Advertisement

Determinants of Cyber Security Use and Behavioral Intention: Case of the Cameroonian Public Administration

  • Doriane Micaela Andeme Bikoro
  • Samuel Fosso Wamba
  • Jean Robert Kala Kamdjoug
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 746)

Abstract

The development of information and communication technologies has brought in its wake the upsurge of cybercrime and has raised the need to take cyber security measures at all levels. One of them consists in placing the human being at the center of computer security, notably by studying the individual perceptions behind the desire to perform acts of security, including cyber security. This research work actually aims to use a mixed method to determine the rationale behind the intention of Cameroonian authorities to adopt and implement cyber security measures. The theoretical underpinnings of this research were posed by the Unified Theory of Acceptance and Use of Technology and the Health Belief Model.

Keywords

Cyber security Behavior UTAUT HBM Cameroon 

References

  1. Abubakar, A.I., et al.: A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Comput. Sci. 62, 221–227 (2015)CrossRefGoogle Scholar
  2. Andeme bikoro, D.M., et al.: Contribution of cybersecurity to electronic data protection in Cameroon (2017)Google Scholar
  3. Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613–643 (2010)CrossRefGoogle Scholar
  4. Arabo, A.: Cyber security challenges within the connected home ecosystem futures. Procedia Comput. Sci. 61, 227–232 (2015)CrossRefGoogle Scholar
  5. Cameroon-info: Cameroun - cybercriminalité: Les Etats-Unis proposent leur expertise au Cameroun (2016). https://www.237online.com/article-30977-cameroun–cybercriminalit-eacute–les-etats-unis-proposent-leur-expertise-au-cameroun.html. Accessed 5 Nov 2017
  6. Cameroun, I.A.: La cybercriminalite, une problematique majeure pour le Cameroun (2016). http://www.investiraucameroun.com/securite/0709-7867-la-cybercriminalite-une-problematique-majeure-pour-le-cameroun. Accessed 29 Oct 2017
  7. Choejey, P., et al.: Cybersecurity practices for e-Government: an assessment in Bhutan. In: The 10th International Conference on e-Business, Bangkok, Thailand (2015)Google Scholar
  8. Claar, C.L.: The adoption of computer security: an analysis of home personal computer user behavior using the health belief model. Utah State University (2011)Google Scholar
  9. Conklin, A., White, G.B.: E-government and cyber security: the role of cyber security exercises. In: 2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006. IEEE (2006)Google Scholar
  10. Damanpour, F.: Organizational innovation: a meta-analysis of effects of determinants and moderators. Acad. Manag. J. 34(3), 555–590 (1991)Google Scholar
  11. Drew, J.: Managing cybersecurity risks. J. Account. 214(2), 44 (2012)Google Scholar
  12. Fielder, A., et al.: Decision support approaches for cyber security investment. Decis. Support Syst. 86, 13–23 (2016)CrossRefGoogle Scholar
  13. Graham, M.E.: Health beliefs and self breast examination in black women. J. Cult. Divers. 9(2), 49 (2002)Google Scholar
  14. Henseler, J., et al.: The use of partial least squares path modeling in international marketing. In: New challenges to international marketing, pp. 277–319. Emerald Group Publishing Limited (2009)Google Scholar
  15. Henshel, D., et al.: Trust as a human factor in holistic cyber security risk assessment. Procedia Manuf. 3, 1117–1124 (2015)CrossRefGoogle Scholar
  16. Hughes, B.B., et al.: ICT/Cyber benefits and costs: reconciling competing perspectives on the current and future balance. Technol. Forecast. Soc. Change 115, 117–130 (2017)CrossRefGoogle Scholar
  17. Janz, N.K., Becker, M.H.: The health belief model: a decade later. Health Educ. Q. 11(1), 1–47 (1984)CrossRefGoogle Scholar
  18. Jick, T.D.: Mixing qualitative and quantitative methods: triangulation in action. Adm. Sci. Q. 24(4), 602–611 (1979)CrossRefGoogle Scholar
  19. Kaplan, J., et al.: Meeting the cybersecurity challenge. McKinsey & Company (2011)Google Scholar
  20. Kim, J., et al.: User resistance to acceptance of In-Vehicle Infotainment (IVI) systems. Telecommun. Policy 40(9), 919–930 (2016)CrossRefGoogle Scholar
  21. MarketWatch: This is the new reality for cyber security: accept that hackers will get in (2016). http://www.marketwatch.com/story/this-is-the-new-reality-for-cyber-security-accept-that-hackers-will-get-in-2016-12-09. Accessed 9 Nov 2017
  22. Rosenstock, I.M.: Historical origins of the health belief model. Health Educ. Monogr. 2(4), 328–335 (1974)CrossRefGoogle Scholar
  23. Rosenstock, I.M., et al.: Social learning theory and the health belief model. Health Educ. Q. 15(2), 175–183 (1988)CrossRefGoogle Scholar
  24. Savulescu, C.: Dynamics of ICT development in the EU. Procedia Econ. Finance 23, 513–520 (2015)CrossRefGoogle Scholar
  25. Steve Morgan, E.-I.-C.: Hackerpocalypse: a cybercrime revelation (2016). http://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/. Accessed 23 Oct 2017
  26. Tenenhaus, M., et al.: PLS path modeling. Comput. Stat. Data Anal. 48(1), 159–205 (2005)MathSciNetCrossRefGoogle Scholar
  27. ThreatMetrix: 2017 Q1 Cybercrime Report. 160 W Santa Clara St San Jose, CA, 95113 United State (2017)Google Scholar
  28. Turan, A., et al.: A theoretical model proposal: personal innovativeness and user involvement as antecedents of unified theory of acceptance and use of technology. Procedia-Soc. Behav. Sci. 210, 43–51 (2015)CrossRefGoogle Scholar
  29. Venkatesh, V., et al.: Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21–54 (2013)CrossRefGoogle Scholar
  30. Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46(2), 186–204 (2000)CrossRefGoogle Scholar
  31. Venkatesh, V., et al.: User acceptance of information technology: toward a unified view. MIS Q., 27(3), 425–478 (2003)CrossRefGoogle Scholar
  32. Wheeler, J.A.: Emerging risks in cyber security: Gartner’s top ten predictions (2016). http://blogs.gartner.com/john-wheeler/gartner-top-ten-cybersecurity-predicts/. Accessed 9 Nov 2017
  33. WSJ: Dow Jones inadvertently exposed some customers’ information (2017). https://www.wsj.com/articles/dow-jones-inadvertently-exposed-some-customers-information-1500237742. Accessed 9 Nov 2017

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Doriane Micaela Andeme Bikoro
    • 1
  • Samuel Fosso Wamba
    • 2
  • Jean Robert Kala Kamdjoug
    • 1
  1. 1.GRIAGESCatholic University of Central AfricaYaoundéCameroon
  2. 2.Toulouse Business SchoolToulouseFrance

Personalised recommendations