Determinants of cybercrime victimization: experiences and multi-stage recommendations from a survey in Cameroon

JE Ntsama, F Tchakounte… - … Conference on e …, 2022 - Springer
JE Ntsama, F Tchakounte, D Tchakounte Tchuimi, A Faissal, FA Fotso Kuate, JY Effa…
International Conference on e-Infrastructure and e-Services for Developing …, 2022Springer
Cybercrimes are multiplying and spreading at an elusive speed commensurate with the
emerging technologies of the fourth revolution. Their sophistication and user's vulnerability
to attacks catalyze their success. Several surveys have been conducted to determine the
factors favoring victimization. However, they can only be applied within a contextual
framework since each ecosystem has particularities. Attempts in this direction are
unavailable in Cameroon where cybercrimes cost 12.2 billion CFA in 2021. This work …
Abstract
Cybercrimes are multiplying and spreading at an elusive speed commensurate with the emerging technologies of the fourth revolution. Their sophistication and user’s vulnerability to attacks catalyze their success. Several surveys have been conducted to determine the factors favoring victimization. However, they can only be applied within a contextual framework since each ecosystem has particularities. Attempts in this direction are unavailable in Cameroon where cybercrimes cost 12.2 billion CFA in 2021. This work consists of a semi-direct survey conducted in Cameroon in 2021 to provide the determinants explaining the most frequent cybercriminal techniques, the vulnerabilities left by the users, the most targeted population segments, and the socio-demographic and economic factors justifying this security fragility. The results relate to 370 questionnaires collected throughout the territory. According to descriptive statistics and the chi-square test, the explanatory variables of cybercrime victimization are gender, age, intellectual level, level of digital knowledge, level of Information and Communication Technology (ICT) proficiency, type of equipment used, the mobile and desktop operating system used, the possession of an anti-virus/anti-spam and the marital status. Within this work, we have identified threats and their drivers and a theoretical framework has been provided with several stages that could be followed to contain cybercrime.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果