ASSESSING THE PREPAREDNESS OF LAW ENFORCEMENT AGENTS IN DEALING WITH WHITE-COLLAR CRIMES: A CASE OF NAIROBI CITY COUNTY, KENYA
DOI:
https://doi.org/10.47941/jmlp.839Keywords:
Preparedness, law enforcement agents, white-collar crimes.Abstract
Purpose: This study sought to assess the preparedness of Law Enforcement Officers in handling white-collar crimes within Nairobi City County. The research objectives were to establish the adequacy of current resources available to effectively manage white-collar crimes in Nairobi City County, to explore the competencies of the law enforcement agents in investigating white-collar crimes in Nairobi City County, to examine the challenges encountered by Law enforcement agents face in thwarting white-collar crimes within Nairobi City County and finally to establish the strategies for enhancing the capacity of law enforcement agents in handling white-collar crimes in Nairobi City County.
Methodology: The target population was largely drawn from the Kenya police, Directorate of criminal investigations and the Kenya Anti-corruption commission with a sample size of 371 respondents drawn from the DCI and KPS. This study adopted quantitative and qualitative research methods. It used a descriptive survey design. Data was collected through questionnaires and interviews. The study was guided by the Rational Choice Theory. Quantitative data was analysed through the SPSS tool version 23. The reports from qualitative data were presented using descriptive statistics. This included frequencies, modes, means, variances and standard deviations. Qualitative data was first coded, patterns established themes and finally reported narratively.
Results: The study revealed that there was a significant and strong relationship between the four variables and preparedness level to deal with white collar crime, however the enforcement agents in Nairobi County-Kenya were found to be generally ill prepared to fight white collar crime. The study revealed that corruption tendering and other acts of bribery; money laundering, embezzlement/misappropriation of public funds/resources as the most prevalent crimes. Cyber-hacking and other forms of internet fraud were also perceived to be problematic, yet security agents were inadequately prepared to deal with these kinds of crimes as they lacked resources and the relevant training to enable them to investigate, arrest, and prosecute the culprits.
Unique Contribution to Theory, Policy and Practice: The study recommended that the government should allocate more funds and resources to enable law enforcement agents procure modern gadgets that track internet activities; the officers/forensic experts need to have proper training and be recruited from the smart people in society who are perceived to be supper intelligent for them to be smart in their investigations; there is also need to strengthen the existing and establish relevant laws (legal and institutional frameworks) aimed at combating corruption related and other economic crimes.
Downloads
References
Ajala, E. B. (2007). Cybercafés, Cybercrime detection and prevention. Liberty high tech, emerald group publishing limited.
Armstrong, H. L and Forde, P. J. (2003). Internet anonymity practices in computer crime, information management and computer security.
Babble, E. (1995). The Practice of Social Research, 7th edition, Boston: Wadsworth publishing company.
Benowitz (2015). Criminallawdc.com – accessed on 17/07/2017
Burns, K.H Whitworth, C.Y Thompson - (2004). Assessing law enforcement preparedness to deal with internet fraud. Journal of Criminal Justice, – Vol. 32, Issue 5, September – October 2004
Burns, P. and Stanley A. (2002). Fraud Management in the credit card industry, discussion paper presented in a seminar at payment card center of the federal reserve bank of Philadelphia
Chua, C. E. H., & Wareham, J. (2004). Fighting internet auction fraud: An assessment and proposal. Computer, 37(10), 31-37.
Creswell, W J, (2009), Research Design; Qualitative, Quantitative and Mixed Methods Approaches, 4th edition, Sage Publications Ltd
Coolican, H, (2014), Research Methods and Statistics in Psychology, 6th edition, Psychology Press, London/New York
Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests Psychometrika. 16, 297-334.
Davis J. T. (2012). Examining perceptions of local law enforcement in the fight against crimes with a cyber-component: An International Journal of Police Strategies & Management, 35(2), 272-284
Deutskens, E., De Ruyter, K., Wetzels, M., & Oosterveld, P. (2004). Response rate and response quality of internet-based surveys: An experimental study. Marketing letters, 15(1), 21-36.
Farrow, K. (2017). http://www.crimes-of-persuasion.com/Criminals/criminals.htm - accessed on
9.2017
Felix Njini, (2016). www.bloomberg.com/markets, -18th October 2016
Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales. Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education.
Gottschalk, P. (2011). White-collar crime and police crime: rotten apples or rotten barrels? Critical Criminology, 20(2), 169-182.
Gottschalk, P., Filstad, C., Glomseth, R., & Solli-Sæther, H. (2011). Information management for investigation and prevention of white-collar crime. International Journal of Information Management, 31(3), 226-233.
Hinduja, S. (2004). Perceptions of local and state law enforcement concerning the role of computer crime investigative teams. Policing: An International Journal of Police Strategies & Management, 27(3), 341-357.
Hoyle, R. H. (2002). Research methods in social relations. Melbourne. Wadsworth.
Huberman, A. M and Miles, M. B, (2002). The qualitative researcher’s companion, London: Sage publication.
ICT (2010), Report on Security Reform and Transitional justice in Kenya, International center for transitional justice
Imbens, G. W., & Wooldridge, J. M. (2009). Recent developments in the econometrics of program evaluation. Journal of economic literature, 47(1), 5-86.
Jamieson, R., Land, L., Stephens, G., & Winchester, D. (2008). Identity crime: the need for an appropriate government strategy. In Forum on Public Policy Online (pp. 1-33).
Kombo K. and Tromp L. (2010). Proposal and Thesis writing; An Introduction. Nairobi Paulines Publications Africa.
Kothari T. R, (2003). Research methodology. A step by step guide for beginners, 2ndedition. New Delhi, Sage publications
Levi M. (2006). Risk and crime shifting moral boundaries. The media construction of financial white-collar crimes, British journal of criminology
Lewis, P. (2002, April 3). Crackdown launched on Web based scams. The Seattle Times, B1.
Lansberg, S. R. (1997). The Impact of the White-Collar Crime Unit on Case Backlog at the Travis County District Attorney's Office: A Program Evaluation of the Cooperative Efforts of the Travis County District Attorney, Sheriff's Office and the Austin Police Department.
Longenderger, J. and Shrimp, T. A. (2001). Consumer vulnerability by scans, swindles and fraud: A new theory of visceral influences on persuasion. Psychology and marketing
Geis, G. (2011). White-Collar and Corporate Crime, ABC-CLIO, LLC 130 Cremona Drive, P.O. Box 1911 Santa Barbara, California 93116-1911, Greenwood publishing group.
McIntyre, G. A. (2002). A method for unbiased selective sampling, using ranked sets. Australian Journal of Agricultural Research, 3(4), 385-390.
Mbaya, B. (2016). The State of Forensic Investigation in Kenya: Doctoral Dissertation, University of Nairobi. Kenya.
Overill, R. E, (2003). Reacting to cyber-intrusions. The technical, legal and ethical dimensions, Journal of financial crimes.
Palmer, M.J. (1995). White-collar Crime in Australia National Symposium – unedited. Paper as presented at conference - Australian institute of criminology, Canberra, 5 & 6 June 1995(unpublished)
Peter, N. (2010). Research Methods for Education, Longman Publishers. Nairobi, Kenya.
Republic of Kenya (ROK) (2010) Central Bank of Kenya annual report, Government Printers.
Republic of Kenya (ROK) (2016) Central Bank of Kenya, Bank supervision annual report, Government Printers.
Republic of Kenya (ROK) (2010). Communication commission of Kenya report, Government Printers
Republic of Kenya (ROK) (2015/2016), Ethics and Anti-Corruption Commission annual report, Government Printers.
Republic of Kenya (ROK) (2010), Kenya Constitution, Nairobi: Government Printers.
Republic of Kenya (ROK) (2011), National Police Service Act, Nairobi: Government Printers.
Reyes A., Kevin O, Jim S, Jon R. H., Captain B, R. Jean, Thomas, R, (2012). Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and
Prosecutors. Published by Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370
Rosoff, Stephen, Henry Pontell and Robert Tillman. (2010). Profit without Honor: White-collar
Crime and the Looting of America (5th ed.). Upper Saddle River, NJ: Prentice Hall
Santos, J. R. A. (1999). Cronbach’s alpha: A tool for assessing the reliability of scales. Journal of extension, 37(2), 1-5.
Savelsberg, Joachim J. (1994). Constructing White-Collar Crime: Rationalities, Communication Power. Philadelphia: University of Pennsylvania Press.
Siemsen, E., Roth, A., & Oliveira, P. (2010). Common method bias in regression models with linear, quadratic, and interaction effects. Organizational research methods, 13(3), 456476.
Standard Newspaper of February 23rd (2011). Hurdles to fighting white collar crime Available from: https://www.standardmedia.co.ke/article/2000029778/hurdles-tofighting-white-collar-crime.
Stevenson, H. H., & Jarillo, J. C. (2007). A paradigm of entrepreneurship: Entrepreneurial management in Entrepreneurship (pp. 155-170). Springer, Berlin, Heidelberg.
Tontarski, R. (2015). The Committees report on strengthening forensic science at the National Institute of Justice, May 7, 2015. Defense Forensic Science Center, Federal Forensic Sector Panel
Vahdati, S., & Yasini, N. (2015). Factors affecting internet frauds in private sector: A case study in cyberspace surveillance and scam monitoring agency of Iran. Computers in Human Behavior, 51, 180-187.
Wilhelm, W. K. (2004). The fraud management lifecycle theory: A holistic approach to fraud management. Journal of economic crime management, 2(2), 1-38.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Patrick Mwakio , Dr. George Mathenge , Dr. George Maroko
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.