MOBILE PHONE TECHNOLOGY ADOPTION BY THE POLICE AS A COUNTER TERRORISM MEASURE IN NAIROBI CITY COUNTY, KENYA

  • DANIEL S. KANDIE Kenyatta University, Kenya
  • STEPHEN HANDA, PhD Kenyatta University, Kenya
Keywords: Mobile Phone Technology, Police Counter Terrorism Measure

Abstract

The study investigated the utilization of mobile phone technology by the National Police Service (NPS) in Nairobi City County (NCC) to combat the increasing threat of terrorism. With a notable gap in existing research on this topic, the purpose was to explore how mobile phone technology was employed within the NPS's counter-terrorism efforts. The objectives included assessing the extent of mobile technology adoption, identifying influencing factors, and understanding the challenges encountered by the NPS in utilizing this technology. Through a focused examination of the Anti-Terrorism Police Unit (ATPU) and specific mobile technologies utilized, the study sought to answer research questions pertaining to the extent, reasons, and limitations of the NPS's use of mobile phones for counter-terrorism. The study reviewed literature objectively with the aid of theories that included: Actor-Network Theory (ANT), the Technology Acceptance Model (TAM), and Unified Theory of Acceptance and Use of Technology (UTAUT). This study used a descriptive survey research design with qualitative and quantitative approaches to investigate the adoption of mobile phone technology by police officers in counterterrorism in NCC, Kenya. The target population of the study was police officers of all cadres from police constable to Gazetted officers based at ATPU. A stratified random sampling method was used to select a sample of 207 respondents. Data was collected using questionnaires and interviews. Quantitative data was analysed using descriptive statistics, while qualitative data was analysed thematically. The findings of the study revealed that police officers in NCC are aware of the benefits of using mobile phone technology in counterterrorism. However, there are a number of challenges that hinder the adoption of this technology, such as lack of training, lack of funding, and security concerns. The study recommends that the government should provide more training and funding to police officers so that they can effectively use mobile phone technology in counterterrorism. In conclusion, although moderate adoption exists, the full potential remains untapped. Factors influencing adoption were identified, including infrastructure, funding, training, collaboration, and policy support. Challenges like limited resources, technological barriers, and privacy concerns hinder optimal utilization. Recommendations focus on investment in infrastructure, securing adequate funding, and providing comprehensive training, fostering interagency collaboration, and addressing privacy concerns. These findings hold significant implications for stakeholders: Policymakers and law enforcement agencies can enhance counterterrorism efficiency and coordination by investing in technology and fostering collaboration. By addressing the recommendations, the safety and security of NCC and similar regions can be improved.

Author Biographies

DANIEL S. KANDIE, Kenyatta University, Kenya

Candidate, Master of Arts in Leadership and Security Management, School of Law, Arts and Social Sciences, Kenyatta University, Kenya

STEPHEN HANDA, PhD, Kenyatta University, Kenya

Lecturer, Department of Security, Diplomacy and Peace Studies, Kenyatta University, Kenya

References

Boffey, D. (2018). EU plans mobile terror alerts to counter spread of fake news. Counter-Terrorism policy. Accessed at https://www.theguardian.com/politics/2018/nov/13/mobile-phone-alerts-to-warn-europeans-if-near-terrorist-attack

Camacho-Collados, M., & Pilehvar, M. T. (2018). From Word to Sense Embeddings: A Survey on Vector Representations of Meaning. Journal of Artificial Intelligence Research, 69, 569-632.

Casey, E. (2014). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet (3rd ed.). Burlington, MA: Academic Press.

Casey, E., & Richards, H. (2011). Case Studies in Mobile Device Forensics. In R. Rogers, S. V. Vemuri, & M. Gupta (Eds.), Mobile Forensics (pp. 15-24). London: Springer.

Chakraborty, J., & Chakraborty, M. (2008). Mobile telephony based secured society an anti-terrorism attempt. TENCON 2008-2008 IEEE Region 10 Conference in Hyderabad, India

Clarke, R. V., & Newman, G. R. (2006). Outsmarting the Terrorists. Westport, CT: Praeger Security International.

Cornish, P. (2010). Technology, strategy, and counterterrorism. International Affairs, 86(4), 875-888.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-34

Doran, K., & Zaykowski, H. (2019). Police Officer Digital Literacy: Results from a National Survey. Policing: A Journal of Policy and Practice, 13(4), 425-434.

Egnoto, M., Ackerman, G., Iles, I., Roberts, H. A., Smith, D. S., Liu, B. F., & Behlendorf, B. (2017). What motivates the blue line for technology adoption? Insights from a police expert panel and survey. Policing: An International Journal of Police Strategies & Management.

Faith, T., & Bekir, C. (2015). Police use of technology to fight against crime. European Scientific Journal, 11(10).

Feyyaz, M. (2020). Countering terrorism in Pakistan: Challenges, conundrum, and resolution. In Non-Western responses to terrorism. Manchester University Press.

Graham, R. (2016). How terrorists use encryption. Combating Terrorism Center. 9(6), 35-45

Gupta, R., & Jain, K. (2014). Adoption of mobile telephony in rural India: An empirical study. Decision Sciences, 45(2), 281-307.

Kessler, G. C. (2016). The Digital Evidence Handbook: The Nearly Complete Guide to Collecting, Preserving, and Presenting Digital Evidence. Amsterdam: Elsevier.

Krenz, A. R. (2015). Enhancing Criminal Justice Technology Education: An Analysis of Current Courses and Proposals for Future Directions. Journal of Criminal Justice Education, 26(3), 358-376.

Kumar, N., & SM, V. (2019). Use of Modern Technology to Counter Terrorism.

Kyobe, M., Siya, M. J., & Williams, Q. (2017). Exploring the factors that influence the adoption of mobile technology by the South African police. Journal of Contemporary Management, 14(1), 327-351.

Lee, J., & Rao, H. R. (2007). Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: an exploratory study of government–citizen’s online interactions in a turbulent environment. Decision Support Systems, 43(4), 1431-1449.

Lynch, J., Salinas, J., McCreary, M., & Bishop, B. (2019). Assessing the impact of mobile technology on police performance: An analysis of the adoption and use of mobile technology by police agencies across the United States. Police Quarterly, 22(3), 364-387

Miller, C. (2006). Cell Phone Bombs: How Law Enforcement Can (and Can't) Prevent Them. Law Enforcement Technology 33(11), 86-95

Moutot, M. (2018). Smartphones: a double-edged sword for terrorists. Retrieved at https://phys.org/news/2018-11-smartphones-double-edged-sword-terrorists.html.

Mwasaa, C. (2010). An Assessment of factors Influencing Mobile Phone Adoption: Case of Kenya's Socio-Economic Development (Doctoral dissertation, University of Nairobi).

Ndonye, R. N. (2019). Implications of Technological Advancement on Performance on Police Officers; Case of Kenya Railways Police Unit.

Oluniyi, A. (2010). NCC Wants to Track Nigerians Movements via Mobile Phones. ICT works. Retrieved at https://www.ictworks.org/

Ragab, E. (2015). Complex Threat: Challenges of Countering Terrorism in the Middle East after the Arab Revolutions. In Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism (pp. 101-112). IOS Press.

Rogers, M. K. (2015). Cybercrime and Digital Forensics: An Introduction. New York: Routledge South University (2016). Fighting Crime with Mobile Technology. Retrieved at https://www.southuniversity.edu/news-and-blogs/2016/08/

Stones, E. K. (2017). Mobile Communications: M-Crime and Security (Doctoral dissertation, UCL (University College London)).

Tanner, S., & Meyer, M. (2015). Police work and new ‘security devices’: A tale from the beat. Security dialogue, 46(4), 384-400.

Tanui, D. K., & Barmao, C. K. (2016). Use of ICT in the Detection and Prevention of Crime in Kenya. Journal Information Engineering and Applications.

Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186-204.
Published
2024-05-12
Section
Articles