Effectiveness of Biometric Modalities Employed in Management of Identity Based Conflicts in Nairobi County, Kenya
Keywords:Biometrics Modalities, Fingerprints, Iris, Scanning, Conflicts, Microcosm
The case of Nairobi County, Kenya, serves as evidence that identity-based conflicts pose persistent difficulties on a global scale. In this region, the convergence of various ethnic and cultural identities sometimes gives rise to strained relations and episodes of violence. The present study investigates the efficacy of biometric technology in mitigating identity-related challenges within the jurisdiction of Nairobi County. A descriptive survey study was conducted, involving 300 participants. Among these participants, 280 were government employees who were actively involved in routine biometric operations, and the remaining 20 were people who had experienced identity-related conflicts. The Yamane technique was employed to choose a sample of 171 respondents. The data collection process encompassed the use of questionnaires, interviews, and observation techniques, which collectively unveiled compelling evidence supporting the substantial role of biometric modalities in both identity maintenance and conflict resolution. These technologies facilitate the acceleration of procedures, mitigate fraudulent activities, and augment accountability, particularly in critical domains such as voting and the dispensation of social assistance. Nevertheless, it is imperative to acknowledge the existence of some obstacles in the realm of data quality, privacy, and inclusivity. These problems underscore the importance of establishing a comprehensive legal framework and implementing public awareness initiatives. This study highlights the significance of adopting a well-rounded strategy that protects individual liberties while optimizing the advantages of biometric modalities in tackling identity-related challenges within Nairobi County. The results of this study provide significant contributions to professionals, governmental organizations, and policymakers engaged in identity verification and conflict resolution. These findings enhance our comprehension of the role of technology in addressing difficulties linked to identity, hence expanding our knowledge in this field.
Adler, A. (2008). Biometric system security. In Handbook of biometrics (pp. 381-402). Springer, Boston, MA.
Afful-Broni, A. (2013). Conflict management in Ghanaian schools: A case study of the role of leadership of Winneba Senior High School. International Journal of Educational Planning and Administration, 2(2), 65-76.
Amoore, L. (2006). Biometric borders: Governing mobilities in the war on terror. Political geography, 25(3), 336-351.
Berger, G., (2007). The Globalization of world politics: An introduction to International Relations. Oxford: Oxford University Press.
Bolle, R. (2004). A guide to biometrics. New York: Springer.
Bolle, R. M., Connell, J. H., Pankanti, S., Ratha, N. K., & Senior, A. W. (2002). Guide to biometrics. Springer Science & Business Media.
Champod, C. (2009). Fingerprints and other ridge skin impressions. CRC press
Coats, W. S., Bagdasarian, A., Helou, T. J. and Lam, T. (2007). The practitioner's guide to biometrics. ABA Publishing, Chicago.
David, M & R, Monaghan. (2018). Special Issue: Contemporary issues and innovation in counterterrorism. Studies in Conflict and Terrorism, 7-78.
DiNapoli, T. P. (2007). Standards for internal control. New York State Government.
Faundez-Zanuy, (2005). Individual, family, and community risk markers for domestic violence in Peru. Violence against women, 11(3), 353-373. https://doi.org/10.1177/1077801204272129 DOI: https://doi.org/10.1177/1077801204272129
Fox, S. (2010). The importance of information and communication design for manual skills instruction with augmented reality. Journal of Manufacturing Technology Management, 21(1), 188-205. https://doi.org/10.1108/17410381011014369 DOI: https://doi.org/10.1108/17410381011014369
Gates, K. (2006). Identifying the 9/11 'Faces of Terror': The promise and problem of facial recognition technology. Cultural Studies, 20(4-5), 417-440. https://doi.org/10.1080/09502380600708820 DOI: https://doi.org/10.1080/09502380600708820
Grijpink, M., (2010). Two barriers to realizing the benefits of biometrics: A chain perspective on biometrics, and identity fraud as biometrics' real challenge, in: Optical Security and Counterfeit Deterrence Techniques V, edited by Rudolf L. van Renesse, Proceedings of SPIE-IS&T Electronic Imaging, SPIE Vol. 5310, pp. 90-102
Harris, K. J. (2011). Abusive supervisory reactions to coworker relationship conflict. The Leadership Quarterly, 22(5), 1010-1023.
Hawthorne, M. (2007) Fingerprints: analysis and understanding. CRC Press
Hosein, I. (2005). Transforming travel and border controls: Checkpoints in the Open Society. Government Information Quarterly, 22(4), 594-625. https://doi.org/10.1016/j.giq.2006.01.002 DOI: https://doi.org/10.1016/j.giq.2006.01.002
Jain P,R & Ross,A. (22-25 September 2002). Learning user specific parameters in a multi biometric system. Proceedings of IEEF International Conference on image processing (pp. 51-60). NY-USA: Rochester.
Kariithi B. (2018). Strategy implementation practices on performance of Huduma Centres. Nairobi City County, Kenya.
Kiragu J. Abdalla G. & Waswa F. (2015). Effects of Huduma Centers in service delivery; a case of Mombasa Huduma Center. International Journal of Academic Research in Business and Social sciences, 5(6), 102-117.
Korir, E. (2015). The Effects of Service Quality on Customer Sartisfaction at the Nairobi Huduma Centre. Journal of Business Management, 2(3), 45-52.
Kothari, C.R., (2014). Research methodology: Methods and techniques (3rd Ed). New Delhi : New Age International (P).
Lawson, M. (2003). How Neoconservatives conquered Washington. Retrieved October 31, 2018, from http//www.antwar.com/orig/lind/.html
Martin, A. K. (2011). Envisioning Technology through Disclosure: A case study of biometrics in the National Identity Scheme in the United Kingdom (Doctoral dissertation, London School of Economics and Political Science).
Ministry of Devolution & Planning, 2015
Mutinda, M. (2017). Strategic Role of Huduma Centre Initiatives on Public Service Delivery among Residents of Nakuru County. IOSR Journal of Business and Management (IOSR-JBM), 19 (9), 35-41.
Nath, V. (2010). Study and design of biometric security systems: fingerprint and speech technology. In Proceedings of the third international conference on microelectronics, computing and communication systems (pp. 577-584). Springer, Singapore.
Ng'aru, S. W., & Wafula, M. K. (2015). Factors Influencing the Choice of Huduma Centers' Services (A Case Study of Mombasa Huduma Centre). International Journal of Scientific and Research Publications, 5(6), 1-9.
Odhiambo, W., & Okello, B. (2019). Influence of automation systems on service delivery in selected huduma centers in kenya. The Strategic Journal of Business & Change Management, 6(2), 2259-2271. https://doi.org/10.61426/sjbcm.v6i2.1258 DOI: https://doi.org/10.61426/sjbcm.v6i2.1258
Okwong, A. E. (2012). IT based solutions to Electoral system in Nigeria. West African Journal of industrial and Academic Research, 5(1), 127-139.
Orodho. (2003). Essentials of educational and Social Sciences Research Methods. Nairobi: Masola Publishers.
Ossorio, P., & Duster, T. (2005). Race and Genetics: Controversies in Biomedical, Behavioral, and Forensic Sciences. American Psychologist, 60(1), 115-128. https://doi.org/10.1037/0003-066X.60.1.115 DOI: https://doi.org/10.1037/0003-066X.60.1.115
Otieno, I., & Omwenga, E. (2015). Citizen-Centric Critical Success Factors for the Implementation of E-Government: A Case Study of Kenya Huduma Centres. IST-Africa Conference, 7(2), 1-6.
Pardesi, J. D. (2007). Emerging Trends in Information Technology. Nirali Prakshan, India
Pato, J., & Millet, L. (2010). Biometric recognition: Challemges and opportunities. Washington DC: The Naional Acdemies Press. Retrieved March 9, 2010.
Pooe, A. (2009). Factors impacting the adoption of biometric authentication in the local banking sector (MTech Dissertation, University of Johannesburg).
Pooe, A., & Labuschagne, L. (2011, November 1). Factors impacting on the adoption on biometric technology by South African banks; An empirical investigation. South African Business Review, 15(1), 119-138.
Ross, A., Jain.A. K., & Nandakumar(2006) 50 years of biometric research: Accomplishment, challenges and opportunities. Pattern recognition letters, 79, 80-105
Rubin, B. (2006). Central Asia and Central Africa:Transnational wars and ethnic conflicts. Journal of Human Development, 7(1) 5-22. https://doi.org/10.1080/14649880500501138 DOI: https://doi.org/10.1080/14649880500501138
Schneider, J.K., & Price, J.H. (2001). Positive Outcomes Implementing Biometrics in Multiple HealthCare Applications. TEPR 2001 Conference and Exhibition
Stone, R. (2016). Fraud, security, and controls in small businesses: A proposed research agenda. Journal of Business, 1(3), 15-21. https://doi.org/10.18533/job.v1i6.44 DOI: https://doi.org/10.18533/job.v1i6.44
Sudha I. (2012), Biometrics and Fingerprint Analysis, Selective and scientific books publishers, New Delhi, India.
Thakral, P., Rai, M., & Thakral, R. (2012). Issues of biometric for disabled. International Journal of applied Engineering research, 7(11), 1.
Thomas, K. W. (2006). Conflict and Conflict Management: Reflections and Update. Journal of Organizational Behavior, 13, 265-274. https://doi.org/10.1002/job.4030130307 DOI: https://doi.org/10.1002/job.4030130307
Wolf P. (2017). Iris-recognition systems and the prospect of sustainable democracy in Africa. International Institute for Democracy and Electoral Assistance International.
How to Cite
Copyright (c) 2023 Odiyo Onyango Awuor, Ruth Simiyu, Frank Matanga
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.