Contribution of Cybersecurity to Electronic Data Protection in Cameroon

Doriane Micaëla ANDEME BIKORO, Université Catholique d'Afrique Centrale
Jean Robert KALA KAMDJOUG, Université Catholique d'Afrique Centrale
Adèle Diane MBALLA ONANA, Université Catholique d'Afrique Centrale
Christine ROUZAUD-DANIS, Toulouse Business School

Description

The advent of digital has made it possible to popularize cyberspaces at all levels, even within governments. But at the same time, the rise of cyberattacks has been exacerbated. The introduction of protective measures such as cybersecurity is aimed at decreasing the number of or preventing cyber-attacks in any form whatsoever. Having previously delineated our field of study in Cameroon e-governance, we propose a model of research that has borrowed constructs from the Health Belief Model (HBM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). Data are being collected through a combination of surveys and interviews with four private and public sector organizations. The main significance of this research work is that it seeks to add valuable input to the aggregate contribution of cybersecurity to the protection of electronic data.

 
Aug 10th, 12:00 AM

Contribution of Cybersecurity to Electronic Data Protection in Cameroon

The advent of digital has made it possible to popularize cyberspaces at all levels, even within governments. But at the same time, the rise of cyberattacks has been exacerbated. The introduction of protective measures such as cybersecurity is aimed at decreasing the number of or preventing cyber-attacks in any form whatsoever. Having previously delineated our field of study in Cameroon e-governance, we propose a model of research that has borrowed constructs from the Health Belief Model (HBM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). Data are being collected through a combination of surveys and interviews with four private and public sector organizations. The main significance of this research work is that it seeks to add valuable input to the aggregate contribution of cybersecurity to the protection of electronic data.