DETERMINANTS OF STRATEGY IMPLEMENTATION IN COUNTY MINISTRIES IN THE NORTH RIFT REGION OF KENYA

John Tuluke Namwar, Dr. Paul Samson Nyang’au

Abstract


The general objective of the project was to examine the determinants of strategy implementation in county ministries in the North Rift region of Kenya. The specific objectives are: examine the effect of County (structural designs) on strategy implementation in county ministries in the North Rift region of Kenya; determine the effect of managerial skills on strategy implementation in county ministries in the North Rift region of Kenya; assess the effect of financial constraints on strategy implementation in county ministries in the North Rift region of the North Rift region of Kenya, and examine the influence of stakeholder involvement on strategy implementation in county ministries in the North Rift region of Kenya. Among the theories that the study has been based on include resource-based view theory, Katz’s theory, stakeholder management theory and systems theory. The research adopted a mixed research design involving both quantitative and qualitative research designs and case study research method where three county governments were selected for data collection in particular, Turkana, West Pokot, and Uasin Gishu. Therefore, the target population from three counties (Turkana, West Pokot, and Uasin Gishu) used as the case studies was middle and top management employees from 30 County Ministries. Simple random technique was used as the sampling procedure. 277 county employees were targeted in the three counties. SPSS analysis statistical software was used to analyse the collected data.  The researcher was able to collect 199 questionnaires giving a response rate of 71.8%. The findings of the study indicate that each of the independent variable has a significant and positive relationship with the dependent variable (strategy implementation). Using the results of the study it has been concluded that structural designs, managerial skills, financial constraints, and stakeholder involvement were found to satisfactorily explain the implementation of strategy at the County Ministries supported by a coefficient of determination referred to as the R Square of 78.7%. Financials constraints is the highly determining factor in relation to strategy implementation with a regression coefficient of 0.414. Following this conclusion, some of the recommendations made for consideration include; county governments to streamline their organizational structure to ensure it complements implementation of strategy, have the National government via the treasury release funds in a timely manner, increase budgetary allocations for implementation of strategy and strive to hire competent strategic management staff and ensure they undergo regular training, among others. 

Key Words: Structural designs, strategy implementation, managerial skills, financial constraints


Full Text:

PDF

References


Agency, C. a. (2022, March 12). DEFINING INSIDER THREATS. Retrieved from CyberSecurity and Infrastracture Security Agency: https://www.cisa.gov/defining-insider-threats

Ali, Z. (2018). Insider Threats – 2018 Statistics. Baltimore, MD 21221: American Publishing, LLC™ .

Bowles, S. F. (2018, March 30). Facebook Employees in an Uproar Over Executive’s Leaked Memo. Retrieved November 23, 2018, from newyork times: https://www.nytimes.com/2018/03/30/technology/facebook-leaked-memo.html

carib, c. (2022, March 19). 6 Tips to Help Protect Your Data from Insider Threats. Retrieved from cloud carib: https://info.cloudcarib.com/blog/6-tips-to-help-protect-your-data-from-insider-threats

Chickowski, E. (2018, 10 16). Reasons Why Employees Violate Security Policies. Retrieved 12 18, 2018, from Dark Reading: https://www.darkreading.com/endpoint/privacy/6-reasons-why-employees-violate-security-policies/d/d-id/1333046?image_number=4

Christian W. Probst, J. H. (2020). Insider threats in Cyber security. New York: Springer Science.

David Leigh, L. H. (2011). Wikileaks, Inside Assange's war on secrecy. Newyork, NY 10107: United States PublicAffairs.

Fischer, E. A. (August 12, 2016). Cybersecurity Issues and Challenges: In Brief. Congressional Research Service.

Ford, D. R. (2018, July 12). Insider Threats & Insider Objections. Retrieved December 18, 2018, from Dark Reading: https://www.darkreading.com/endpoint/insider-threats-and-insider-objections/a/d-id/1333416

George, T. (2021, September 08). Security Week Network. Retrieved from The Impact of the Pandemic on Today's Approach to Cybersecurity: https://www.securityweek.com/impact-pandemic-todays-approach-cybersecurity

Holger Schulze, C. a. (2018). INSIDER THREAT 2018 REPORT. New York: CA Technologies.

James Scott, S. F. (2017). In 2017, The Insider Threat Epidemic Begins. ICIT Critical Infrastructure Forum, 4-5.

Johnson, A. (2018). Cybersecurity failures raise threat of 'deadly missile attacks. Los Angeles.: NBC News .

Jones, M. (2020, December 23). Six cybersecurity trends heading our way in 2021. Retrieved from T_HQ Technology and Business: https://techhq.com/2020/12/six-cybersecurity-trends-heading-our-way-in-2021/

Kamau Muthoni, Faith , K., & Frankline , S. (2019, January 31). How big banks lost billions in one week to cyber crime. The Standard, p. 4.

Libraries, U. (2022, March 7). Research Guide. Retrieved from USC Libraries: https://libguides.usc.edu/writingguide/researchdesigns

Magazine, S. (2020). Cyber risks related to insider threats bigger than external threat actors. BNP Media.

Mangan, D. (2018). US Treasury employee arrested, accused of leaking media secret information about suspicious financial transactions related to Paul Manafort, Russians. CNBC.

Martin, J. A. (2019, August 21). What is access control? A key component of data security. Retrieved from CSO: https://www.csoonline.com/article/3251714/what-is-access-control-a-key-component-of-data-security.html

Mr. Pragnesh G. Patel, S. (2013). Data Security in Cloud Computing using Elliptical. International Research Journal of Computer Science Engineering and Applications, 5.

Muncaster, P. (2021, July 8). CTOs Keeping Quiet on Breaches to Avoid Cyber Blame Game. Retrieved from Infosecurity Group: https://www.infosecurity-magazine.com/news/ctos-keeping-quiet-breaches-blame/

Munguti, R. (2020, June 28). Nation News. Retrieved from Nation media: https://nation.africa/kenya/news/how-merali-lost-sh10-million-to-conmen-who-mimicked-uhuru-s-voice-142384

Palmer, A. s. (2018, December 14). How one hacked laptop led to an entire network being compromised. Retrieved from ZDNet: https://www.zdnet.com/article/how-one-hacked-laptop-led-to-an-entire-network-being-compromised/

Panda. (2021, April 12). 11 Emerging Cybersecurity Trends in 2021. Retrieved from Panda Media Security: https://www.pandasecurity.com/en/mediacenter/tips/cybersecurity-trends/

Petters, J. (2020, September 22). What is an Insider Threat? Definition and Examples. Retrieved from Varonis: https://www.varonis.com/blog/insider-threats/

Ray, T. (2022, March ). Motive doesn't matter: The three types of insider threats. Retrieved from Maureen Data Systems: https://www.mdsny.com/motive-doesnt-matter-the-three-types-of-insider-threats/

Rosenthal, M. (2021, October 21). Insider Threats Examples: 17 Real Examples of Insider Threats. Retrieved from TESSIAN: https://www.tessian.com/blog/insider-threats-types-and-real-world-examples/

Russian investigative journalist: Snowden is 'a sort of ghost'. (2017, November 18). Retrieved November 20, 2017, from Yahoo: https://www.yahoo.com/news/russian-investigative-journalist-snowden-sort-ghost-170357193.html

Stewart, J. M. (2018, June 26). The Three Types of Multi-Factor Authentication(MFA). Retrieved from SkillSoft Global Knowledge: https://www.globalknowledge.com/us-en/resources/resource-library/articles/the-three-types-of-multi-factor-authentication-mfa/#gref

Young, E. &. (2013). Bring your own device, Security and Risk Considerations for your Mobile device Program. Insights on Governance, Risks and Compliance, 5-6.

Zeadally, S. (2021). Detecting Insider Threats: Solutions and Trends. Information Security Journal: A Global Perspective, 1-2.


Refbacks

  • There are currently no refbacks.