Social Media Governance in Cameroon: An Inquiry Into its Regalian Role of Ensuring Security to Users
Keywords:
Social Media, Governance, Security, Users, Formal and InformalAbstract
The social media with its facinating speed and ease in communication has in the last three decades caused a systematic change in the livelihood of many and a new pattern in the modes of human interaction. Its multiplier effect is being felt heavily in the domain of comminication, medicine and businesses, with a move from traditional business to e-commerce. While applauding this technology that today unites the world as global village, it is recurrent in our daily dealings that the social media has its own setbacks, as no one seems to be safe from cybercriminals and persons with mailicious intents on the social media. It is on this premise that we set out in this research to investigate and uncover the nature of social media governance in Cameroon, while questioning its effectiveness in providing adequate safty to its users. Making use of both qualitative and quantitative research methods, our findings reveal that the existing formal and informal governance techniques applied both by the public and
piravte parties seems inefficent in resolving the already existing difficulties of social media users and if not upgraded, the situation might eventually become very degrading in the long-run. It is on this setback that we advocate for an increase in public-private partnership in the fight against cybercrimes and equally a greater cooperation amongst states for a global governance with the creation of a global social media policy.
References
Zerfass, A., Fink, S., & Linke, A. (2011). Social media governance : Regulatory frameworks as drivers of
success in online communications. Paper presented at the 14th Annual International Public Relations
Research Conference, Miami, Florida, March 9–12. P.5
Van Kersbergen, K., & van Waarden, F. (2004). ‘‘Governance as a bridge between disciplines : Cross-
disciplinary inspiration regarding shifts in governance and problems of governability, accountability and
legitimacy.’’ European Journal of Political Research, 43(2), 143–171.
McLuhen, M.1994 (First published 1964). Understanding Media, the Extension of Man, Massachusetts :
MIT Press.
Cyber Security guides for parents / child online protection guide by ANTIC p.15
Jasmine Roberts. (2016), Writing for Strategic Communication Industries, Ohio, Pressbooks P.85.
See cases of bloggers and influencers who make their earning as per the number of followers and views they
record on their page and content created. See also the case of companies who utilise social media outlets to
merket their products.
This is mostly justified by its fast interconnectiveness and it broadbased community. This large community
is generally viewed as a captivating audience by both the potential and actual Human Rights violators to
cause great damage(s) and pain to their victim(s) by spreading in most cases defamatory content to the
person of their victim for example.
Insecurity Insight. 2020. Social Media Monitoring, Bulletin 10. Cameroon September 2020. Switzerland :
Insecurity Insight.
Alfakoro, Abubakar S Yushau, Yahaya Aliyu Ismaila and Abdul Hadi Ayodeji. "Social Media and its
Impact on Governance Building in Africa : The Nigeria Scenario."Arabian J Bus Manag Review 11 (2021) :
P.2.
Terry Flew, 2015, ‘‘Social Media Governance’’ : Sage Journals. P 1
Andrew Liaopoulos. 2017. Cyberspace Governance and State Sovereignty. In Book Democracy and an
Open-Economy World Order, Springer, Pp25-35. P.27 ISBN 978-3-319-52168-8.
Patrick 2014, The unruled world. The case of good enough global governance. Foreign Affairs, 93, 58-73.
Available at https://relooney.com. Consulted 06/05/2024.
Lawrence S. Fikellstein 1995. ‘‘What is global governance ?’’ Global governance : A Review of
Multilateralism and International Organisations, 1(3), 367-372 available at
https://doi.org/10.1163/19426720-001-03-90000007. Consulted 06/05/2024.
Terry Flew, 2015, ‘‘Social Media Governance.’’ Sage Journals. P 1.
Social Media Governance, Managing Social Media Risk, available at https://pwc.blogs.com consulted
/03/2024.
Ibid.
It came into picture in 2001 and entered into force on July 1, 2004.
This Law was adopted by the 23rd session of the AU that held in Malabo, Equatorial Guinea 27th June 2014
and ratified by 13 countries as of 2023. They include Benin ; Cameroon, Chad ; Comoros, Djibouti, Gambia,
Guinea-Bissau, South Africa, Sierra Leone, Sao Tome and Principe, Sudan, and Tunisia. Available at
https://dataprotection.africa.com Uploaded 19 May 2023 and consulted 20 March 2024.
Paul Meyer., (2016) Outer Space and Cyberspace : A Tale of Two Security Realms. International Cyber
Norms : Legal, Policy & Industry Perspectives, Anna-Maria Osula and Henry Roiges (Eds.), NATO CCD
COE publications, Tallinn. P.155. (155-169)
Demchak and Dombrowski P. (2011). ‘‘Rise of Cyber Westphalian age’’, Strategic Studies, quarterly, 5, 32-
See the case of America and the Chinesse based Application Tik Tok being questioned and branded a spying
App by the American Administration.
See the position of leading world powers such as USA and Russia who are not bound by the Budapest
Convention on the scale of global governance on cyber governance and equally see the case of leading
economic powers in Africa on the scale of regional governance, such as Nigeria and South Africa who are
not bound by the African Malabo covention due to conflicting views with their internal laws. A clear
depiction of the ill effects of soverignty.
Freedman, D. (2008). The politics of media policy. Cambridge, UK : Polity Press, 264. Equally available in
International Journal of Communication3 (2009), Book Review 883)886 reviewed by Paniota Tsatsou,
Swansea University.
Cornish. (2015), ‘‘Governing Cyberspace through Constructive Ambiguity.’’ Global Politics and Strategy,
Volume 57, Issue 3, P.158 (153-176).
The two sides of Cybersecurity-Rand corporation available at https://www.rand.org consulted 20/01/2024.
Avalaible at https://www.centraleyes.com consulted 19/01/2024.
Douglass C. North, (1991), ‘‘Institutions’’, Journal of Economic Perspectives, vol.5, n°1, pp. 97-112
Boyer R. (1990), Théorie de la régulation. Une analyse critique, Agalma, Paris, La Découverte
Serkan Sevas & Suleyman Karatas., (2022) Cyber Governance Studies in ensuring Cybersecurity : an
overview of cybersecurity governance. International Cyber Law Review, Vol.3, pp 7-34. P8
Zerfass, A., Fink, S., & Linke, A. (2011). Social media governance : Regulatory frameworks as drivers of
success in online communications. Paper presented at the 14th Annual International Public Relations
Research Conference, Miami, Florida, March 9–12. P.5
Van Kersbergen, K., & Van Waarden, F. (2004). ‘‘Governance as a bridge between disciplines : Cross-
disciplinary inspiration regarding shifts in governance and problems of governability, accountability and
legitimacy.’’ European Journal of Political Research, 43(2), 143–171.
Savas S & Tapaloglu.N, (2019), ‘‘Data analysis through social media according to the classified crime.’’
Turkish Journal of Electronic Engineering and Computer Science vol.27(1) : 407-420.
Serkan Sevas & Suleyman Karatas., (2022), ‘‘Cyber Governance Studies in ensuring Cybersecurity : an
overview of cybersecurity governance.’’ International Cyber Law Review, Vol.3, pp 7-34.
See Gercke Marco, Understanding Cybercrime : A Guide for Developing Countries (ITU : Geneva, 2009)
p.84.
Uchenna Jerome Orji, 2015. Multilateral Legal responses to cyber Security in Africa : Any Hope for
Effective International cooperation ? 7th International Conference on Cyber Conflict, NATO CCD COE
Publications, Tallinn, p.107.
See Article 24 (1-6) of the Budapest Convention on Cybercrime, establishing issues and conditions for
extradiction in cybercrime offences.
See Section 24(4) of the Budapest Convention on Cybercrime
See Article 9 on Offences related to child pornography of the 2001 Budapest Convention.
However, some countries regard the criminalization of the online dissemination of xenophobic materials as
an impediment to free speech. See Kristin Archick “Cybercrime : The Council of Europe Convention”, CRS
Report for Congress, (September 28, 2006) p.3. See Article 9 on Offences related to child pornography of
the 2001 Budapest Convention.
Ibid.
See for e.g., The African Union Convention on Cyber Security and Data Protection (Malabo, 2014) and The
Council of Europe, Convention on Cybercrime, 41 I.L.M. 282 (Budapest, 23.XI, 2001).
Enow Godwill Baiye, (2022), ‘‘The Form and Content of Advertisement in Cameroon : Does Regulation
Really Matters ?’’ Journal of Law of Torts and Consumer Protection Law. Vol.5 No. 1, p.1.
Law No. 2016/007 of 12 th July 2016 revising the Penal Code
See section 241-1 New of the Penal Code.
Lauched by its Secretary General Antonio GUTERRES ? where he stressed that ‘Silence may indeed be just
another name for indifference to bigotry and intolerance.’
See Section 22(1) of the Law No 98/014 of 13 July 1998 to govern Telecommunications in Cameroon.
Dominique Armand LONG WELADJI, (2009), La protection des consommateurs des services de
Communications électroniques au Cameroun, Master II memoire, Université Catholique d'Afrique Centrale,
Institut Catholique de Yaoundé, http://www.memoireonline.com, (accessed 20/03/2015).
Ibid. Section 21(2).
A reading of Mua Patrick in The Guardian Post Daily 12 November 2023, 04 : 49.
Uploaded to Cameroon News Agency Facebook page by Lambert Binla on 29 December 2020 and
consulted 22/04/2024.
Available at http//;www.Antic.cm consulted on the 15/11/2022.
Ntanhdui Ntanhdui B., (2019) The Protection of Bank Customers Against Cybercrimes, Masters
Dissertation, University of Dschang, Faculty of Law and Political Science, P51 Unpublished.
Ibid.
Ibid.
A reading of Shing Timothy in The Guardien Post edition of 07 August 2023.
Speech of MINPOSTEL Conference of Governors 2017, Ministry of Post and Telecommunication, available
at https://www.minpostel.gov.cm consulted 05/05/2024.
See Section 3(1) of Law No 98/014 of 13 July 1998 to govern Telecommunications in Cameroon which is to
the effect that Administration in charge of telecommunications - The Ministry or Minister, as the case may
be, is vested with general authority over the telecommunications sector, on behalf of the Government.
Kinga Helen K., 2016, Mobile Telecommunication Operator and the Protection of Consumers in Cameroon
University of Dschang, Faculty of Law and Political Science, Masters Dissertation, P.41 Unpublished.
Amindeh Blaise Atabong (2023) Cameroon join forces with NGOs to counter cyber crime, available online
at ITWeb Africa https://itweb.africa consulted 03/05/2024.
This Decree by virtue of its section 89 abrogates the Lawof 29 July 1981 on Press Freedom and Law No. 66-
LF18 of 21 December 1966 on the press and amendments thereto, and Law No. 87-19 of 17 December
to lay down the regulations governing audiovisual communication in Cameroon.
See section 88
See the missions of the NCC as spelled out in Article 4 of Decree No 2012/038 of 23 January 2012 on the
Re-organisation of the National Communication Council.
Conseil National de la Communication. https://cnc.gov.cm
National Communication and Press Freedom in Cameroon available at https://www.researchkey.net.
Consulted 07/05/2024.
Prime Minister Joseph Dion Ngute commissioned the new President of the media regulatory body, Joseph
Chebonkenk alabubse with instructions to ensure the respect of ethics and deontology, fight against hate
speech and the spread of fake news among other. A reading of Cameroon Tribune No 12378/8577 of 30th
June 2021, p.4.
Commission de Droits de l’homme available at https://www.cdhc.cm consulted 05/05/2024.
See section 3(1) of Law No 2019/014 of July 2019 Relating to the establishment, organization and
functioning of the Cameroon Human Rights Commission.
See section 3(2) Ibid.
Section 5 Ibid.
See section 8 Ibid.
Y.K. Sabharwal, The Role of the Judiciary in Good Governance, High Court of India, available at
https://highcourtchd.gov.in consulted 5/5/2024.
Ibid
Cameroon News Agency available at https://cameroonnewsagency.com consulted 22 :05 :2024.
CFIB/017b/2015 (Unreported)
Law No. 2010/012 of 21 st December 2010 relating to Cyber Security and Cyber Criminality in Cameroon
Yata E. Tantoh & Bafuke E, Nji., (2021), “Social Media and Cybercrimes : An Appraisal of Prosecution in
Cameroon”, Review Internationale de Droit et Science Politique (R.I.D.S.P), Vol.1, No 3, p.893.
CFI Buea/011A/2013, unreported.
Mbah V. T., Mbifi R., Kelese G.S. (2024). ‘‘The intricases in guaranteeing a safe haven for social media
users in times of snowballing cyber criminality in cameroon.’’ Journal of the Center for Research and
Expertise in Governance, International and Strategic Relations in Africa, No 3, p.227. (207-231).
Ibid.
Aleksander Kalisz (2023), Public-Priavte Partnership on Cybersecurity and International Law : Finding
Multilateral Solutions. Cambridge University Press, P.1.
Mbah V. T. et al, Op cit note 76.
Available at ITWeb https://www.itweb.co.za consulted 03/05/2024.
Cameroon News Agency (CNA), available online at https://cameroonnewsagency.com consulted
/05/2024.
A reading of Amindeh Blaise Atabong in ITWeb ‘’Cameroon rolls out tech plan to root out fraud.’’ 16 Jan
available at https://www.docusign.com consulted 07/05/2024.
Ellyne Phneah, contributor on March 8, 2013 available at https://www.zdnet.com accessed 20/9/2022.
Sega Enterprises Ltd. v. Sabella, 1997 Copyr. Law. Dec. 27, 648 (N.D. Cal. Dec. 18, 1996). The court held
that the BBS operator was not directly liable because she did not directly cause the copying of the video
games. They are condition of originality and creation.
FindLaw Attorney Writers (2008). Copyright Law and the Internet : Selected Statutes and Cases. Available
cases.html#:~:text=The%20Act%20was%20designed%20to%20increase%20the%20protection,identity%20
of%20its%20author%20and%20conditions%20for%20use. Accessed on the 30th of March, 2024.
Tessian (2021), The psychology of human error. Available at https://www.tessian.com/research/the-
psychology-of-human-error/. Accessed 01/05 /2024.
Available at https://www.ekransystem.com. Consulted 04/05/2024
Cyber security breaches caused by employees
A two days seminar was organised by NAICT in Douala, the chief town of the Litoral Region from the 04-
May 2017 to groomed ythe legal practitioners on cybercriminality. Available at antic.cm https://antic.cm
consulted 03/04/2024.
Policy Standard Procedures Guidelines available at https://policies.vt.edu consulted 04/05/2024.
Available at https://ca.indeed.com consulted 04/05/2024.