Social Media Governance in Cameroon: An Inquiry Into its Regalian Role of Ensuring Security to Users

Authors

  • Bafuke Evarestus

Keywords:

Social Media, Governance, Security, Users, Formal and Informal

Abstract

The social media with its facinating speed and ease in communication has in the last three decades caused a systematic change in the livelihood of many and a new pattern in the modes of human interaction. Its multiplier effect is being felt heavily in the domain of comminication, medicine and businesses, with a move from traditional business to e-commerce. While applauding this technology that today unites the world as global village, it is recurrent in our daily dealings that the social media has its own setbacks, as no one seems to be safe from cybercriminals and persons with mailicious intents on the social media. It is on this premise that we set out in this research to investigate and uncover the nature of social media governance in Cameroon, while questioning its effectiveness in providing adequate safty to its users. Making use of both qualitative and quantitative research methods, our findings reveal that the existing formal and informal governance techniques applied both by the public and
piravte parties seems inefficent in resolving the already existing difficulties of social media users and if not upgraded, the situation might eventually become very degrading in the long-run. It is on this setback that we advocate for an increase in public-private partnership in the fight against cybercrimes and equally a greater cooperation amongst states for a global governance with the creation of a global social media policy.

References

Zerfass, A., Fink, S., & Linke, A. (2011). Social media governance : Regulatory frameworks as drivers of

success in online communications. Paper presented at the 14th Annual International Public Relations

Research Conference, Miami, Florida, March 9–12. P.5

Van Kersbergen, K., & van Waarden, F. (2004). ‘‘Governance as a bridge between disciplines : Cross-

disciplinary inspiration regarding shifts in governance and problems of governability, accountability and

legitimacy.’’ European Journal of Political Research, 43(2), 143–171.

McLuhen, M.1994 (First published 1964). Understanding Media, the Extension of Man, Massachusetts :

MIT Press.

Cyber Security guides for parents / child online protection guide by ANTIC p.15

Jasmine Roberts. (2016), Writing for Strategic Communication Industries, Ohio, Pressbooks P.85.

See cases of bloggers and influencers who make their earning as per the number of followers and views they

record on their page and content created. See also the case of companies who utilise social media outlets to

merket their products.

This is mostly justified by its fast interconnectiveness and it broadbased community. This large community

is generally viewed as a captivating audience by both the potential and actual Human Rights violators to

cause great damage(s) and pain to their victim(s) by spreading in most cases defamatory content to the

person of their victim for example.

Insecurity Insight. 2020. Social Media Monitoring, Bulletin 10. Cameroon September 2020. Switzerland :

Insecurity Insight.

Alfakoro, Abubakar S Yushau, Yahaya Aliyu Ismaila and Abdul Hadi Ayodeji. "Social Media and its

Impact on Governance Building in Africa : The Nigeria Scenario."Arabian J Bus Manag Review 11 (2021) :

P.2.

Terry Flew, 2015, ‘‘Social Media Governance’’ : Sage Journals. P 1

Andrew Liaopoulos. 2017. Cyberspace Governance and State Sovereignty. In Book Democracy and an

Open-Economy World Order, Springer, Pp25-35. P.27 ISBN 978-3-319-52168-8.

Patrick 2014, The unruled world. The case of good enough global governance. Foreign Affairs, 93, 58-73.

Available at https://relooney.com. Consulted 06/05/2024.

Lawrence S. Fikellstein 1995. ‘‘What is global governance ?’’ Global governance : A Review of

Multilateralism and International Organisations, 1(3), 367-372 available at

https://doi.org/10.1163/19426720-001-03-90000007. Consulted 06/05/2024.

Terry Flew, 2015, ‘‘Social Media Governance.’’ Sage Journals. P 1.

Social Media Governance, Managing Social Media Risk, available at https://pwc.blogs.com consulted

/03/2024.

Ibid.

It came into picture in 2001 and entered into force on July 1, 2004.

This Law was adopted by the 23rd session of the AU that held in Malabo, Equatorial Guinea 27th June 2014

and ratified by 13 countries as of 2023. They include Benin ; Cameroon, Chad ; Comoros, Djibouti, Gambia,

Guinea-Bissau, South Africa, Sierra Leone, Sao Tome and Principe, Sudan, and Tunisia. Available at

https://dataprotection.africa.com Uploaded 19 May 2023 and consulted 20 March 2024.

Paul Meyer., (2016) Outer Space and Cyberspace : A Tale of Two Security Realms. International Cyber

Norms : Legal, Policy & Industry Perspectives, Anna-Maria Osula and Henry Roiges (Eds.), NATO CCD

COE publications, Tallinn. P.155. (155-169)

Demchak and Dombrowski P. (2011). ‘‘Rise of Cyber Westphalian age’’, Strategic Studies, quarterly, 5, 32-

See the case of America and the Chinesse based Application Tik Tok being questioned and branded a spying

App by the American Administration.

See the position of leading world powers such as USA and Russia who are not bound by the Budapest

Convention on the scale of global governance on cyber governance and equally see the case of leading

economic powers in Africa on the scale of regional governance, such as Nigeria and South Africa who are

not bound by the African Malabo covention due to conflicting views with their internal laws. A clear

depiction of the ill effects of soverignty.

Freedman, D. (2008). The politics of media policy. Cambridge, UK : Polity Press, 264. Equally available in

International Journal of Communication3 (2009), Book Review 883)886 reviewed by Paniota Tsatsou,

Swansea University.

Cornish. (2015), ‘‘Governing Cyberspace through Constructive Ambiguity.’’ Global Politics and Strategy,

Volume 57, Issue 3, P.158 (153-176).

The two sides of Cybersecurity-Rand corporation available at https://www.rand.org consulted 20/01/2024.

Avalaible at https://www.centraleyes.com consulted 19/01/2024.

Douglass C. North, (1991), ‘‘Institutions’’, Journal of Economic Perspectives, vol.5, n°1, pp. 97-112

Boyer R. (1990), Théorie de la régulation. Une analyse critique, Agalma, Paris, La Découverte

Serkan Sevas & Suleyman Karatas., (2022) Cyber Governance Studies in ensuring Cybersecurity : an

overview of cybersecurity governance. International Cyber Law Review, Vol.3, pp 7-34. P8

Zerfass, A., Fink, S., & Linke, A. (2011). Social media governance : Regulatory frameworks as drivers of

success in online communications. Paper presented at the 14th Annual International Public Relations

Research Conference, Miami, Florida, March 9–12. P.5

Van Kersbergen, K., & Van Waarden, F. (2004). ‘‘Governance as a bridge between disciplines : Cross-

disciplinary inspiration regarding shifts in governance and problems of governability, accountability and

legitimacy.’’ European Journal of Political Research, 43(2), 143–171.

Savas S & Tapaloglu.N, (2019), ‘‘Data analysis through social media according to the classified crime.’’

Turkish Journal of Electronic Engineering and Computer Science vol.27(1) : 407-420.

Serkan Sevas & Suleyman Karatas., (2022), ‘‘Cyber Governance Studies in ensuring Cybersecurity : an

overview of cybersecurity governance.’’ International Cyber Law Review, Vol.3, pp 7-34.

See Gercke Marco, Understanding Cybercrime : A Guide for Developing Countries (ITU : Geneva, 2009)

p.84.

Uchenna Jerome Orji, 2015. Multilateral Legal responses to cyber Security in Africa : Any Hope for

Effective International cooperation ? 7th International Conference on Cyber Conflict, NATO CCD COE

Publications, Tallinn, p.107.

See Article 24 (1-6) of the Budapest Convention on Cybercrime, establishing issues and conditions for

extradiction in cybercrime offences.

See Section 24(4) of the Budapest Convention on Cybercrime

See Article 9 on Offences related to child pornography of the 2001 Budapest Convention.

However, some countries regard the criminalization of the online dissemination of xenophobic materials as

an impediment to free speech. See Kristin Archick “Cybercrime : The Council of Europe Convention”, CRS

Report for Congress, (September 28, 2006) p.3. See Article 9 on Offences related to child pornography of

the 2001 Budapest Convention.

Ibid.

See for e.g., The African Union Convention on Cyber Security and Data Protection (Malabo, 2014) and The

Council of Europe, Convention on Cybercrime, 41 I.L.M. 282 (Budapest, 23.XI, 2001).

Enow Godwill Baiye, (2022), ‘‘The Form and Content of Advertisement in Cameroon : Does Regulation

Really Matters ?’’ Journal of Law of Torts and Consumer Protection Law. Vol.5 No. 1, p.1.

Law No. 2016/007 of 12 th July 2016 revising the Penal Code

See section 241-1 New of the Penal Code.

Lauched by its Secretary General Antonio GUTERRES ? where he stressed that ‘Silence may indeed be just

another name for indifference to bigotry and intolerance.’

See Section 22(1) of the Law No 98/014 of 13 July 1998 to govern Telecommunications in Cameroon.

Dominique Armand LONG WELADJI, (2009), La protection des consommateurs des services de

Communications électroniques au Cameroun, Master II memoire, Université Catholique d'Afrique Centrale,

Institut Catholique de Yaoundé, http://www.memoireonline.com, (accessed 20/03/2015).

Ibid. Section 21(2).

A reading of Mua Patrick in The Guardian Post Daily 12 November 2023, 04 : 49.

Uploaded to Cameroon News Agency Facebook page by Lambert Binla on 29 December 2020 and

consulted 22/04/2024.

Available at http//;www.Antic.cm consulted on the 15/11/2022.

Ntanhdui Ntanhdui B., (2019) The Protection of Bank Customers Against Cybercrimes, Masters

Dissertation, University of Dschang, Faculty of Law and Political Science, P51 Unpublished.

Ibid.

Ibid.

A reading of Shing Timothy in The Guardien Post edition of 07 August 2023.

Speech of MINPOSTEL Conference of Governors 2017, Ministry of Post and Telecommunication, available

at https://www.minpostel.gov.cm consulted 05/05/2024.

See Section 3(1) of Law No 98/014 of 13 July 1998 to govern Telecommunications in Cameroon which is to

the effect that Administration in charge of telecommunications - The Ministry or Minister, as the case may

be, is vested with general authority over the telecommunications sector, on behalf of the Government.

Kinga Helen K., 2016, Mobile Telecommunication Operator and the Protection of Consumers in Cameroon

University of Dschang, Faculty of Law and Political Science, Masters Dissertation, P.41 Unpublished.

Amindeh Blaise Atabong (2023) Cameroon join forces with NGOs to counter cyber crime, available online

at ITWeb Africa https://itweb.africa consulted 03/05/2024.

This Decree by virtue of its section 89 abrogates the Lawof 29 July 1981 on Press Freedom and Law No. 66-

LF18 of 21 December 1966 on the press and amendments thereto, and Law No. 87-19 of 17 December

to lay down the regulations governing audiovisual communication in Cameroon.

See section 88

See the missions of the NCC as spelled out in Article 4 of Decree No 2012/038 of 23 January 2012 on the

Re-organisation of the National Communication Council.

Conseil National de la Communication. https://cnc.gov.cm

National Communication and Press Freedom in Cameroon available at https://www.researchkey.net.

Consulted 07/05/2024.

Prime Minister Joseph Dion Ngute commissioned the new President of the media regulatory body, Joseph

Chebonkenk alabubse with instructions to ensure the respect of ethics and deontology, fight against hate

speech and the spread of fake news among other. A reading of Cameroon Tribune No 12378/8577 of 30th

June 2021, p.4.

Commission de Droits de l’homme available at https://www.cdhc.cm consulted 05/05/2024.

See section 3(1) of Law No 2019/014 of July 2019 Relating to the establishment, organization and

functioning of the Cameroon Human Rights Commission.

See section 3(2) Ibid.

Section 5 Ibid.

See section 8 Ibid.

Y.K. Sabharwal, The Role of the Judiciary in Good Governance, High Court of India, available at

https://highcourtchd.gov.in consulted 5/5/2024.

Ibid

Cameroon News Agency available at https://cameroonnewsagency.com consulted 22 :05 :2024.

CFIB/017b/2015 (Unreported)

Law No. 2010/012 of 21 st December 2010 relating to Cyber Security and Cyber Criminality in Cameroon

Yata E. Tantoh & Bafuke E, Nji., (2021), “Social Media and Cybercrimes : An Appraisal of Prosecution in

Cameroon”, Review Internationale de Droit et Science Politique (R.I.D.S.P), Vol.1, No 3, p.893.

CFI Buea/011A/2013, unreported.

Mbah V. T., Mbifi R., Kelese G.S. (2024). ‘‘The intricases in guaranteeing a safe haven for social media

users in times of snowballing cyber criminality in cameroon.’’ Journal of the Center for Research and

Expertise in Governance, International and Strategic Relations in Africa, No 3, p.227. (207-231).

Ibid.

Aleksander Kalisz (2023), Public-Priavte Partnership on Cybersecurity and International Law : Finding

Multilateral Solutions. Cambridge University Press, P.1.

Mbah V. T. et al, Op cit note 76.

Available at ITWeb https://www.itweb.co.za consulted 03/05/2024.

Cameroon News Agency (CNA), available online at https://cameroonnewsagency.com consulted

/05/2024.

A reading of Amindeh Blaise Atabong in ITWeb ‘’Cameroon rolls out tech plan to root out fraud.’’ 16 Jan

available at https://www.docusign.com consulted 07/05/2024.

Ellyne Phneah, contributor on March 8, 2013 available at https://www.zdnet.com accessed 20/9/2022.

Sega Enterprises Ltd. v. Sabella, 1997 Copyr. Law. Dec. 27, 648 (N.D. Cal. Dec. 18, 1996). The court held

that the BBS operator was not directly liable because she did not directly cause the copying of the video

games. They are condition of originality and creation.

FindLaw Attorney Writers (2008). Copyright Law and the Internet : Selected Statutes and Cases. Available

at https://corporate.findlaw.com/intellectual-property/copyright-law-and-the-internet-selected-statutes-and-

cases.html#:~:text=The%20Act%20was%20designed%20to%20increase%20the%20protection,identity%20

of%20its%20author%20and%20conditions%20for%20use. Accessed on the 30th of March, 2024.

Tessian (2021), The psychology of human error. Available at https://www.tessian.com/research/the-

psychology-of-human-error/. Accessed 01/05 /2024.

Available at https://www.ekransystem.com. Consulted 04/05/2024

Cyber security breaches caused by employees

A two days seminar was organised by NAICT in Douala, the chief town of the Litoral Region from the 04-

May 2017 to groomed ythe legal practitioners on cybercriminality. Available at antic.cm https://antic.cm

consulted 03/04/2024.

Policy Standard Procedures Guidelines available at https://policies.vt.edu consulted 04/05/2024.

Available at https://ca.indeed.com consulted 04/05/2024.

Published

2024-12-16

How to Cite

Evarestus, B. . (2024). Social Media Governance in Cameroon: An Inquiry Into its Regalian Role of Ensuring Security to Users. Journal of Constitutional Law and Jurisprudence, 8(1), 67–80. Retrieved from https://lawjournals.celnet.in/index.php/Jolj/article/view/1670