Abstract
The development of information and communication technologies has brought in its wake the upsurge of cybercrime and has raised the need to take cyber security measures at all levels. One of them consists in placing the human being at the center of computer security, notably by studying the individual perceptions behind the desire to perform acts of security, including cyber security. This research work actually aims to use a mixed method to determine the rationale behind the intention of Cameroonian authorities to adopt and implement cyber security measures. The theoretical underpinnings of this research were posed by the Unified Theory of Acceptance and Use of Technology and the Health Belief Model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abubakar, A.I., et al.: A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Comput. Sci. 62, 221–227 (2015)
Andeme bikoro, D.M., et al.: Contribution of cybersecurity to electronic data protection in Cameroon (2017)
Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613–643 (2010)
Arabo, A.: Cyber security challenges within the connected home ecosystem futures. Procedia Comput. Sci. 61, 227–232 (2015)
Cameroon-info: Cameroun - cybercriminalité: Les Etats-Unis proposent leur expertise au Cameroun (2016). https://www.237online.com/article-30977-cameroun–cybercriminalit-eacute–les-etats-unis-proposent-leur-expertise-au-cameroun.html. Accessed 5 Nov 2017
Cameroun, I.A.: La cybercriminalite, une problematique majeure pour le Cameroun (2016). http://www.investiraucameroun.com/securite/0709-7867-la-cybercriminalite-une-problematique-majeure-pour-le-cameroun. Accessed 29 Oct 2017
Choejey, P., et al.: Cybersecurity practices for e-Government: an assessment in Bhutan. In: The 10th International Conference on e-Business, Bangkok, Thailand (2015)
Claar, C.L.: The adoption of computer security: an analysis of home personal computer user behavior using the health belief model. Utah State University (2011)
Conklin, A., White, G.B.: E-government and cyber security: the role of cyber security exercises. In: 2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006. IEEE (2006)
Damanpour, F.: Organizational innovation: a meta-analysis of effects of determinants and moderators. Acad. Manag. J. 34(3), 555–590 (1991)
Drew, J.: Managing cybersecurity risks. J. Account. 214(2), 44 (2012)
Fielder, A., et al.: Decision support approaches for cyber security investment. Decis. Support Syst. 86, 13–23 (2016)
Graham, M.E.: Health beliefs and self breast examination in black women. J. Cult. Divers. 9(2), 49 (2002)
Henseler, J., et al.: The use of partial least squares path modeling in international marketing. In: New challenges to international marketing, pp. 277–319. Emerald Group Publishing Limited (2009)
Henshel, D., et al.: Trust as a human factor in holistic cyber security risk assessment. Procedia Manuf. 3, 1117–1124 (2015)
Hughes, B.B., et al.: ICT/Cyber benefits and costs: reconciling competing perspectives on the current and future balance. Technol. Forecast. Soc. Change 115, 117–130 (2017)
Janz, N.K., Becker, M.H.: The health belief model: a decade later. Health Educ. Q. 11(1), 1–47 (1984)
Jick, T.D.: Mixing qualitative and quantitative methods: triangulation in action. Adm. Sci. Q. 24(4), 602–611 (1979)
Kaplan, J., et al.: Meeting the cybersecurity challenge. McKinsey & Company (2011)
Kim, J., et al.: User resistance to acceptance of In-Vehicle Infotainment (IVI) systems. Telecommun. Policy 40(9), 919–930 (2016)
MarketWatch: This is the new reality for cyber security: accept that hackers will get in (2016). http://www.marketwatch.com/story/this-is-the-new-reality-for-cyber-security-accept-that-hackers-will-get-in-2016-12-09. Accessed 9 Nov 2017
Rosenstock, I.M.: Historical origins of the health belief model. Health Educ. Monogr. 2(4), 328–335 (1974)
Rosenstock, I.M., et al.: Social learning theory and the health belief model. Health Educ. Q. 15(2), 175–183 (1988)
Savulescu, C.: Dynamics of ICT development in the EU. Procedia Econ. Finance 23, 513–520 (2015)
Steve Morgan, E.-I.-C.: Hackerpocalypse: a cybercrime revelation (2016). http://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/. Accessed 23 Oct 2017
Tenenhaus, M., et al.: PLS path modeling. Comput. Stat. Data Anal. 48(1), 159–205 (2005)
ThreatMetrix: 2017 Q1 Cybercrime Report. 160 W Santa Clara St San Jose, CA, 95113 United State (2017)
Turan, A., et al.: A theoretical model proposal: personal innovativeness and user involvement as antecedents of unified theory of acceptance and use of technology. Procedia-Soc. Behav. Sci. 210, 43–51 (2015)
Venkatesh, V., et al.: Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21–54 (2013)
Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46(2), 186–204 (2000)
Venkatesh, V., et al.: User acceptance of information technology: toward a unified view. MIS Q., 27(3), 425–478 (2003)
Wheeler, J.A.: Emerging risks in cyber security: Gartner’s top ten predictions (2016). http://blogs.gartner.com/john-wheeler/gartner-top-ten-cybersecurity-predicts/. Accessed 9 Nov 2017
WSJ: Dow Jones inadvertently exposed some customers’ information (2017). https://www.wsj.com/articles/dow-jones-inadvertently-exposed-some-customers-information-1500237742. Accessed 9 Nov 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Andeme Bikoro, D.M., Fosso Wamba, S., Kala Kamdjoug, J.R. (2018). Determinants of Cyber Security Use and Behavioral Intention: Case of the Cameroonian Public Administration. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) Trends and Advances in Information Systems and Technologies. WorldCIST'18 2018. Advances in Intelligent Systems and Computing, vol 746. Springer, Cham. https://doi.org/10.1007/978-3-319-77712-2_104
Download citation
DOI: https://doi.org/10.1007/978-3-319-77712-2_104
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77711-5
Online ISBN: 978-3-319-77712-2
eBook Packages: EngineeringEngineering (R0)