Purpose: This study examined how employee technological factors influence the management of cybersecurity breaches at the Independent Policing Oversight Authority (IPOA), Kenya. The research addressed concerns over increasing cyber incidents linked to employee technological weaknesses, including poor system use, limited digital literacy, and weak compliance with cybersecurity protocols. Methodology: The study adopted a descriptive cross-sectional research design guided by General Deterrence Theory. From a target population of 290 IPOA employees, 160 respondents were selected using quota, convenience, and purposive sampling. Data were collected through structured questionnaires and semi-structured interviews, then analyzed quantitatively and qualitatively. Findings: The findings established that employee technological factors significantly influence the management of cybersecurity breaches at IPOA. Employees with stronger digital literacy, higher technological competence, and better understanding of cybersecurity systems demonstrated improved ability to prevent, detect, and respond to cyber threats. Regression analysis showed a statistically significant relationship between technological competence and reduced occurrence of breaches. Qualitative findings further revealed that inadequate system familiarity, poor password practices, and low adherence to cybersecurity procedures contributed to phishing attacks, malware infections, and unauthorized access to sensitive case records. Improved system usability also enhanced employee compliance with cybersecurity measures. Conclusion: The study concludes that employee technological capability is central to effective cybersecurity breach management in public institutions. IPOA should prioritize continuous ICT training, improve system usability, and strengthen technological support frameworks to enhance cybersecurity resilience and minimize vulnerabilities associated with employee technological weaknesses.
Building similarity graph...
Analyzing shared references across papers
Loading...
Omar Jibril Abdirahman
Onyango Omboto John
Kenyatta University
Institute for Security Studies
Building similarity graph...
Analyzing shared references across papers
Loading...
Abdirahman et al. (Thu,) studied this question.
www.synapsesocial.com/papers/69f594fc71405d493affff4b — DOI: https://doi.org/10.5281/zenodo.19916274
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: