THE INFLUENCE OF EMPLOYEE TECHNOLOGICAL FACTORS ON THE MANAGEMENT OF CYBERSECURITY BREACHES AT THE INDEPENDENT POLICING OVERSIGHT AUTHORITY, KENYA

Authors

  • Abdirahman Omar Jibril Researcher, Department of Security, Diplomacy and Peace Studies, Kenyatta University, Kenya
  • Omboto John Onyango Lecturer, Department of Security, Diplomacy and Peace Studies, Kenyatta University, Kenya

Keywords:

Employee technological factors, cybersecurity breaches, digital literacy, CT competence, public sector cybersecurity, Kenya

Abstract

Purpose: This study examined how employee technological factors influence the management of cybersecurity breaches at the Independent Policing Oversight Authority (IPOA), Kenya. The research addressed concerns over increasing cyber incidents linked to employee technological weaknesses, including poor system use, limited digital literacy, and weak compliance with cybersecurity protocols.

Methodology: The study adopted a descriptive cross-sectional research design guided by General Deterrence Theory. From a target population of 290 IPOA employees, 160 respondents were selected using quota, convenience, and purposive sampling. Data were collected through structured questionnaires and semi-structured interviews.

Findings: The findings established that employee technological factors significantly influence the management of cybersecurity breaches at IPOA. Employees with stronger digital literacy, higher technological competence, and better understanding of cybersecurity systems demonstrated improved ability to prevent, detect, and respond to cyber threats. Regression analysis showed a statistically significant relationship between technological competence and reduced occurrence of breaches. Qualitative findings further revealed that inadequate system familiarity, poor password practices, and low adherence to cybersecurity procedures contributed to phishing attacks.

Conclusion: The study concludes that employee technological capability is central to effective cybersecurity breach management in public institutions. IPOA should prioritize continuous ICT training, improve system usability, and strengthen technological support frameworks to enhance cybersecurity resilience and minimize vulnerabilities.

DOI: https://doi.org/10.5281/zenodo.19916275

References

Ajufo, G., & Qutieshat, A. (2023). An examination of the human factors in cybersecurity: Future directions for Nigerian banks. Indonesian Journal of Information Systems, 6(1), 1–16. https://doi.org/10.24002/ijis.v6i1.6639

Alanezi, F., & Brooks, L. (2014). Combatting online fraud in Saudi Arabia using General Deterrence Theory (GDT). In Proceedings of the UK Academy for Information Systems (UKAIS) Conference. https://core.ac.uk/download/pdf/301361896.pdf

AL-Nuaimi, M. N. (2024). Human and contextual factors influencing cybersecurity in organizations, and implications for higher education institutions: A systematic review. Global Knowledge, Memory and Communication, 73(1/2), 1–23. https://doi.org/10.1108/GKMC-07-2022-0168

Alsharif, M., Mishra, S., & AlShehri, M. (2022). Impact of human vulnerabilities on cybersecurity. Computer Systems Science & Engineering, 40(3), 1153–1166. https://doi.org/10.32604/csse.2022.019938

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cybersecurity vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

Berlilana, Noparumpa, T., Ruangkanjanases, A., Hariguna, T., & Sarmini. (2021). Organization benefit as an outcome of organizational security adoption: The role of cybersecurity readiness and technology readiness. Sustainability, 13(24), 13761. https://doi.org/10.3390/su132413761

Bhattacherjee, A., & Shrivastava, U. (2018). The effects of ICT use and ICT laws on corruption: A General Deterrence Theory perspective. Government Information Quarterly, 35(4), 703–712. https://doi.org/10.1016/j.giq.2018.07.006

Butavicius, M., Parsons, K., Lillie, M., McCormac, A., Pattinson, M., & Calic, D. (2020). When believing in technology leads to poor cybersecurity: Development of a trust in technical controls scale. Computers & Security, 98, 102020. https://doi.org/10.1016/j.cose.2020.102020

CAK. (2024). Cybersecurity Report: 36th Edition October–December 2024. Communications Authority of Kenya.

CAK. (2025). Cybersecurity Report: 37th Edition January–March 2025. Communications Authority of Kenya.

Colabianchi, S., Costantino, F., Nonino, F., & Palombi, G. (2025). Transforming threats into opportunities: The role of human factors in enhancing cybersecurity. Journal of Innovation & Knowledge, 10(3), 100695. https://doi.org/10.1016/j.jik.2025.100695

Dikito, A. R., Kaiser, M. S., & Vincent, J. P. (2024). Factors influencing cybersecurity: A focus group approach. International Journal of Academic Research in Progressive Education and Development, 13(4), 1–18. https://doi.org/10.6007/IJARPED/v13-i4/23539

Ewoh, P., & Vartiainen, T. (2024). Vulnerability to cyberattacks and sociotechnical solutions for health care systems: Systematic review. Journal of Medical Internet Research, 26, e46904. https://doi.org/10.2196/46904

Garg, S. (2025). Understanding employee vulnerability to cyberattacks using the lens of strategic human resource management. The International Journal of Human Resource Management, 36(19), 3401–3436. https://doi.org/10.1080/09585192.2025.2601788

IPOA. (2024). Annual Report 2023/2024. Independent Policing Oversight Authority, Nairobi, Kenya.

Kadena, E., & Gupi, M. (2021). Human factors in cybersecurity: Risks and impacts. Security Science Journal, 2(2), 51–64. https://www.securityscience.edu.rs/index.php/journal-security-science/article/view/54

Maphosa, V. (2024). An overview of cybersecurity in Zimbabwe's financial services sector. F1000Research, 12, 1251. https://doi.org/10.12688/f1000research.132823.2

Pollini, A., Callari, T. C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., & Guerri, D. (2022). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology & Work, 24(2), 371–390. https://doi.org/10.1007/s10111-021-00683-y

Published

2026-04-30

How to Cite

Jibril, A. O., & Onyango, O. J. (2026). THE INFLUENCE OF EMPLOYEE TECHNOLOGICAL FACTORS ON THE MANAGEMENT OF CYBERSECURITY BREACHES AT THE INDEPENDENT POLICING OVERSIGHT AUTHORITY, KENYA. Academic Journal of Humanities and Social Sciences Research, 3(1), 1–13. Retrieved from https://academicpubs.org/ojs33/index.php/academicpubs/article/view/76

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.