THE INFLUENCE OF EMPLOYEE TECHNOLOGICAL FACTORS ON THE MANAGEMENT OF CYBERSECURITY BREACHES AT THE INDEPENDENT POLICING OVERSIGHT AUTHORITY, KENYA
Keywords:
Employee technological factors, cybersecurity breaches, digital literacy, CT competence, public sector cybersecurity, KenyaAbstract
Purpose: This study examined how employee technological factors influence the management of cybersecurity breaches at the Independent Policing Oversight Authority (IPOA), Kenya. The research addressed concerns over increasing cyber incidents linked to employee technological weaknesses, including poor system use, limited digital literacy, and weak compliance with cybersecurity protocols.
Methodology: The study adopted a descriptive cross-sectional research design guided by General Deterrence Theory. From a target population of 290 IPOA employees, 160 respondents were selected using quota, convenience, and purposive sampling. Data were collected through structured questionnaires and semi-structured interviews.
Findings: The findings established that employee technological factors significantly influence the management of cybersecurity breaches at IPOA. Employees with stronger digital literacy, higher technological competence, and better understanding of cybersecurity systems demonstrated improved ability to prevent, detect, and respond to cyber threats. Regression analysis showed a statistically significant relationship between technological competence and reduced occurrence of breaches. Qualitative findings further revealed that inadequate system familiarity, poor password practices, and low adherence to cybersecurity procedures contributed to phishing attacks.
Conclusion: The study concludes that employee technological capability is central to effective cybersecurity breach management in public institutions. IPOA should prioritize continuous ICT training, improve system usability, and strengthen technological support frameworks to enhance cybersecurity resilience and minimize vulnerabilities.
DOI: https://doi.org/10.5281/zenodo.19916275
References
Ajufo, G., & Qutieshat, A. (2023). An examination of the human factors in cybersecurity: Future directions for Nigerian banks. Indonesian Journal of Information Systems, 6(1), 1–16. https://doi.org/10.24002/ijis.v6i1.6639
Alanezi, F., & Brooks, L. (2014). Combatting online fraud in Saudi Arabia using General Deterrence Theory (GDT). In Proceedings of the UK Academy for Information Systems (UKAIS) Conference. https://core.ac.uk/download/pdf/301361896.pdf
AL-Nuaimi, M. N. (2024). Human and contextual factors influencing cybersecurity in organizations, and implications for higher education institutions: A systematic review. Global Knowledge, Memory and Communication, 73(1/2), 1–23. https://doi.org/10.1108/GKMC-07-2022-0168
Alsharif, M., Mishra, S., & AlShehri, M. (2022). Impact of human vulnerabilities on cybersecurity. Computer Systems Science & Engineering, 40(3), 1153–1166. https://doi.org/10.32604/csse.2022.019938
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cybersecurity vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333
Berlilana, Noparumpa, T., Ruangkanjanases, A., Hariguna, T., & Sarmini. (2021). Organization benefit as an outcome of organizational security adoption: The role of cybersecurity readiness and technology readiness. Sustainability, 13(24), 13761. https://doi.org/10.3390/su132413761
Bhattacherjee, A., & Shrivastava, U. (2018). The effects of ICT use and ICT laws on corruption: A General Deterrence Theory perspective. Government Information Quarterly, 35(4), 703–712. https://doi.org/10.1016/j.giq.2018.07.006
Butavicius, M., Parsons, K., Lillie, M., McCormac, A., Pattinson, M., & Calic, D. (2020). When believing in technology leads to poor cybersecurity: Development of a trust in technical controls scale. Computers & Security, 98, 102020. https://doi.org/10.1016/j.cose.2020.102020
CAK. (2024). Cybersecurity Report: 36th Edition October–December 2024. Communications Authority of Kenya.
CAK. (2025). Cybersecurity Report: 37th Edition January–March 2025. Communications Authority of Kenya.
Colabianchi, S., Costantino, F., Nonino, F., & Palombi, G. (2025). Transforming threats into opportunities: The role of human factors in enhancing cybersecurity. Journal of Innovation & Knowledge, 10(3), 100695. https://doi.org/10.1016/j.jik.2025.100695
Dikito, A. R., Kaiser, M. S., & Vincent, J. P. (2024). Factors influencing cybersecurity: A focus group approach. International Journal of Academic Research in Progressive Education and Development, 13(4), 1–18. https://doi.org/10.6007/IJARPED/v13-i4/23539
Ewoh, P., & Vartiainen, T. (2024). Vulnerability to cyberattacks and sociotechnical solutions for health care systems: Systematic review. Journal of Medical Internet Research, 26, e46904. https://doi.org/10.2196/46904
Garg, S. (2025). Understanding employee vulnerability to cyberattacks using the lens of strategic human resource management. The International Journal of Human Resource Management, 36(19), 3401–3436. https://doi.org/10.1080/09585192.2025.2601788
IPOA. (2024). Annual Report 2023/2024. Independent Policing Oversight Authority, Nairobi, Kenya.
Kadena, E., & Gupi, M. (2021). Human factors in cybersecurity: Risks and impacts. Security Science Journal, 2(2), 51–64. https://www.securityscience.edu.rs/index.php/journal-security-science/article/view/54
Maphosa, V. (2024). An overview of cybersecurity in Zimbabwe's financial services sector. F1000Research, 12, 1251. https://doi.org/10.12688/f1000research.132823.2
Pollini, A., Callari, T. C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., & Guerri, D. (2022). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology & Work, 24(2), 371–390. https://doi.org/10.1007/s10111-021-00683-y
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Abdirahman Omar Jibril, Omboto John Onyango

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author(s) and source are properly credited.