<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="497" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://ir.zou.ac.zw/items/show/497?output=omeka-xml" accessDate="2026-05-02T18:32:15+02:00">
  <fileContainer>
    <file fileId="503">
      <src>https://ir.zou.ac.zw/files/original/8ba475350178bb601c0f930fedb011f4.pdf</src>
      <authentication>030d6cd484368a560ff90c0284852926</authentication>
    </file>
  </fileContainer>
  <collection collectionId="65">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="75">
                <text>Staff  Publications</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="1">
    <name>Text</name>
    <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2985">
              <text>THE IMPACT OF AI ON PRIVACY AND SECURITY OF DATA IN UNIVERSITIES IN ZIMBABWE: A&#13;
LITERATURE REVIEW&#13;
</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2986">
              <text>REASON GOBVU&#13;
</text>
            </elementText>
            <elementText elementTextId="2987">
              <text>NEVER KATSAMUDANGA</text>
            </elementText>
            <elementText elementTextId="2988">
              <text>GODFREY TSVUURA</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2989">
              <text>In this empirical paper we discussed the impact of AI on data privacy and security in universities in Zimbabwe. The integration of how artificial intelligence (AI) in universities has transformed various aspects of educational systems offering enhanced efficiencies and personalised learning experiences were discussed. This technological advancement raises significant concerns regarding data privacy and security. As universities increasingly rely on AI systems that process vast amounts of sensitive information, the risk of data breaches and unauthorised access escalates. With a focus on Zimbabwe, this research offers a systematicliterature analysis of the effects of AI on data security and privacy in higher education. The study explores topics such as application of AI in universities, data privacy and security concerns, ethical and legal gaps in the application of AI and prospects for AI adoption in a responsible manner, drawing on both worldwide and regional studies. The paper is couched in Information Security Theory which evolved in the 1970s–1980s within the field of computer security as government, military and corporate institutions began formulating formal information assurance standards (Bishop, 2003). Information Security Theory model became widely recognised through the U.S Department of Defense publication and the early academic security literature. The findings suggest that AI increases efficiency and personalisation in universities, it also puts universities at risk for algorithmic bias, data breaches and poor information governance. In Zimbabwean universities, these risks are worse due to inadequate infrastructure, poor implementation of data privacy laws and regulations and insufficient knowledge. The study ends by suggesting that strong legislative policies, cybersecurity frameworks and effective digital literacy programmes should be implemented to ensure responsible AI use.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="2990">
              <text>The Zimbabwe Open University Journal of Applied Social Sciences</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2991">
              <text>2026</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
  <tagContainer>
    <tag tagId="934">
      <name>Artificial Intelligence</name>
    </tag>
    <tag tagId="1360">
      <name>cybersecurit</name>
    </tag>
    <tag tagId="1358">
      <name>data security</name>
    </tag>
    <tag tagId="1357">
      <name>privacy</name>
    </tag>
    <tag tagId="1359">
      <name>universities</name>
    </tag>
    <tag tagId="30">
      <name>Zimbabwe</name>
    </tag>
  </tagContainer>
</item>
