The ODL African Continental Education Strategy: Anchoring AI/Machine Learning on the African Technological Innovation and Investment Table


  • Gabriel Kabanda University of Zimbabwe


Knowledge generation, innovation, sustainable development, economic framework, Cybersecurity, Artificial Intelligence, Machine Learning


Through the process of innovation, research produces knowledge and technology that are put to use in the real world. The development of applied scientific technologies can be judged by the number of technological advancements, patents, innovations, research papers that have been published, etc. The purpose of the research was to develop an economic framework and technology solutions for the development of knowledge, innovation, and enterprise on the African continent, using Zimbabwe as a representative example. The study examined the potential applications of cybersecurity and machine learning to the business of producing and disseminating information. The practice of cybersecurity involves a variety of policies, techniques, technologies, and procedures that work together to safeguard the availability, confidentiality, and integrity of computing resources, networks, software programs, and data from intrusion. Cybersecurity is the process of defending systems, networks, and programs from electronic (malicious) attacks. Machine learning (ML) is the process of creating models for the broad relationships among data sets after automatically analyzing massive data sets. Since the Pragmatism paradigm best exemplifies the harmony between knowledge and action, it was chosen as the research philosophy for this study. Focused group discussions served as the main study design while the qualitative component was predominantly used in the knowledge generating component, which was based on an integral research architecture that incorporates descriptive, narrative, theoretical, and experimental survey methodologies. The quantitative dimension investigated machine learning and cybersecurity prototype models using an experiment as a study design. The commercialization of priority projects for

strategic investment included post-harvest technologies, small-scale mining, mineral value addition, and bio-mining, clean water alternatives, mining waste-derived tile technologies, ICT innovations in machine learning and cybersecurity, and defense technologies. To direct the installation of upcoming cybersecurity systems in Africa, a Bayesian Network model for cybersecurity was developed. The research developed an effective network intrusion detection system using the KDDCup 1999 intrusion detection benchmark dataset. The sample included 494,020 instances of primary data with 42 variables that were analyzed mostly using the SNORT open source program and other Bayesian Network-supporting platforms. The most effective ML algorithms were considered while creating a Bayesian Network model.


Berman, D.S., Buczak, A.L., Chavis, J.S., and Corbett, C.L. (2019). “Survey of Deep Learning Methods for Cyber Security”, Information 2019, 10, 122; doi:10.3390/info10040122.

Bloice, M. & Holzinger, A., (2018), A Tutorial on Machine Learning and Data Science Tools with Python. Graz, Austria: s.n.

Burt, D., Nicholas, P., Sullivan, K., & Scoles, T. (2013). Cybersecurity Risk Paradox. Microsoft SIR.

Government of Zimbabwe’s Various Budget Statements by the Ministry of Finance, accessed at

Government of Zimbabwe’s Various Monetary Policy Statements by the Reserve Bank of Zimbabwe, accessed at

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. In Information Systems.

Jones, C. (1998) Introduction to Economic Growth, (W.W. Norton, 1998 First Edition, 2002 Second Edition).

Kabanda, G. (2013), “African context for technological futures for digital learning and the endogenous growth of a knowledge economy”, Basic Research Journal of Engineering Innovation (BRJENG), Volume 1(2), April 2013, pages 32-52,

Kabanda, G., (2021), “Performance of Machine Learning and Big Data Analytics paradigms in Cybersecurity and Cloud Computing platforms”, Global Journal of Computer Science and Technology: G Interdisciplinary Volume 21, Issue 2, Version 1.0, Year 2021; Type: Double Blind Peer Reviewed

International Research Journal; Publisher: Global Journals Online ISSN: 0975-4172 & Print ISSN: 0975-4350;

Performance of Machine Learning and Big Data Analytics Paradigms in Cybersecurity and Cloud Computing Platforms (

Kothari, C.R. (2004). Research Methodology Methods and Techniques 2nd Revised Edition. New Age International Publishers

Mazumdar, S., and Wang, J., (2018). Big Data and Cyber security: A visual Analytics perspective in S. Parkinson et al (Eds), Guide to Vulnerability Analysis for Computer Networks and Systems.

Menzes, F.S.D., Liska, G.R., Cirillo, M.A. and Vivanco, M.J.F. (2016) Data Classification with Binary Response through the Boosting Algorithm and Logistic Regression. Expert Systems with Applications, 69, 62-73.

Murugan, S., and Rajan, M.S., (2014). Detecting Anomaly IDS in Network using Bayesian Network, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278- 8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07,

Napanda, K., Shah, H., and Kurup, L., (2015). Artificial Intelligence Techniques for Network Intrusion Detection, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, IJERTV4IS110283, Vol. 4

Issue 11, November-2015.

Nielsen, R. (2015). CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan, Technical Report January 2015, Los Alamos National Laboratory, USA.

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from

machine learning perspective. Journal of Big Data.

Siti Nurul Mahfuzah, M., Sazilah, S., & Norasiken, B. (2017). An Analysis of Gamification Elements in Online Learning To Enhance Learning Engagement. 6th International Conference on Computing & Informatics.

Stallings, W., (2015). Operating System Stability. Accessed on 27th March, 2019. H15-OS8e.pdf

Thomas, E. M., Temko, A., Marnane, W. P., Boylan, G. B., & Lightbody, G. (2013). Discriminative and generative classification techniques applied to automated neonatal seizure detection. IEEE Journal of Biomedical and Health Informatics.

Truong, T.C; Diep, Q.B.; & Zelinka, I. (2020). Artificial Intelligence in the Cyber Domain: Offense and Defense. Symmetry 2020, 12, 410.

Umamaheswari, K., and Sujatha, S., (2017). Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud, Defence Science Journal, Vol. 67, No. 6, November 2017, pp. 645-653, DOI : 10.14429/dsj.67.11118.

Wilson, B. M. R., Khazaei, B., & Hirsch, L. (2015, November). Enablers and barriers of cloud adoption among Small and Medium Enterprises in Tamil Nadu. In: 2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 140-145). IEEE.




How to Cite

Kabanda, G. (2022). The ODL African Continental Education Strategy: Anchoring AI/Machine Learning on the African Technological Innovation and Investment Table. West African Journal of Open and Flexible Learning, 10(2), 33–96. Retrieved from



Keynotes & Addresses