Cybercrime had been a serious challenge in Kenya, threatening digital infrastructure, economic stability, and public trust in technology. It had led to financial loss, data loss, disruption, document damage, and psychological stress among others. In recognizing this, the government brought the cybersecurity training as a capacity building initiative through the Kenya National ICT Policy Despite the policy initiative being brought, Kenya continued to experience recurring incidents of system breaches, data theft, and disruptions to essential services thereby undermining public trust in digital infrastructure and highlighting the growing gap between policy intentions and the realities of cybercrime prevention and control. This study was therefore necessitated to assess the actual impact of the cybersecurity on cybercrime prevention and identify reasons for its limited effectiveness. The paper therefore evaluated how Kenya's ICT Policy on cybersecurity training contributed to the prevention of Cybercrime in Kenya. Descriptive research design alongside sequential explanatory mixed methods approach were employed. Primary data was obtained from officers working with the cybercrime prevention institutions as well as mobile communications providers such as Safaricom and Airtel in Kenya. A simple linear regression and thematic analysis were used to analyze responses collected from officers working with the cybercrime prevention institutions in Kenya. The paper established that cybersecurity training enhanced officers’ skills and aided cybercrime prevention; however, its impact varied across institutions due to differences in commitment, resources, content relevance, and integration, with key contextual and institutional factors shaping effective-ness. The paper concluded that cybersecurity training improved officers’ skills and cybercrime prevention, but its impact differs by institution, shaped by resource allocation, commitment, content relevance, and integration into operations. The paper recommended that the government and telecommunication institutions to prioritize funding, leadership support, role-specific customization, interactive delivery, robust evaluations and integration of training into operations to enhance the effectiveness and sustainability of cybersecurity training initiatives.
Published in | Journal of Public Policy and Administration (Volume 9, Issue 2) |
DOI | 10.11648/j.jppa.20250902.16 |
Page(s) | 111-125 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2025. Published by Science Publishing Group |
Cybersecurity Training, Multi-agencies, Cybercrime Prevention
Frequency | Percent | ||
---|---|---|---|
Valid | CCU-I | 14 | 19.4 |
DFLK | 4 | 5.6 | |
ACU | 6 | 8.3 | |
CAK | 5 | 6.9 | |
NIS-CSU | 4 | 5.6 | |
KE-CIRT/CC | 11 | 15.3 | |
NC3 | 13 | 18.1 | |
Ministry of ICT | 5 | 6.9 | |
CBK | 4 | 5.6 | |
Safaricom | 4 | 5.6 | |
Airtel | 2 | 2.8 | |
Total | 72 | 100.0 |
Model Summaryb | |||||||||
---|---|---|---|---|---|---|---|---|---|
Model | R | R Square | Adjusted R Square | Std. Error of the Estimate | Change Statistics | ||||
R Square Change | F Change | df1 | df2 | Sig. F Change | |||||
1 | .891a | .794 | .791 | .67723 | .794 | 269.526 | 1 | 70 | .000 |
a. Predictors: (Constant), ct | |||||||||
b. Dependent Variable: cp |
ANOVAa | ||||||
---|---|---|---|---|---|---|
Model | Sum of Squares | Df | Mean Square | F | Sig. | |
1 | Regression | 123.614 | 1 | 123.614 | 269.526 | .000b |
Residual | 32.105 | 70 | .459 | |||
Total | 155.719 | 71 | ||||
a. Dependent Variable: cp | ||||||
b. Predictors: (Constant), ct |
Coefficientsa | |||||||||
---|---|---|---|---|---|---|---|---|---|
Model | Unstandardized Coefficients | Standardized Coefficients | t | Sig. | Correlations | ||||
B | Std. Error | Beta | Zero-order | Partial | Part | ||||
1 | (Constant) | -2.312 | .330 | -7.016 | .000 | ||||
Ct | 1.481 | .090 | .891 | 16.417 | .000 | .891 | .891 | .891 | |
a. Dependent Variable: cp |
Respondent's working institution | Minimum | Maximum | Mean | Std. Deviation | |
---|---|---|---|---|---|
CBK | Ct | 2.33 | 4.67 | 3.7262 | .88096 |
Cp | 1.25 | 5.00 | 3.1607 | 1.55541 | |
Valid N (listwise) | |||||
NC3 | Ct | 2.33 | 4.33 | 3.3750 | .94648 |
Cp | 1.75 | 5.00 | 3.5000 | 1.74404 | |
Valid N (listwise) | |||||
NIS-CSU | Ct | 2.67 | 4.67 | 4.2500 | .77996 |
Cp | 2.00 | 5.00 | 3.8750 | 1.02164 | |
Valid N (listwise) | |||||
ACU | Ct | 2.33 | 3.00 | 2.8000 | .27386 |
Cp | 1.25 | 1.75 | 1.4000 | .22361 | |
Valid N (listwise) | |||||
DFLK | Ct | 2.33 | 4.33 | 3.3750 | .94648 |
Cp | 1.75 | 5.00 | 3.2500 | 1.51383 | |
Valid N (listwise) | |||||
KE-CIRT/CC | Ct | 2.33 | 4.67 | 3.7121 | .95479 |
Cp | 1.25 | 5.00 | 3.0455 | 1.58831 | |
Valid N (listwise) | |||||
Safaricom | Ct | 2.33 | 4.67 | 3.6795 | .89872 |
Cp | 1.25 | 5.00 | 3.2115 | 1.47848 | |
Valid N (listwise) | |||||
Ministry of ICT | Ct | 2.33 | 3.00 | 2.6667 | .31180 |
Cp | 1.25 | 1.75 | 1.3500 | .22361 | |
Valid N (listwise) | |||||
CCU-I | Ct | 2.67 | 4.67 | 4.1250 | .97539 |
Cp | 2.00 | 4.50 | 3.6250 | 1.10868 | |
Valid N (listwise) | |||||
CAK | Ct | 2.33 | 3.00 | 2.7917 | .31549 |
Cp | 1.25 | 2.25 | 1.6875 | .42696 | |
Valid N (listwise) | |||||
Airtel | Ct | 2.83 | 4.00 | 3.4167 | .82496 |
Cp | 1.75 | 5.00 | 3.3750 | 2.29810 | |
Valid N (listwise) |
Institution | Leadership Commitment | Budgetary Support | Technological Infrastructure | Training Frequency | Trainer Expertise | Collaboration Culture |
---|---|---|---|---|---|---|
NIS-CSU | 4.37 | 4.95 | 4.73 | 4.60 | 4.16 | 4.16 |
CCU-I | 4.06 | 4.87 | 4.60 | 4.71 | 4.02 | 4.97 |
CBK-CPU | 4.83 | 4.21 | 4.18 | 4.18 | 4.30 | 4.52 |
KE-CIRT/CC | 4.43 | 4.29 | 4.61 | 4.14 | 4.29 | 4.37 |
Safaricom | 3.46 | 3.79 | 3.20 | 3.51 | 3.59 | 3.05 |
Airtel | 3.61 | 3.17 | 3.07 | 3.95 | 3.97 | 3.81 |
DFLK | 3.30 | 3.10 | 3.68 | 3.44 | 3.12 | 3.50 |
NCCC | 3.03 | 3.91 | 3.26 | 3.66 | 3.31 | 3.52 |
ACU | 2.55 | 2.18 | 2.97 | 2.78 | 2.94 | 2.89 |
CAK | 2.60 | 2.92 | 2.09 | 2.20 | 2.05 | 2.33 |
Ministry of ICT | 2.39 | 2.27 | 2.83 | 2.36 | 2.28 | 2.54 |
Institution | Irregular Training Schedules | Punitive Training Approaches | Generic Content & Lack of Customization | Inadequate Budgetary Support | Lack of Training Infrastructure | Monotonous Delivery | No Pre/Post Training Evaluation | Poor Inter-Agency Coordination |
---|---|---|---|---|---|---|---|---|
Ministry of ICT | 3.11 | 4.72 | 2.89 | 4.66 | 2.80 | 4.59 | 2.48 | 2.30 |
CAK | 4.67 | 4.35 | 3.09 | 4.71 | 3.89 | 2.34 | 4.27 | 3.07 |
ACU | 4.08 | 2.67 | 3.33 | 4.28 | 2.94 | 2.63 | 2.30 | 2.41 |
NIS-CSU | 3.72 | 2.59 | 4.22 | 2.92 | 3.50 | 2.22 | 4.76 | 4.43 |
CCU-I | 2.52 | 2.60 | 2.64 | 2.36 | 3.58 | 2.98 | 4.19 | 3.78 |
KE-CIRT/CC | 2.52 | 2.92 | 3.49 | 3.95 | 2.60 | 3.15 | 2.64 | 2.99 |
CBK-CPU | 2.26 | 3.52 | 3.70 | 3.29 | 4.72 | 2.83 | 2.11 | 2.27 |
Safaricom | 4.44 | 3.27 | 2.23 | 2.43 | 4.19 | 4.34 | 4.30 | 2.94 |
Airtel | 3.72 | 2.89 | 3.74 | 3.44 | 4.64 | 3.06 | 4.01 | 2.98 |
DFLK | 4.01 | 3.75 | 2.56 | 2.19 | 4.52 | 2.86 | 4.07 | 4.07 |
NCCC | 2.16 | 2.48 | 2.28 | 4.56 | 3.71 | 3.57 | 4.18 | 3.82 |
Institution | Type of Training Approach | Customization to specific roles | Funding | Engagement | Evaluation and Feedback | Training Reliance |
---|---|---|---|---|---|---|
NIS-CSU | 4.5 | 4.3 | 4.7 | 4.4 | 4.4 | 4.2 |
CCU-I | 4.3 | 4.7 | 4.6 | 4.1 | 4.5 | 4.3 |
CBK-CPU | 4.1 | 4.4 | 4.5 | 3.9 | 4.2 | 4.1 |
KE-CIRT/CC | 4.2 | 4.4 | 4.9 | 3.8 | 4.3 | 4.2 |
Safaricom | 4.0 | 4.2 | 4.3 | 3.7 | 4.0 | 4.0 |
Airtel | 4.1 | 4.1 | 4.2 | 3.9 | 4.1 | 4.0 |
DFLK | 4.3 | 4.5 | 4.4 | 4.0 | 4.3 | 4.2 |
NCCC | 4.2 | 4.6 | 4.5 | 4.1 | 4.2 | 4.3 |
ACU | 4.4 | 4.5 | 4.6 | 4.0 | 4.3 | 4.3 |
CAK | 4.1 | 4.3 | 4.4 | 4.0 | 4.8 | 4.1 |
Ministry of ICT | 4.3 | 4.6 | 4.5 | 4.1 | 4.4 | 4.3 |
ACU | Anti-counterfeit Unit |
ANOVA | Analysis of Variance |
CAK | The Communications Authority of Kenya |
CBK-CPU | Central Bank of Kenya’s Cybercrime Prevention Unit |
CCU-I | Cyber Crime Unit-investigation |
CP | Cybercrime Prevention |
CT | Cybersecurity Training |
DFLK | Digital Forensic Laboratory of Kenya |
DV | Dependent Variable |
ICT | Information and Communication Technology |
IV | Independent Variable |
KE-CIRT/CC | Kenya Computer Incident Response Team and Coordination Centre |
KNBS | Kenya National Bureau of Statistics |
MTTDR | Mean Time to Detect and Respond |
MTTIR | Mean Time to Investigate and Resolve |
NC3 | National Cyber Command Centre |
NIS-CSU | National Intelligence Service’s Cyber Security Unit |
RCT | Rational Choice Theory |
SPSS | Statistical Package for Social Sciences |
[1] | AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecuri-ty strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. |
[2] | Alruwaili, A. (2019). A Review of the Impact of Training on Cybersecurity Awareness. International Journal of Ad-vanced Research in Computer Science, 10(5). |
[3] | Alsalamah, A., & Callinan, C. (2021). Adaptation of Kirkpatrick’s four-level model of training criteria to evaluate train-ing programmes for head teachers. Education Sciences, 11(3), 116. |
[4] | Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspec-tive. Computers & Security, 98, 102003. |
[5] | Clarke, V., & Braun, V. (2017). Thematic analysis. The journal of positive psychology, 12(3), 297-298. |
[6] | Communications Authority of Kenya (2023). Cyber Security. Ministry of Information, Communications and the Digital Economy: |
[7] | Deloitte (2014). "Meet the Modern Learner." Retrieved from |
[8] | Eero, E. & Mei S. (2023). The Effectiveness of Cybersecurity Training Programs in Nigeria. ResearchGate. |
[9] | Gitari, S. M. (2020). Reforming the institutional and legal frameworks of E-commerce in Kenya; consumer rights protec-tion in the digital economy (Doctoral dissertation, Strathmore University). |
[10] | Goldstein, I. L., & Ford, J. K. (2002). "Training in Organizations: Needs Assessment, Development, and Evaluation." Wadsworth Publishing. |
[11] | Gordon, L A; Loeb, M. P & Zhou, L. (2020). "Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model". Journal of Cybersecurity. |
[12] | Government of Kenya (2016). The National ICT Policy-2016. Ministry of Information, Communications and the Digital Economy. |
[13] | Hatzivasilis, G., Ioannidis, S., Smyrlis, M., Spanoudakis, G., Frati, F., Goeke, L., & Koshutanski, H. (2020). Modern aspects of cyber-security training and continuous adaptation of programmes to trainees. Applied Sciences, 10(16), 5702. |
[14] | Kenya National Bureau of Statistics Economic Survey, (2020). Cyber-attacks in Kenya up by half to hit 56 m in three months. Business Daily. |
[15] | Krstić, M. (2022). Rational choice theory–alternatives and criticisms. Socijalna ekologija. Časopis za ekološku misao i sociologijska istraživanja okoline, (31), 1. |
[16] | Ndeda, L. A., & Odoyo, C. O. (2019). Cyber threats and cyber security in the Kenyan business context. |
[17] | Nevmerzhitskaya, J., Norvanto, E., & Virag, C. (2019). High Impact Cybersecurity Capacity Building. ELearning & Software for Education, 2. |
[18] | Nurse, J. R., Adamos, K., Grammatopoulos, A., & Di Franco, F. (2021). Addressing the EU cybersecurity skills shortage and gap through higher education. European Union Agency for Cybersecurity (ENISA) Report. |
[19] | Okuku, A., Renaud, K., & Valeriano, B. (2015). Cybersecurity strategy's role in raising Kenyan awareness of mobile secu-rity threats. Information & Security, 32(2), 1. |
[20] | Paternoster, R., Bachman, R., Bushway, S., Kerrison, E., & O’Connell, D. (2015). Human agency and explanations of criminal desistance: Arguments for a rational choice theory. Journal of Developmental and Life-Course Criminology, 1, 209-235. |
[21] | Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training meth-ods. Computers & Security, 136, 103585. |
[22] | Sitienei, J. C., & Kandiri, J. (2024). Evaluating Cybersecurity Threats, Measures, and Effective Factors for Enhancing the Security of Kenya's E-citizen Platform. Reviewed Journal of Social Science & Humanities, 5(1), 463-480. |
[23] | Stalans, L. J., & Donner, C. M. (2018). Explaining why cybercrime occurs: Criminological and psychological theo-ries. Cyber Criminology. |
[24] | Tanczer, L. M., Brass, I., & Carr, M. (2018). CSIRT s and global cybersecurity: How technical experts support science diplomacy. Global Policy. |
[25] |
The American Society for Training and Development (2019). "Designing Learning: Clear Objectives." Retrieved from
https://www.td.org/insights/designing-learning-clear-objectives |
[26] |
The Association for Talent Development (2021). "The State of the Industry: Training by the Numbers." Association for Talent Development. Retrieved from
https://www.td.org/insights/the-state-of-the-industry-training-by-the-numbers |
[27] | Tschakert, K. F., & Ngamsuriyaroj, S. (2019). Effectiveness of and user preferences for security awareness training meth-odologies. Heliyon, 5(6). |
[28] | Wekundah, R. N. (2015). The effects of cyber-crime on e-commerce; a model for SMEs in Kenya (Doctoral dissertation, University of Nairobi). |
[29] | Whitmire, T. (2020). The Arrest and Prosecution of Cyber Stalkers: How" Rational" are Criminal Justice Decision Mak-ers? |
[30] | Zhao, J., Wang, X., Zhang, H., & Zhao, R. (2021). Rational choice theory applied to an explanation of juvenile offender decision making in the Chinese setting. International Journal of Offender Therapy and Comparative Criminolo-gy, 65(4), 434-457. |
APA Style
Ogutu, K. O., Obosi, J. O., Odongo, H. A. (2025). The Impact of Cybersecurity Training Policy Initiative on Cybercrime Prevention in Kenya. Journal of Public Policy and Administration, 9(2), 111-125. https://doi.org/10.11648/j.jppa.20250902.16
ACS Style
Ogutu, K. O.; Obosi, J. O.; Odongo, H. A. The Impact of Cybersecurity Training Policy Initiative on Cybercrime Prevention in Kenya. J. Public Policy Adm. 2025, 9(2), 111-125. doi: 10.11648/j.jppa.20250902.16
@article{10.11648/j.jppa.20250902.16, author = {Kennedy Obumba Ogutu and Joseph Okeyo Obosi and Henry Amadi Odongo}, title = {The Impact of Cybersecurity Training Policy Initiative on Cybercrime Prevention in Kenya }, journal = {Journal of Public Policy and Administration}, volume = {9}, number = {2}, pages = {111-125}, doi = {10.11648/j.jppa.20250902.16}, url = {https://doi.org/10.11648/j.jppa.20250902.16}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.jppa.20250902.16}, abstract = {Cybercrime had been a serious challenge in Kenya, threatening digital infrastructure, economic stability, and public trust in technology. It had led to financial loss, data loss, disruption, document damage, and psychological stress among others. In recognizing this, the government brought the cybersecurity training as a capacity building initiative through the Kenya National ICT Policy Despite the policy initiative being brought, Kenya continued to experience recurring incidents of system breaches, data theft, and disruptions to essential services thereby undermining public trust in digital infrastructure and highlighting the growing gap between policy intentions and the realities of cybercrime prevention and control. This study was therefore necessitated to assess the actual impact of the cybersecurity on cybercrime prevention and identify reasons for its limited effectiveness. The paper therefore evaluated how Kenya's ICT Policy on cybersecurity training contributed to the prevention of Cybercrime in Kenya. Descriptive research design alongside sequential explanatory mixed methods approach were employed. Primary data was obtained from officers working with the cybercrime prevention institutions as well as mobile communications providers such as Safaricom and Airtel in Kenya. A simple linear regression and thematic analysis were used to analyze responses collected from officers working with the cybercrime prevention institutions in Kenya. The paper established that cybersecurity training enhanced officers’ skills and aided cybercrime prevention; however, its impact varied across institutions due to differences in commitment, resources, content relevance, and integration, with key contextual and institutional factors shaping effective-ness. The paper concluded that cybersecurity training improved officers’ skills and cybercrime prevention, but its impact differs by institution, shaped by resource allocation, commitment, content relevance, and integration into operations. The paper recommended that the government and telecommunication institutions to prioritize funding, leadership support, role-specific customization, interactive delivery, robust evaluations and integration of training into operations to enhance the effectiveness and sustainability of cybersecurity training initiatives. }, year = {2025} }
TY - JOUR T1 - The Impact of Cybersecurity Training Policy Initiative on Cybercrime Prevention in Kenya AU - Kennedy Obumba Ogutu AU - Joseph Okeyo Obosi AU - Henry Amadi Odongo Y1 - 2025/06/30 PY - 2025 N1 - https://doi.org/10.11648/j.jppa.20250902.16 DO - 10.11648/j.jppa.20250902.16 T2 - Journal of Public Policy and Administration JF - Journal of Public Policy and Administration JO - Journal of Public Policy and Administration SP - 111 EP - 125 PB - Science Publishing Group SN - 2640-2696 UR - https://doi.org/10.11648/j.jppa.20250902.16 AB - Cybercrime had been a serious challenge in Kenya, threatening digital infrastructure, economic stability, and public trust in technology. It had led to financial loss, data loss, disruption, document damage, and psychological stress among others. In recognizing this, the government brought the cybersecurity training as a capacity building initiative through the Kenya National ICT Policy Despite the policy initiative being brought, Kenya continued to experience recurring incidents of system breaches, data theft, and disruptions to essential services thereby undermining public trust in digital infrastructure and highlighting the growing gap between policy intentions and the realities of cybercrime prevention and control. This study was therefore necessitated to assess the actual impact of the cybersecurity on cybercrime prevention and identify reasons for its limited effectiveness. The paper therefore evaluated how Kenya's ICT Policy on cybersecurity training contributed to the prevention of Cybercrime in Kenya. Descriptive research design alongside sequential explanatory mixed methods approach were employed. Primary data was obtained from officers working with the cybercrime prevention institutions as well as mobile communications providers such as Safaricom and Airtel in Kenya. A simple linear regression and thematic analysis were used to analyze responses collected from officers working with the cybercrime prevention institutions in Kenya. The paper established that cybersecurity training enhanced officers’ skills and aided cybercrime prevention; however, its impact varied across institutions due to differences in commitment, resources, content relevance, and integration, with key contextual and institutional factors shaping effective-ness. The paper concluded that cybersecurity training improved officers’ skills and cybercrime prevention, but its impact differs by institution, shaped by resource allocation, commitment, content relevance, and integration into operations. The paper recommended that the government and telecommunication institutions to prioritize funding, leadership support, role-specific customization, interactive delivery, robust evaluations and integration of training into operations to enhance the effectiveness and sustainability of cybersecurity training initiatives. VL - 9 IS - 2 ER -