LITERATURE ANALYSIS ON THE ROLE OF ARTIFICIAL INTELLIGENCE IN STRENGTHENING CYBERSECURITY IN E-GOVERNMENT SERVICES
DOI:
https://doi.org/10.69916/jkbti.v5i2.455Keywords:
Artificial Intelligence, Cybersecurity, Digital Government, E-Government Services, Explainable AIAbstract
The rapid expansion of e-government services has increased the importance of cybersecurity in protecting public digital infrastructure, citizen data, and the continuity of government operations. In this context, Artificial Intelligence (AI) has emerged as a promising approach to strengthening cyber defense through real-time monitoring, anomaly detection, intelligent classification, and adaptive threat response. This study examines the role of AI in strengthening cybersecurity in e-government services through a Systematic Literature Review (SLR) of 27 selected articles published between 2019 and 2025. The review synthesizes the literature at the intersection of AI, cybersecurity, and digital government to identify major research trends, dominant methodological approaches, thematic classifications, and key implementation challenges. The findings show that AI is increasingly positioned not only as a tool for improving administrative efficiency, but also as a strategic enabler of cyber resilience in public-sector digital ecosystems. The literature highlights that machine learning, deep learning, explainable AI, anomaly detection, and privacy-preserving learning models have substantial potential for improving the security of citizen portals, digital identity systems, inter-agency platforms, and smart-government infrastructures. However, implementation remains constrained by fragmented data environments, interoperability problems, institutional readiness gaps, limited explainability, privacy concerns, and the dual-use nature of AI in cyber defense and cyber offense. This study concludes that AI is most effective when integrated into a broader socio-technical framework encompassing governance, accountability, transparency, and organizational capacity.
Downloads
References
T. Janowski, “Digital government evolution: From transformation to contextualization,” Government Information Quarterly, vol. 32, no. 3, pp. 221–236, 2015, doi: https://doi.org/10.1016/j.giq.2015.07.001
I. Mergel, N. Edelmann, and N. Haug, “Defining digital transformation: Results from expert interviews,” Government Information Quarterly, vol. 36, no. 4, art. no. 101385, 2019, doi: https://doi.org/10.1016/j.giq.2019.06.002
L. Carter and F. Bélanger, “The utilization of e-government services: Citizen trust, innovation and acceptance factors,” Information Systems Journal, vol. 15, no. 1, pp. 5–25, 2005, doi: https://doi.org/10.1111/j.1365-2575.2005.00183.x
F. Bélanger and L. Carter, “Trust and risk in e-government adoption,” The Journal of Strategic Information Systems, vol. 17, no. 2, pp. 165–176, 2008, doi: https://doi.org/10.1016/j.jsis.2007.12.002.
P. Gupta, A. Hooda, A. Jeyaraj, J. J. M. Seddon, and Y. K. Dwivedi, “Trust, risk, privacy and security in e-government use: Insights from a MASEM analysis,” Information Systems Frontiers, vol. 27, pp. 1089–1105, 2025, doi: https://doi.org/10.1007/s10796-024-10497-8.
B. W. Wirtz and W. M. Müller, “An integrated artificial intelligence framework for public management,” Public Management Review, vol. 21, no. 7, pp. 1076–1100, 2019, doi: https://doi.org/10.1080/14719037.2018.1549268.
B. W. Wirtz, P. F. Langer, and C. Fenner, “Artificial intelligence in the public sector – a research agenda,” International Journal of Public Administration, vol. 44, no. 13, pp. 1103–1128, 2021, doi: https://doi.org/10.1080/01900692.2021.1947319.
A. Zuiderwijk, Y.-C. Chen, and F. Salem, “Implications of the use of artificial intelligence in public governance: A systematic literature review and a research agenda,” Government Information Quarterly, vol. 38, no. 3, art. no. 101577, 2021, doi: https://doi.org/10.1016/j.giq.2021.101577.
R. Madan and M. Ashok, “AI adoption and diffusion in public administration: A systematic literature review and future research agenda,” Government Information Quarterly, vol. 40, no. 1, art. no. 101774, 2023, doi: https://doi.org/10.1016/j.giq.2022.101774.
J. Bullock, M. M. Young, and Y.-F. Wang, “Artificial intelligence, bureaucratic form, and discretion in public service,” Information Polity, vol. 25, no. 4, pp. 491–506, 2020, doi: https://doi.org/10.3233/IP-200223.
Ž. Bojović, Đ. Klipa, P. D. Bojović, I. M. Jovanović, J. Šuh, and V. Šenk, “Interconnected Government Services: An Approach toward Smart Government,” Applied Sciences, vol. 13, no. 2, art. no. 1062, 2023, doi: https://doi.org/10.3390/app13021062.
P. A. W. Putro, D. I. Sensuse, and W. S. S. Wibowo, “Framework for critical information infrastructure protection in smart government: A case study in Indonesia,” Information and Computer Security, vol. 32, no. 1, pp. 112–129, 2024, doi: https://doi.org/10.1108/ICS-03-2023-0031.
V. Figueroa, L. E. Sánchez Crespo, A. Santos-Olmo, D. G. Rosado, and E. Fernández-Medina, “Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals,” International Journal of Information Security, vol. 24, art. no. 121, 2025, doi: https://doi.org/10.1007/s10207-025-01024-0.
F. Kamoun, F. Iqbal, M. A. Esseghir, and T. Baker, “AI and machine learning: A mixed blessing for cybersecurity,” in 2020 International Symposium on Networks, Computers and Communications (ISNCC), 2020, art. no. 9297323, doi: https://doi.org/10.1109/ISNCC49221.2020.9297323.
N. Mohamed, “Current trends in AI and ML for cybersecurity: A state-of-the-art survey,” Cogent Engineering, vol. 10, no. 2, art. no. 2272358, 2023, doi: https://doi.org/10.1080/23311916.2023.2272358.
L. Ofusori, T. Bokaba, and S. Mhlongo, “Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction,” Applied Artificial Intelligence, vol. 38, no. 1, art. no. 2439609, 2024, doi: https://doi.org/10.1080/08839514.2024.2439609.
N. Capuano, G. Fenza, V. Loia, and C. Stanzione, “Explainable Artificial Intelligence in CyberSecurity: A Survey,” IEEE Access, vol. 10, pp. 93575–93600, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3204171.
I. H. Sarker, “Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview,” Security and Privacy, vol. 6, no. 5, art. no. e295, 2023, doi: https://doi.org/10.1002/spy2.295.
M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, “From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy,” IEEE Access, vol. 11, pp. 80218–80245, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3300381.
C. Nobles, “The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review,” Procedia Computer Science, vol. 239, pp. 547–555, 2024, doi: https://doi.org/10.1016/j.procs.2024.06.206.
D. Tranfield, D. Denyer, and P. Smart, “Towards a methodology for developing evidence-informed management knowledge by means of systematic review,” British Journal of Management, vol. 14, no. 3, pp. 207–222, 2003, doi: https://doi.org/10.1111/1467-8551.00375.
C. Okoli, “A Guide to Conducting a Standalone Systematic Literature Review,” Communications of the Association for Information Systems, vol. 37, art. 43, 2015, doi: https://doi.org/10.17705/1CAIS.03743.
Y. Xiao and M. Watson, “Guidance on Conducting a Systematic Literature Review,” Journal of Planning Education and Research, vol. 39, no. 1, pp. 93–112, 2019, doi: https://doi.org/10.1177/0739456X17723971.
H. Snyder, “Literature review as a research methodology: An overview and guidelines,” Journal of Business Research, vol. 104, pp. 333–339, 2019, doi: https://doi.org/10.1016/j.jbusres.2019.07.039.
M. J. Page et al., “The PRISMA 2020 statement: An updated guideline for reporting systematic reviews,” BMJ, vol. 372, p. n71, 2021, doi: https://doi.org/10.1136/bmj.n71.
V. Braun and V. Clarke, “Using thematic analysis in psychology,” Qualitative Research in Psychology, vol. 3, no. 2, pp. 77–101, 2006, doi: https://doi.org/10.1191/1478088706qp063oa.
J. Thomas and A. Harden, “Methods for the thematic synthesis of qualitative research in systematic reviews,” BMC Medical Research Methodology, vol. 8, art. 45, 2008, doi: https://doi.org/10.1186/1471-2288-8-45.
Q. N. Hong et al., “The Mixed Methods Appraisal Tool (MMAT) version 2018 for information professionals and researchers,” Education for Information, vol. 34, no. 4, pp. 285–291, 2018, doi: https://doi.org/10.3233/EFI-180221.
A. Al-Besher and K. Kumar, “Use of artificial intelligence to enhance e-government services,” Measurement: Sensors, vol. 24, Art. no. 100484, 2022, doi: https://doi.org/10.1016/j.measen.2022.100484.
R. Sen, G. Heim, and Q. Zhu, “Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics,” Communications of the Association for Information Systems, vol. 51, pp. 179–209, 2022, doi: https://doi.org/10.17705/1CAIS.05109.
N. Mohamed, “Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms,” Knowledge and Information Systems, vol. 67, pp. 6969–7055, 2025, doi: https://doi.org/10.1007/s10115-025-02429-y.
N. Capuano, G. Fenza, V. Loia, and C. Stanzione, “Explainable Artificial Intelligence in CyberSecurity: A Survey,” IEEE Access, vol. 10, pp. 93575–93600, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3204171.
H. Li, L. Ge, and L. Tian, “Survey: federated learning data security and privacy-preserving in edge-Internet of Things,” Artificial Intelligence Review, vol. 57, Art. no. 130, 2024, doi: https://doi.org/10.1007/s10462-024-10774-7.
M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, “From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy,” IEEE Access, vol. 11, pp. 80218–80245, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3300381.
C. Nobles, “The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review,” Procedia Computer Science, vol. 239, pp. 547–555, 2024, doi: https://doi.org/10.1016/j.procs.2024.06.206.
Downloads
Published
Scite Metrics
Altmetric
How to Cite
Issue
Section
License
Copyright (c) 2026 Erfan Wahyudi, Wiredarme

This work is licensed under a Creative Commons Attribution 4.0 International License.
Most read articles by the same author(s)
- Erfan Wahyudi, Muhammad Suhardi, CYBERSECURITY GOVERNANCE IN ELECTRONIC-BASED GOVERNMENT SYSTEMS: AN ANALYSIS OF THE GOVERNMENT’S LEGAL RESPONSIBILITY FOR PUBLIC DATA BREACHES , Jurnal Kecerdasan Buatan dan Teknologi Informasi: Vol. 4 No. 3 (2025): September 2025
- Wiredarme, CONSTITUTIONAL ACCOUNTABILITY OF THE GOVERNMENT FOR MACHINE LEARNING-BASED SYSTEM ERRORS IN DIGITAL PUBLIC SERVICES , Jurnal Kecerdasan Buatan dan Teknologi Informasi: Vol. 3 No. 3 (2024): September 2024
- Erfan Wahyudi, Wiredarme, CONSTITUTIONAL IMPLICATIONS OF THE USE OF MACHINE LEARNING IN INDONESIA’S SOCIAL ASSISTANCE SELECTION AND DISTRIBUTION SYSTEM , Jurnal Kecerdasan Buatan dan Teknologi Informasi: Vol. 2 No. 3 (2023): September 2023
- Wiredarme, STATE DIGITAL SOVEREIGNTY IN THE GOVERNANCE OF ARTIFICIAL INTELLIGENCE WITHIN INDONESIA’S GOVERNMENT SYSTEM , Jurnal Kecerdasan Buatan dan Teknologi Informasi: Vol. 2 No. 3 (2023): September 2023
- Erfan Wahyudi, Wiredarme, THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN ELECTION SUPERVISION: BETWEEN DIGITAL EFFECTIVENESS AND THE PROTECTION OF CITIZENS’ POLITICAL RIGHTS , Jurnal Kecerdasan Buatan dan Teknologi Informasi: Vol. 3 No. 3 (2024): September 2024













