CHALLENGES OF INTEGRATING SURVEILLANCE TECHNOLOGIES AND SECURITY MANAGEMENT BY PRIVATE SECURITY PROVIDERS IN NAKURU COUNTY, KENYA

  • ANTHONY REBO NGURE Kenyatta University, Kenya
  • STEPHEN HANDA, PhD Kenyatta University, Kenya
Keywords: Security Challenges, Surveillance Technologies, security Management

Abstract

The study determined challenges of integrating surveillance technologies and security management by private security providers in Nakuru County, Kenya. The study utilized the Integrated System Theory of managing security information. The study adopted a descriptive research design which employed both quantitative and qualitative approaches in collecting and analyzing data which was then analyzed quantitatively and qualitatively. The study targeted private security providers in Nakuru County as unit of analysis. It also employed purposive, stratified, and simple random sampling techniques to select 30 respondents from ten (10) private security providers from the three sub counties distributed among the five sectors of the economy. Interviews and FGDs as well questionnaire were used in the collecting data. Findings indicated that inadequate networks and infrastructure presented additional difficulties for private security companies. Additionally, private security companies faced challenges such improper outcome analysis, corruption, and police intervention during investigations, which made it difficult to find the offenders and resulted in criminals operating freely on the streets. Similarly, security providers encounter technical difficulties such as complex security system installations carried out by unqualified individuals who lack the necessary knowledge and skills; frequent equipment breakdowns, blackouts, malfunctioning equipment, and shortage of qualified technicians. The study concluded that private security companies should use surveillance technologies to suit changing customer demands and keep up with changing crime trends; customers are satisfied with the functionalities of the surveillance technologies and that integrating surveillance technologies is not free of challenges. The study recommended that the police and private security personnel work together to respond to criminal activities and improve the use of surveillance technologies in incident response coordination.

 

Author Biographies

ANTHONY REBO NGURE, Kenyatta University, Kenya

Master of Arts in Security Science and Management, School of Law, Arts and Social Sciences

STEPHEN HANDA, PhD, Kenyatta University, Kenya

Lecturer, Department of Department of Security Diplomacy and Peace Studies

References

Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy?. Computers & Security, 39, 396-405. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0167404813001338

Atabek, O. (2019). Challenges in integrating technology into education. arXiv preprint arXiv:1904.06518. Retrieved from: https://arxiv.org/abs/1904.06518

Bree, R. T., & Gallagher, G. (2016). Using Microsoft Excel to code and thematically analyse qualitative data: a simple, cost-effective approach. All Ireland Journal of Higher Education, 8(2). Retrieved from: https://ojs.aishe.org/index.php/aishe- j/article/view/281

Da Veiga, A., & Eloff, J. H. (2010). A framework and assessment instrument for information security culture. Computers & security, 29(2), 196-207. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0167404809000923

Dede, C. (2011). Reconceptualizing technology integration to meet the necessity of transformation. Journal of Curriculum and Instruction, 5(1), 4-16. Retrieved from: http://www.joci.ecu.edu/index.php/JoCI/article/view/121

Elharrouss, O., Almaadeed, N., & Al-Maadeed, S. (2021). A review of video surveillance systems. Journal of Visual Communication and Image Representation, 77, 103116. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S1047320321000729

Fischer, C., Fishman, B., Dede, C., Eisenkraft, A., Frumin, K., Foster, B., ... & McCoy, A. (2018). Investigating relationships between school context, teacher professional development, teaching practices, and student achievement in response to a nationwide science reform. Teaching and Teacher Education, 72, 107-121. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0742051X17314130

Githae, A. A. W. (2019). Utilisation And Effectiveness Of Outsourced Private Security Services By Commercial Banks In Kenya (Doctoral dissertation). Retrieved from: http://41.89.227.156:8080/xmlui/handle/123456789/4614

Hagen, J., & Albrechtsen, E. (2009). Effects on employees' information security abilities by e‐ learning. Information Management & Computer Security, 17(5), 388-407. Retrieved  from: https://www.emerald.com/insight/content/doi/10.1108/09685220911006687/full/h tml

Hancock, D. R., Algozzine, B., & Lim, J. H. (2021). Doing case study research: A practical guide for beginning researchers. Retrieved from: https://books.google.co.ke/books?hl=en&lr=&id=G3FEEAAAQBAJ&oi=fnd&pg=PP1&dq=Hancock,+D.+R.,+Algozzine,+B.,+%26+Lim,+J.+H.+(2021).+Doing+case+study+research:+A+practical+guide+for+beginning+researchers.&ots=iqU6rwUY6f&sig=fzwIYq7MdnPLpnuNqUTDOYCsS-E&redir_esc=y#v=onepage&q&f=false

Hossein Nezhad Nedaei, B., Abdul Rasid, S. Z., Sofian, S., Basiruddin, R., & Amanollah Nejad Kalkhouran, A. (2015). A Contingency‐Based Framework for Managing Enterprise Risk. Global Business and Organizational Excellence, 34(3), 54-66. Retrieved from: https://onlinelibrary.wiley.com/doi/full/10.1002/joe.21604

Kallio, H., Pietilä, A. M., Johnson, M., & Kangasniemi, M. (2016). Systematic methodological review: developing a framework for a qualitative semi‐structured interview guide. Journal of advanced nursing, 72(12), 2954-2965. Retrieved from: https://onlinelibrary.wiley.com/doi/full/10.1111/jan.13031

KASSAN, P. L. (2021). Use of integrated security management system in crime prevention: a case of public referral hospitals in nairobi city county, kenya.

Keser, H., & Çetinkaya, L. (2013). ÖĞRETMEN VE ÖĞRENCİLERİN ETKİLEŞİMLİ TAHTA KULLANIMINA YÖNELİK YAŞAMIŞ OLDUKLARI SORUNLAR

Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S1874548215000207

Marshall, D., Thomas, T., Marshall, D., & Thomas, T. (2017). Photographs, CCTVs and Other Cameras. Privacy and Criminal Justice, 127-151. Retrieved from: https://link.springer.com/chapter/10.1007/978-3-319-64912-2_6

Memos, V. A., Psannis, K. E., Ishibashi, Y., Kim, B. G., & Gupta, B. B. (2018). An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Future Generation Computer Systems, 83, 619-628.

Neuendorf, K. A. (2017). The content analysis guidebook. sage. Retrieved from: https://books.google.co.ke/books?hl=en&lr=&id=nMA5DQAAQBAJ&oi=fnd&pg=PP1&dq=Neuendorf,+K.+A.+(2017).+The+content+analysis+guidebook.+sage.&ots=pIMkw3jz6r&sig=2aH_LKepCqrrUqqhMKr8C6J3TDA&redir_esc=y#v=onepage&q&f=false

Patel, R. (2021). A study on customer perception towards cctv security system. Patel Institute of BMC & IT, Uka Tarsadia University.

Porikli, F., Bremond, F., Dockstader, S. L., Ferryman, J., Hoogs, A., Lovell, B. C., ... & Venetianer, P. L. (2013). Video surveillance: past, present, and now the future [DSP Forum]. IEEE Signal Processing Magazine, 30(3), 190-198.

Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control systems: An introduction to the issue. IEEE Control Systems Magazine, 35(1), 20-23. Retrieved from: https://ieeexplore.ieee.org/abstract/document/7011179

Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International journal of information management, 36(2), 215-225. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0268401215001103

Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964-975. Retrieved from:  https://www.sciencedirect.com/science/article/abs/pii/S0167739X1630694X

Turner III, D. W., & Hagstrom-Schmidt, N. (2022). Qualitative interview design. Howdy or Hello? Technical and Professional Communication. Retrieved from: https://pressbooks.library.tamu.edu/howdyorhello/back-matter/appendix-qualitative-interview-design/

Wilson, C., Hargreaves, T., & Hauxwell-Baldwin, R. (2017). Benefits and risks of smart home technologies. Energy Policy, 103, 72-83. Retrieved from: https://www.sciencedirect.com/science/article/pii/S030142151630711X/?science2

Zheng, S., & Xia, Y. (2021). Private Security Companies in Kenya and the Impact of Chinese Actors. Available at SSRN 3859591. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0747563217300791
Published
2024-04-21
Section
Articles