All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99


Impacts of Using Multi Agency Command Centre Strategy on National Security at Isebania Trans-Border, Migori County, Kenya

DOI: 10.4236/oalib.1110566, PP. 1-23

Subject Areas: Politics

Keywords: Boundary, Border, National Security

Full-Text   Cite this paper   Add to My Lib


National Security of any nation is the epitome of development and prosperity. The term evolved from simpler definitions that emphasized freedom from military threat and from political coercion. A nation has security when it has the ability to preserve the nation’s physical integrity and territory, to maintain its economic relations with the rest of the world on reasonable terms, to preserve its nature, institutions and governance against disruption from outside; and control its borders. The study examined the impacts of using Multi Agency Command Centre Strategy on National security at Isebania trans-border, Migori County, Kenya. The study employed Decision Theory. Survey design was utilized which involved collection of data on a number of variables. Target population comprised of 980 persons (800 business persons, 70 village elders, 60 border Officers, 43 Police Officers, 6 Chiefs and 1 Assistant county commissioner (ACCs). The study considered a 30% of each category of sample population and therefore, the sample size for the study was 294 (240 business men and women, 21 village elders, 18 border officers, 12 police officers and 2 chiefs, 1 ACC). Interviews, Questionnaires, and Focus group discussion tools were used to collect data from the respondents. Data was analyzed by use of Statistical Package for Social Sciences (SPSS) version 27. The result was presented in form of graphs. Findings revealed that Multi-Agency Command Centre as a strategy views border security with a bird’s eye view, as used by Foucault where in our case multi-agency command center as both security planning and a coordination tool where all the relevant leaders in an emergency gather under one chair to plan, execute and pool resources and harness synergies as evidenced by this research as the public view it. This does not mean that the tool is ineffective by virtue of the fact that the public is not knowledgeable, but its ineffectiveness is demonstrated by evidence that National Intelligence Service does not detect and curb crime. Therefore, the study recommends that training needs to be enhanced more, especially on trust leaders about Multi-Agency Command Centre and competencies instilled on how to lead and better harness the synergies of all participating agencies as per their specialization. There is dire need to deploy more intelligence personnel at the borders to improve effectiveness of securing our borders.

Cite this paper

Kithii, N. N. and Odhiambo, E. O. S. (2023). Impacts of Using Multi Agency Command Centre Strategy on National Security at Isebania Trans-Border, Migori County, Kenya. Open Access Library Journal, 10, e566. doi:


[1]  Amoore, L. and De Goede, M. (2005) Governance, Risks and Dataveillance in the War on Terror. Crime, Law and Social Change, 43, 149-173.
[2]  Foucault, M. (2007) Security, Territory, Population: Lectures at the College de France 1977-1978. Translated by Macey, D., Allen Lane, London.
[3]  Hindesss, B. (2000) Divide and Govern: Governmental Aspects of the Modern States Systems. In: Ericson, R. and Stehr, N., Eds., Governing Modern Societies, University of Toronto, Toronto, 118-140.
[4]  Predd, J., Willis, H., Setodji, C. and Stelzner, A. (2012) Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources.
[5]  Gutierrez, E., Juett, J. and Kiekintveld, C. (2013) Generating Effective Patrol Strategies to Enhance U.S. Border Security. Journal of Strategic Security, 6, 152-159.
[6]  Cote-Boucher, K. (2008) The Diffuse Border: Intelligence-Sharing, Control and Confinement along Canada’s Smart Border. Surveillance and Society, 5, 142-165.
[7]  Pollock, K. (2013) Review of Persistent Lessons Identified Relating to Inter-Operability from Emergencies and Major Incidents since 1986. Emergency Planning College Occasional Papers 6. Emergency Planning College, York.
[8]  Rosand, E. (2006) The UN-Led Multilateral Institutional Response to Jihadist Terrorism: Is a Global Counterterrorism Body Needed? Journal of Conflict and Security Law, 11, 399-427.
[9]  Onkware, K., Odhiambo, E.S.O. and Ntabo, O.M. (2010) Counter-Terrorism strategies by Kenya against Somalia Terrorism. Egerton Journal of Humanities, Social Sciences & Education, 1X, 99-109.
[10]  Rosenblum, M.R., Bjelopera, J.P. and Fiklea, K.M. (2013) Border Security: Understanding Threats at U.S. Borders. Congressional Research Service, Washington DC, 1-30.
[11]  Odhiambo, E.O.S., Kassilly, J., Maito, T.L., Onkware, K., Oboka, W.A. and Otipi, N.H. (2013) The Reprisal Attacks By Al-Shabaab against Kenya. Journal of Defense Resources Management, 4, 53-64.
[12]  Nduti, D.M. and Odhiambo, E.O.S. (2020) Mechanisms of Curbing Smuggling of Food Commodities from Uganda into Busia Town, Kenya. International Journal of Research and Innovation in Social Science (IJRISS), 4, 122-137.
[13]  Wakhungu, J.P., Okoth, G.P. and Odhiambo, E.O.S. (2020) Challenges and Opportunities Constraining and Enhancing Kenya and Tanzania Participation in the EAC Econo-Political Integration Process. Open Journal of Political Science, 11, 134-154.
[14]  EAC Treaty (2006) Treaty for the Establishment of the East African Community.
[15]  Mugenda, O. and Mugenda, A.G. (2008) Social Science Research Theory and Principles. ARTS, Nairobi.
[16]  FEMA (2008) Introduction to the Incident Command System, ICS-100 for Higher Education Student Manual.
[17]  Cabinet Office (2013) Joint Doctrine: The Interoperability Framework, U.K.
[18]  House, A., Power, N. and Alison, L. (2013) A Systematic Review of the Potential Hurdles of Interoperability to the Emergency Services in Major Incidents: Recommendations for Solutions and Alternatives. Cognition, Technology & Work, 16, 319-335.
[19]  Perry, S.J. and Wears, R.L. (2011) Large Scale Coordination of Work: Coping with Computer Chaos within Healthcare. Psychology Press, Hove.
[20]  Bharosa, N., Lee, J. and Janssen, M. (2010) Challenges and Obstacles in Showing and Coordinating information during Multi-Agency Disaster Response: Proposition from Field Exercises. Information Systems Frontier, 12, 49-65.
[21]  Sims, J. and Gerber, B. (2005) Transforming US Intelligence. Georgetown University Press, Washington DC.
[22]  Lichsestein, B., Bien, M., Marion, R., Seers, A., Orton, D. and Craigs, S. (2006) Complexity Leadership Theory: An Interactive Perspective on Leading in Complex Adaptive Systems. University of Nebraska-Lincoln, Lincoln.
[23]  Comfort, L.K. (2002) Managing Intergovernmental Responses to Terrorism and Other Extreme Events. Publius: The Journal of Federalism, 32, 29-50.
[24]  OEM (2012) Commissioning Process for Building and Systems. ASHRAE, Atlanta.
[25]  Allison, L., Power, N. and Allen, D. (2014) Critical Incident Decision Making: Evidence Review, N8 Research Partnership.
[26]  Brehmer, B. (1994) Same Notes on Psychological Research Related to Risk. In: Brehmer, B. and Sahlin, N.-E., Eds., Future Risks and Risk Management. Technology, Risk, and Society, Vol. 9, Springer, Dordrecht, 79-91.
[27]  Das, T.K. and Teng, B.-S. (2004) The Risk Based View of Trust: A Conceptual Framework. Journal of Business and Psychology, 19, 85-116.
[28]  Hohmann, H. (2008) Agreeing and Implementing the Doha Round of the WTO. Cambridge University Press, Cambridge.
[29]  de Wulf, L. and Sokol, J.B. (2005) Customs Modernization Handbook. World Bank, Washington DC.
[30]  Truel, C. (2010) A Short Guide to Customs Risk. Routledge, Taylor & Francis Group.
[31]  Sokolova, A. (2017) Challenges with Features of Customs Clearance at the Russian-Finnish Border a Case of GW Europe. KYAMK University of Applied Sciences, kotka.
[32]  Salter, E. and Amoores, M. (2008) Smart Borders and Mobilities: Spaces, Zones, Enlosures. Surveillance & Society, 5, 96-101.
[33]  Department of Immigration and Multicultural Affairs (2006) 2005 Access and Equity Annual Report: Progress in Implementing the Charter of Public Service in a Culturally Diverse Society.;query=Id%3A%22publications%2Ftabledpapers%2FHSTP010825_2004-07%22;src1=sm1
[34]  Taylor, S. (2005) Sovereign Power at the Border. Public Law Review, 16, 57-77.
[35]  Lyon, D. (2003) Surveillance as Social Sorting: Privacy, Risks and Digital. Routledge, New York.
[36]  Odgers, M. and Brennan, P. (2014) Implementation of an IATA/ICAO/WCO PNRGOV EDI Message Processing System. WCO IT Conference 2014-Brisbane.
[37]  Wasike, S. and Odhiambo, E.O.S. (2016) A Critique of the Usefulness of Theories in Explaining Socio-Political Phenomenon. Asian Journal of Basic and Applied Sciences, 3, 29-33.
[38]  Smith, S. (1986) Theories of Foreign Policy: An Historic Overview. Review of International Studies, 12, 13-29.
[39]  Hacking, I. (1975) The Emergence of Probability. Cambridge University Press, Cambridge.
[40]  Fischbeck, P. and Butler, S. (2002) Multi-Attribute Risk Assessment. Carnegie Mellon University, Pittsburgh.
[41]  Butler, S. (2001) Improving Security Technology Selections with Decision Theory. Carnegie Mellon University, Pittsburgh.
[42]  Herbert, S. (1957) Models of Man. John Wiley & Sons, New York.
[43]  Kahneman, D. and Tversky, A. (1974) Prospects Theory: An Analysis of Decision under Risk. Econometrica, 47, 263-292.
[44]  Harvey, L.O. (2014) Detection Theory: Sensory and Decision Processes. Colorado University, Boulder.
[45]  Isaac, S. and Michael, W.B. (1997) Handbook in Research and Evaluation: A Collection of Principles, Methods, and Strategies Useful in the Planning, Design, and Evaluation of Studies in Education and the Behavioral Sciences. 3rd Edition, Educational and Industrial Testing Services, San Diego.
[46]  Kraemer, K.L. (1991) The Information Systems Research Challenge: Survey Research Methods. Harvard University Graduate School of Business Administration United States.
[47]  GOK (2018) Migori County Integrated Development Plan 2018-2022. Government Printer, Nairobi.
[48]  Kriecjce, R.V. and Morgan, D.W. (1970) Determining Sample Size for Research Activities. Educational and Psychological Measurement, 30, 607-610.
[49]  Mugenda, O. and Mugenda, G. (2003) Research Methods: Qualitative and Quantitative Approaches. African Centre for Technology Studies, Nairobi.
[50]  Cohan, L. and Manion, L. (2000) Research Methods in Education. Routledge, London.
[51]  Kithii, N.N. and Odhiambo, E.O.S. (2021) Impacts of Using Multi Agency Command Centre Strategy on National Security at Isebania Trans – Border surveillance Strategies on National Securityat Isebania, Migori County, Kenya. Unpublished Thesis
[52]  Juma, P.W. and Odhiambo, E.O.S. (2021) Geo-Political Factors Influencing Kenya and Tanzania Foreign Policy Behaviour since 1967. Journal of Defense Resources Management, 12, 75-98.
[53]  Odhiambo, E.O.S., Kassilly, J., Maito, L.T., Onkware, K. and Oboka, W.A. (2012) Kenya’s Constitution and Child Trafficking as a Security Threat. Journal of Defense Resources Management, 3, 75-88.


comments powered by Disqus

Contact Us