The Strategies of Service Delivery Adopted by Private Security Firms in Crime Prevention in Nairobi County, Kenya

Lukalia George Mondela, Ann Merecia Sirera

Abstract

National security is vital for achieving social, economic and political objectives. Given these critical aspects of security, a country across the globe can only satisfy the security need with support from other participants, such as the community and by partnering with private security firms. With the particular requirement and level of training that PSFs offer their personnel, a partnership of police and PSFs in crime detection and prevention is critical in providing security across the Country. This study sought to establish the service delivery strategies adopted by private security firms in dealing with crime. This study was modelled by the resource-based view theory s that offered a discernment of what options the private security firms present in addressing the diverse challenges emanating from ineffective strategic decisions in service delivery. A descriptive survey research design employing mixed methods approach in data collection was utilized to undertake the study. The target population constituted managers, supervisors, clients, and private security guards drawn from a sorted group of private security firms in Nairobi County. A multistage sampling approach employing clustering, proportionate random sampling and purposive sampling were used to obtain a sample size of 90 respondents. Questionnaires and interview guides were the main tools of data collection. Quantitative data were analyzed using descriptive statistics and presented in tables and charts. Qualitative data was presented in quotes and analyzed thematically. The data findings showed that guarding and collaboration strategies were the main strategies of the PSFs. Based on the results, the study recommended implementing government policy and legislation on collaboration between security agencies and PSFs for effective service delivery, implementing an oversight control agency to check on professionalism and adopting modern and innovative technology by PSFs for effective crime prevention.



Keywords


Security; Private Security; Strategies; Strategic options; Service delivery

Full Text:

PDF


References


Abdullahi, M. S, Shehu, U. R., & Usman, B. M (2019). Impact of Information Communication Technology On Organisational Productivity In The Nigeria Banking Industry: Empirical Evidence. Noble International Journal of Business and Management Research, 3(1), 1–9.

Ainuddin, R. A., Beamish, P. W., Hulland, J. S., & Rouse, M. J. (2007). Resource attributes and firm performance in international joint ventures. Journal of World Business, 42(1), 47–60. doi: 10.1016/j.jwb.2006.11.001

Albrecht, S., Breidahl, E., & Marty, A. (2018). Organisational resources, organisational engagement climate, and employee engagement. Career Development International, 23(1), 67–85. doi: 10.1108/cdi-04-2017-0064

Barney, J. B. (2018). Why resource-based theory's model of profit appropriation must incorporate a stakeholder perspective. Strategic Management, 39(13), 3305–3325. doi: 10.1002/smj.2949

Kuhns, J., Blevins, K., & Lee, S. (2012). Understanding Decisions to Burglarise from the Offender's Perspective. Retrieved from https://www.researchgate.net/publication/268444817_Understanding_Decisions_to_Burglarize_from_the_Offender%27s_Perspective?channel=doi&linkId=546b48410cf2f5eb18091770&showFulltext=true

Baker, B. (2013). Security Beyond the State: Private Security in International Politics. International Peacekeeping, 20(1), 118–119. doi: 10.1080/13533312.2012.761852

Bures, O., & Carrapico, H. (2016). Private security beyond private military and security companies: exploring diversity within private-public collaborations and its consequences for security governance. Crime, Law and Social Change, 67(3), 229–243. doi: 10.1007/s10611-016-9651-5

Burns, A. J., Roberts, T. L., Posey, C., Bennett, R. J., & Courtney, J. F. (2015). Assessing the role of security education, training, and awareness on insiders' security-related behavior: An expectancy theory approach. In 2015 48th Hawaii International Conference on System Sciences (pp. 3930-3940). doi: 10.1109/hicss.2015.471

Byrne, J., Marx, G. (2019). Technological Innovations in Crime Prevention and Policing. A Review of the Research on Implementation and Impact. Retrieved from https://www.ojp.gov/pdffiles1/nij/238011.pdf

Chinwokwu, E. C. (2018). An assessment of the relationship between private security companies and the police in crime prevention in Lagos Metropolis, Nigeria. International Journal of Police Science & Management, 20(1), 80–93. doi: 10.1177/1461355718756413

Cordner, G. (2017). Evidence-based police education and training in the United States. European Law Enforcement Research Bulletin, 3, 71–78.

Cushen, J., & Thompson, P. (2016). Financialisation and value: why labour and the labour process still matter. Work, Employment & Society, 30(2), 352–365.

Diphoorn, T. (2016). “Surveillance of the Surveillers”: Regulation of the Private Security Industry in South Africa and Kenya. African Studies Review, 59(2), 161–182. doi: 10.1017/asr.2016.31

Ekhomu, O. (2019). Boko Haram. doi: 10.4324/9780203710838

Freilich, J. D., & Newman, G. R. (2013). Providing Opportunities: A Sixth Column for the Techniques of Situational Crime Prevention. Organised Crime, Corruption and Crime Prevention, 33–42. doi: 10.1007/978-3-319-01839-3_5

Githimi, S., Bor, E., & Appolos, M. (2017). How the availability of private security services assist in crime control in Nairobi County, Kenya. Global Journal of Arts, Humanities and Social Sciences, 5(1), 51–61.

Grove, E., Farrell, G., Farrington, D., Johnson, D. (2012). Preventing Repeat Victimisation: A Systematic Review. Retrieved from https://www.researchgate.net/publication/274312621_Preventing_Repeat_Victimization_A_Systematic_Review

Kamenju, J. A., Mwachofi, S., & Wairagu, F. (2003). Terrorised Citizens: Profiling Proliferation of Small Arms and Insecurity in the North Rift Region of Kenya. Nairobi: Security Research and Information Centre.

Kiama, S., & Bor, E. (2015). Private security services and crime control in Karen location, Nairobi County, Kenya. Journal of Humanities and Social Science, 20(10), 84–90.

Willis, J. J., Koper, C. S., & Lum, C. (2018). Technology use and constituting structures: accounting for the consequences of information technology on police organisational change. Policing and Society, 30(5), 483–501. doi: 10.1080/10439463.2018.1557660

Kotler, P., & Keller, K. L. (2016). Marketing Management (15 Global ed.). Essex: Pearson’s Education Limited.

Kumbuti, H. (2013). Use of technology as a strategy by Kenya police in detection of crimes in Nairobi City. Retrieved from http://erepository.uonbi.ac.ke/bitstream/handle/11295/63076/Kambuti_Use%20Of%20Technology%20As%20A%20Strategy%20By%20Kenya%20Police%20In%20Detection%20Of%20Crimes%20In%20Nairobi%20City%20Kumbuti?sequence=1&isAllowed=y

Mkutu, K. A., & Sabala, K. (2007). Private Security Companies in Kenya and Dilemmas for Security. Journal of Contemporary African Studies, 25(3), 391–416. doi: 10.1080/02589000701662442

Mutonyi, G. P., & Sirera, A. (2018). Commercial Security’s’ Effect on Security of Kenyans in Private Venues. Emerging Science Journal, 2(4). doi: 10.28991/esj-2018-01142

Mutonyi, G. P., Masiga, C., & Kilongosi, H. (2020). Commercialised Security and Its Role in Selected Countries’ National Security. Path of Science, 6(7), 2001–2021. doi: 10.22178/pos.60-6

Mutonyi, G., Ann Merecia Sirera, & Mwai, W. (2020). Examining Commercialised Security Industry's Services on National Security in Nairobi County, Kenya. Technium Social Sciences Journal, 8, 710–736. doi: 10.47577/tssj.v8i1.671

Nalla, M. K., Maxwell, S. R., & Mamayek, C. M. (2017). Legitimacy of Private Police in Developed, Emerging, and Transitional Economies. European Journal of Crime, Criminal Law and Criminal Justice, 25(1), 76–100. doi: 10.1163/15718174-25012107

Prenzler, T and Sarre, R (2014). Regulation. In The Handbook of Security Management, edited by Martin Gill. Pages 857–78. London: Palgrave MacMillan.

Prenzler, T., & Sarre, R. (2012). The Evolution of Security Industry Regulations in Australia: A Critique. International Journal for Crime and Justice, 1(1), 38–51.

Ronen, Y. (2010). PRIV-WAR Report. Israel: The use and regulation of private military and security companies in situations of armed conflict. Retrieved from http://psm.du.edu/media/documents/reports_and_stats/think_tanks/privwar_national-report_ronen.pdf

Cunningham, W. C., & Taylor, T. H. (1985). Private security and police in America: the Hallcrest report I. Boston: Butterworth-Heinemann.

Shemesh, A. (2013). Perspective of the Labor Market for security guards in Israel in time of terror attacks 2000–2004. Retrieved from https://ec.europa.eu/eurostat/cros/system/files/NTTS2013fullPaper_179.pdf

Sparrow, M., (2014). Managing the Boundary between Public and Private Policing. New Perspectives in Policing Bulletin. Washington: U. S. Department of Justice, National Institute of Justice.

Office for National Statistics. (2020). Crime in England and Wales: year ending December 2019. Retrieved from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingdecember2019

Te, F., Kadar, C., Brungger, R., & Cvijikj, I. P. (2018). Human versus technology: comparing the Effect of Private Security Patrol and Crime Prevention Information System over the Crime Level and Safety Perception. Retrieved from https://aisel.aisnet.org/ecis2016_rip/48

Tseloni, A., Thompson, R., Grove, L., Tilley, N., & Farrell, G. (2017). The effectiveness of burglary security devices. Security Journal, 30(2), 646–664. doi: 10.1057/sj.2014.30

United Nations Office on Drugs and Crime. (2014). State Regulation concerning Civilian Private Security Services and their Contribution to Crime Prevention and Community Safety. Retrieved from https://www.unodc.org/documents/justice-and-prison-reform/Civilian_Private_Security_Services_Ebook.pdf

Wilkie, K. (2013). Private Security Officers and Private Policing in Residential Estates in Hong Kong (Doctoral thesis). Retrieved from https://researchportal.port.ac.uk/files/5925223/Wilkie_Yat_Hung_Kwong_PhD_Thesis_2013.pdf


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2023 Lukalia George Mondela, Ann Merecia Sirera

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.