Determinants of Airport Vulnerability to Security and Safety. A Case of Jomo Kenyatta International Airport Nairobi

Hellen Nthenya Makau Samwel Auya Erick Kiprono Bor

Abstract

Airport security and safety have in most instances affected by criminal activities resulting in far-reaching consequences in the air transport industry. Although airports across the world have put in place measures to deter security and safety vulnerabilities, still most airports suffer huge losses because of safety and security threats. This paper explores the determinants of airport vulnerability to security and safety at Kenya airports with a focus on Jomo Kenyatta International Airport, Nairobi. Specifically, the paper focuses on external and internal determinants of Airport Vulnerability to Security and Safety at the airport of study. Using a descriptive research design, a sample of 296 respondents drawn from a target population of 1140, the study established that external factors including supportive stakeholders in the security and safety protocols at the airport, proper implementation of security protocols and measures by the airport operators, and periodic training of staff on safety and security have positively influenced the security and safety at the airport. In addition, the study also established that internally, the airport management has put measures to reduce airport vulnerability to security and safety including putting in place appropriate security policies and measures, equipping security personnel with required safety and security gadgets, and undertaking periodic training to staff on safety and security. The paper concludes that external factors have positively influenced the security and safety at the airport because of supportive stakeholders on the security and safety protocols and that internally, the airport management has put in place internal control to minimize the airport’s vulnerability to security and safety issues because the management has put in place appropriate security policies and measures, and engaged in training staff on safety and security. The study also recommends that the airport management invest more in procuring modern security and safety equipment for security personnel and develop evidence-based policies and best practices whose implementation will foster security and safety at the airport. The airport management should also closely monitor the implementation of all security and safety protocols and undertake periodic training, inspections and audits on safety and security matters to mitigate security risks at the airport.

References

1. Avizienis, A., Laprie, J., Randell, B., & Carl Landwehr, C. (2004). Basic concepts and Taxonomy of Dependable and Secure Computing. USA, Iowa State University.
2. Boholm, M., Möller, N., & Hansson, O. (2016). The concept of risk, safety, and security:applications in everyday language. Risk Analysis, 36(2), 320–338.
3. Burns, A., McDermid, J., & Dobson, J. (1992) On the Meaning of Safety and Security. The Computer Journal, 6(35), 3-15.
4. Carayon, P. (2006). Human factors of complex socio-technical systems. Appl Ergon, 37(6), 525 - 535.
5. Carayon, P., & Smith, M. (2000). Work organization and ergonomics. Appl Ergon, 31(6), 649-662.
6. Camastral, M. (2014). Business continuity management in airports: securing continuity in the face of crisis. Australia, Queens land University of Technology.
7. Devine, M. (2014). Risk management and high reliability: a case study of Australian airport Management. Australia, Queensland University of Technology.
8. Enoma, A., & Allen, S. (2007). Developing key performance indicators for airport safety and Security Facilities. Aviation Safety Journal, 25(8), 296-315.
9. Enoma, A., Allen, S., & Enoma, A. (2009). Airport Redesign for Safety and Security: Case Studies of Three Scottish Airports. International Journal of Strategic Property Management, 13(2), 103-116.
10. Gerlach, E., Belsher, M., Beutler, E., & Larry, E. (2010). Cross-Cultural Differences in RiskPerceptions of Disasters: Cross-Cultural Differences in Risk Perceptions of Disasters. Risk Analysis, 30(10), 1539–1549.
11. ICAO. (2022). Annex 17 to the Convention on International Civil Aviation. Security. Montreal, Canada: International Civil Aviation Organization.
12. Kanyi, P., Kamau, P., & Mireri, C. (2016). Assessment Of the Security Preparedness and Adherence to International Civil Aviation Standards at Wilson Airport, Kenya. Journal of Humanities and Social Science, 21(3), 23-41.
13. Kraemer, S., & Carayon, P. (2007). Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Appl Ergon, 38(2), 143-154.
14. Kothari, R. (2004). Research Methodology Methods and Techniques (2nd Edition). New Age International Publishers, New Delhi.
15. Lykou, G., Anagnostopoulos, A., & Gritzalis, D. (2018). Implementing cyber-security measuresin airports to improve cyber resilience. Global Internet of Things Summit, 1(6), 305–310.
16. Nolan, P. (2014). Safety and Security Review for the Process Industries: Application of HAZOP,PHA, What-IF and SVA Reviews (3th ed.). Norwich, William Andrew Publisher.
17. Nwasonuba, O., & Okendo, N. (2021). An Evaluation of Security in the Nigerian Airports. African Journal of Business and Economic Development, 1(5), 30-43.
18. Piètre-Cambacédès, L., & Bouissou, M. (2013). Cross-fertilization between safety and security engineering. Reliability Engineering & System Safety, 110 (1), 110-126.
19. Piètre-Cambacédès, L., & Chaudet, C. (2010). The SEMA referential framework: Avoiding ambiguities in the term’s “security” and “safety”. International Journal of Critical Infrastructure Protection, 3(2), 55-66.
20. Schoitsch, E. (2005). Design for Safety and Security of Complex Embedded Systems: A Unified Approach in Cyberspace Security and Defense. Research Issues, 196(1), 161-174.

Authors

Hellen Nthenya Makau
Samwel Auya
Erick Kiprono Bor
[1]
“Determinants of Airport Vulnerability to Security and Safety. A Case of Jomo Kenyatta International Airport Nairobi”, Soc. sci. humanities j., vol. 8, no. 05, pp. 3724–3730, May 2024, doi: 10.18535/sshj.v8i05.1101.