Cybersecurity Practices and International Relations Performance in Rwanda. A Case of Broadband Systems Corporation
DOI:
https://doi.org/10.47604/jir.3055Keywords:
Cybersecurity Policies, Cybersecurity Practices, Cybersecurity Technology, Cybersecurity Training, International Relations PerformanceAbstract
Purpose: The general objective of the research was to assess the effect of cybersecurity practices on international relations performance in Rwanda, a case of Broadband Systems Corporation. Specifically, the study determined the effect of cybersecurity policies on the international relations performance in Rwanda, to find out the effect of cybersecurity technology on the international relations performance in Rwanda and to assess the effect of cybersecurity training on the international relations performance in Rwanda.
Methodology: Descriptive, correlational, qualitative and quantitative based on primary and secondary data were used in the study. This research aimed to gather data from 229 employees, stakeholders of Broadband Systems Corporation, including company officials, cybersecurity staff and beneficiaries. Using Slovin's approach, the researcher determined the number of participants needed for the sample. Researcher had 146 participants in their sample, out of a total population of 229. The researcher used questionnaires question to gather primary data. The researcher analyzed the data using SPSS (Statistical Package for Social Scientists, version 25) to grasp statistics such as percentage, mean, standard deviation, and frequency. Bivariate correlation analysis was performed to investigate the hypotheses.
Findings: The model demonstrates a multiple correlation coefficient (R) of 0.877, signifying a robust positive correlation among cybersecurity policies, cybersecurity technology, and cybersecurity training with the dependent variable, international relations performance in Rwanda. Analysis of Variance results for the regression analysis shows the F-value is 141.583, which indicates a highly significant model fit. The significance level (Sig.) is .000, demonstrating that the predictors cybersecurity technology, cybersecurity policies, and cybersecurity training significantly contribute to explaining variations in international relations performance.
Unique Contribution to Theory, Practice and Policy: BSC should implement continuous cybersecurity awareness training to help employees recognize and respond to common cyber threats.
Downloads
References
Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eigenpub Review of Science and Technology, 7(1), 138-158.
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754.
Amoo, O. O., Osasona, F., Atadoga, A., Ayinla, B. S., Farayola, O. A., & Abrahams, T. O. (2024). Cybersecurity threats in the age of IoT: A review of protective measures. International Journal of Science and Research Archive, 11(1), 1304-1310.
Barron, E. N. (2024). Game theory: an introduction. John Wiley & Sons.
Chitadze, N. (2023). Basic Principles of Information and Cyber Security. In Analyzing New Forms of Social Disorders in Modern Virtual Environments (pp. 193-223). IGI Global.
Comparitech. (2024, April). Data breaches: Statistics by location. Retrieved from https://techjury.net/blog/data-breach-statistics/
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: A systematic review of data availability. Geneva Papers on Risk and Insurance - Issues and Practice, 47(3), 698-736.
Harvey, J. F., Bresman, H., Edmondson, A. C., & Pisano, G. P. (2022). A strategic view of team learning in organizations. Academy of Management Annals, 16(2), 476-507.
Hasani, T., O’Reilly, N., Dehghantanha, A., et al. (2023). Evaluating the adoption of cybersecurity and its influence on organizational performance. SN Business & Economics, 3, 97.
Hassan, A. O., Ewuga, S. K., Abdul, A. A., Abrahams, T. O., Oladeinde, M., & Dawodu, S. O. (2024). Cybersecurity in banking: a global perspective with a focus on Nigerian practices. Computer Science & IT Research Journal, 5(1), 41-59.
Huang, Y., & Zhu, Q. (2022). Game-theoretic frameworks for epidemic spreading and human decision-making: A review. Dynamic Games and Applications, 12(1), 7-48.
Kala, E. S. M. (2023). Critical role of cyber security in global economy. Open Journal of Safety Science and Technology, 13(4).
Kam, H. J., Ormond, D. K., Menard, P., & Crossler, R. E. (2022). That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training. Information Systems Journal, 32(4), 888-926.
Khan, W. M., & Padhy, D. (2022). Cybersecurity, international relations and India’s foreign policy - Historical perspective and prospects. International Journal of Scientific Development and Research (IJSDR), 7(7), 488.
Leng, Y., Dong, X., Moro, E., & Pentland, A. (2024). Long-range social influence in phone communication networks on offline adoption decisions. Information Systems Research, 35(1), 318-338.
Mbatha, B. (2024). Diffusion of Innovations: How Adoption of New Technology Spreads in Society. In Information, Knowledge, and Technology for Teaching and Research in Africa: Human Machine Interaction and User Interfaces (pp. 1-18). Cham: Springer Nature Switzerland.
Naseer, H., Desouza, K., Maynard, S. B., & Ahmad, A. (2024). Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics. European Journal of Information Systems, 33(2), 200-220.
Nujen, B. B., Kvadsheim, N. P., Mwesiumo, D., Reke, E., & Powell, D. (2023). Knowledge obstacles when transitioning towards circular economy: an industrial intra-organisational perspective. International Journal of Production Research, 61(24), 8618-8633.
Peschl, M. F. (2023). Learning from the future as a novel paradigm for integrating organizational learning and innovation. The Learning Organization, 30(1), 6-22.
Putteeraj, M., Bhungee, N., Somanah, J., & Moty, N. (2022). Assessing E-Health adoption readiness using diffusion of innovation theory and the role mediated by each adopter's category in a Mauritian context. International Health, 14(3), 236-249.
Radanliev, P. (2024). Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. Journal of Cyber Security Technology, 1–51.
Shaikh, F. A., & Siponen, M. (2023). Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions. Information Systems Frontiers, 1-12.
Sophos. (2024, May). The State of Phishing in Q1 2024. Retrieved from https://www.sophos.com/en-us/products/phish-threat
Ukhanova, E. (2022). Cybersecurity and cyber defence strategies of Japan. In SHS Web of Conferences (Vol. 134, p. 00159). EDP Sciences.
Von Stein zu Nord-und Ostheim, H. F. (2022). The UKUSA Agreement: The History of an Enduring Relationship (Doctoral dissertation).
Weiss, U., & Agassi, J. (2023). Game Theory and Social Science. In Games to Play and Games not to Play: Strategic Decisions via Extensions of Game Theory (pp. 61-83). Cham: Springer Nature Switzerland.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Daniel Mirenge Kayonga, Malgit Amos Akims, PhD, Festus Irungu Ndirang
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.