Purpose: The general objective of the research was to assess the effect of cybersecurity practices on international relations performance in Rwanda, a case of Broadband Systems Corporation. Specifically, the study determined the effect of cybersecurity policies on the international relations performance in Rwanda, to find out the effect of cybersecurity technology on the international relations performance in Rwanda and to assess the effect of cybersecurity training on the international relations performance in Rwanda. Methodology: Descriptive, correlational, qualitative and quantitative based on primary and secondary data were used in the study. This research aimed to gather data from 229 employees, stakeholders of Broadband Systems Corporation, including company officials, cybersecurity staff and beneficiaries. Using Slovin's approach, the researcher determined the number of participants needed for the sample. Researcher had 146 participants in their sample, out of a total population of 229. The researcher used questionnaires question to gather primary data. The researcher analyzed the data using SPSS (Statistical Package for Social Scientists, version 25) to grasp statistics such as percentage, mean, standard deviation, and frequency. Bivariate correlation analysis was performed to investigate the hypotheses. Findings: The model demonstrates a multiple correlation coefficient (R) of 0.877, signifying a robust positive correlation among cybersecurity policies, cybersecurity technology, and cybersecurity training with the dependent variable, international relations performance in Rwanda. Analysis of Variance results for the regression analysis shows the F-value is 141.583, which indicates a highly significant model fit. The significance level (Sig.) is .000, demonstrating that the predictors cybersecurity technology, cybersecurity policies, and cybersecurity training significantly contribute to explaining variations in international relations performance. Unique Contribution to Theory, Practice and Policy: BSC should implement continuous cybersecurity awareness training to help employees recognize and respond to common cyber threats.
Read full abstract