Designing Intelligent Enterprise Architectures Integrating Generative AI with Cyber Defense and Data Driven Decision Frameworks

Authors

  • Adrian Lawrence Kingsbridge Senior Software Engineer, United Kingdom Author

DOI:

https://doi.org/10.15662/IJRAI.2026.0901004

Keywords:

Intelligent Enterprise Architecture, Generative AI, Cyber Defense, Data Driven Decision Making, Enterprise Analytics, Secure AI Systems, Decision Intelligence, AI Governance

Abstract

Enterprises are increasingly dependent on digital platforms to support strategic decision-making, operational efficiency, and competitive advantage. At the same time, escalating cyber threats and the growing complexity of data ecosystems challenge the effectiveness of traditional enterprise architectures. This paper proposes an intelligent enterprise architecture that integrates generative artificial intelligence with cyber defense mechanisms and data driven decision frameworks. The proposed architecture unifies advanced analytics, generative AI reasoning capabilities, and security-aware data pipelines to enable proactive, adaptive, and resilient decision intelligence. Generative AI is leveraged not only for predictive insights but also for scenario simulation, automated reasoning, and contextual explanation, while cyber defense components ensure continuous monitoring, threat detection, and risk mitigation. The framework embeds governance, transparency, and human oversight to support trustworthy and compliant AI adoption. By aligning decision intelligence with cybersecurity and architectural governance, the proposed approach enables enterprises to transition from reactive defense and fragmented analytics toward intelligent, integrated, and resilient enterprise systems. This research contributes a conceptual and methodological foundation for next-generation enterprise architectures capable of supporting secure, data driven, and AI-augmented decision-making across complex digital environments.

References

1. Bishop, C. M. (2010). Pattern Recognition and Machine Learning. Springer.

2. Chen, H., Chiang, R. H. L., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS Quarterly, 36(4), 1165–1188.

3. Mittal, S. (2025). From attribution to action: Causal incrementality and bandit-based optimization for omnichannel customer acquisition in retail media networks. International Journal of Research Publications in Engineering, Technology and Management, 8(6), 13171–13181. https://doi.org/10.15662/IJRPETM.2025.0806021

4. Archana, R., & Anand, L. (2025). Residual u-net with Self-Attention based deep convolutional adaptive capsule network for liver cancer segmentation and classification. Biomedical Signal Processing and Control, 105, 107665.

5. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

6. Ahmad, S. (2025). The Impact of Structured Validation and Audit Frameworks on the Fairness and Efficiency of AI-Driven Hiring Systems. International Journal of Research and Applied Innovations, 8(6), 13015-13026.

7. Vimal Raja, G. (2025). Context-Aware Demand Forecasting in Grocery Retail Using Generative AI: A Multivariate Approach Incorporating Weather, Local Events, and Consumer Behaviour. International Journal of Innovative Research in Science Engineering and Technology (Ijirset), 14(1), 743-746.

8. Lakshmi, A. J., Dasari, R., Chilukuri, M., Tirumani, Y., Praveena, H. D., & Kumar, A. P. (2023, May). Design and Implementation of a Smart Electric Fence Built on Solar with an Automatic Irrigation System. In 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1553-1558). IEEE.

9. Poornachandar, T., Latha, A., Nisha, K., Revathi, K., & Sathishkumar, V. E. (2025, September). Cloud-Based Extreme Learning Machines for Mining Waste Detoxification Efficiency. In 2025 4th International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 1348-1353). IEEE.

10. Ananth, S., Radha, K., & Raju, S. (2024). Animal Detection In Farms Using OpenCV In Deep Learning. Advances in Science and Technology Research Journal, 18(1), 1.

11. Khan, M. I. (2025). Big Data Driven Cyber Threat Intelligence Framework for US Critical Infrastructure Protection. Asian Journal of Research in Computer Science, 18(12), 42-54.

12. Ferdousi, J., Shokran, M., & Islam, M. S. (2026). Designing Human–AI Collaborative Decision Analytics Frameworks to Enhance Managerial Judgment and Organizational Performance. Journal of Business and Management Studies, 8(1), 01-19.

13. M. R. Rahman, “Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices”, jictra, vol. 15, no. 1, pp. 17–23, Dec. 2025, doi: 10.51239/jictra.v15i1.348.

14. Mohana, P., Muthuvinayagam, M., Umasankar, P., & Muthumanickam, T. (2022, March). Automation using Artificial intelligence based Natural Language processing. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 1735-1739). IEEE.

15. Sugumar, R. (2024). AI-Driven Cloud Framework for Real-Time Financial Threat Detection in Digital Banking and SAP Environments. International Journal of Technology, Management and Humanities, 10(04), 165-175.

16. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(01), 67-83.

17. Christadoss, J., Panda, M. R., Samal, B. V., & Wali, G. (2025). Development of a Multi-Objective Optimisation Framework for Risk-Aware Fractional Investment Using Reinforcement Learning in Retail Finance. Futurity Proceedings, 3.

18. Karnam, A. (2025). Rolling Upgrades, Zero Downtime: Modernizing SAP Infrastructure with Intelligent Automation. International Journal of Engineering & Extended Technologies Research, 7(6), 11036–11045. https://doi.org/10.15662/IJEETR.2025.0706022

19. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

20. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.

21. Poornima, G., & Anand, L. (2025). Medical image fusion model using CT and MRI images based on dual scale weighted fusion based residual attention network with encoder-decoder architecture. Biomedical Signal Processing and Control, 108, 107932.

22. Kusumba, S. (2025). Driving US Enterprise Agility: Unifying Finance, HR, and CRM with an Integrated Analytics Data Warehouse. IPHO-Journal of Advance Research in Science And Engineering, 3(11), 56-63.

23. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.

24. Hastie, T., Tibshirani, R., & Friedman, J. (2009). The Elements of Statistical Learning. Springer.

25. Kshetri, N. (2018). 1 Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80–89.

26. Manda, P. (2023). LEVERAGING AI TO IMPROVE PERFORMANCE TUNING IN POST-MIGRATION ORACLE CLOUD ENVIRONMENTS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(3), 8714-8725.

27. Pearl, J. (2009). Causality: Models, Reasoning, and Inference (2nd ed.). Cambridge University Press.

28. Rai, A., & Tiwana, A. (2020). Explainable AI: From black box to glass box. Journal of the Academy of Marketing Science, 48(1), 137–141.

29. Shmueli, G., & Koppius, O. R. (2011). Predictive analytics in information systems research. MIS Quarterly, 35(3), 553–572.

30. Varian, H. R. (2014). Big data: New tricks for econometrics. Journal of Economic Perspectives, 28(2), 3–28.

31. Zheng, Y., Capra, L., Wolfson, O., & Yang, H. (2014). Urban computing: Concepts, methodologies, and applications. ACM Transactions on Intelligent Systems and Technology, 5(3), Article 38.

Downloads

Published

2026-01-14

How to Cite

Designing Intelligent Enterprise Architectures Integrating Generative AI with Cyber Defense and Data Driven Decision Frameworks. (2026). International Journal of Research and Applied Innovations, 9(1), 13512-13519. https://doi.org/10.15662/IJRAI.2026.0901004