1 Information Science, University of North Texas, United States.
2 College of Technology, Davenport University, United States.
3 Computer Science, Troy University, United States.
4 School of Computing, Robert Gordon University, United Kingdom.
World Journal of Advanced Research and Reviews, 2025, 27(01), 1381-1393
Article DOI: 10.30574/wjarr.2025.27.1.2656
Received on 04 June 2025; revised on 12 July 2025; accepted on 14 July 2025
The integration of artificial intelligence (AI) into national cybersecurity frameworks represents a paradigmatic shift in how democratic nations approach digital defense and resilience planning. This article examines the multifaceted role of AI in shaping United States cybersecurity policy, analyzing current implementations, strategic frameworks, and emerging challenges. Through comprehensive analysis of policy documents, threat assessments, and technological capabilities, this study demonstrates that AI serves both as a critical enabler of cybersecurity resilience and a potential vector for sophisticated threats. The research reveals that while AI technologies offer unprecedented capabilities for threat detection, response automation, and predictive analysis, they simultaneously introduce novel vulnerabilities and ethical considerations that require careful policy navigation. The findings suggest that successful AI integration in national cybersecurity requires a balanced approach encompassing technological innovation, regulatory frameworks, public-private partnerships, and international cooperation.
Artificial Intelligence; Cybersecurity Policy; National Security; Resilience Planning; Digital Infrastructure; Threat Detection
Preview Article PDF
Esther Chinwe Eze, Shakirat O. Raji, Grace A. Durotolu and Fen Danjuma John. The role of AI in national cybersecurity policy and resilience planning: A comprehensive analysis of the United States' strategic approach. World Journal of Advanced Research and Reviews, 2025, 27(01), 1381-1393. Article DOI: https://doi.org/10.30574/wjarr.2025.27.1.2656.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0