorism","tag-national-security","tag-terrorism","issuem_issue-issue-67-january-2026"],"_links":{"self":[{"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/article\/1325"}],"collection":[{"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/types\/article"}],"author":[{"embeddable":true,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/comments?post=1325"}],"version-history":[{"count":1,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/article\/1325\/revisions"}],"predecessor-version":[{"id":1326,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/article\/1325\/revisions\/1326"}],"wp:attachment":[{"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/media?parent=1325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/categories?post=1325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/tags?post=1325"},{"taxonomy":"issuem_issue","embeddable":true,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/issuem_issue?post=1325"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/qiraatafrican.com\/journal\/wp-json\/wp\/v2\/coauthors?post=1325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}