This study was focused on the role of private security companies in enhancing community security in the case of Yeka Sub city, Addis Ababa, Ethiopia. The study was employed mixed research design that is both quantitative and qualitative and data was collected through the primary and secondary data sources.
To analyze and show data clearly, thematic and descriptive data analysis methods were used and SPSS and excel software’s were also used as tools of analysis in this study. Results were shown quantitatively and qualitatively and presented via the description, tables, and graphs.
This study found that the private security has a vital role in enhancing community security through preventing, controlling, and eliminating crime conducive environments. With regard to partnerships of private security with public police, the result shows that they have a great coordination in sharing information’s, capacity building, and assisting each other while patrolling. However, their partnerships were challenged by lack of security skills, poor security equipment’s, low salaries, misunderstandings, illegitimate responsibilities, and absence of standard and national private security training manuals.
The findings reveal that appropriate security strategies are necessary to increase the contribution and make legalize their responsibilities of private security in providing security services to the community around their worksite.
Table of Contents
List of Tables
List of Figures
List of Annex
List of Acronyms/ Abbreviations
Glossary of Local Terms
Abstract
CHAPTER ONE
1. INTRODUCTION
1.1. Background
1.2. Statement of the Problem
1.3. Research Objectives
1.3.1.General Objective
1.3.2.Specific Objectives
1.4. Research Questions
1.5. Significance of the Study
1.6. Scope of the Study
1.7. Limitation
1.8. Ethical consideration
1.9. Justifications for the selection of the Study Area
1.10. Organization of the Thesis
CHAPTER TWO
2. REVIEW LITRATURE
2.1. Introduction
2.2. Basic Concepts and Definitions
2.2.1.Security
2.2.2.Security Personnel
2.2.3.Private Security
2.2.4.Company
2.2.5.Private Security Company
2.2.6.Human Security
2.2.7.Community Security
2.2.8.Community Insecurity
2.2.9.Ensuring security of the community
2.3. Theoretical Literature Review
2.3.1.Causes of Threats to Community Security (Crime)
2.3.2.Economic Theory of Crime
2.3.3.Abraham Maslow’s Hierarchy of Needs on Security Affairs
2.4. Empirical Literature Review
2.4.1.Role of PSCs in enhancing community security
2.4.2.The partnership of PSCs and AAP in enhancing community security
2.4.3.The challenges of PSCs in enhancing community security
2.5. Conceptual Framework
CHAPTER THREE
3. METHODOLOGY
3.1. Introduction
3.2. Description of the Study Area
3.2.1.Location
3.3. Research design
3.4. Research philosophy
3.5. Research approach
3.6. Sampling strategy
3.7. Sample size
3.8. Methods and instruments of data collection
3.8.1.Primary data Sources
3.8.1.1. Questionnaires
3.8.1.2. Interview
3.8.2. Secondary data Sources
3.8.2.1. Document Analysis
3.9. Analyze methods and tools
3.10. Validity and reliability
3.10.1.Instrument of validity
3.10.2.Instrument of reliability
CHAPTER FOUR
4. Results and Discussion
4.1. Introduction
4.2. Demographic characteristics of the respondents
4.2.1.Respondent distribution
4.2.2.Response Rate
4.2.3.Gender of the Respondents
4.2.4.Age of the respondents
4.2.5.Educational background of the respondents
4.2.6.Work experiences of the respondents
4.2.7.Profession of the respondents
4.3. Analysis of Collected Data
4.3.1.The role of PSCs in enhancing community security
4.3.1.1. Perception of police officers
4.3.1.2. Perception of community
4.3.1.3. Perception of the security personnel
4.3.2. The partnership of PSCs and AAP in enhancing community security
4.3.2.1. Training to improve security personnel capacity
4.3.2.2. Resources and information sharing to prevent and control crime
4.3.3. Challenges facing security personnel’s while providing security services
4.3.3.1. Capacity
4.3.3.2. Resources challenges
4.3.3.3. Institutional cooperation and legalization
4.3.3.4. Economic challenges
CHAPTER FIVE
5. Conclusion and Recommendation
5.1. Conclusion
5.2. Recommendations
Reference
Annexes
Acknowledgements
I would like to express my very great appreciation to Dr. Teferi Hailemichael, my research supervisor, for his patient guidance, enthusiastic encouragement and constructive criticisms of this research work.
I would also like to thank the staff of institutions of Yeka sub city Police Department, Yeka sub city Labor and Social Affairs office, Lion Security Service PLC., and Ghion Security and Cleaning Service PLC for their help during the field work in terms of responding and offering valuable information and resources giving towards my research work.
I would also like to give special thanks to my wife Hiwot Abreha, my parents, brothers, sisters for their continuous support and understanding when undertaking my research. I acknowledge with thanks their influence on my life.
Finally, I wish to thank my friends Gudeta Kebede and Welde Berhe for their support and encouragement throughout my study. I would like to thank sincerely all those who helped me with their valuable support during the entire process of this paper in one way or another.
List of Tables
Table 2. Sample size
Table 3. Shows the expected data to be collected and the actual data collected
Table 4. Shows the proportion of respondents by gender
Table 5. Shows the proportion of age categories of respondents
Table 6. Shows the educational background of respondents
Table 7. Shows the experience distribution of the respondent
Table 8. Shows previous profession of respondents
Table 9. Shows security personnel's perceptions of the role of PSCs in enhancing community security
Table 10. Shows the agreement level of security personnel towards the chain of PSCs and AAP.
Table 11. Shows the availability and type of security equipment used by security personnel.
Table 12. Shows the challenges that security personnel are facing in maintaining community security
List of Figures
Figure 1. Location and administrative map of Yeka sub city
Figure 2. Maslow’s hierarchy of needs
Figure 3. Conceptual Framework of the role of PSCs in enhancing community security
Figure 4. Shows the proportion of respondents by gender
Figure 5. Shows the proportion of age categories of respondents
Figure 6. Shows the educational background of respondents
Figure 7. Shows the experience distribution of the respondent
Figure 8. Shows previous profession of respondents
Figure 9. Shows security personnel's perceptions of the role of PSCs in enhancing community security
Figure 10. Shows the agreement level of security personnel towards the chain of PSCs and AAP
Figure 11. Shows the availability and type of security equipment used by security personnel.
Figure 12. Problem Tree
Figure 13. Objective Tree
List of Annex
Annex I. Questionnaires to be filled by Security personnel’s
Annex II. Key Informant Interview Guide
AOA I. O^A AO* 0*+** P^^A P^%* ^AiP¥
AOA II. *A ^AiP¥ - A^A ATI* AMOA (^/A/A) VA***= A7VA**T Ar^O ^m*
Annex III. Problem and Objective Trees
List of Acronyms/ Abbreviations
Addis Ababa police AAP
Commission on Human Security CHS
Danish Institute for Human Rights DIHR
Democratic Control of Armed Forces
DCAF
Department of Defence DOD
Ethiopian Civil Service University ECSU
Ethiopian Federal Police Communion EFPC
Interior State Security ISS
Internal Security Divisions ISDs
International Committee of The Red Cross
(ICRC)
ICRC
Memorandum of Understanding MOU
Non-Governmental Organizations NGO
Non-lethal Service Providers NSPs
Private security agencies PSCs
Private Security Agencies PSAs
Private security companies (PSCs)
South African National Defense Force SANDF
United Kingdom’s UK's
United Nations Development Programme
UNDP
United Nations Office on Drugs and Crime
UNODC
United Nations Trust Fund for Human
Security (UNTFHS)
UNTFHS
United States US
Yeka Sub City Police Department (YSCPD)
YSCPD
Glossary of Local Terms
Woreda: is the lowest administrative division in today ‘s Addis Ababa and the rest of Ethiopia. Until the end of 2010 all current Woredas used to be known as Kebeles.
Dulla: is among one of security equipment which is made up of different woods like from eucalyptus trees. Some time they (security personnel) call as soundless weapon. It is just like a stick.
Abstract
This study was focused on the role of private security companies in enhancing community security the case of Yeka Sub city, Addis Ababa, Ethiopia. The study was employed mixed research design that is both quantitative and qualitative and data was collected through the primary and secondary data sources. To analyze and show data clearly thematic and descriptive data analysis methods were used and SPSS and excel software’s were also used as tools of analysis in this study. Results were shown quantitatively and qualitatively and presented via the description, tables, and graphs. This study found that the private security has a vital role in enhancing community security through preventing, controlling, and eliminating crime conducive environments. With regard to partnerships of private security with public police, the result shows that they have a great coordination in sharing information’s, capacity building, and assisting each other while patrolling. However, their partnerships were challenged by lack of security skills, poor security equipment’s, low salaries, misunderstandings, illegitimate responsibilities, and absence of standard and national private security training manuals. The findings reveal that appropriate security strategies are necessary to increase the contribution and make legalize their responsibilities of private security in providing security services to community around their worksite.
Keywords: - collaboration /partnership, security personnel, security service, crime prevention
CHAPTER ONE
1. INTRODUCTION
Private security agencies (PSCs), peace and security in this paper involve assessing the role of private security in maintaining community security in Yeka Sub City, and their partnership with Addis Ababa Police and Particularly the Yeka Sub City Police Department (YSCPD) ; focused on preventing and controlling crimes so as to enhance community security in the sub city. The terms private security companies (PSCs) and private security agencies (PSAs) and are used interchangeably in this research study (PSCs). Despite the fact that the term PSAs is the most commonly used term in Ethiopia to refer to PSCs, the term PSCs was used in this study for the common understanding of the research community.
Prior research on the roles, challenges, prospers, and attitudes and perceptions of officers (police and PSC owners) and communities, including Richards and Smith (2007), Lilly (2000), Danish Institute for Human Rights (DIHR), (2019), Oyagi, (2020), Kenna, 2017, Solomon, (2015), Cunningham et al. (2010), Diphoorn, (2015), Isima, (2007), Gumedze, (2015), Omotoso & Aderinto, (2016) Researchers such as Shah (2016), Anicent, (2014), Abrahamsen (2011), Kakalik &Wildhorn, (1971), and others have tried to define what private security is in a different dimension.
However, there is an overall lack of enough research or under-researched in Ethiopia regarding the role, capacity, legalization, and chain of private security companies and their partnership with the Addis Ababa Police Commission to depict and analyze security issues to manage in highly dynamic environments where security complexity and dynamics are rapidly and continuously evolving. Thus, this research aims to explore and asses the contribution of PSCs in enhancing community security in Yeka Sub City, Addis Ababa. This research focused on maintaining or enhancing community security by preventing or thwarting acts of crime.
This chapter will introduce the study by first discussing the background and context, followed by the statement of the problem, research objective, research questions, and significance of the study, scope, limitation, ethical considerations, and finally the organizational structure.
1.1.Background
Security is an essential prerequisite for safe and prosperous societies where people can exercise their right to development and fully enjoy the spectrum of human rights (DIHR and DCAF, 2019). Therefore, security has long been the prerogative of the state and is an essential public service. Ensuring peace and security for every citizen and their property is the main responsibility of public security (Oyagi, 2020). According to the scholar, sectors and individuals such as government, Non-Governmental Organizations (NGO), private sectors, civil society, communities, and individuals play a significant role in enhancing and maintaining human security.
The word "human security" implies freedom from fear and freedom from want, with more specific definitions focusing on the consequences of direct, armed aggression (Schnabel and Pedrazzini, 2014). According to Cilliers, (2004), physical harm, injury, abuse, or the threat of abuse were among the identified human security threats in Africa. Whereas for others, structural violence and inequalities lead to poverty (Ronald, 2014), which leads to economic insecurity. Community security which one dimension of human security is defined by Bennett (2014), as a state in which people feel safe.
According to the Commission on Human Security (CHS) (2003), community security is a multi-sectorial issue and needs collective and shared responsibilities to secure the communities. As a result, hybridizing and or transferring some sort of security to PSCs is an effective strategy for preserving basic human security, particularly community, political, and individual security. The shift to private security occurred in an environment where existing policing practices and resources towards maintaining peace and security were subject to increasing complexities and burden pressures, motivating a willingness to consider alternative approaches (Sparrow, 2014).
The emergence of the contemporary international private military and security industry began in the early 1990s, with the emergence of private security providers with clear corporate structures (Holmqvist, 2005). In 2012, more than 28,000 individuals were in Afghanistan and in 2009, more than 15,000 individuals in Iraq were private security contractors, which were funded by the Department of Defence (DOD) (Peters, 2021). Holmqvist (2005) argued that the Iraq war was the prominent use made of private security services by the United States (US), and how this use has become linked with concerns about both human rights waves of abuse and business ethics, has uncovered the tip of what is, in fact, a very large iceberg of a problem.
As a result, security confutes the idea of a state monopoly on security in favor of the concept of hybrid or somehow shared responsibility security.
Globally, the birth of world war, the formation of governments, modernization, globalization, 9/11, and other socioeconomic developments all contributed to the great leaps made in making private security what it is today (Interior State Security (ISS), 2016). Private security guard agencies began in 1850 by an entrepreneur called Alan Pinkerton to help protect the businesses impacted by the new industrial revolution-based influx of thieves and criminals (Vigil, 2019). Back then, security was primarily for railroad companies, banks, and other types of businesses that were prime targets for outlaws.
In Africa, the private security industry has a significant number of small and medium-sized domestically owned private security companies (Democratic Control of Armed Forces (DCAF), 2015). These companies offer a diversity of services but focus mostly on guarding residences, businesses, and transactions (for example, homes, embassies, banks, cash transfers). It is difficult to estimate the size of the sector, and it varies greatly from state to state. South Africa has the largest PSC on the continent (8144 companies), valued at approximately two % of the country’s total GDP (Gumedze, 2015). Kenya’s industry also expanded significantly following the Westgate Mall terror attacks; today, there are about 2000 companies that hire approximately 400,000 officers (Diphoorn, 2015). When it comes to Ethiopia, in Addis Ababa, PSCs employ approximately 2,800-9,000 people (Solomon, 2015). Thus, the industry is booming in Africa, which can enhance the economic and security sectors of human security, which is the headache of the content governments.
Africa, in particular the Horn of Africa, though showing great effort in preserving peace and security, still faces a challenge in maintaining community security (Endalcachew, 2014). This region was one of the most conflict-prone, with intra- and interstate conflict, human explosions, election fraud, political exclusion/struggle, discrimination (ethnic and religious), piracy, terrorism, human rights violations, arms proliferation, and poverty/famine all posing significant threats to community security.
In Ethiopia, PSCs play several important roles, ranging from a kind of service provision; guarding, VIP protection, screening; admitting customers to clients’ premises; ID checking, surveillance, property, and infrastructure protection (Solomon, 2015). According to the scholar, the growth in private security has been driven in part by the increasing level of outsourcing of security functions in areas including commercial security, the privatization of corrections and certain policing functions, and infrastructure protection.
However, there is an overall lack of enough research or under-researched in Ethiopia regarding the roles, challenges of PSCs, and partnerships of private-public securities to depict and analyze security issues to manage in highly dynamic environments where security complexity and dynamics are rapidly and continuously evolving. This research aims to assess, identify, and investigate the contribution of PSCs to maintaining community security and their cooperation with the Addis Ababa police (AAP), particularly YSCPD. This research focused on the community security stream of human security in the case study.
The researcher argues that there is a need to determine the key roles and challenges of PSCs in maintaining community security, including their cooperation with AAP. Moreover, exploring and analyzing the role of the AAP or YSCPD to support and exchange resources (human, material, information, skills, and others), supporting them by giving additional training and assuming them as an alternative to solving and preventing problems and maintaining residents’ peace and security inclusively.
1.2.Statement of the Problem
Community security is largely calibrated to the micro-level, to locations that the state may find inaccessible or ignore. In practice, this necessitates community security approaches that include systems and agents recognized locally as being responsible for people's security, regardless of their relationship with state authorities (Belhadj, et al., 2015). Narrowed concept of community security is focused mostly on violent threats (Lautensach, 2020).
According to United Nations Trust Fund for Human Security (UNTFHS), (2005), community security can threaten by physical violence, crime, terrorism, domestic violence, and child labor. Lautensach (2020) stated that, violence associated with poverty, lack of state capacity, and socio economic and political inequalities that threaten the security of communities at large. Increased crime has been shown to have a significant impact on social fabric, or the interpersonal relationships between members of a community, because crime instills fear. People are more likely to fear becoming victims of crime if they are more aware of it (Crime's Effect on Community, 2015).
As of Rees (2009), fear of crime, unjust treatment, financial insecurities are causes of human insecurity. The author also stated property crimes such as act of theft of vehicles and other non- vehicle properties are common source of insecurities. In the case of South Sudan such acts of crime or attacks on individuals and properties have affected the socio-economic development, business viability and community stability (Akoch, 2021). In Nigeria, bandits, kidnapping, military robberies, lack of specialized skills and improper utilization of security funds are among the causes of community insecurity which results loss of life, jobs, and properties (Otolorin, 2017).
Addressing such community security challenges cannot be fulfilled within the sole responsibility of public security institutions-including police (Omotoso &Aderinto, 2016). With the increasing incidence of crime and delinquency which aggravates the sense of insecurity, resulted in the growing role of PSCs in security matters (Chalom, et al., 2001). In 1998, privatization of security was started and focused on the designing of polices to prevent conflicts and maintaining sustainable peace (Lilly, 2000). Many states worldwide are increasingly outsourcing security functions to private contractors that were traditionally undertaken by public sectors (military and police) (Richards and Smith, 2007).
Worldwide, the private security industry is experiencing a period of rapid growth, and, when effectively regulated and fully accountable, can make a valuable contribution to the provision of security (Strom et al., 2010). Across many states in Africa, national police forces are constrained in terms of their financial and human resources (International Committee of The Red Cross (ICRC), 2015). Gumedze, (2015), in South Africa there are discussions on the development of a policy framework for a crime prevention partnership between the state and the private security sector, and some actors see an official relationship between public and private security as effective.
In Ethiopia, lack of comprehensive legal and policy frameworks, absence of institutional arrangements, lack of standardized training and education are major factors for the ineffectiveness of PSCs in maintaining security (Abera, 2021). That’s why the crime incidents were increasing especially at large cities like Addis Ababa which causing community insecurity. The city has high crime incidences and this is evidence that the city police force cannot succeed in winning the fight against crime alone.
The researcher experience of the problem in the study area was supported by community complaints, crime report documents, and scholars. Moreover, it is normal to hear people talking and complaining about their concerns about the rising number of thefts, robberies, snatching, pickpocketing, physical harm, and killings in the sub city. According to Alexander (2019), the aforementioned crime incidents are common in Addis Ababa. From 2008 to 2017, the number of robbery and burglary crimes in the city increased from 2,898 to 4,311 (Ephrem, 2018). The crime rate of Yeka sub-city, which is one part of the city, is no different and experiences the same problems. Such criminal offenses cause and will cause community insecurity, fear, distrust, threat, and stress. Furthermore, the case study has never been studied before.
Looking into the above crime incidents, it is possible to say Addis Ababa city administration hard security, particularly YSCPD (public security) cannot prevent and control the acts alone. Moreover, though PSCs security personnel are now stationed practically everywhere in the sub city, concerns about community security threats such as crime incidents against individuals, property thefts (vehicles, and infrastructure damage) are still being reported every day, making claims on the role of PSCs and their partnerships with AAP.
Therefore, it becomes imperative that this study looks into the role of PSCs in enhancing community security. Understanding and or investigating the key roles, challenges, and capacities of PSCs in enhancing community security and their chain with AAP and or YSCPD, as well as proposing recommendations, will help to eliminate acts of violence/crime and to maintain community security at the grass-root level in the case of Yeka Sub City.
1.3. Research Objectives
1.3.1. General Objective
Given the lack of research regarding the contribution of private security companies despite the increasing crime incidents, the aim or overarching objective of the study is to explore the role of PSCs in enhancing community security in Yeka Sub City, Addis Ababa, Ethiopia.
1.3.2. Specific Objectives
The paper focuses on the following specific objectives:
1. To analyse the perception of police officers, local communities, and security personnel themselves towards the role of PSCs and their employees (security personnel) in enhancing community security in Yeka Sub City, Addis Ababa.
2. To investigate the relationships between these PSCs and YSCPD in Yeka Sub City, Addis Ababa.
3. To assess the challenges of PSCs and their employees (security personnel) in enhancing community security in Yeka Sub City, Addis Ababa.
1.4. Research Questions
The central or overarching question of this is study is; in what ways PSCs play a role in maintaining peace and security and how effective is their chain with AAP, particularly with YSCPD in enhancing community security in Yeka Sub City?
The investigative or specific question of the study are:
1. What is the perception of Police officers, local community, and personnel security themselves towards the role of PSCs in maintaining peace and security of the community in Yeka Sub City, Addis Ababa?
2. To what extent the PSCs and YSCPD are coordinating in enhancing community security in Yeka Sub City, Addis Ababa?
3. What are the challenges of PSCs and their employees (security personnel) in enhancing community security in Yeka Sub City, Addis Ababa?
1.5.Significance of the Study
Theoretical significance: the findings of this study will contribute to the body of knowledge on peace and security by incorporating private security agencies in preventing and controlling crimes so as to enhance community security. This study also plays a role in addressing the current gap in research in this area and provides academic value. Furthermore, the findings are critical for assisting and resolving challenges faced by security personnel, as well as promoting their roles in enhancing community security and creating more effective and integrated security apparatus. Finally, it provides insight for future researchers who want to assess the role and challenges of PSCs and partnership levels with AAP in enhancing community security in the study area or elsewhere using different methodologies and techniques.
Practical significance: the findings of this study will enhance the understanding of security policy makers on strategies and dynamics of crime prevention institutions. This will result in the formation of programs to improve crime prevention and community security in the Yeka sub-city. This research will be also helpful because the findings will enable security policymakers extend and deepen their understanding of crime prevention through the collaboration of PSCs and AAP. This will reveal any challenges of working with a wide range of Private Security Companies and provide suggestions on how to overcome the challenges identified.
1.6.Scope of the Study
Spatially, the study's scope is limited to Yeka Sub City, which the one among the 11 sub cities in Addis Ababa. Having two bus stations, Megenagna bus station which is the busiest station serving for the city, and Lamberet bus station serving or linked the city with the Northern part of Ethiopia.
Thematically, this study is focused on the role of PSCs in enhancing human security in Yeka Sub City, Addis Ababa. Despite the concept of human security, which by its nature is too broad and includes seven security categories, the study was delimited to the community security dimension.
Many PSCs in the study geography operate in a variety of sizes based on the number of employees. Caparini (2006), cited in Solomon (2005), categorized PSCs into three classes. According to the author, those PSCs that have more than 1,000 security personnels could be considered large. Companies that employ between 500 and 1000 are considered middle-sized, while companies employing less than 500 are considered small-sized. Therefore, due to the availability of so many PSCs in Addis Ababa, the researcher focused on two security agencies which is based on Caparini classification. Taking this figure as a yardstick, this research focused on two PSCs, namely Lion Security PLC and Ghion Security PLC companies. This is because they employed over 1,000 and 300 security personnel, respectively. They are considered large and small PSCs based on the Caparini classification.
1.7. Limitation
Limitations are obstacles that the researcher is likely to face in the field and how they plan to overcome them (Kothari, 2012). The study projects that most of the respondents were likely to be engaged in their duties and may not have had time to participate in the study. Especially due to the current issues, the police officers were reluctant to give time to discuss the problem. The researcher concentrated spatially in Yeka sub city only and thematically on Lion and Ghion PSCs only because it was not practical to cover all private security operational around the whole city and private security due to a wider geographical coverage, which in turn the time and financial wise costs were not enough as such. It also allowed the researcher to get data within the time frame. The researcher ensured that those who were unable to participate in the interview during hours of active duty were contacted during their free time to arrange for an interview after work. Also, the researcher used a phone-based interview with one member of the police force to solve uncertainties.
There were also some security sensitive issues. Some police officers’ respondents would not allow me to record sound and take photos. This can have an effect on caching up clearly the idea of what the respondent said and even the details of the data. However, on the next day of the interview session, the researcher added one supporter who has security knowledge and can take notes quickly from the respondents. Therefore, by doing this, the researcher filled the gap.
1.8. Ethical consideration
This academic study was carried out with due regard to the ethical value of social science research. The researcher submitted the cooperation letter of Ethiopian Civil Service University (ECSU) to Lion Security Service PLC, Ghion Security and Cleaning Service PLC, Yeka Sub City Labor and Social Affairs Office (LSAO), and Yeka Sub City Police Department (YSCPD). All the organizations considered agreed to the collection of data and the availability of information. That permission smooth’s the whole process of accessing the information and data collection.
In doing so, the researcher believed that using this assistance for unnecessary work is unethical and inconvenient for the research. Furthermore, in collecting information, the researcher was care of plagiarism. All the copy rights of others were taken into consideration and accepted as the work of them. Moreover, in collecting quantitative data, participants acted independently of the researcher, and no data was fundamentally changed, biased, or tried to be removed by the researcher. Lastly, the information provided was treated with the utmost confidentiality. The rule of confidentiality was fully observed. There was no respondent who was mentioned by his/her name in the report.
1.9. Justifications for the selection of the Study Area
The rationale behind the researcher's decision to choose Yeka Sub City is that the researcher has lived experience in the area, which can help to collect data easily within a given frame of time for the study to be accomplished. According to my research, the theme understudy, specifically the role of private security in enhancing community security in the city and particularly in the study areas, is somewhat neglected in the literature; and the study area is widely regarded as one of Addis Abeba's crime hotspots. This is supported by police officers from the directorate of crime prevention and control's Yeka sub city police department (YSCPD) (2022), in which Megenagna and Lamberet have been identified as known crime hotspots in the study area. As a result, the above-mentioned reasons are sufficient to conduct a study on this topic in the study area.
1.10.Organization of the Thesis
This thesis shows the role and challenge of private security while providing security services to their clients; and their partnerships with Yeka sub city police department (YSCPD) that can help to prevent and eliminate crimes and crime favorable environments so as to enhance the security of communities found around their worksite. The organization of this thesis is as follows. In chapter one, the context of the study has been introduced. The research problems, objectives, and questions have been identified, and the value of such research has been argued. The significance, scope, and limitations of the study have also been discussed. The existing literature was reviewed under chapter two to identify concepts, definitions, trends, evolutions, and theories, as well as roles and challenges in the context of PSCs and community security.
In chapter three, the description of the study area, methodology section, this section provides information related to the location, topography, population, and location of the study area. It also explains the research design and approaches, data collection methods and instruments, and analysis methods. In Chapter four, which is the analysis and discussion part of the study, presents the data and interpretation accordingly. The final chapter, which is Chapter five, deals with conclusions and recommendations part of the study.
CHAPTER TWO
2. REVIEW LITRATURE
2.1.Introduction
This chapter presents a literature review, derived from existing theoretical literature, a critique of existing literature about challenges in the provision of security, the influence of employee capacity, equipment adoption, and customer satisfaction on the provision of security. Research gaps and a critical literature review summary are also presented.
2.2.Basic Concepts and Definitions
2.2.1. Security
The definition of security, according to Merriam-Webster, is the condition of being free from harm, danger, and or risk. Security means a lot of things in a lot of different contexts for instance security in economics, physical security, boundary security, property, and even food security. It is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset such as a person, dwelling, community, nation, or organization from any harm. It further means security of one’s property, so it does not get stolen or damaged. Thus, in this study the researcher deals or focused on the community security stream in Yeka sub city.
2.2.2. Security Personnel
To avoid ambiguity (Law Insider, 2022), Security Personnel refers to personnel directly engaged or employed by the contractors to perform security services on board the vessel. According to this definition, it refers to any person engaged or employed by the contractor to provide security services. The Cambridge Dictionary agreed with this definition. As a result, in this study, the researcher used the term security personnel to refer to or represent the private security personnel employed by private security agencies in Yeka sub city.
2.2.3. Private Security
The term private security is ambiguous, and researchers have used a variety of definitions. The private security sector includes a wide range of businesses, from multinational corporations to sole proprietorships. Each country is responsible for designating private security providers and determining which businesses and services are regulated. The definition is based on the local environment and the services provided by the country in question (The Danish Institute for Human Rights, 2019). Only a few model definitions are discussed in this section.
Private security, according to Shah (2016), also refers to the private sector's protection of property, people, and information without the assistance of the government. This entails protecting against both man-made and natural disasters, which include terrorist attacks. Private security refers to individuals who provide all types of security-related services, such as investigation, guard, patrol, detection, alarm, and armoured transportation, all with the goal of preventing and detecting crime.
Individuals rather than government agencies provide security services under the umbrella of private security. It safe personnel or protects either people or property or both. This usually involves offering armoured vehicle service (Anicent, 2014). A private security agency, according to Abrahamsen (2011), is a person or group of people who, other than a government agency, department, or institution, are engaged in providing private security services such as training private security personnel or their supervisors or providing security personnel to any industrial or business undertaking, company, or other person or property.
As a result, the word private security encompasses a wide range of organizations, including security guard businesses and investigation services. These companies' security personnel can be armed or unarmed, employed as in-house or contract employees, and have varying levels of authority depending on where they work and what responsibilities they have.
This research was based on the definition of private security as a person or group of people who, other than a government agency, department, or institution, are engaged in providing private security services.
2.2.4. Company
Company is an association or collection of individuals, whether natural persons, legal persons, or a mixture of both. Company members share a common purpose and unite in order to focus on their various talents and organize their collectively available skills or resources to achieve specific, declared goals. Companies take various forms, such as:
(i.) Voluntary Associations which may be registered as a Non-profit Organization
(ii.) A group of Soldiers
(iii.) Business entity with an aim of gaining of profit
(iv.) Financial entities and Banks
A company or an association of persons can be created by law as a legal person so that the company in itself can accept limited liability, civil responsibility, and taxation incurred as members perform (or fail) to discharge their duties within the publicly declared birth certificate or published policy. As companies are legal persons, they may also associate and register themselves as companies, often known as a corporate group.
2.2.5. Private Security Company
A private security company is a for-profit enterprise, sometimes a corporation or limited liability partnership that provides armed and unarmed security services and expertise to private and public clients. Private security is defined by the American Society for Industrial Security (ASIS) International as the nongovernmental, private-sector practice of protecting people, property, and information, conducting investigations, and otherwise safeguarding an organization's assets, according to ASIS International (2009).
Private security companies are defined by the U.S. Bureau of Statistics as companies primarily engaged in providing guard and patrol services, such as bodyguard, guard dog, parking security, and security guard services. Many of them even provide advanced special operations services if the client demands such services. Examples of services provided by these companies include the prevention of unauthorized activity or entry, traffic regulation, access control, and fire and theft prevention and detection. These services can be broadly described as the protection of personnel and assets.
Employees of private security companies are generally referred to as either Security personnel or Security Officers, depending on the laws of the state or country they operate in. The private security industry comprises those actors who provide security for people and property under contract and for profit. These include private security companies (PSCs), private military companies (PMCs), Internal Security Divisions (ISDs) and Non-lethal Service Providers (NSPs).
Employees of private security companies are generally referred to as either security personnel or security officers, depending on the laws of the state or country they operate in. The private security industry comprises those actors who provide security for people and property under contract and for profit.
In Ethiopia, these companies are called as private security agencies. They act as agents, mostly focused on business-based licenses. Their security wise responsibility is not, as such, clearly defined. However, this study dealt with the concept of private security companies, which are those who provide security services to their clients and protect their neighbor’s community from fear of crime and acts of crime.
2.2.6. Human Security
Despite the fact that the definition of human security is susceptible to debate (Tadjbakhsh, 2005), its concept was first introduced by the United Nations Development Programme (UNDP) in 1994 in its 1994 Human Development Report. According to UNDP (1994), the new dimension of security, which equates security with people rather than territories, with development rather than arms, this security concept is more people-centered than the traditional emphasis on state security), and its framework focuses on threats to individuals’ socioeconomic and political conditions, their access to food and health, and their environmental, communal, and personal safety (Jolly and Ray, 2006). This new contemporary concept of security is further interpreted by (Haq, 1995) as:
“Security of people, not just territory. Security of individuals, not just nations. Security through development, not through arms. Security of all the people everywhere - in their homes, in their jobs, in their streets, in their communities, in their environment”.
This discourse broadened the concept of the threat to security caused by severe environmental conditions, frequent economic hardship, health insecurity, food insecurity, and security related to personal, community, and political (UNTFHS, 2005). From the concept and elements or dimensions of human security, this study dealt with community security in Yeka sub city, which is one dimension of human security.
2.2.7. Community Security
Community security is a dimension of human security that is primarily concerned with the security and safety of the community. Scholars believe that the community may face insecurity as a result of an increase in pit crimes (pick pocketing, theft, robbery, etc.) and other complex crimes committed against the community's will. Based on this, the researcher examined the role of private security in maintaining community security in the Yeka sub-city.
2.2.8. Community Insecurity
Insecurity is a state or feeling of vulnerability to threats and lack of protection. As a result, community insecurity refers to the feeling that the community is unsafe from crimes and threats in general. According to Ephrem (2018) findings, people perceive themselves to be less safe from crimes and criminals in areas identified as crime hotspots. They live with apprehension about crime and a sense of insecurity. Thus, this study dealt with the core problem of community insecurity caused by the prevalence of crimes and criminals in Yeka sub city.
2.2.9. Ensuring security of the community
Community security is one of the new dimensions of security, which is called human security. Mostly focused on the safety and security of the community in an area. The responsibility of ensuring the security of the community is not practiced by only public law enforcement institutions but also by individuals, communities, non-governmental organizations, civil society, and the private sector (Oyagi, 2020). Thus, Kenna, (2017) explains the role of private security personnel in playing a great role in the prevention of crime and peacekeeping in a given state. This paper dealt with the role of private security companies in promoting the security of the community by preventing crimes in Yeka sub city.
2.3. Theoretical Literature Review
2.3.1. Causes of Threats to Community Security (Crime)
Despite the various causes or threats to community security identified by different scholars, this study primarily deals with the crime incidents in Yeka sub city, which are the causes of community security in the sub city. There are numerous theories that have been developed by various scholars from various perspectives. Unlike biological and psychological theories of criminality, which ascribe criminality to biological and personality variables, sociological, economic, and security theories of crime attribute criminality to the criminal's social and economic circumstances.
Sociological theories that deny individualism and link crime to social structures and interaction include strain theory, subcultural theory, opportunity theory, and social disorganization theory. Economic theories portray a criminal as a logical individual who weighs the costs and benefits of committing a crime before committing it (Rubin, 1978). Security theories and ideas from a national and corporate perspective on who and how secure. These sociological and economic security theories will be examined in this part since they explain crime in terms of socioeconomic issues, such as urban poverty.
2.3.2. Economic Theory of Crime
The impact of economic factors on the incidence of criminal activity, particularly socioeconomic inequality, has been studied in theoretical and empirical literature. Gary Becker, a Nobel Laureate, published a significant study on the economics of crime in 1968. He proposed the well-known high-fine-low-probability finding in a framework where rational criminals weigh the benefits of breaking the law against the potential cost (in terms of probability and severity of punishment). According to Becker's economic theory of crime, the relative benefits of committing a crime are greater in societies with greater income disparity than in communities with more evenly distributed income distribution. Thus, economic inequality could be one source of threats to community security.
According to Fleisher (1966, 120, as cited by Fajnzylber et al., 1998), the main theoretical reason for believing that low income increases the likelihood of committing crime is that the probable cost of getting caught is relatively low because [low-income individuals] see their legitimate lifetime earnings prospects as dismal. They may expect to lose only a small portion of their earning potential as a result of acquiring criminal rectitude. However, an individual's expected legal income is not the only important income factor; potential victims' income level is also important. As a result, the greater the potential victim's level of income, the greater the motivation to commit crimes, particularly crimes against property.
Aside from the relationship between economic conditions and crime, one of the primary topics in Becker's study was the assessment of the impact of police presence, convictions, and the severity of sanctions on the degree of criminal activity. People are expected to consider both the risk of being caught and the potential punishment when deciding whether or not to commit a crime. Both characteristics have a negative impact on crime rates, according to empirical evidence from the United States (Fajnzylber et al., 1998). As a result, the policy implications of the economic theory of crime are centered on discouraging potential criminals by making crime more expensive. As a result, the theory is applicable to this study because poverty and unemployment are factors that cause or initiate crime which are also considered as causes or threats to community security in the study area.
2.3.3. Abraham Maslow’s Hierarchy of Needs on Security Affairs
People are motivated to meet particular wants, according to Maslow (1943, 1954), and some needs take precedence over others. In his 1943 work "A Theory of Human Motivation" and his 1987 book Motivation and Personality, Maslow first proposed the concept of a hierarchy of needs. The hierarchy of needs argues that people are motivated to meet basic wants like security and safety before moving on to more advanced demands, and it is still useful for understanding human motivation, management training, and personal growth today. Physical survival is our most basic necessity, and it will be the driving force behind our actions. The next level up is what motivates us once that level is completed, and so on.
According to Maslow, each of us are motivated by needs, and our needs are inborn. He created the need for safety and security as a basic need that human beings rely on to protect their lives and property from an impeding security threat. The critical aspects of security that must be emphasized in order for humans to evolve are analyzed by him. These factors are classified as safety needs by Maslow. In his book of “Motivation and Personality”, a peaceful, well-run, stable, and good community are usually secure from ... criminal attack, murder, anarchy, and dictatorship, among other things. Maslow 1943, any danger, deprivation and or blocking to the basic needs leads to threat.
The following are some examples of security components explored by Maslow 1987.
(i.) Security
(ii.) Order
(iii.) Law
(iv.) Limits
(v.) Stability
Because they promote peace and stability in community, all of the characteristics listed above are critical to providing a favorable environment for human preservation. Furthermore, Maslow contended that these requirements are similar to instincts and play an important role in behavior motivation. Physiological, security, social, and esteem desires are all deficit wants, which means they arise from a lack of something. To avoid negative sensations, it is critical to meet these lower-level requirements. Among them are the requirements for safety and security. A high level of security is required for survival. Security demands include the desire for stable employment, health care, safe neighborhoods, properties, and environmental protection. Many PSCs have sprung up in recent years, of which are aligned with Abraham Maslow's hierarchy of needs (Figure 2). Thus, the researcher dealt on the security demand of safe neighborhood of basic needs using the PSCs.
Figure 1. Maslow’s hierarchy of needs
Illustrations are not included in the reading sample
Source: McLeod S.2018 Maslow’s hierarchy of needs
2.4. Empirical Literature Review
2.4.1. Role of PSCs in enhancing community security
Private Security Companies (PSCs) help to reduce the security deficit in the face of police incapacities, by performing roles that would either not have been performed by the police, such as guarding residential and private habitations, or, if the police were to perform such tasks, for example, guarding critical national infrastructure like airports, that would have further overstretched their already limited capacity.
According to Strom et al. (2010), private security companies in the United States perform a variety of functions, including protecting employees and property, conducting investigations, performing pre-employment screening, providing information technology security, and many others.
The study conducted by Anthony Minnaar (2004) about Crime Prevention, Partnership Policing, and the Growth of Private Security: The South African Experience, said that since 1992, different security actors have debated the future role of the private security industry in the country. The PSC thus complements the police by relieving them of the need to perform some routine so that they can concentrate on core policing duties such as intelligence gathering and investigations. However, PSC operations have a downside, however, in that they are urban focused and profit-motivated, and since it is only the wealthy that are able to afford their services, crime is invariably displaced from wealthy neighborhoods to poorer communities, further reinforcing existing socioeconomic inequalities (Heyns & Steifisyn, 2006).
According to Anicent (2014)'s study in the Case of Kikuyu Sub County, Kenya, the role of private security is regarded as a crime-prevention tool, with efforts aimed at preventing, limiting, or controlling the level of crime and disorder in society.
According to Abera (2021), in Ethiopia, PSCs can provide security services to private and public organizations such as banks, insurance companies, hotels, various industrial sectors, and so on. When we see the power sharing of public police with private security, Article 7 (16) of the Ethiopian Federal Police Commission Establishment Proclamation No. 313/2003 states that the commission may "delegate, as necessary, its powers to other organs and civil servants for the execution of certain functions.”
2.4.2. The partnership of PSCs and AAP in enhancing community security
The partnership between public and private security is critical to ensuring the effective delivery of security services (Private Officer International, 21 April 2013). Despite the fact that Kenya has a high level of crime, there is very little collaboration and harmonization between the two entities. The absence of a consistent policy framework to improve the private security-public police relationship, as well as a clear regulatory framework for private security, has hampered cooperation between private security institutions and the public police (Murunga, 2011). However, the level of cooperation may be enhanced through joint training, regular joint security briefing meetings and crime mapping, physical and information resource sharing as well as reduced suspicion between the two entities (Anicent, 2014).
In contrary, according to Muller (2010), the private security agencies and the South Africa police service signed Memorandum of Understanding (MOU) in 2009 which is mainly focused on ensuring that the PSCs and the police would work together to achieve their common goal of protecting the society. This shows that there are countries which trying legal cooperation of the private and public security institutions cooperation on the prevention of crimes. This can crystallize into an effective and efficient partnership and create safest environment for the community. In New Orleans, USA, a public-private partnership initiative was established in 1995. It was made up of 20 people who led various community organizations, including representatives from the private security industry. The formation was successful because it reduced local crime and attracted people to the area because it was safer than it had previously been. This group collaborated closely with the Mayor's office and the police department (Bhanu & Stone, 2016). According to Wakefield (2003), a collaborative partnership between private security and the police was formed at one of the United Kingdom’s (UK's) centers (the Arts Plaza) in order to reduce crime. This partnership had a warm relation, which was largely attributed to the manner in which it was managed by the Security Manager and the Police Superintendent, who were tasked with this responsibility. The only source of concern for the police was that the members of the private security companies involved relied more on the police to deal with crime at the Arts Plaza.
A number of government institutions are using findings from recent research in the field to create policies to promote this practice. Despite the benefits that come with cooperation between the police and private security, some people, especially the police, are cynical about the partnership and are not yet ready to embrace the idea. The investigation indicates that collaboration between private providers and the police has been successful in reducing the crime rate in a number of countries (Prenzler, 2009). However, Minnaar (2004) makes a more meaningful contribution towards that aspect of private security where they are involved directly in crime prevention and partnership policing. The study conducted by Anicent (2014) in Kenya showed that the level of cooperation and the level of information sharing between the private security providers and the police in fighting crime to be low due to low level of mutual mistrust and rivalry that exists between the two entities.
The lack of a legal framework and policy consistency is due in part to the varying levels of jurisdiction of the police, who make specific bargains with private security organizations in their area. To some extent, this is due to changes in the police force's leadership and the ongoing police reform process (Abrahamsen & Williams, 2005). For these two reasons, there is little official cooperation in the provision of security services to the country by private and public security entities.
2.4.3. The challenges of PSCs in enhancing community security
As far as the empirical review is concerned, Mkilindi, (2014) in Assessment of the Role of Private Security Companies in the Enhancement of Public Security in Kinondoni Municipal Council, Tanzania can be quickly cited. The author assesses and evaluates the efforts of PSCs in creating the safest environment and their challenges to doing more. Accordingly, the author observes that despite the efforts and presence of private security personnel, criminal incidences and insecurities will continue, mostly due to a lack of cooperation among stockholders. Apart from that, Mkilindi and Akoch (2021) focus on the effectiveness of PSCs in providing human security with similar results. Here, the challenge is the lack of regulation capacity building within and or by external institutions.
According to Nyaura and Ngugi (2014)'s research in Eldoret Municipality, Kenya, local private security guards face challenges such as a lack of skills and experience, a lack of effective guarding weapons, long working hours, and low pay. Similarly, some of the challenges that private security firms face in South Africa are as follows: private security uses excessive force when it is not warranted; they sometimes fail to follow the regulations in place; some security officers are poorly trained; and industry operating standards are poor (South, 1988).
The Ethiopian PCSs case is somehow faced with similar and different challenges, unlike the prior studies. Recently, Abera (2021) undertook a study of the key challenges of private security in Ethiopia. The conclusions of the author reveal that in addition to the challenges of resources and professionalism, there are also legalization issues that challenge the efforts of PSCs in providing safety and security. Yifru (2007) assessed the challenges and prospects of security personnel service in Ethiopia: the case of commercial nominees’ plc. Accordingly, the scholar found that employees of private security companies are not effective due to low pay, incentives, long hours, and other factors influencing the productivity of private personnel.
Related to training and standards, Minnaar and Ngoveni (2004) conducted research on the relationship between the South African Police Service and the private security industry: any role for outsourcing in the prevention of crime. According to their findings, the South African National Defense Force (SANDF) controlled the standards, training, and operations of PSCs in the country. In contrast with this, Abera and Yifru observed that in the case of Ethiopia, regulation and monitoring are almost non-existent. It is undeniable that the Ethiopian Federal Police Communion (EFPC) has recently taken steps against those involved in illegal activities. This may be taken as a control and monitoring strategy, with the limitation of continuity.
As a result, this study focused on the roles of PSCs and their partnership with AAP, particularly in YSCPD in enhancing the sub city community security. It was dealt with the roles, capacity building, and information and resource sharing between the Addis Ababa Police in YSCPD and the PSCs.
2.5. Conceptual Framework
According to Kothari (2004), the conceptual framework explains the relationship between the independent variables and the dependent variable. The former is presumed to be the cause of the changes and affects the latter, which is the effect. The conceptual framework is further defined as the study of the relevant variables of the research and maps out how they might relate to each other, often represented in a visual format (Swaen, 2021). It helps the researcher see and visualize the proposed relationship between the variables easily and quickly.
Similarly, the researcher identified the relevant variables of the case study and depicted them using the diagram method. The diagram framework of this research illustrates the association between and or among the identified variables of the study. Ndunguru (2001), further explained a conceptual framework as a collection of research concepts and variables as well as their logical relationships, which are commonly represented by diagrams, charts, graphs, pictographs, flow charts, organograms, or mathematical equations.
Human security is a new dimension and trend of a form of security that is increasingly demanded in this era either individual's communities, organizations, or nations as a whole. It is a new paradigm of security that diverts from state-centered to people-centered security thinking. To preserve and enhance human security is not the sole responsibility of a government or state. It should be a shared responsibility. With the increasing and even increasing variety of issues and responsibilities, governments trying to transfer some security functions to private security companies.
This rise in a variety of insecure conditions increases the demand for PSCs and their relationships with public security institutions in the field. To this day, PSCs have a great role in enhancing and preserving the security of a community. The effectiveness of the PSCs in enhancing community security is determined by factors like professionalism, skill, and attitude, security materials, sharing of resources with different stakeholders, training, employee history, legal frameworks (targeting, controlling, monitoring, and facilitating mechanisms), and strong organization.
The conceptual framework of this study depicts the relationship between these factors. According to the study's framework, private security agencies play an important role in increasing societal security. This is evidenced by the increasing number of people working in various private security businesses, which results in an increase in peace and harmony in any society.
Figure 2. Conceptual Framework of the role of PSCs in enhancing community security.
Illustrations are not included in the reading sample
Source: Adapted from literature review and Own Articulation, 2022.
People believes that public police force is the only institution that have to prevent and control crime incidents. However, private security companies that operate effectively can also ensure security at the individual, group, society, and national levels (Mkilindi, 2014). To enhance security in society, there is a need for strong and organized security companies that are well equipped, and that provide good and affordable security services. Well empowered and equipped private security personnel’s awareness of human security could also improve or enhance the human security level. In this diagram, PSC officers are the security personnel. From the given human security dimensions, this study is mainly focused on the community security sector.
The term human security in this research is limited to the community level security provision in the study area by private security personnel. Their partnerships and commitments and awareness towards security and crime, and the threat to community is likely to an important indication of the role of private security towards community security. In the security system professional and institutions can control the capacity, role, challenges, and resource through assessment and partnerships. Meanwhile, the security perceptions and threats to their security. On the one hand, the security service provider (PSCs) influences the security of the community; on the other hand, the criminal activities and crime incidents also provide feedbacks to the security perception. These feedbacks will be converted to the formulation and redesign of security service providing guidelines and other means of cooperation’s to effectively respond and enhance the community security (Figure 3).
More collaboration between PSCs and AAP would also improve the security of individuals, communities, and nations in general. Capacity building through training, awareness creation, and resource sharing with private and public security institutions could also contribute to the community's safety and security.
CHAPTER THREE
3. METHODOLOGY
3.1 ntroduction
An organized collection of steps and procedures for completing a research project is known as research methodology (Creswell, 1994). This determines the quality of a set of data, despite the fact that the methodology is rarely discussed in a final report (O'Sullivan, et al, 2017). Thus, data collection and analysis tools and procedures are included in the study methodology. The nature of the research problem or concerns being investigated, on the other hand, determines the research design used (Creswell, 1994).
Specifically, this chapter presents an explanation of how the study was conducted. It presents the research plan, which includes the research design, how data was collected and from whom, and the data analysis technique used to analyse the data in order to generate the study's findings
3.2. Description of the Study Area
3.2.1 Location
According to various writers, Addis Ababa was established as Ethiopia's capital city in 1887, and the city has since been chosen as the hub of Africa's diplomatic center. The city is divided into eleven (11) sub-cities, which are known locally as Kifle Ketema. Yeka was one of the eleven sub-cities, with twelve (12) woredas (Figure 1).
Geographically, Yeka sub city is located in the north-eastern part of Addis Ababa at 9[0] 01' 30.73" N latitude and 38[0] 48' 27.55" E longitude on the earth's surface at an elevation of 2470 meters. The sub city's area coverage was approximately 59.89 km[2], or 11% of the city's total geographical area, making it the fourth largest sub city after Akaki Kality, Lemi Kura, and Bole. Yeka was the second most populous sub city in terms of population after Kolfe Keranyo, which had 377,091 residents (Bisrat, 2017).
Yeka was the busiest subcity, which means it has one bus station (Lamberet) that connects the city to the north of the country and another city bus station (Megenagna). There were also private and public institutions like Civil Service University, Kotebe Metropolitan University, and Ethio-China Friendship Technical University. As a result of these and other favorable conditions, the sub-city is the second most populous.
The vegetation covered the majority of the northern part of the sub-city. Thus, despite its landscape and other climate-related controlling benefits, such as getting clean air and reducing heat stress, it was also used as a shelter or camouflage, and even to commit crimes such as rape, hanging, and killing, which may have an impact on the community living nearby.
There are various sector bureaus, offices, agencies, and authorities within the sub-city administration. They are in charge of promoting peace and security, developing infrastructure, encouraging investment, providing economic and social services, and upholding other regulatory facilities.
Figure 3. Location and administrative map of Yeka sub city
Illustrations are not included in the reading sample
Source: adapted from open source and researcher articulation, 2022.
The Federal police, Addis Ababa police, Yeka sub city police department, and the city's peace and security administration bureau work together to maintain the peace and development of the sub city. There are also PSCs that are working towards providing security and safety to individuals, communities, and properties. Despite having many challenges, they have their own contributions to enhancing public peace and security.
3.3. Research design
Research design implies the crafting of the conceptual structure within which research will be conducted in a way that is as efficient as possible, the collection of relevant evidence with minimal expenditure of effort, time, and money (Ethiopian Civil Service University (ECSU), 2018). The type of research design was determined by the research problem (De Vaus, 2006). Mc Milan & Schumacher (1984) also stated that it implies the way the study is planned and conducted, the problems it will encounter and the techniques it will employ to answer the research questions.
There are various types of mixed methods research design. From these types of mixed research design the researcher in this study employed the Convergent Parallel Mixed-Methods Design. A convergent design, is an efficient and popular approach to mixing methods research (Creswell & Plano Clark, 2018). Two different approaches namely qualitative and quantitative methods are mixed to obtain the triangulated results in this design. According to Creswell and Plano Clark (2018), at first, two types of data sets are collected concurrently, and secondly, they are analyzed independently using quantitative and qualitative analytical approaches. In the analysis phase, a researcher can always look for the common concepts across both sets of findings.
Integration in convergent design can be done in two ways: a) by presenting findings of the qualitative study followed by the quantitative study or vice versa or b) by transforming the qualitative data into counts and integrating the transformed qualitative dataset into quantitative data (Ibid). In the latter case, a researcher can count the identified codes or themes. Thus, the researcher collected qualitative data by conducting an in-person interview and collected quantitative data from survey to examined the role and challenge of PSCs in enhancing community security through preventing crime incidents in the sub city, and analyzed concurrently or parallel.
In this study, a cross-sectional study design was also used by the researcher. The primary reason for choosing this design is that it is the most commonly used design in social science (Kumar 1996:81). The second reason is that this design is best suited to studies aimed at determining the prevalence of a phenomenon, situation, attitude, or issue by surveying a sample of the population. They are useful in gaining a general picture of the world at the time of the study.
3.4. Research philosophy
The underlying beliefs (i.e. world view) regarding how data about a phenomenon should be gathered, analyzed, and used are referred to as research philosophy (Grad Coach, 2021). Positivism, critical realism, interpretivism, postmodernism, and pragmatism are examples of research philosophies used in various studies (Mark and Philip, 2019).
Pragmatism, according to Saunders et al. (2012), is a research philosophy based on the epistemology that there is no single way to learn but rather many different ways or points of view because there are multiple realities. Thus, knowledge of various realities is gained through the integration of hybrid research methods, which include both qualitative and quantitative research methods. In contrast to positivism and interpretivism, pragmatism research philosophy allows for the integration of multiple research approaches, research strategies, and research methods (qualitative and quantitative) within the same study (Collis, et al. 2014).
The researcher used a pragmatist philosophy to achieve the goal of this study. This is done to see or acquire realities from the various experts' and stockholders' perspectives on the stated problem and objectives of the study. This is based on the pragmatism philosophy of observing different realities from various points of expertise. Through this philosophy, the researcher hopes to gain a better understanding of the problem/s under study from the perspectives of various people, namely PSC managers, police officers from various offices, community members, and security personnel who lived and have the experiences.
3.5. Research approach
While researching the role of PSCs in enhancing community security in Yeka Sub City, the researcher used a case study as a research design and a mixed research approach as the research methodology to collect and analyze both qualitative (open-ended) and quantitative (Semi closed-ended) data. A mixed methods case study design is a type of mixed methods study in which quantitative and qualitative data collection, analysis, and integration are used to provide detailed evidence for a condition(s) or to develop cases for comparative analysis" (Creswell & Plano Clarke, 2018, p. 116).
In other sayings, using mixed research approaches allows researchers to answer research questions with sufficient depth and breadth (Enosh, Tzafrir, & Stolovy, 2014) and aids in generalizing the findings and implications of research issues to the entire population. For example, the researcher employs a qualitative approach to gather detailed information from key informants such as PSC managers, police officers, and community members. The researcher's quantitative approach to collecting data from security personnel, which was relatively large, increased the likelihood of generalizing findings to a larger or entire population of private security in the study area. Furthermore, quantitative findings can be triangulated with qualitative results, and vice versa.
3.6. Sampling strategy
Sampling is defined as the selection of some parts from an aggregate or whole based on various attribute criteria that may be influenced by judgments (Vogt (2005)). Kothari (2004), on the other hand, defined sampling as the process of obtaining information by examining only a subset of the entire population. As a result, the researcher in this study chose samples based on criteria such as an individual's expertise, position, and length of time living in the study area. This is simply to assess the role and challenges of private security agencies and their security personnel, as well as their collaboration with the YSCPD while providing security services.
Stratified sampling divides the population into "strata" (Blair, 2015) and then deliberately selects units (e.g., individual people, events, or objects) that are best suited to allow researchers to address their research questions using the judgment sampling technique (Fery, 2018). On the other hand, according to Lewis-Beck et al (2004), judgment sampling/purposive sampling is the deliberate seeking out of participants with specific characteristics based on the needs of the developing analysis and emerging theory. Similarly, Vogt (2005) defines judgment sampling as a procedure in which a researcher decides that a convenience sample (e.g., volunteers) is similar enough to a random sample to satisfy their objective. Purposive sampling involves the researcher purposefully selecting a respondent from a given total population based on his/her judgment about some appropriate sample characteristics that are relevant to the research topic and easily accessible to him/her (Rwegoshora, 2006). The purposive sampling method and the stratified sampling method, which are non-probability and probability sampling, respectively, were used in this study.
In most cases, security personnel are stationed here and there. For example, if one security personnel work in woreda 12 today, He and or She may switch to another Woredas work site tomorrow, or even to another sub-city site of their client's work site. Due to the lack of permanent working areas, it was impossible to conduct any sort of probability sample; therefore, 120 security personnel, 12 community members, 6 police officers from YSCPD, and 4 from PSCs, i.e. two from each agency within Yeka sub city, were purposefully selected based on expert opinion. However, in order to ensure a uniform distribution throughout the sub city, stratified sampling was used to divide the sub city into 12 strata based on the Woreda level boundary. The researcher then used the judgmental sampling method to distribute and collect 120 postal surveys to and from security personnel working in the selected study area (twelve woredas), and questionnaires were distributed to security personnel. Within each stratum, a total of ten questionnaires were to be collected. This is due to the underlying principle of purposive sampling being the researcher's judgment as to who can provide the best information to achieve the research objective within the time and budget constraints.
Furthermore, the respondents who were purposefully chosen had the knowledge, position, and experience that the study required. They are directly and indirectly involved in enhancing community security in Yeka sub-city by preventing and controlling crimes in collaboration with the Addis Ababa police force.
3.7. Sample size
Sample a predetermined number from a larger population and to find some way of reducing the number of participants included in the survey without biasing the findings in any way and ensuring internal validity (Mathers, Fox, and Hunn, 2007).
The sample size required from the total targeted or given population for this study is decided by using the scientific statistical method formulated by Kothari, (2004). According to Kothari (2004), for a finite population, sample size is determined by the formula shown below.
Illustrations are not included in the reading sample
Table 1. Sample size
Illustrations are not included in the reading sample
Source: Survey 2022
Therefore, the sample size involved 120 respondents of security personnel who are responsible for and have expertise in preventing crimes so as to maintain security and safety in the environment in which they work. A questionnaire was distributed to those who were able to read and write, their willingness to respond, and be accessible and have time to respond to the questions.
3.8. Methods and instruments of data collection
The study used both primary and secondary data collection methods, as well as various instruments, to achieve the stated objectives and answer the research questions. The primary data was gathered from respondents via semi-structured open-ended questions for interviews with key informants such as police officers, PSCs managers, and community members, and semi closed survey questions for security personnel. Secondary data was gathered from published and unpublished documents such as assessment thesis, articles, brochures, and proclamations.
In mixed-method research, key data collection instruments include closed-ended and open- ended questionnaires, in-person interviews, and observations (Zohrabi, 2013). According to the author, semi-closed-ended questionnaires provide quantitative or numerical data to the inquirer, whereas open-ended questionnaires provide qualitative or textual information. According to Creswell (2007), the primary data collection tools in a qualitative approach are interviews, observations, and document reviews. As a result, a case study design entails detailed, in-depth data collection tools that draw on multiple sources of information (Creswell, 2014).
In this study, data collection methods or instruments used included questionnaires, in person interviews, and observation. Basically, the primary data was collected through in-person interviews, questionnaires, and observation.
3.8.1. Primary data Sources
3.8.1.1. Questionnaires
In his article, Zohrabi (2013) credited questionnaires as one of the primary sources of obtaining data in any research endeavor. The importance of making use of a questionnaire is that it helps the researcher ask the same question in the same manner to all the respondents (Davies et al, 2011:63). As pointed out by Kothari (2004), this method has its own merits; it is free from bias, it gives time for the respondents to give more thought; and larger samples can be made use of, so the results can be made more dependable and reliable.
In this study, the questionnaires were administered to private security personnel, mainly to explore and analyze their understandings, and experiences towards community security and other security level cooperation and information sharing with AAP. The questionnaires were prepared and distributed in Amharic with the sole intention of effective communication with all participants. Finally, the responses from the survey were categorized and translated into English for analysis.
3.8.1.2. Interview
One of the data collection methods used in qualitative research techniques is the interview. It is a useful tool for gathering detailed information about one's perceptions, views, experiences, and impressions on specific issues. Interviewing allows the researcher to determine whether the answers obtained are the result of respondent or interviewer characteristics (O'Sullivan et al., 2017). In-person interviews, according to these authors, can greatly improve administrative studies.
The researcher conducted in-depth face-to-face interviews with Yeka sub-city police officers from the crime prevention and control directorate, as well as community policing offices. In addition, an in-person interview was conducted with PSCs managers and community members from the sub city. These interviews included semi-structured questions that aided in eliciting the participants' intended responses to the issue under investigation. First, the researcher creates an interview guide in English based on the basic research questions and specific objectives. The interview was then conducted in Amharic with the sole purpose of ensuring effective communication with all participants. Based on their responses, the interviews were typed in the text book and recorded on an audio recorder based on their consent. Finally, the recorded responses carefully transcribed into written notes in Amharic and then translated into English for analysis.
3.8.2. Secondary data Sources
Secondary data tends to expand the data set from which specific generalizations can be made. In general, it is much less expensive to collect first-hand information using secondary data than it is to use primary data (Kothari, 2004). Furthermore, because the researcher obtains the necessary information easily at one point, this method of data collection saves time. In this study, the researcher reviewed various published and unpublished documents, proclamations, and reports related to the objective and provided solutions to the problems stated.
3.8.2.1. Document Analysis
Relevant official documents are obtained and analyzed. These include published theses, proclamations, brochures, police reports, and guidelines. It is important to use various instruments to serve two purposes: (1) to enrich and enhance results and (2) to triangulate findings with one another.
3.9. Analyze methods and tools
After data has been collected in various ways, the question of how to analyze it arises. In fact, the information gathered is unprocessed. Following data collection, the data must be analyzed in accordance with the outline established for the purpose of the research proposal. Technically, collected data was edited, coded, classified, and tabulated before being analyzed and presented in both qualitative and quantitative ways.
Thematic Analysis allows you to code and categorize data into themes. Using thematic analysis, it is possible to associate different ideas and points of view of participants and compare them to data gathered in different situations and at different times from other or the same participants during the project (Alhojailan, 2012). As a result, the researcher used a thematic type of exploratory sequential analysis, which is used when the researcher wants to follow up on qualitative findings with quantitative analysis (Edmonds and Kennedy, 2017). Following that, the processes of categorizing or grouping large amounts of raw data into classes or groups based on common characteristics were presented. Data with similar characteristics were grouped together.
Qualitative data from in-person interviews, observations, and document reviews were analyzed by carefully interpreting meanings and contents in relation to thematic issues. Quantitative data from the questionnaire were also analyzed quantitatively using Statistical Packages for Social Sciences (SPSS) to encode and analyze frequencies and percentages, and Microsoft Excel spread sheets to create figures or graphs. Descriptions, tables, bar charts, and pie charts were used to present the analyzed data.
3.10. Validity and reliability
Expert reflection was added by security officers and PSCs workers in the preparation of the questionnaires and interviews to ensure the validity of data collection instruments. Constructive criticism from security and research experts helped the researcher identify flaws and provided an opportunity to modify and improve the instruments. The instruments were corrected in accordance with the expert opinions. Following that, the researcher administered and collected all instruments.
3.10.1.Instrument of validity
In all types of research, establishing the scientific usefulness of findings and the validity of research instruments is critical. Before conducting the survey, the researcher discussed the contents of the questionnaires to ensure that they were clearly worded. To be sure, questions that were vague or unclear were removed and corrected after feedback was received. The collected data was carefully analyzed, and the results aided in the development of the research being considered.
3.10.2.Instrument of reliability
The reliability of a research instrument refers to how often the instrument produces the same or similar results. Although there might some uncertainties, the results of a quality instrument gathered at different times from both primary and secondary sources were generally consistent. Two enumerators were also trained to ensure quality data or instrument efficiency and to collect data from security personnel.
CHAPTER FOUR
4. Results and Discussion
4.1 .Introduction
This chapter analyzes and discusses the findings of data gathered through in-depth interviews and survey techniques. Following data collection from respondents, the data was edited, classified, coded, and tabulated. The findings were organized according to the study's objectives and presented in the form of tables, pie charts, percentages, and figures.
The data was analyzed using the research objectives and questionnaire. Under the subtopics, both quantitative and qualitative data were analyzed, interpreted, and presented. Because the numbers of quantitative information did not have sufficient meaning on their own, qualitative information based on description was used to supplement them. Quotations were used to validate what respondents said about the issue under consideration, thereby supporting the statistical data. The analysis included an explanation of the assessment of the role of private security companies in improving human security the case of Yeka sub city.
4.2 . Demographic characteristics of the respondents
4.2.1. Respondent distribution
The total number of respondent’s expected and actual data collected in this study is 140, as shown in Table (3). Thus, in this study, all respondents (140 or 100%) participated and collected data.
Table 2. Shows the expected data to be collected and the actual data collected.
Illustrations are not included in the reading sample
Source: Survey 2022
4.2.2. Response Rate
For this study, one hundred twenty (120) questionnaires were administered to private security personnel. From this, all (120 or 100%) questionnaires were returned, yielding a 100% response rate (Table 3).
4.2.3. Gender of the Respondents
In this paper, there are a total of 140 respondents illustrated in Table (3), of which 20 or 14 % of them participated as key informants, including PSCs, administrative officers, police officers, and community members. All of these respondents were males. On the other hand, of the actual questionnaire respondents, 77, or 73.3 %, of the respondents were male and 28 or 26.7 % were female (Table 4 and Figure 4).
Table 3. Shows the proportion of respondents by gender.
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 4. Shows the proportion of respondents by gender
Illustrations are not included in the reading sample
Source: Survey 2022
Thus, the finding admits that a proportionally huge number of males were enrolling in the private security industry in different positions. This is because the nature of the work is more favourable for males than females. Females are typically assigned during the day, but they do not prefer to work at night. The finding also noted that there is a gender imbalance in the security sector, which has its own effect on the performance and role of PSCs in preventing crime and promoting community security in the sub city. Most women are reluctant to join the profession due to the fact that they associate it with men. Additionally, they noted the long working hours and at times lack of adequate equipment and poor remuneration are conditions unfavorable thereby leading to few women being enlisted to serve in the profession (Wairagu, F. et.al, 2004).
4.2.4. Age of the respondents
The researcher was interested in the age distribution of the respondents, which is depicted in Table (5) and Figure (5). As a result, it is clear that the majority of security personnel, 50 or 41.7 %, are between the ages of 25 and 35, with the 35 to 55 age group accounting for 36 or 30 % of the total. Respondents aged up to 25 years old accounted for 20 or 16.7 %, while those aged 55 and above accounted for 14 or 11.7 %.
Table 4. Shows the proportion of age categories of respondents
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 5. Shows the proportion of age categories of respondents
Illustrations are not included in the reading sample
Source: Survey 2022
This demonstrates that the majority of the more productive labor force has joined the security guarding service. The main reason for joining private security services in is to look for new job opportunities. In terms of reducing the unemployment rate, which might be one cause of crime incidence in the city, it can play an important role.
It is expected that the young employees will be able to learn and acquire new skills, which will improve the company's performance. Furthermore, young employees are more likely to embrace modern technology than older employees. Nonetheless, the young personnel may be lacking in the necessary experience and competence to handle security issues. This could be counterproductive to private security firms' efforts to improve their performance. Employee performance and age diversity have a statistically significant positive correlation, according to Odhiambo, Gachoka, and Rambo (2018). In the case of developing security behaviors, the findings of the study by Kai Roer, Dr. Gregor Petric (2017) show a positive relationship or correlation between age and the employees' security culture.
4.2.5. Educational background of the respondents
Respondent 07 (March, 2022) from the PSCs managers requested to answer the educational background of the security personnel in order to assess their capacity. He stated the following:
“Because of the salaries and the community's attitude toward it, only low-income people were interested in working in this field in the past. But everything is changing now. People with lower and higher levels of education, for example, are involved in this work”(March, 2022).
According to the findings from the survey also, the majority of respondents (63 or 52.5 %) completed secondary education (grades 9-12); 31 or 25.8 % completed a diploma; 25 or 20.8 % completed elementary schools (grades 1-8); and only 1 or 0.8 % completed university education (Table 6 and Figure 6).
Table 5. Shows the educational background of respondents.
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 6. Shows the educational background of respondents.
Illustrations are not included in the reading sample
Source: Survey 2022
Thus, the participation of people with higher education levels in this profession is due to an increase in unemployment in the city, a shift in the community's attitude toward job selection, an increase in salary even if somewhat insufficient, and work habits, and is viewed as an opportunity to find another job, and so on. The researcher also argued that, education has a significant impact on an individual's performance in a variety of fields, including security. Threats, for example, were disseminated via vocal, written, broachers, video, and other means. As a result, adequate education, such as basic writing and reading skills, is expected to understand and prevent threats, thereby improving the performance of security personnel. This also implies that the respondents were literate enough to interpret and respond to the study's objectives definitively.
The finding is also supported by a study by Ng and Feldman (2019), which found that education level, in addition to having a positive impact on main task performance, is positively related to creativity and citizenship behavior, as well as negatively on substance use in the workplace and absence from work. Similarly, Jaoko (2014) concluded that academic qualifications have a positive relationship with employee performance.
4.2.6. Work experiences of the respondents
The work experience of the respondents in this study was as illustrated in Table (7) and Figure (7). According to the findings, the majority of respondents (58 or 48.3 %) had 2 to 5 years of work experience, 39 or 32.5 %, had up to 2 years of experience, and 22 or 18.3 % had 5 to 12 years of experience.
Table 6. Shows the experience distribution of the respondent.
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 7. Shows the experience distribution of the respondents
Illustrations are not included in the reading sample
Source: Survey 2022
The researcher attempted to assess the respondents' experience because experience simply means dealing with various situations and developing various capacities to cope with exposures and solve problems. As a result, having experience in the security sector is essential in order to see situations in a variety of ways and provide appropriate solutions before they become incidents.
According to scientific evidence, formal training alone does not change employee behavior (Metalidou et al. 2014). Employees perform better in sub-dimensions that contribute to the security culture when they have been with the same employer for a longer period of time. This may contribute credence to the notion that social context (the workplace), possibly in combination with formal training, has an impact on security culture.
4.2.7. Profession of the respondents
According to the findings in Table (8) and Figure (8), 94 or 78.3 %, of the respondents were civil, while 26 or 21.7 % were military. Based on this, it appears that the majority of security personnel lack relatively high military or police science skills and knowledge, despite the fact that training is provided prior to employment, with the majority of the training focusing on police greeting styles and how to use weapons. However, from except the community members, the police officers and PSCs managers have prior military profession.
According to Respondent 03 from the community policing office (March 14, 2022), every citizen has a responsibility to keep the environment safe from any illegal acts. Private security personnel, on the other hand, have a better understanding of and are better able to maintain security in and around their job neighborhoods. This is especially true for those (security personnel) employed by private agencies who have prior military and police science knowledge and skills and are therefore better able to prevent and control crime. They make a significant contribution to the creation of a stable and peaceful environment.
Illustrations are not included in the reading sample
Table 7. Shows previous profession of respondents
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 8. Shows previous profession of respondents
Source: Survey 2022
Extensive specialized knowledge, as well as a broad range of general managerial skills, are required for successful security practice (Criscuoli, 1998). This demonstrates that security personnel who have previously served in the national military or public police have a significant potential or actual skill and knowledge to thwart any criminal acts or incidents around their working place designed to promote security and safety in society. The researcher also found out that there might be skill and knowledge challenges to performing their roles (security personnel) in protecting and preventing crime incidents to enhance community security in the city.
These challenges were emanated from the negative public perceptions including the security personnel themselves towards the field and lack of a standardized and certified security trainings manuals and modules and sites. This is consistent with Criscuoli's (1998) findings that the two most significant barriers to acceptance as a field profession are incorrect public perceptions of the field and a lack of a structured prerequisite training program.
4.3. Analysis of Collected Data
4.3.1. The role of PSCs in enhancing community security
Many people in the study area still believe that better police and judicial measures are the only ways to reduce crime. As a result, the new national crime prevention strategy plan (2019) was designed to involve the entire public in crime prevention, as the criminal justice system alone is incapable of preventing and controlling crimes. According to a study conducted by the organization Private Officer International (2013), collaboration between public and private actors is critical in ensuring the effective delivery of security services.
Article 7 (16) of the Ethiopian Federal Police Commission Establishment Proclamation No. 313/2003 states that the commission may "delegate, as necessary, its powers to other organs and civil servants for the execution of certain functions." In this context, it could be argued that PSCs can provide security services to private and public organizations such as banks, insurance companies, hotels, various industrial sectors, and so on. Working as a security guard in one institution may also provide security services to the community around the worksite.
As a result, the researcher sought to find out about the perceptions of police officers, security personnel, PSCs, and community members about the role of private security companies in maintaining community security in the Yeka sub-city.
4.3.1.1. Perception of police officers
The current study sought to ascertain police officers' perceptions of the contributions and benefits of having PSCs in enhancing community security in Yeka sub city. To obtain feedback, the researcher interviewed police officers from the crime prevention directorate and the office of community policing in Yeka sub city. Six (6) or 100% police officers from the crime prevention and control directorate and the office of community policing were reported to be very positive about the contribution of these security companies.
Although as a citizen, security personnel are responsible for crime prevention; they (the security personnel) are aware of basic security and some of them are armed and have military science knowledge, so they prevent crime in the area where they are employed and also support the police patrol (Respondent 02 from Yeka sub city crime prevention and control directorate, March 14, 2022). In terms of delegation of responsibility to the security personnel, the same respondent also stated that:
“Despite there are no formalized rules and or regulations that state towards the duties and responsibilities of security personnel towards securing the community around their worksite, voluntarily based police officers were given or share the responsibility of protecting an area within a 500-meter radius of their work area. The police force organizes various awareness-raising forums to discuss how to protect the environment from crime and criminals, how to prevent crime, and other forms of military and sophisticated criminal acts in order to gain substantial support from security personnel in providing security services to the community. This is accomplished by speaking with the employer and delegating full responsibility to the agency”(Respondent 02 from the Yeka sub city crime prevention and control directorate, March 14, 2022).
During the interview, Respondent 01 from the crime prevention and control directorate of the Yeka sub-city police department was asked to comment on the extent to which PSCs and their employees influence the provision of security to the community in Yeka sub city. As an answer to:
“They serve a vital role and help us a lot in maintaining the security of the sub city, as well as the safety of their neighbors or surrounding communities. Besides providing information to the police concerning criminal incidents, they sometimes seize criminal’s red handed and protect property from pillage and plunder. Assist police officers and other members of the public security force. They collaborate closely with community policing, which is especially important now that crime is on the rise. They help to create jobs, lower unemployment, and solve security issues”(March 14, 2022).
Similarly, Respondent 03 from the community policing office believes that they (private security) play an important role in promoting community security and safety alongside the police force and eliminating favorable conditions for criminal activity. Respondent 03 from the community policing office stated specifically that "the greater the number of security sectors, the greater the potential for security maintenance in the mega-city. The respondent continued, “Despite the fact that they (private security personnel) have their own security area, they also participate in preventing and monitoring criminal activities by eliminating favorable conditions in neighboring areas or workplaces, apprehend criminals, or give us information. Anyone who remains silent while a crime is being committed bears responsibility. As a result, the private security personnel bear a dual burden: they are responsible not only for their profession, but also as citizens for preventing and controlling crime in their workplace and surroundings to enhance the community security”(March 14, 2022).
Therefore, according to the results from the police officers, security personnel play a significant role and have a force multiplication effect in the prevention of crime and maintaining the security of the community by thwarting crime incidents and threats, working hand in hand with the police force and the community as a whole in the Sub city.
4.3.1.2. Perception of community
A Human Motivation Theory in Abraham Maslow's 1943 paper, our actions are motivated in order to meet certain needs. Maslow pioneered the concept of a hierarchy of needs (Figure 2). According to this hierarchy, people are motivated to meet basic needs before moving on to more complex requirements. Security and safety are among the most basic needs of a community, according to Maslow. As Maslow points out, any person has rights to basic needs of safety and security. The purpose of the study was to determine about the perceptions of a community towards the role of community security personnel on enhancing community security. This was done to see if the community residing in and around the working area of the private security personnel have felt safety.
Despite there are some concerns, the data demonstrate that local communities have a great a position of faith on the security services giving by the security personnel. For example, in an interview with Respondent 11 from the local community who owns a business (shop), he stated that;
“I am very confident in the safety of my family as well as my shop when they (security personnel) are around, and that makes me concentrate fully on my work. He added, I have never heard about any criminal incidents in my shop or in my neighborhood. The security personnel found around this area are good looking, well trained, and cooperative with the community, but it’s undeniable that they need to have sophisticated weapons so as to improve their security services”(April 5, 2022).
Similarly, Respondent 12 from the local community civil servant stated the following about these security companies and security personnel:
“The security personnel here are doing or providing an excellent job of security service. Before these banks and hotels opened, the neighborhood was in disarray. In our area, criminals robbed and stole mobile phones by hitting the victims with stones at night and hiding in the surrounding vegetation. Thankfully, to the security personnel stationed here to keep their client’s property secure, we also feel secure. Theft, robbery, hanging, and burglary are all on the decline. I haven't seen or heard of a single crime this year. As a result, we must support them in different ways in doing so more effectively”(April 5, 2022).
The researcher interviewed the majority of the local community, and they were optimistic about the importance of private security agencies and their security personnel in enhancing community security in areas where they were stationed in collaboration with the community and public policies.
From the findings, the researcher argued that, the community has a positive perception towards the importance of the availability of security personnel in preventing and controlling crimes and eliminating criminal activities around their neighbor. collaboration with the police and the community, these security personnel can perform better in providing security service to their clients and neighboring communities in the study area. They were playing an irreplaceable role in the security of the community around their worksite. To perform better, they should equip themselves with better security instruments and other support like flash lights and cameras. In line with this, Dambazau (2006) argues that the presence of a security man is effective to the extent that it is capable of retarding criminal activities.
4.3.1.3. Perception of the security personnel
The study sought to determine whether or not perceptions of the security personnel towards PSCs have a role in terms of providing community security. The findings on the Table (9) and Figure (9) indicated that the respondents have argued that PSCs have a role on promoting and enhancing community security in the city. About more than a half (73 or 60.8 %) of the respondents from the security personnel strongly agreed that PSCs have an important role on the safety and security of a community in Addis Ababa. While 47 or 39.2 % were agreed on the role of private security on preventing crimes and promoting community security in the sub city of Yeka. None of the respondent disagreed on the role of the private security agency in enhancing community security in the sub city.
The study sought to determine whether or not perceptions of security personnel towards PSCs have a role in providing community security. According to the findings in Table (9) and Figure (9), indicate that the respondents have argued that PSCs have a role in promoting and enhancing community security in the sub city. More than a half (73 or 60.8 %) of security personnel respondents strongly agreed that PSCs have a significant role in promoting the safety and security of a community in Yeka sub city. While 47or 20 % of respondents agreed on the role of private security in preventing crime and promoting community security in the study area. None of the respondents disagreed with the role of the private security agency in enhancing community security in the sub city.
The findings show that that security personnel’s have complete confidence in the provision and maintaining of community security in the study area. However, as shown in Table (9) and Figure (9), each security personnel differentiated in their level of argumentation.
Table 8.Shows security personnel's perceptions of the role of PSCs in enhancing community security
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 9. Shows security personnel's perceptions of the role of PSCs in enhancing community security
Illustrations are not included in the reading sample
Source: Survey 2022
As a result, the researcher contended that PSCs play an important role in promoting and maintaining community security in the study area. The majority of security personnel were optimist towards securing the communities found around their worksite. This is inline with the theory of liberalism which insisted that, in addition to the state power, other intuitions have a role in providing security services. According to this theory, non-state actors such as civil society, non-governmental organizations, the private sector, and other individuals are as important as state actors in terms of security (Meiser 2018). The involvement of these actors can solve insecurities in the anarchic system.
4.3.2. The partnership of PSCs and AAP in enhancing community security
4.3.2.1. Training to improve security personnel capacity
According to Connors and colleagues (2000), combining police officers' legal authority and training with the size, resources, and technical expertise of private security can result in a successful emergency response partnership. This was confirmed during interviewed PSC managers and police officers from Yeka sub city police department, recognized that an enhanced security training package as the most significant part of the security industry. The majority of these respondents believed that certified training centers and approved courses should be available for PSC security personnel in order to harmonize and raise standards. This strongly suggests that adequate and proper training should be provided by an autonomous institution, possibly by the certified and well recognized institution rather than by PSCs alone. However, there are no such systems and models in Ethiopia.
However, there are no guidelines as to who provides this training (the police, the corporation, or any other institution), and the standards of modules, including the training's contents and quality, are not mentioned (Respondent 01 from the crime prevention and control directorate of Yeka sub city police department, March 14, 2022). As a consequence, the duration and content of training for recruits and the quality of trainers in the industry are left to the discretion and capability of various PSCs. During the survey and preliminary observation, it was also observed that the training facilities of some companies are poor and even do not have clear guidelines.
According to Respondent 03 from community policing office about the trainings given to the security personnel said that:
“The Training given by police officers in the sub city was based on attempting to provide a variety of criminal and security-related training and capacity-building opportunities, most of which are focused on the act-of-crime and the way they (criminals) behave. For instance, crimes such as armed robberies in areas with a large number of pedestrians and cars; petty urban thefts (car theft using Master Kee, murder, property robbery, physical harm, hanging, and so on)”(March 14,2022).
Furthermore, Respondent 04 from the Yeka sub-city police department's community policing office responded to the question of capacity building for security personnel by a police officer as follows:
“They (security personnel) are continually being empowered to prevent these and other crimes from occurring, and if they do happen, they will assist the police force in their efforts to apprehend the criminals. Educating security personnel on the need to ask and follow up on police golden questions such as where, when, why, how, and other wild specific activities in order to prevent and control the occurrence of crimes and criminals before and after they occur”(March 16, 2022).
Respondent 03 from the community policing office (March 14, 2022) reiterated that, other physical and military training is also provided by the agencies themselves before new recruits enter the workforce. Furthermore, if requested by the agency or employer, the police officer would provide additional security and technical training to the security personnel. On the other hand, we provide training and advice to agency officials and senior site supervisors four times a year by identifying security gaps, tactics, and types of crimes (Respondent 04 from the community policing office of Yeka sub city police department, March 16, 2022). The respondent added that, police officers undergo a series of special operations to assess the gap and or weakness of the private security personnel and try to make them aware and informed through training.
The researcher argument is that, in fact, there was a series of trainings designed by police departments which were focused on capacity building of the security personnel. However, there are still no formal and standardized national or city-wide training modules and manuals or contents. This means they are simply cooperating voluntarily and temporarily for a purpose.
However, there are directions which state PSCs should give training to their employees before engaging in their job. This is also open to criticism about who can prepare the manuals and who can manage and deliver the training. This is consistent with Abera's (2021) discovery. According to him, in Ethiopia, the Federal Police Communion is responsible and in 2011, Working Guideline 01/2011 was prepared, which insists that PSCs should have a training syllabus and that PSC personnel must have completed 90 days of training under category I and 15 days under category II (Article-7 of the Police Guideline). This is different when we see the status in South Africa. In South Africa, the South African National Defence prepares training manuals and even regulates the training given to the PSCs according to their activities in the country (Minnaar, 2004).
4.2.2.2. Resources and information sharing to prevent and control crime
Regular communication using (meetings, training, newsletters, e-mail, websites, etc.) is also beneficial. Private security companies have also been given police forces to assist with certain functions, often to reduce costs and improve services in a particular area (Greene, 2006). For example, the Minneapolis Police Department Safe Zone program hires private security officers to help patrol downtown areas (Center for Problem Oriented Policing, 2007). The program has been credited with reducing targeted violent crimes and automobile crimes and increasing arrests for quality-of-life crimes.
In the area where private security works, such as private and public institutions, are identified as the key infrastructure and given special attention. For example, water tanks, electricity, banking, media, and other community-influenced institutions are protected by the police in addition to private security (Respondent03 from the community policing office of Yeka subcity police department, March 14, 2022). Weapons and other military related resources were provided and licensed by the Federal Police Commission based on the request of the private security agency (employer) (Respondent01 from the crime prevention and control directorate of Yeka sub-city police department, March 14, 2022).
Respondent 03 from the community police office of Yeka sub city elaborated on their relationship with the following example story:
“We have a very strong relationship with the security personnel stationed in and around Yeka sub-city in terms of information sharing. In our city, for example, infrastructurebased theft, particularly on the light railway, has increased year after year. On March 8, 2022, a light rail cable was stolen in our sub city. As a result, the community was subjected to a variety of issues until the cable could be adjusted and reconnected. Police began looking for suspects to arrest and bring to justice. As a result, such heinous crimes are committed in groups at night, and various stakeholders require assistance in arresting the suspects. Private security is one of these stakeholders. During our investigation into the theft of the main line cable of a railway passing through Yeka subcity, private security personnel worked alongside the police forces day and night, exchanging valuable information with the police in order to arrest suspects in connection. Finally, nine suspects were caught after 3 days. In this way, they collaborated and played an important role in preventing further damage that could have jeopardized the government's ability to provide long-term service to the community”(March 14, 2022).
Respondent 01 from the crime prevention and control directorate responded to the interview on the partnership of PSCS and AAP as;
“Our partnership is primarily focused on crime prevention and eliminating conducive situations for criminals. We are collaborating to ensure that the community security and to ensure their daily peace and safety of the community in the sub city. Especially, at the grassroot level which is with the community police officers, the security personnel have a strong relationship on preventing crimes by eliminating crime motivators at the locality”(March 14, 2022).
Regarding the partnership that existed between the security provider institutions and the PSCs, Respondent 07 answered from the PSCs as:
“Police officers were conducting night observations to monitor the situation of security personnel; and resolve any problems, and report any complaints to agency managers. In the case of PSCs, we will communicate about any security issues that happen over the phone or in person. Concerning the current situation in our country, the police have requested us to train our security personnel, and some of our security personnel are being trained by the police” (March 4, 2022).
Respondent 14 stated his idea for how he obtained the partnership of PSCs and AAP in enhancing community security in the study area as:
“Although I do not have that much knowledge, I see government security forces occasionally meeting and consulting with private security personnel about what they see, observe, and hear. Accordingly, I feel that they are working together on security and other related issues. In this case, it means a lot to eliminate criminals and crime acts in the area, as well as having a stable and secure society”(April 8, 2022).
Despite some challenges, the majority of respondents from both the police department and the private security agency argued that they have vital relationships focused on preventing and controlling crimes in order to create a secure and safe environment for the sub city's community. This is shared by the majority (104 or 86.7 %) of security personnel respondents (Table 10 and Figure 10). The results show that 23 or 19.2 % and 81 or 67.5 %, respectively, have appositions of "strongly agreed" and "agreed." While 14 or 11.7 % of respondents became neutral on the position of the chain of private security agencies and security personnel with the Addis Ababa Police in the study area; 2 or 1.7 % of respondents became neutral.
Table 9. Shows the agreement level of security personnel towards the chain of PSCs and AAP.
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 10. Shows the agreement level of security personnel towards the chain of PSCs and AAP.
Illustrations are not included in the reading sample
Source: Survey 2022
Based on the facts presented above, the researcher contended that in Yeka sub city, private security and public security forces working collaborated to improve community security by reducing, preventing, and controlling crimes and criminal acts. This is done through sharing of information’s and even arresting criminals. The community members, PSCs, security personnel themselves, and police officers are also optimists about the partnerships of public police and security personnel in the study area. But their partnership is just based on the voluntarily there is no legal ground or formalized agreements of sharing of responsibilities. This finding is consistent with Hassan (2011) findings that the police in partnership with private security firms played an important role in detecting crime at various levels. The author contended that the presence of security services is effective in the sense that it can deter criminal activity. Mkilindi (2014) also demonstrates this by stating that most of the time, top police officials are quoted speaking to the public about the importance of public-private partnerships in maintaining the country's peace and security. However, it is undeniable that there is still a gap or challenging issues in their relationships for a variety of reasons, including issues of legitimacy and consistency. According to Muller (2010), the private security agencies
and the South Africa police service signed Memorandum of Understanding (MOU) in 2009 which is mainly focused on ensuring that the PSCs and the police would work together to achieve their common goal of protecting the society.
4.3.3. Challenges facing security personnel’s while providing security services
4.3.3.1. Capacity
The study's findings highlight the capacity-related challenges that private security faces when providing security services to the community. Various crimes are committed as a result of security personnel and staff officers' incompetence and negligence (Respondent 01 from the crime prevention and control directorate, March 14, 2022). Indeed, private security has played an important role in improving community security in the sub city. One thing they all have in common is a lack of security skills (Respondent 03 from community policing office, March 14, 2022).
Government security forces, on the other hand, are hesitant to detain and prosecute criminals (Respondent 07 from PSCs, March 4, 2022). According to Respondent 03 from the police department (March 14, 2022), some security personnel have low capacity, and when the police patrol, they discovered some security personnel were sleepy at the time of night when criminals chose to commit crimes. This is due to the work load, which requires them to work 24 hours a day for 30 days without rest. This is evidenced by security personnel, with 17 or 10.7 % of respondents claiming that a lack of rest time is a challenge. They work without rest for many hours and days and this can reduce their capacity and puts them at risk of health problems.
Respondent 03 from community police office (March 14, 2022) response to the question of the capacity of PSCs from the police department also attributed it to a lack of adequate security personnel training. This could also be inferred from the complaints about the manner in which private security manages crime scenes when they are the first to arrive at such scenes. This might be indicative that private security personnel do not have sufficient capacity to preserve crime incidences until they are handed over to the police. The long time it takes the police to arrive at crime scenes, as indicated by Respondent 07 from PSCs (March 4, 2022), could also be one of the factors exposing their inability to properly preserve crime scenes.
According to Respondent 01 from the crime prevention and control directorate:
“The majority of security personnel employed by private agencies are from the city's outskirts, where the majority are farmers with little or no knowledge or skill in security. Others are incapable of thwarting crimes because of they are over aged and have difficulty seeing and hearing clearly in the dark and far distant objects respectively. Due to the complex and sensitive nature of crimes happening now in the city, those over aged security personnel could be incapable of preventing and controlling crime incidence in the area they serve”(March 14,2022).
For the question of the capacity related challenges of the security personnel Respondent 13 from community members replied as bellow:
“Criminals may, on occasion, use sophisticated tactics. They can use their energy as well as instruments. As a result, security personnel officers must possess the necessary capacity and strength to deal with complex crimes. Better physical outstanding is required to deter, prevent, and control act of crimes. However, the security personnel on duty now do not appear to be suffering from this for a variety of reasons. The security personnel stationed at a settlement in my neighborhood to protect private property of construction, for example, are elderly and their ability to defend not only the community, property, but also themselves was irrational. Therefore, I am not confident on their capacity”(April 5, 2022).
However, the security agencies did not agree on the incompetence of their employees due to a lack of training. Respondent 10 from the PSCs elaborated on this;
“Our security personnel will be hired based on our agency's criteria and will receive capacity building training (physical, weapon use, and basic security) both in practice and in theory. As a result, the main challenge is not a lack of capacity, but rather personal negligence”(March 7, 2022).
Respondent 08 from PSCs, on the other hand, when asked about security officer training, responded as follows:
"I do not believe that security personnel training is designed to be a universal solution to all crime problems. I believe it is geared toward specific objectives of various companies catering to specific client needs. Clients are the ones who set the standards. They are the ones who pay us, and we simply carry out their wishes. According to this, the current training is adequate"(March 4, 2022).
In this the researcher argued that, the age-related issues raised by this respondent might not as such obstacle in security providing at this time. Because, majority of the respondents in this study were under the age category of 25 to 35 (Table 5 & Figure 5). But such difference were created due to the absence of continuous assessment and controlling mechanisms between the security provider institutions. Another challenge is that the security personnel are not receiving adequate security training. This is supported by 6 or 3.8 % of security personnel respondents who argue that they face challenges such as a lack of skill and security knowledge (Table 11). Due to these and other empowerment program limitations, they are challenged to provide full security services for the community in the sub city.
According to these findings, among the capacity challenges for providing full security service to the community in the sub city were a lack of full training, cooperation, assessments, and awareness towards security service, physically unfit, little or no security skills and knowledges as well as other personal traits. Meaningful and standardized training prior to and on-the-job training are essential for developing professional and effective security personnel. According to the United Nations Office on Drugs and Crime (UNODC), security personnel from PSCs should complete the following basic courses before deployment:
“Role of civilian private security services and their contribution in crime prevention and community safety; relevant legislation relating to and regulating arrest powers and the use of force; oral and written communication skills; code of conduct and professional ethics; customer and client handling skills; emergency procedures for natural disasters, accidents, and other emergencies; human rights and adherence to applicable national and international standards; if applicable use of firearms (when, how, limitations); and use of security equipment and devices such as security alarms, screening equipment, and radio (p.65).”
Likewise, according to a study conducted by Schneider et al. (2003), in order to provide high- quality service, employees must receive adequate training in technical skills, knowledge, and interactive skills. Employees with interactive skills are more likely to provide courteous, caring, responsive, and empathetic service. Successful businesses invest heavily in training and ensure that it is relevant to their business goals and strategies.
4.3.3.2. Resources challenges
The findings of this sub-section study reveal the difficulties that security personnel and PSCs face in preventing and/or thwarting crimes that threaten community security in the Yaka sub city was due to a lack of resources. These challenges vary from agency to agency and even from site to site. Regarding resource base challenges, Respondent 13 from community member stated;
“As we have seen, the security personnel in this neighborhood are guarding this organization day and night with "Dulla." How do you think you can prevent crime and catch a thief with a security instrument like Dulla? It’s impossible because these security personnel also want to live for themselves, so the government and or the employer agency should think about it. Otherwise, it will lead to even more insecurities. Therefore, I think they need to be better equipped to carry out coordinated or joint security operations and to provide security for the community”(April 5, 2022).
Respondent 12 from the community member group added;
“Private security personnel will never solve security problems; they can only reduce or minimize security problems. I myself, do not fully trust these security personnel’s because they are also humans working in a very difficult environment with very low payment, they can easily be tempted, and they have no or poor weapons to fight against criminals who operate with sophisticated weapons. I feel that the PSCs have poor management which make frequent changes of security personnel, which is not proper for reliable security and continued security services both for their clients and even to the community including me”(April 5, 2022).
The security personal responses to the question of what type of security equipment they used to give security services were unanimous; 53 or 41.7 %, of them, said that they were giving security services for their client and the neighboring community using the Dulla which is made up of wood. Their number is not insignificant; and this means that a significant number of security personnel are working or giving security services using Dulla. This has a profound effect on the security industry as well as on community security in the Yeka sub city. On the contrary, 70 or 51.1 % of total security personnel responded that they have guarded their clients or work sites with a weapon or gun.
Therefore, the above findings stated that a lack of or poor security equipment was making it difficult for security personnel to provide security services to both their clients and worksite neighbors in the community of the sub city. It is too risky or troublesome for security personnel to make a threat or catch criminals without having a weapon. Thus, from the researcher's observation, having only "Dulla" as guarding equipment might have lowered their sense of making a secure and safe community in and around their work place. So, they need to be equipped with at least one gun per site. Otherwise, it will be difficult to maintain the security of both their client and the community in the city. The researcher argued that the absence of or58 |Page
poor security equipment was an obstacle to promoting full security service for their clients and the surrounding community in the Yeka sub city by the security personnel.
Table 10. Shows the availability and type of security equipment used by security personnel.
Illustrations are not included in the reading sample
Source: Survey 2022
Figure 11. Shows the availability and type of security equipment used by security personnel.
Illustrations are not included in the reading sample
Source: Survey 2022
As a result, the researcher argued that private security agencies and security personnel must recognize that adopting modern security equipment will either provide solutions to existing problems or present with new opportunities, such as increased effectiveness and operational efficiency. This is consistent with the arguments of Al-Jabri and Sohail (2012), who claim that relative advantage leads to increased efficiency, economic benefits, and social status. As a result, the relative advantage of modern technology is related to the rate of adoption.
4.3.3.3. Institutional cooperation and legalization
In this sub section the challenges raised from the institutional cooperation was assessed based on the interviews and surveys undertaken. The researcher asks a question the challenges of security personnel’s and PSCs at large and the Respondent 07 from the PSCs replied that:
“Concerning private security agencies, not only in Addis Ababa, but throughout Ethiopia, we are currently registered and regarded as business entities or moneymakers, rather than security service provider members or security service providers, not only to their clients but also to the surrounding community at large. This becomes an impediment not only to our collaboration in crime prevention, but also to our communication, which may occasionally deteriorate”(March 4, 2022).
According to the same respondent, some police officers were reluctant to cooperate with us, and even though they considered us fully incompetent, they did not share or exchange information with us. According to the researcher observations, most PSCs and their security personnel have the phone number of the community policing office located near their workplace to contact if a crime occurs. However, when they call a phone to ask for support, they (police officers) could not answer their phones, or answer after a while, and were reluctant to cooperate on the issue immediately (Respondent 07 and 10 from PSCs, March 4, 2022). This could be attributed to the lack of trust, misunderstanding, and low level of information sharing between police officers and PSC officials. In the information age, such a lack of cooperation, distrust, and the inability to share information contributes to the increasing presence of threats and crime incidences that pose a threat to community security in the sub city.
Respondent 03 from the community policing office of Yeka sub city police department, on the other hand, stated that:
“Some private security agencies were not open or interested in working with police officers and sharing information about their work progress and their employer (security personnel) full address. Last year, public law enforcement conducted a study on these private agencies, and the results revealed that the majority of them did everything outside of the labor and social affairs guidelines, and some also did not have a permanent address. Low wages, employing unskilled and unaware security personnel simply by wearing a uniform, a lack of training facilities and manuals, illegal practices, a lack of a permanent office and address, and so on are also just a few of the challenges that stand in the way of effective crime prevention and community security(March 14, 2022).
Respondents 07 from PSCs (March 4, 2022) who responded to the question about challenges to providing security services indicated that the main barrier is a lack of effective communication and responsibilities. This is also contributed by 29 or 18.2 % of the security personnel. They stated that among the challenges they face while providing security to the city's residents are ineffective communication and misunderstandings between themselves and the public police. In addition, 20 or 12.6 %, of the security personnel, argued that, inconsistency and illegitimate responsibilities were also among the challenges they faced. This is based on the reality that there is an absence of a formal or legalized structure of communication between the AAP and PSCs in security and crime preventing activities. When asked if their cooperation has a legal basis, almost all police officers and private security agencies responded that there is no formalized relationship between the police and private security providers. Their relationship is just based on voluntary consensus.
Private security personnel, according to the Respondents from police officers, lack education and training and pose a threat to their policing domain (professionals versus nonprofessionals). Private security personnel believe that public law enforcement officers have a limited understanding of the private security industry and do not recognize the critical role they play in solving and preventing crime Such misunderstanding and mistrust resulted from the absence of legalized cooperation frameworks and guidelines for assessing and sharing skills with one another. These findings support Abrahamsen, et al. (2011) arguments that the interaction between private security providers and the police is marked by a lack of a defined regulatory framework for the private sector and a clear and consistent policy framework. Furthermore, the finding is consistent with the findings in Southeast Europe, where local police and PSCs have not become formal partners but have developed an effective working relationship (Klopfer and Amstel, 2016). As a result, the police use private security at their discretion and in an unstructured manner. It goes on to say that the collaboration with private security is ad hoc and unofficial. Furthermore, he claims that the absence of policy consistency in the interaction between the police and the business sector contradicts often-stated goals of increased cooperation and efficacy.
4.2.3.4. Economic challenges
Another challenge raised by Respondent 03 from community policing (March 14, 2022) is that, despite the fact that they (security personnel) assist the police by providing security around their working sites, they are experiencing financial hardship. The money they earned and the jobs they did were never matched, limiting their effectiveness and capacity to provide security services to the city's residents. The majority (57 or 38.5 %) of respondents from the security personnel, and they claimed that their ability to provide security services is challenged by the payment or typically low salary they receive (Table 12). As a result, most security personnel choose or respect this industry or work not for the satisfaction or as a profession, but simply as a bridge or an alternative job. One-third of those polled were dissatisfied with their pay, claiming it was out of proportion to their workload.
Table 11. Shows the challenges that security personnel are facing in maintaining community security.
Illustrations are not included in the reading sample
Source: Survey 2022
Therefore, the researcher found that, the role of security personnel in providing security service is not only to their clients but also to the security of surrounding communities in the study area was performed with some challenges. The researcher concludes by arguing that the private security personnel in the sub city is characterized by lack of clear legitimate security responsibilities, poor training facilities, absence of unique standardized training manuals, job insecurity, low salary, high working hours with poor security equipment’s which in turn affects the joint operation with public police on enhancing and maintaining of community security in the study area. This is consistent with the findings of Yifru (2007), who discovered that employees of private security companies are ineffective due to low pay, incentives, long hours, and other factors influencing private security personnel productivity.
CHAPTER FIVE
5. Conclusion and Recommendation
5.1. Conclusion
This chapter will conclude the study by summarizing the key research findings in relation to the research aims and research questions, as well as the value and contribution thereof. Thus, the overarching aim of this study is to explore the role of private security agencies in enhancing community security in Yeka sub city. In this study, respondents from private security companies, Yeka sub city police department, private security personnel, and selected members of the local community participated and have played a great role in the accomplishment of this study. The results of the study have been analyzed from the perspective of crime prevention, thwarting threats to the community, chains with police officers, regulations, and challenges due to giving security services to the client and to the community at large in the sub city.
The results indicate that, security personnel are playing an important role in preventing and controlling crime so as to enhance the security of the community. Furthermore, among the community, police, and private security personnel, there is a positive perception of the role of private security agencies and their security personnel in enhancing community security by preventing crime incidences. In general, the majority of respondents were optimistic about the role of these agencies and their security personnel.
Despite the fact that it is done voluntarily, the majority of private security agencies and their employees (security personnel) have collaborated and have a close partnership with the police to control, thwart, and prevent crimes in the city by sharing information and resources. Furthermore, when it comes to PSC collaboration with police forces, the majority of respondents argue that they are working together to eliminate favorable environments for criminals, share information with police, thwart criminal acts, capacity building training, exchanging valuable information with police to overhand criminals, and provide joint security service to the community of the sub city.
Furthermore, the majority of respondents from both categories (PSCs Administrators, security personnel, communities, and the police department) claimed that security personnel had encountered some difficulties in carrying out their security service duties. Among the key challenges identified by the respondents are low level of capacity and skill, economic insecurity (low salary), illegitimate responsibility, lack of security equipment, distrust and misunderstandings, and lack or low level of knowledge of the current flexible and technology wise crimes and criminals’ behaviors. These are among the listed challenges facing the security personnel while providing security services in the study area. As a result, in spite of their aggressive commitment to eliminate crime incidents by creating a safe environment, the above listed challenges create a gap in enhancing the security of their clients as well as the neighboring community in the sub city.
The researcher believes that this work can contribute to the field of study of security by utilizing joint security services, both public and private, in the city to improve community security by preventing and/or controlling crimes and criminals.
5.1. Recommendations
Based on the study’s findings and conclusions, the researcher made the following recommendations to enhance community security the case of Yeka sub city:
- Most security personnel know that they have a great role in ensuring the security of the community by preventing crime incidents and thwarting threats, but their salaries are so low that it leads to a low level of commitment and security service from them. Therefore, the researcher suggested that agencies play their role in the peace and security of the community they serve by paying relatively fair salaries to the security personnel, especially in consultation with the government, in terms of the current cost of living.
- Metropolitan-based crime is sophisticated and supported by advanced technology. Most private security personnel currently do not have military or police skills. Therefore, the city police and private security agencies should work together to provide a series of capacity building trainings for security officers on crime prevention and control. This must be done in a legal framework to be sustainable. Furthermore, security personnel must be certified by the police, PSC, or another relevant body to ensure that the training they receive prior to entering the worksite is sufficient, consistent, and standardized in order for them to become security professionals.
- It is not possible to deploy security forces or public police at every corner of the sub city due to a lack of resources and other factors. Private security personnel, on the other hand, are present in every neighborhood and near the area. As a result, delegating specific responsibilities to private security personnel through the police commission makes it easier to keep the city safe and secure. Instantaneously, city community-based police officers should work with security personnel to enhance community security, but this should be guided by a legal framework.
- Private security agencies, according to the local community, have a significant impact on improving community security. There is, however, a chasm between collaboration and an integrated security giving service identifying the perpetrators, who are thought to be unqualified private security personnel. As a result, the community should be aware of how to prevent crime and improve security by collaborating with private security providers in the neighborhood of their location.
- There are currently differing opinions between security personnel and employers regarding pay. This can influence the efficiency of the security service given by security personnel. As a result, in order to provide effective and coordinated security and to create a stable and productive workforce, the Bureau of Labor and Social Affairs at all levels must work with security service providers and employer agencies to resolve salary issues.
- Private security personnel face security equipment issues while on the job to protect the client's property and even make a significant contribution to the sub city overall security. The majority of them are guarded by "Dulla's." It is not enough to defend themselves, let alone the local community, using Dulla alone. Therefore, the researcher recommended that, the federal police, AAP, YSCPD, and private security agencies must work together to ensure that security personnel are better equipped to improve community security through crime prevention.
- The two had strong security related ties, according to respondents from private security firms and police officers. Their collaborations and links, on the other hand, are usually based on temporary issues and are done voluntarily. This will not result in long-term improvements in community security. As a result, I proposed that the relationship and cooperation between the police, private security personnel, and agencies be governed by a legal framework in order to provide effective, accountable, and coordinated security services and crime prevention apparatus.
- There's an issue with training standards. It is clear that the training provided to security personnel varies from agency to agency. This has an impact on cooperation among and with other security personnel. As a result, I highly suggest that the police department and PSCs collaborate on the creation of training manuals for physical, mental, and weapon use.
- There was illegitimacy, ignorance, and inconsistency in responsibilities, all of which posed challenges to improving community security through joint security service. Therefore, I suggest that legally framed proclamations must be issued to define the responsibilities and partnerships of public and private security in the provision of security services to the community in the sub city.
- There are obstacles, such as misunderstandings, and some agencies are even attempting to conceal themselves. Such challenges can raise security concerns, especially if the agencies conceal themselves, which can cast a shadow on collecting the full address of security personnel. To address this, the researcher proposed that police officers work tirelessly to educate security personnel and agencies about the benefits of working together and the disadvantages of working alone, and that police officers themselves be regarded as security service providers who have the capacity to secure the area around their workplace by cooperating with AAP.
Reference
Abrahamsen, R. & Williams, M.C. (2005). The globalization of private security. Country report
-Nigeria. University of Wales, Abe Ystwyth. Retrieved from https://gsdrc.org/document-library/the-globalisation-of-private-security-country- report-nigeria/
Abrahamsen, R. & Williams, M.C., (2011).Security beyond the state: private security in international politics. Cambridge, UK: Cambridge University Press
Akoch J. (2021).Effectiveness of private security companies in the provision of security to commercial enterprises in juba City, South Sudan. [Unpublished master's thesis]. Africa Nazarene University
Alexander, T., M., (2019).Spatial Distribution Analysis of Crime against Person and Property Using GIS and Crime Stat, A case of Addis Ketema sub city, Addis Ababa. [Unpublished master's thesis]. Adama Science and Technology University
Alhojailan, M. I. (2012). Thematic analysis: A critical review of its process and evaluation. West EastJournal of Social Sciences, 1(1), 39.
Anicent, T.N. (2014).The role of private security in community policing: Case of Kikuyu Sub County, Kiambu County, Kenya.[Unpublished master's thesis]. University of Nairobi
Antunes, S &Camisao, I. (2018). Introducing Realism in International Relations Theory an E- IR Foundations beginner’s textbook.E-International Relations, 1(1). Retrieved from https://www.e-ir.info/2018/02/27/introducing-realism-in-international-relations- theory/
ASIS International. (2009). International glossary of security terms. Retrieved from http://www.asisonline.org/library/glossary/index.xml
Avant, D. (2004). The Privatization of Security and Change in the Control of Force.International Studies Perspectives5(2):153 - 157. DOI:10.1111/j. 1528-3577.2004. 00165.x.
Becker , G.S., (1968) Crime and punishment: an economic approach, University of Chicago and National Bureau of Economic Research, e Publisher: NBER, Volume ISBN: 087014-263-1, Retrieved from https://www.nber.org/system/files/chapters/c3625/c3625.pdf
Belhadj, B., Jaffe,P.S, & Warren (2015).Plural Security Provision in Beirut, Knowledge Platform Security & Rule of Law, The Hague. Retrieved from https://www.kpsrl.org/publication/plural-security-provision-in-beirut
Bennett, W., (2014). Community Security handbook. London: Saferworld. Retrieved from https://gsdrc.org/document-library/community-security-handbook/
Bhanu, C. & Stone, C. (2016). Public-Private Partnerships for Police Reform. Retrieved from; https://biblioteca.cejamericas.org/bitstream/handle/2015/3220/Public- private.pdf?sequence=1&isAllowed=y
Bilgin, P. (2003). Individual and Societal Dimensions of Security.International Studies Review, 5(2), 203-222. Retrieved from http://www.jstor.org/stable/3186403
Cilliers, J. (2004). Human Security in Africa A conceptual framework for review.African Human Security Initiative, 1(1). Retrieved from https://gsdrc.org/document- library/human-security-in-africa-a-conceptual-framework-for-review/
Clarke, A. E. (2005).Situational analysis: Grounded theory after the postmodern turn.Sage Publications, Inc. Retrieved from https://doi.org/10.4135/9781412985833
Commission on Human Security (CHS) (2003).Human Security Now: Final Report,New York:CHS. https://reliefweb.int/sites/reliefweb.int/files/resources/91BAEEDBA50C6907C1256D 19006A9353-chs-security-may03.pdf
Creswell, J. W. (2009).Qualitative, Quantitative, and Mixed Method Approaches: (2nd ed.). California, USA: Sage
Creswell, J. W. (2007).Qualitative Inquiry and Research Design: Choosing among Five Approaches. (2nd ed.). California, USA: Sage.
Creswell, J. W., Plano Clark, V. L., Gutmann, M., & Hanson, W. (2003).Advanced mixed methods research designs. In Tashakkori, A., & Teddlie, C. (Eds.), Handbook of mixed methods in social and behavioral research (pp. 209-240). Thousand Oaks, CA: Sage.
Crime's Effect on Community. (2015). Retrieved from https://study.com/academy/lesson/crimes-effect-on-community.html.
Criscuoli, E. J. (1988). The Time Has Come to Acknowledge Security as a Profession.The Annals of the American Academy of Political and Social Science,498, 98-107. Retrieved from http://www.jstor.org/stable/1045385
Davies, P., Francis, P. &Jupp, V. (2011).Doing Criminological Research. (2nd ed.). London: SAGE. Retrieved from https://et1lib.org/book/5541143/d196c2
Denney, L. & Jenkins, S. (2013). Securing communities: The what and the how of community policing. Background paper. London: Retrieved from https://gsdrc.org/document- library/securing-communities-the-what-and-the-how-of-community-policing/
DIHR & DCAF, (2019). Private Security Governance and National Action Plans (NAPS) on Business and Human Rights. Retrieved from https://www.securityhumanrightshub.org/node/261
Diphoorn, T. (2015).The Diversity of the Private Security Industry in Sub-Saharan Africa. University of California Press, 1(1), 1. Retrieved from https://www.slideshare.net/IPSS-Addis/the-diversity-of-the-private-security-industry- in-subsaharan-africa
Edmonds, W. & Kennedy, T. (2017).Exploratory-sequential approach. In An applied guide to research designs(pp. 201-207). SAGE Publications, Inc, Retrieved from https://dx.doi.org/10.4135/9781071802779
Endalcachew, B. (2014). Human security in the horn of Africa: Trends and Challenges.International Journal of Multidisciplinary Research and Development,1(7), 341-346. Retrieved from https://www.academia.edu/11704006/Human_security_in_the_horn_of_Africa_Trend s_and_Challenges
Ephrem, D. (2018).The Trajectory, Prevalence and Consequences of Serious Crimes in Addis Ababa: An Exploratory Descriptive Study.[Unpublished master's thesis]. Addis Ababa University.
Ethiopian Civil Service University (ECSU), (2018). Manual for Master’s Research Proposal and Thesis Writing (Unpublished). Addis Ababa, Ethiopia
Ezega.com, (2019). Ethiopia to Introduce New National Crime-Prevention Strategy. Retrieved from https://www.ezega.com/News/NewsDetails/7388/Ethiopia-to-Introduce-New- National-Crime-Prevention-Strategy
Fajnzylber, P., Lederman, D., & Leoyza,N., (1998). Determinants of crime rates in Latin America and the world: An empirical assessment. Publisher: World Bank. https://doi.org/10.1596/0-8213-4240-1
Grad Coach, (2021).How to Write a Methodology Chapter for a Dissertation or Thesis (4 Steps + Examples)[You Tube Chanel]. Retrieved from https://www.youtube.com/watch?v=W0vNS1VafXA
Greene, J. (2006).The encyclopedia of police science. New York: Routledge. Retrieved from https://et1lib.org/book/770117/bbef44
Gumedze, S. (2015). The Private Security Industry in International Perspective,European Journal on Criminal Policy and Research, 7(2015), 143-174.
Haq, M. (1995).Reflections on Human Development. New York: Oxford University Press. Retrieved from https://et1lib.org/book/871079/3efeea
Hassan, I. M. (2011).Private security companies and crime prevention in Niger State.[Unpublished master's thesis]. University of Nigeria, Nsukka.
Holmqvist, C. (2005). Private Security Companies: The case of Regulation, SIPRI Policy Paper No.9. Stockholm international peace research institute. Publisher SIPRI.
International Committee of the Red Cross (ICRC), (2015). Montreux Document: Regional Conference on Private Military and Security Companies in Addis Ababa. Retrieved from Retrieved from https://www.icrc.org/en/document/montreux-document-regional- conference-private-military-and-security-companies-addis-ababa.
Isima, J. (2007). Regulating the Private Security Sector: An Imperative for Security Sector Governance in Africa.Journal of Security Sector Management, 5(1), 1740-2425.
Johnson, R. B., Onwuegbuzie, A. J., & Turner, L. A. (2007). Toward a definition of mixed methods research.Journal of Mixed Methods Research, 1, 112-133. doi:10.1177/1558689806298224
Jolly, R. & Ray, D. B., (2006). 'The Human Security Framework and National Human Development Reports: A Review of Experiences and Current Debates', National Human Development Report Series, United Nations Development Programme, New York
Julian, K., W. (2018). "Political Realism in International Relations",The Stanford Encyclopedia of Philosophy(Summer 2018 Edition), Edward N. Zalta (ed.), URL = <https://plato.stanford.edu/archives/sum2018/entries/realism-intl-relations/-.
Kai Roer, K.& Gregor, P. (2017). Age, Experience, Risk and Security. A security culture report. Published by: CLTRe North America, Inc. Retrieved from https://get.clt.re/age- and-experience-on-risk-and-security/
Kansteiner, K &Konig, S. (2020). The Role(s) of Qualitative Content Analysis in Mixed Methods Research Designs.Forum Qualitative Social Research, 21(1). Retrieved from https://www.qualitative-research.net/index.php/fqs/article/view/3412/4513
Kenna,T, E. (2017). Labour Rights of Security Personnel in the Ethiopian Private Security Industry: Case Study in Addis Ababa. [Unpublished master's thesis]. Addis Ababa University.
Kothari, C.R. (2004).Research methodology methods and techniques. (2nd ed.). New Delhi: New age international Publishers: New age international Publishers. Retrieved from https://et1lib.org/book/690061/75b0e4
Lautensach, A., & Lautensach, S. (Eds.) (2020).Human Security in World Affairs: Problems and Opportunities(2nd Edition). Victoria, BC: BCcampus. Retrieved from https://opentextbc.ca/humansecurity
Law Insider (web site). Retrieved from. https://www.lawinsider.com/dictionary/security- personnel
Lilly, D. (2000). The Privatization of Security and Peace building: A Framework for Action.: International Alert, 2000. Retrieved from https://reliefweb.int/report/world/privatization-security-and-peacebuilding- framework-action
Locke, J. (1690). The Second Treatise on Government. Retrieved from, https://history.hanover.edu/courses/excerpts/163locke.html
Mark & Philip, (2019).Research Methods for Business Students: How can your research proposal be structured?8 th Ed. Retrieved from https://www.scribd.com/document/531311864/Research-Methods-for-Business- Students-by-Mark-N-K-Saunders-Philip-Lewis-Adrian-Thornhill
Mathers N, Fox N.& Hunn A. (2007). Surveys and Questionnaires, the NIHR RDS for the East Midlands / Yorkshires & the Humber. Retrieved from https://www.rds- yh.nihr.ac.uk/wpcontent/uploads/2013/05/12_Surveys_and_Questionnaires_Revision _2009.pdf
McLeod S. (2018). Maslow’s Hierarchy of Needs. Simply Psychology. Retrieved from https://canadacollege.edu/dreamers/docs/Maslows-Hierarchy-of-Needs.pdf
Meiser, J.W. (2018). Introducing Liberalism in International Relations Theory an E-IR Foundations beginner’s textbook.E-International Relations, 1(1). Retrieved from https://www.e-ir.info/2018/02/18/introducing-liberalism-in-international-relations- theory/
Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Skourlas, C., & Giannakopoulos, G. (2014). The Human Factor of Information Security: Unintentional Damage Perspective. Procedia-Social and Behavioral Sciences, 147, 424-428. Retrieved from https://www.sciencedirect.com/science/article/pii/S1877042814040440
Minnaar,A., (2004). Crime Prevention, Partnership Policing and the Growth of Private Security: The South African Experience. Retrieved from https://www.ojp.gov/pdffiles1/nij/Mesko/207977.pdf
Mkilindi, A.M. (2014).Assessment of the role of private security Companies in the enhancement of public Security: the case of Ultimate Security Company in Kinondoni Municipal council.[Unpublished master's thesis]. Mzumbe University.
Murunga, P. (2014).The Effects of Working Conditions of Private Security Personnel on Service Delivery: Case of Secure Force Security Company - Nairobi County.[Unpublished master's thesis]. Kenyatta University.
Nyaura, J.E., & Ngugi, M.N. (2014). Challenges faced by the local private security guards (“watchmen”) in Eldoret Municipality, Kenya, towards community policing: A Criminological Perspective.Elixir International Journal71 (2014) 24803-24806 https://www.elixirpublishers.com/articles/1402117362_71%20(2014)%2024803- 24806.pdf
O’Sullivan, E., Rassel, G.,, Berner,M., & Taliaferro,J.D., (2017).Research Methods for Public Administrators.(6th ed) published 2017 by Routledge 711 Third Avenue, New York, NY 10017
Odhiambo, M. W., Gachoka, H. G., & Rambo, C. M. (2018). Relationship between Age Diversity and Employee Performance of Public Universities in Western Kenya.International Journal of Academic Research in Business and Social Sciences, 8(11), 223-248.
Omotoso, O., &Aderinto, A. A. (2016). Challenges of Providing Security in Lagos State: The Case of Corporate Private Security Organizations.African Journal of Criminology & Justice Studies,9(1): 1-18.
Otolorin, G.E., (2017). Determinants of Human Insecurity in Nigeria and their impact on Economic Growth. A Paper presented at the Nigeria Economic Society"s South-South economic conference (SSREC). Port-Harcourt, Nigeria. Available at SSRN: https://ssrn.com/abstract=
Oyagi, K. (2020). Effects of Private Security Companies on Enhancement of Public Security and Safety in Dar Es Salaam, Tanzania: Case Study of Ilala Municipality.International Journal of Research in Commerce and Management Studies, 2(5),
Peters, H., M. (2021). Department of Defense Contractor and Troop Levels in Afghanistan and Iraq: 2007-2020.Congressional Research Service. Retrieved from https://sgp.fas.org/crs/natsec/R44116.pdf
Prenzler, T. (2009). Strike Force Piccadilly: a public-private partnership to stop ATM ram raids. Policing:An International Journal of Police Strategies & Management, Vol. 32 Iss: 2, pp.209 - 225
Private Officer International (POI), (2013). Embracing Private and Public security collaboration. Retrieved from http://privateofficernews.wordpress.com/category/policesecurity-cooperation
Proclamation No. 313/2003. Federal Police Commission Proclamation. Federal Negarit Gazette of the Federal Democratic Republic of Ethiopia. Retrieved from https://chilot.me/wp-content/uploads/2011/07/proc-no-313-2003-federal-police- commission.pdf
Proclamation No. 804/2013. National Intelligence and Security Service Reestablishment Proclamation. Federal Negarit Gazette of the Federal Democratic Republic of Ethiopia. Retrieved from https://chilot.files.wordpress.com/2014/09/proclamation-no-804-2013- national-intellegence-and-security-services-establishment.pdf
Rees, T., J., (2009). Is Personal Insecurity a Cause of Cross-National Differences in the Intensity of Religious Belief?Journal of Religion and Society,Volume 11 (2009).
Richards, A. & Smith, H., (2007).Addressing the role of private security companies within security sector reform programmes', Saferworld, London
Ronald, B. (2014. The Evolving Boundaries of Defence: An Assessment of Recent Shifts in Defence Activities (Contributions to Conflict Management, Peace Economics and Development, Vol. 23), Emerald Group Publishing Limited, Bingley, pp. 271-273. Retrieved from https://doi.org/10.1108/S1572-832320140000023017
Saunders, M. (2019). Chapter 4:Understanding research philosophy and approaches to theory development.In Lewis, P, Thonhill, A & Bristow, A (Eds), Research Methods for Business Students" (pp. 128-171). London, United Kingdom: Pearson Education.
Saunders, M., Lewis, P. & Thornhill, A. (2012).Research Methods for Business Students. Pearson Education Ltd., Harlow. Retrieved from https://www.researchgate.net/publication/330760964_
Schnabel, A & Pedrazzini, Y. (2014). Operationalizing Human Security: Concepts, Analysis, and Applications. Swiss Peace Foundation, 20(1). Retrieved from https://www.dcaf.ch/operationalizing-human-security-concept-analysis-application#
Shahrbanou,T, (2005). Human Security: Concepts and Implications with an Application to Post-Intervention Challengesin Afghanistan. N117-118. Retrieved from https://www.sciencespo.fr/ceri/sites/sciencespo.fr.ceri/files/etude117_118.pdf
Silverman, D &Marvasti, A. (2008). Doing qualitative research: A comprehensive guide.(2nd ed.). California, USA: Sage Publications, Inc.
Solomon, H. (2010). The Status of Private Security Companies in Ethiopia: The Case of Addis Ababa.An Anthology of Peace and Security Research, IPSS, in collaboration with Friedrich Ebert Stiftung, 1(1),
South N. (1988).Policingfor Profit: The Private Security Sector. New Delhi: SAGE.
Sparrow, M.K. (2014). Managing the Boundary between Public and Private Policing.National Institute of Justice, 1(2). Retrieved from https://www.ncjrs.gov/pdffiles1/nij/247182.pdf
Strauss, A., & Corbin, J. (1998).Basics of qualitative research: Techniques and procedures for developing grounded theory(2nd ed.). Sage Publications, Inc.
Strom et al. (2010). Private Security Industry: A Review of the Definitions, Available Data Sources, and Paths Moving Forward. Virtual Library of US Department of Justice, 1(1). Retrieved from https://www.ojp.gov/ncjrs/virtual-
library/abstracts/private-security-industry-review-definitions-available-data-sources
Swaen, B. (2021). Scriber: Constructing a conceptual framework. Retrieved from https://www.scribbr.com/methodology/conceptual-framework/
Swiss Federal Department of Foreign Affairs (DCAF). (2015). Montreux Document Forum. Retrieved from https://www.montreuxdocument.org/news/regional- conference-pmscs-addis-ababa.html
The Danish Institute for Human Rights (DIHR), (2019). Annual report 2019. Retrieved from https://www.humanrights.dk/publications/annual-report-2019
The Economist, (2003). Defense Contractors: Military-industrial complexities. Retrieved from https://www.economist.com/business/2003/03/27/military-industrial-complexities
Tongco, M. D. C. (2007). Purposive Sampling as a Tool for Informant Selection.Ethno botany Research and Applications,5, 147-158. Retrieved from https://ethnobotanyjournal.org/index.php/era/article/view/126
United Nations Development Programme (UNDP), (1994). UN-I Library: Human Development Report 1994. Retrieved from DOI: https://doi.org/10.18356/87e94501- en
United Nations Trust Fund for Human Security (UNTFHS), (2005). Human security in theory and practice. Application of the Human Security Concept and the United Nations Trust Fund for Human Security.
Vigil, P.R.O., (2019). The history of security the Security Industry. [Weblog]. Retrieved from https://pro-vigil.com/blog/security-industry-history/
Wakefield, A. (2003). Selling security: the private policing of public space. Willan Publishing. Retrieved from: https://researchportal.port.ac.uk/en/publications/selling-security-the- private-policing-of-public-space
World Health Organization (WHO), (2002). Health and human security World Health Organization, Regional Office for the Eastern Mediterranean. Retrieved from https://apps.who.int/iris/handle/10665/200730
World Population Review,(2021). Addis Ababa Population 2021. Retrieved from. https://worldpopulationreview.com/world-cities/addis-ababa-population
Zohrabi, M. (2013). Mixed Method Research: Instruments, Validity, Reliability and Reporting Findings.Theory and Practice in Language Studies, 3(2), 254-262.
Zukauskas, P, Vveinhardt, J &Andriukaitiene, R. (2018). Philosophy and Paradigm of Scientific Research, Management Culture and Corporate Social Responsibility.Intech Open,1(1). Retrieved from https://www.intechopen.com/chapters/58890
Annexes
Ethiopian Civil Service University
College of Leadership and Governance
African Institute of Governance and Development (AIGD) Peace and Security Study Department
Annex I.Questionnaires to be filled by Security personnel’s
Dear respondent,
I am a student at Civil Service University Master of Art in Peace and Security Study. I am currently researching as part of the requirement to complete my second-degree studies; my research title is “The Role of PSCs in Enhancing Community Security: The Case of Yeka Sub City, Addis Ababa”. The research is purely for academic purposes and the responses you give will be treated with the utmost confidentiality. Your identity will also be kept anonymous in the final report.
Illustrations are not included in the reading sample
Annex II.Key Informant Interview Guide for PSCs Managers, community members, and police officers
Illustrations are not included in the reading sample
Annex III. Problem and Objective Trees
Figure 12. Problem Tree
Illustrations are not included in the reading sample
Source: Adapted from literature review and Own Articulation, 2022
Figure 13. Objective Tree
Illustrations are not included in the reading sample
Source: Adapted from literature review and Own Articulation, 2022
[...]
- Arbeit zitieren
- Gebru Zerabruk (Autor:in), 2022, The Role of Private Security Agencies in Enhancing Community Security, München, GRIN Verlag, https://www.grin.com/document/1373516
-
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen. -
Laden Sie Ihre eigenen Arbeiten hoch! Geld verdienen und iPhone X gewinnen.