Developing an Algorithmic ICT Security Engineering Framework for Data Privacy Compliance in Zambian SME Law Firms

Authors

  • Moonga Shamwiinga* Electrical and Electronics Engineering University of Zambia, Lusaka, Zambia. Author
  • Simon Tembo Electrical and Electronics Engineering University of Zambia, Lusaka, Zambia. Author

Keywords:

Data privacy compliance, ICT security engineering, SME law firms, machine learning, Zambia Data Protection Act

Abstract

COVID-19 has accelerated the digital transformation of small- and medium-sized enterprises in Zambia, with even law firms now having a firm foothold online. Nevertheless, it has also increased the complexity of data privacy compliance and revealed many deficiencies with manual approaches to compliance. Under the Data Protection Act No. 3 of 2021, this challenge has a greater urgency as it requires organisations dealing with personal and sensitive information to adopt more robust governance, monitoring and protection systems. Zambian SME law firms are particularly open to such attacks because they handle sensitive client information while operating under financial, infrastructural, and technical limitations. Such aided approaches can remedy that, hence presented and established in this study was an algorithmic ICT security engineering framework for automating data privacy compliance monitoring, assessment, and management among such systems. The study employed a four-phase design science and mixed-methods framework consisting of: (1) algorithm development & optimisation; (2) simulation-based testing; (3) controlled experimental validation; and (4) real-world implementation assessment. The framework consisted of a machine learning-based compliance assessment engine, an intelligent privacy management module and a security engineering component that can adapt over time. Performance metrics included Compliance Assessment Accuracy (CAA), Precision, Recall, F1-score, Resource Utilisation Efficiency (RUE), Computational Overhead Ratio (COR), Threat Detection Rate (TDR), Mean Time to Detection (MTTD), Security Incident Response Time (SIRT), Implementation Success Index (ISI) and Return on Investment (ROI). Under a compact 18-feature configuration, the proposed hybrid compliance engine reached 91.8% CAA, 91.7% F1-score and considerable computational efficiency The framework was stably effective across a variety of simulated small to medium enterprise (SME) scenarios and showed an overall performance with respect to threat detection of 89.7%, mean-time-to-detection of just 5.8 seconds, and statistically significant improvements versus manual, rule-based, several conventional machine learning discrimination baselines. Materials and methods: Data were generated from network communications collected in the LaBrea honeypot (open-source). In the loop of continuous improvement, the pilot implementation led to a further enhancement in average compliance index from 60.2% up to 85.6%, resulting in a reduction of manual hours for audit from 36.7 to 13.7 per month, as well as the generation of an average security ROI at 44.3%. The results demonstrate that resource- aware compliance automation is achievable for Zambian SME law firms, and provide a tool to enhance privacy protection without the need for enterprise-scale infrastructure.

References

1. Andersson, L., & Kim, J. (2023). Privacy-by-design frameworks for enterprise data management: A comprehensive approach to automated privacy control. International Journal of Information Privacy, 12(4), 245– 267.

2. Banda, C., Mulenga, P., & Chanda, K. (2024). Digital transformation challenges in Zambian SME law firms: Resource constraints and technological adoption. African Journal of Legal Technology, 8(2), 134– 152.

3. Brown, A., Wilson, K., & Taylor, M. (2022). Controlled experiments in cybersecurity research: Best practices and validation frameworks. Journal of Cybersecurity Research, 15(3), 234–251.

4. Chama, R., Simukonda, L., & Mwansa, D. (2023). Machine learning applications in regulatory compliance: Opportunities for developing economies. Computers & Security, 118, 102–117.

5. Chen, L., & Rodriguez, M. (2024). Transformer-based models for automated regulatory compliance in financial services. Expert Systems with Applications, 201, 117–133.

6. Chen, L., Zhang, Q., & Kumar, S. (2023). Resource-efficient machine learning for cybersecurity in SMEs. Computers & Security, 125, 103–118.

7. Chishimba, M., & Kalaba, F. (2024). Cybersecurity infrastructure challenges in resource-constrained SMEs: A Zambian perspective. International Journal of Small Business and Enterprise Development, 31(3), 456–473.

8. Creswell, J. W., & Plano Clark, V. L. (2017). Designing and conducting mixed methods research (3rd ed.). SAGE Publications.

9. Davis, R., Martinez, C., & Anderson, P. (2023). Quantitative metrics for cybersecurity effectiveness assessment. IEEE Transactions on Information Forensics and Security, 18, 1456–1468.

10. Gregor, S., & Hevner, A. R. (2013). Positioning and presenting design science research for maximum impact. MIS Quarterly, 37(2), 337–355.

11. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105.

12. Johnson, R., Smith, K., & Davis, L. (2024). Neural network approaches for real-time breach detection in financial services. Information Security Journal, 33(2), 156–171.

13. Kabwe, H., Mwanza, J., & Phiri, S. (2024). Regulatory adaptation in cybersecurity: Zambian SMEs and the Data Protection Act implementation. African Law and Technology Review, 6(1), 23–41.

14. Kafue, P., & Mumbuna, A. (2022). Digital client confidentiality in Zambian law firms: Challenges and opportunities. Zambian Law Journal, 54(3), 187–203.

15. Kumar, A., & Singh, B. (2023). Simulation frameworks for cybersecurity research: A comprehensive review. Simulation Modelling Practice and Theory, 126, 102–119.

16. Kumar, R., Patel, S., & Thompson, J. (2023). Supervised learning systems for GDPR compliance assessment in European SMEs. European Journal of Information Systems, 32(4), 445–462.

17. Liu, X., & Williams, D. (2023). Self-learning security frameworks for dynamic cloud environments: Threat intelligence and regulatory adaptation. Journal of Cloud Computing, 12(1), 1–18.

18. Martinez, E., Brown, P., & Wilson, A. (2024). Deep learning models for automated classification of legal documents and privacy control implementation. Artificial Intelligence and Law, 32(2), 289–307.

19. Mbewe, T., & Katongo, J. (2024). Evidence-based compliance frameworks for SME policy formulation in Zambia. Public Policy and Administration Review, 18(3), 234–251.

20. Muchanga, K., & Siame, L. (2024). Economic impact of data privacy compliance on Zambian digital economy development. African Economic Research Journal, 29(4), 412–428.

21. Mulenga, S., Banda, F., & Zulu, K. (2024). Technical infrastructure challenges in Zambian SME cybersecurity implementation. African Technology Review, 15(2), 156–173.

22. Musonda, P., & Chanda, L. (2022). Cybersecurity threats in Zambian legal practice: An analysis of client data protection challenges. Cybersecurity and Law Review, 8(4), 278–295.

23. Mutale, G., & Sichone, M. (2022). Simulation modelling of SME operational environments in the Zambian legal sector. Operations Research and Management Science, 19(3), 145–162.

24. Mwanza, D., & Phiri, K. (2023). Digital transformation in Zambian SMEs: Privacy and security implications in the legal sector. International Journal of Law and Technology, 31(2), 123–140.

25. Mwila, J., & Zulu, P. (2023). Resource constraints and ICT security implementation in Zambian SME law firms. Small Business Economics, 61(3), 1123–1142.

26. National Data Protection Authority – Republic of Zambia. (2025). Enforcement guidelines and penalties under the Data Protection Act: Annual compliance report.

27. Park, S., & Brown, M. (2023). Predictive compliance assessment using machine learning: Regulatory change impact analysis. Regulatory Science and Technology, 16(4), 234–249.

28. Patel, N., & Kumar, R. (2022). Algorithmic approaches to data privacy compliance in resource-constrained environments. Information & Management, 59(4), 103–115.

29. Republic of Zambia. (2021). Data Protection Act No. 3 of 2021. Government Printer.

30. Rodriguez, M., & Thompson, J. (2022). Computational optimisation for cybersecurity in SMEs. Expert Systems with Applications, 198, 116–128.

31. Sakala, N., Mwanza, K., & Banda, T. (2022). Adaptive security systems for SME environments: Challenges in automatic threat response. African Journal of Cybersecurity, 5(3), 145–162.

32. Saunders, M., Lewis, P., & Thornhill, A. (2019). Research methods for business students (8th ed.). Pearson Education.

33. Simunji, K., & Katongo, A. (2024). Artificial intelligence applications in cybersecurity for resource-constrained organisations. AI and Cybersecurity Review, 12(1), 78–95.

34. Sommerville, I. (2016). Software engineering (10th ed.). Pearson Education.

35. Stake, R. E. (2005). Qualitative case studies. In N. K. Denzin & Y. S. Lincoln (Eds.), The SAGE handbook of qualitative research (3rd ed., pp. 443–466). SAGE Publications.

36. Tembo, M., Chanda, P., & Mulenga, R. (2023). Evolving cybersecurity threat landscape in Zambian legal practice: Compliance and protection strategies. International Cybersecurity Law Review, 9(4), 312–329.

37. Thompson, K., Anderson, B., & Garcia, L. (2024). Ensemble learning strategies for automated compliance assessment in healthcare organisations. IEEE Transactions on Biomedical Engineering, 71(5), 1234–1246.

38. Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.). SAGE Publications.

39. Zambia Development Agency. (2023). SME sector contribution to national economy: Annual statistical report 2023.

40. Zambian Institute of Advanced Legal Education. (2024). Technology adoption and resource constraints in Zambian law firms: Survey report 2024.

41. Zhang, H., Li, W., & Chen, Y. (2023). Machine learning approaches for cybersecurity in small and medium enterprises. Computers & Security, 124, 89–104.

Downloads

Published

2026-04-10

Issue

Section

Articles

How to Cite

Developing an Algorithmic ICT Security Engineering Framework for Data Privacy Compliance in Zambian SME Law Firms. (2026). World Journal of Multidisciplinary Studies, 3(4), 15-26. https://wasrpublication.com/index.php/wjms/article/view/316