CHALLENGES OF INTEGRATING SURVEILLANCE TECHNOLOGIES AND SECURITY MANAGEMENT BY PRIVATE SECURITY PROVIDERS IN NAKURU COUNTY, KENYA
Abstract
The study determined challenges of integrating surveillance technologies and security management by private security providers in Nakuru County, Kenya. The study utilized the Integrated System Theory of managing security information. The study adopted a descriptive research design which employed both quantitative and qualitative approaches in collecting and analyzing data which was then analyzed quantitatively and qualitatively. The study targeted private security providers in Nakuru County as unit of analysis. It also employed purposive, stratified, and simple random sampling techniques to select 30 respondents from ten (10) private security providers from the three sub counties distributed among the five sectors of the economy. Interviews and FGDs as well questionnaire were used in the collecting data. Findings indicated that inadequate networks and infrastructure presented additional difficulties for private security companies. Additionally, private security companies faced challenges such improper outcome analysis, corruption, and police intervention during investigations, which made it difficult to find the offenders and resulted in criminals operating freely on the streets. Similarly, security providers encounter technical difficulties such as complex security system installations carried out by unqualified individuals who lack the necessary knowledge and skills; frequent equipment breakdowns, blackouts, malfunctioning equipment, and shortage of qualified technicians. The study concluded that private security companies should use surveillance technologies to suit changing customer demands and keep up with changing crime trends; customers are satisfied with the functionalities of the surveillance technologies and that integrating surveillance technologies is not free of challenges. The study recommended that the police and private security personnel work together to respond to criminal activities and improve the use of surveillance technologies in incident response coordination.
References
Atabek, O. (2019). Challenges in integrating technology into education. arXiv preprint arXiv:1904.06518. Retrieved from: https://arxiv.org/abs/1904.06518
Bree, R. T., & Gallagher, G. (2016). Using Microsoft Excel to code and thematically analyse qualitative data: a simple, cost-effective approach. All Ireland Journal of Higher Education, 8(2). Retrieved from: https://ojs.aishe.org/index.php/aishe- j/article/view/281
Da Veiga, A., & Eloff, J. H. (2010). A framework and assessment instrument for information security culture. Computers & security, 29(2), 196-207. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0167404809000923
Dede, C. (2011). Reconceptualizing technology integration to meet the necessity of transformation. Journal of Curriculum and Instruction, 5(1), 4-16. Retrieved from: http://www.joci.ecu.edu/index.php/JoCI/article/view/121
Elharrouss, O., Almaadeed, N., & Al-Maadeed, S. (2021). A review of video surveillance systems. Journal of Visual Communication and Image Representation, 77, 103116. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S1047320321000729
Fischer, C., Fishman, B., Dede, C., Eisenkraft, A., Frumin, K., Foster, B., ... & McCoy, A. (2018). Investigating relationships between school context, teacher professional development, teaching practices, and student achievement in response to a nationwide science reform. Teaching and Teacher Education, 72, 107-121. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0742051X17314130
Githae, A. A. W. (2019). Utilisation And Effectiveness Of Outsourced Private Security Services By Commercial Banks In Kenya (Doctoral dissertation). Retrieved from: http://41.89.227.156:8080/xmlui/handle/123456789/4614
Hagen, J., & Albrechtsen, E. (2009). Effects on employees' information security abilities by e‐ learning. Information Management & Computer Security, 17(5), 388-407. Retrieved from: https://www.emerald.com/insight/content/doi/10.1108/09685220911006687/full/h tml
Hancock, D. R., Algozzine, B., & Lim, J. H. (2021). Doing case study research: A practical guide for beginning researchers. Retrieved from: https://books.google.co.ke/books?hl=en&lr=&id=G3FEEAAAQBAJ&oi=fnd&pg=PP1&dq=Hancock,+D.+R.,+Algozzine,+B.,+%26+Lim,+J.+H.+(2021).+Doing+case+study+research:+A+practical+guide+for+beginning+researchers.&ots=iqU6rwUY6f&sig=fzwIYq7MdnPLpnuNqUTDOYCsS-E&redir_esc=y#v=onepage&q&f=false
Hossein Nezhad Nedaei, B., Abdul Rasid, S. Z., Sofian, S., Basiruddin, R., & Amanollah Nejad Kalkhouran, A. (2015). A Contingency‐Based Framework for Managing Enterprise Risk. Global Business and Organizational Excellence, 34(3), 54-66. Retrieved from: https://onlinelibrary.wiley.com/doi/full/10.1002/joe.21604
Kallio, H., Pietilä, A. M., Johnson, M., & Kangasniemi, M. (2016). Systematic methodological review: developing a framework for a qualitative semi‐structured interview guide. Journal of advanced nursing, 72(12), 2954-2965. Retrieved from: https://onlinelibrary.wiley.com/doi/full/10.1111/jan.13031
KASSAN, P. L. (2021). Use of integrated security management system in crime prevention: a case of public referral hospitals in nairobi city county, kenya.
Keser, H., & Çetinkaya, L. (2013). ÖĞRETMEN VE ÖĞRENCİLERİN ETKİLEŞİMLİ TAHTA KULLANIMINA YÖNELİK YAŞAMIŞ OLDUKLARI SORUNLAR
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S1874548215000207
Marshall, D., Thomas, T., Marshall, D., & Thomas, T. (2017). Photographs, CCTVs and Other Cameras. Privacy and Criminal Justice, 127-151. Retrieved from: https://link.springer.com/chapter/10.1007/978-3-319-64912-2_6
Memos, V. A., Psannis, K. E., Ishibashi, Y., Kim, B. G., & Gupta, B. B. (2018). An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Future Generation Computer Systems, 83, 619-628.
Neuendorf, K. A. (2017). The content analysis guidebook. sage. Retrieved from: https://books.google.co.ke/books?hl=en&lr=&id=nMA5DQAAQBAJ&oi=fnd&pg=PP1&dq=Neuendorf,+K.+A.+(2017).+The+content+analysis+guidebook.+sage.&ots=pIMkw3jz6r&sig=2aH_LKepCqrrUqqhMKr8C6J3TDA&redir_esc=y#v=onepage&q&f=false
Patel, R. (2021). A study on customer perception towards cctv security system. Patel Institute of BMC & IT, Uka Tarsadia University.
Porikli, F., Bremond, F., Dockstader, S. L., Ferryman, J., Hoogs, A., Lovell, B. C., ... & Venetianer, P. L. (2013). Video surveillance: past, present, and now the future [DSP Forum]. IEEE Signal Processing Magazine, 30(3), 190-198.
Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control systems: An introduction to the issue. IEEE Control Systems Magazine, 35(1), 20-23. Retrieved from: https://ieeexplore.ieee.org/abstract/document/7011179
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International journal of information management, 36(2), 215-225. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0268401215001103
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964-975. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0167739X1630694X
Turner III, D. W., & Hagstrom-Schmidt, N. (2022). Qualitative interview design. Howdy or Hello? Technical and Professional Communication. Retrieved from: https://pressbooks.library.tamu.edu/howdyorhello/back-matter/appendix-qualitative-interview-design/
Wilson, C., Hargreaves, T., & Hauxwell-Baldwin, R. (2017). Benefits and risks of smart home technologies. Energy Policy, 103, 72-83. Retrieved from: https://www.sciencedirect.com/science/article/pii/S030142151630711X/?science2
Zheng, S., & Xia, Y. (2021). Private Security Companies in Kenya and the Impact of Chinese Actors. Available at SSRN 3859591. Retrieved from: https://www.sciencedirect.com/science/article/abs/pii/S0747563217300791