Social Media Influence on Personal Security among the Youth in Nairobi City County, Kenya

  • Sally Soita Kenyatta University
  • Harrison Njoroge, PhD Kenyatta University
Keywords: Social Media, Personal Security, PCAK, Cyber Security, Youth, Law Enforcement, Nairobi, Cyberspace, Physical Space, Cyber Security and Technology
Share Article:


This study examined positive uses of social media that include warning and preventing individuals from violence resulting from negative uses of social media and user victimisation. The study was guided by Space transition theory which states that criminals are more likely to commit crimes in cyberspace more than in physical space due to anonymity and identity flexibility. The objective of the study was to determine the forms of social media use among the youths in Nairobi County. The target population were members of the Professional Criminologists Association of Kenya (PCAK). Purposive sampling was used to select 155 youth respondents from a population of 15000 youths and 145 law enforcement informant interviewees drawn from 2,000 law enforcement officers in PCAK in Nairobi County. Piloting of the questionnaire was disseminated among 30 PCAK youths Nakuru chapter. The research instruments were verified by the supervisor for content validity. Statistical Packages for Social Sciences, SPSS and Microsoft Excel software were used in data entry and descriptive statistics were used to analyse the data. Qualitative data were analysed using content analysis, coding, classification, and text inferencing. This study was significant to academic research, criminal justice practitioners and the private sector to assist in goal formulation and achievement of cyber security. The results of this research showed that the form of social media that youth mostly prefer +are WhatsApp over other social media platforms. The most preferred social media platforms by both genders were found to be WhatsApp and Twitter. It was recommended that future research could focus on the modern methods of social media as technology is dynamic. This will give direction on the contemporary forms of social media and their relationship to personal security; this, in turn, improves the security settings suitable for the users


Download data is not yet available.


Aissani, R., & Dheyab Abdullah, A. (2018). Motives for the use of Twitter by Arab youth. Communication Today, 9(1).

Akakandelwa, A., & Walubita, G. (2017). Students’ social media use and its perceived impact on their social life: A case study of the University of Zambia. The International Journal of Multi-Disciplinary Research, (October), 1–14.

Alava, S., Frau-Meigs, D., & Hassan, G. (2017). Youth and violent extremism on social media: mapping the research. UNESCO Publishing.

Bake. (2018). State of the Internet in Kenya 2017, 33.

Bichir, V. (2011). The social and economic impact of internet social networks: Survey on Facebook network. International Conference Modern Approaches in Organisational Management and Economy. 5, pp. 74-77. Bucharest, Romania: Faculty of Management, Academy of Economic Studies.

Byrne, E., Vessey, J. A., & Pfeifer, L. (2018). Cyberbullying and social media: Information and interventions for school nurses working with victims, students, and families. The Journal of School Nursing, 34(1), 38-50.

Calbalhin, J. P. (2018). Facebook User’s Data Security and Awareness: A Literature Review. Journal of Academic Research, 2(June 2018), 1–13.

Chytiri, A. P. (2015). Hotel Recruitment and Selection Practices: The case of Greek Hotel Units/Chains Vs Foreign Hotel Units/Chains in Greece (Doctoral dissertation, University of Kent).

De Jong, K. (2019). Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Dillman, D. A., & Smyth, J. D. (2007). Design effects in the transition to web-based surveys. American Journal of Preventive Medicine, 32(5), S90–S96.

Endeley, R. E. (2018). End-to-end encryption in messaging services and national security—case of WhatsApp messenger. Journal of Information Security, 90(01), 95.

Feuls, M., Fieseler, C., & Suphan, A. (2014). A social net? Internet and social media use during unemployment. Work, employment and society, 28(4), 551-570.

Hay, C., & Ray, K. (2020). General strain theory and cybercrime. The Palgrave handbook of international cybercrime and cyberdeviance. 583-600.

Herrero-Diz, P., & Ramos-Serrano, M. (2018). Breaking stereotypes online: young activists’ use of the internet for social well-being. Catalan Journal of Communication & Cultural Studies, 10(1), 99-114.

Hufnagel, S., Moiseienko, A., Leukfeldt, R., & Kleemans, E. R. (Edward). (2019). Cybercrime, money mules and situational crime prevention. Criminal Networks and Law Enforcement, (June), 75–89.

Irshad, S., & Soomro, T. R. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43.

Jainshankar, K. (2008). Space Transition Theory. Crimes of the Internet, (January 2008), 283–301. Retrieved from

Jeesmitha, P. S., & Com, M. (2019). The impact of social media. International Journal of Scientific Research and Engineering Development, 2(1), 229–235.

Jisha, K., & Jebakumar. (2014). Whatsapp: A Trend Setter in Mobile Communication among Chennai Youth. IOSR Journal of Humanities and Social Science (IOSR-JHSS), 19(9), 01-06.

Kelfve, S., Kivi, M., Johansson, B., & Lindwall, M. (2020). Going web or staying paper? The use of web-surveys among older people. BMC Medical Research Methodology, 20(252).

Kerlinger, F. N., & Lee, H. B. (2000). Foundations of behavioral research (4th ed.). Holt, NY: Harcourt College Publishers.

Kižina, S. (2015). Social Media as a New Propaganda.

Kumar, S., & Somani, V. (2018). Social Media Security Risks, Cyber Threats and Risks, (May).

Lindemann, N. (2021, August 9). What’s The Average Survey Response Rate? [2021 Benchmark].

Mohsin Alvi. (2016). A Manual for Selecting Sampling Techniques in Research. University of Karachi, Iqra. University. In Munich Personal RePEC Archive (pp. 1–56).

Nilan, P., Burgess, H., Hobbs, M., Threadgold, S., & Alexander, W. (2015). Youth, social media, and Cyberbullying Among Australian Youth: “Sick Friends”. Social Media and Society, 1(2).

Nishad, M. (2018). A Review Paper on Phishing Through E-Mail, (1), 1–2.

Ogunlana, S. O. (2019). Halting Boko Haram/Islamic State’s West Africa Province Propaganda in Cyberspace with Cybersecurity Technologies. Journal of Strategic Security, 12(1), 72-106.

Olofinbiyi, S. A. (2021). Exploring Youth Awareness of Cybercrime and Factors Engendering its Proliferation in Nigeria. African Renaissance, 18(4), 319-342.

Omede, A. J., & Alebiosu, E. A. (2020). Social Media and Boko Haram Insurgency in Nigeria. Fuwukari International Journal of Sociology and Development, 1(2), 1-12.

PCAK. (2021, April 22). Recruitment, Vetting and Approval Model.

Petherick, W. (2017). Victim Precipitation: Why we need to Expand Upon the Theory. Forensic Research & Criminology International Journal, 5(2), 2–4.

Project, D. C., Waal, A. De, & Gideon, C. (2018). The Culture of Terrorist Propaganda in Sub-Saharan Africa A Case Study on AlShabaab Use of Communication Technologies in Somalia and Kenya.

Richins, S. (2015). Social Media Use in Health. Emerging Technologies in Healthcare, (March), 81–86.

Shaari, A. H., Kamaluddin, M. R., Paiz Fauzi, W. F., & Mohd, M. (2019). Online dating romance scam in Malaysia: An analysis of online conversations between scammers and victims. GEMA Online Journal of Language Studies, 19(1), 97–115.

Shava, H., & Chinyamurindi, W. T. (2018). Determinants of social media usage among a sample of rural South African youth. SA Journal of Information Management, 20(1), 1–8.

Silva, C. (2017). Research Design - The New Perspective of Research Methodology. British Journal of Education, Society & Behavioural Science, 19(2), 1–12.

SIMElab Africa. (2019). The Kenyan Social Media Landscape: Trends and Emerging Narratives, 2020. Nairobi: USIU.

Soomro, T. R., & Hussain, M. (2019). Social Media-Related Cybercrimes and Techniques for Their Prevention. Applied Computer Systems, 24(1), 9–17.

Tamori, A., Bhujade, R. K., Sinhal, A., & Professor, A. (2018). Analysis of Whatsapp Security. International Journal of Ethics in Engineering & Management Education Website: Www.Ijeee.In, 5(6), 2348–4748. Retrieved from

Throuvala, M. A., Griffiths, M. D., Rennoldson, M., & Kuss, D. J. (2021). Perceived challenges and online harms from social media use on a severity continuum: a qualitative psychological stakeholder perspective. International journal of environmental research and public health, 18(6), 3227.

Udenze, S. (2017). Is WhatsApp messaging subsuming conventional SMS? International Journal of Advanced Research and Publications, 2(3), 20-25.

Uhls, Y. T., Ellison, N. B., & Subrahmanyam, K. (2017). Benefits and costs of social media in adolescence. Pediatrics, 140(Supplement 2), S67-S70.

Waechter, N. (2021). Gendered social media cultures between individuality and collectively. In Forms of Collective Engagement in Youth Transitions (pp. 185-206). Brill.

Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims – both financial and non-financial. Criminology and Criminal Justice, 16(2), 176– 194.

28 February, 2023
How to Cite
Soita, S., & Njoroge, H. (2023). Social Media Influence on Personal Security among the Youth in Nairobi City County, Kenya. East African Journal of Information Technology, 6(1), 1-14.