Nigeria’s Security Challenges

Nigeria ◽  
2018 ◽  
Author(s):  
John Campbell ◽  
Matthew T. Page

Some of Nigeria’s greatest security threats—such as Boko Haram and militancy in the oil-rich Niger Delta—routinely grab international headlines. Others, like deadly communal conflict and violent crime, rarely do. Nevertheless, these security challenges have something in common: all are a product of Nigerian state...

2018 ◽  
Vol 4 (2) ◽  
pp. 15
Author(s):  
Chris I. Nwagboso

This paper examines the various internal security challenges confronting Nigeria in the 21st century. The paper adopts historical method and content analysis to investigate how the abysmal failure of the poorly formulated and ineffectively implemented National Security Policy has hitherto exacerbated internal security challenges in Nigeria. The paper further attempts a critical review of major internal security challenges hitherto confronting the country; such as the Niger Delta crises, kidnapping in the South-East geo-political zone, Jos crises, Boko Haram crises and crises by Fulani Herdsmen in the Northern part of Nigeria. The result of the analysis shows that these internal security challenges have not only been difficult to address by the National Security Policy, but have also impacted negatively on the country's desired socio-economic development in the 21st century. The paper, therefore, recommends among others, the need for a careful review of the Nigeria's National Security Policy that will not only be integrative/comprehensive in outlook, but will also take cognizance of some domestic factors that are currently responsible for internal security problems in the country; such as unemployment, inequality, poverty, fraudulent electoral process, corruption, skewed federalism, porous nature of the Nigeria’s borders, sabotage among politicalelites, bad governance, religious intolerance, citizen-settler controversies, among others.


Author(s):  
Ejiroghene Augustine Oghuvbu

Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and threaten the very existence of Nigeria as a federation. Against this backdrop, this paper therefore attempts to identify some of the emerging trends of security challenges in Nigeria with a view to diagnosing their causes and examining their implications on the corporate existence of Nigeria. This paper adopted the analytical method and relied on the natural theory of state to posit that the solution to the disturbing trend of security challenges in Nigeria is employment generation and genuine implementation of poverty alleviation programmes in the polity


2021 ◽  
Vol 37 ◽  
pp. 423-451
Author(s):  
Norman Sempijja ◽  
Collin Olebogeng-Mongale

The post-cold war period has witnessed an evolution in the nature of conflict from the new wars of the 1990s to asymmetric conflicts involving the weaponisation of civilians. This has achieved the twin objective of operating within the ranks of the combatants (in the case of women) as wives and child-bearers of the fighters, and inflicting harm on adversaries through suicide attacks. The weaponisation of women in the case of the wars in Syria and Nigeria has therefore elicited both human security challenges for the communities being targeted, and for the weaponised women. The biggest dilemma facing states of origin has been whether to accept the weaponised women’s return and rehabilitate them or declare them stateless. There has been a clear tendency to securitise them, especially when internal political dynamics are factored in. This qualitative study uses a case study approach to delve into the human security challenges emanating from the weaponisation of women in the case of Boko Haram and the Islamic State between 2001 and 2018. The paper further relies on content analysis to delve deeper into the discourse on human security. Through the use of a human security conceptual framework and securitisation theory, the paper argues that although once weaponised, some women become human security threats to targeted communities, and also face human security challenges during and after the insurgency, there is a need to deal with the women on a case-by-case basis rather than pursuing a blanket policy of securitising them. States need to work with international organisations to action processes aimed at delivering justice, demobilisation, rehabilitation, and the reintegration of these women. This will uphold international law and respect for human rights.


Unity Journal ◽  
2021 ◽  
Vol 2 ◽  
pp. 251-262
Author(s):  
Sumitra Karki

Nepal has been a home to diversified settlement in terms of ethnicity, religion, dialect and culture since its outset in civilization. It also lies between two great military and economic giants of Asia – India and China – that are hostile to each other. While these bring abundant opportunities for Nepal, it possesses several internal and external security threats. Nepal suffers from cyber-attack, environmental degradation, pandemic, ethnic, racial or religious conflicts, inequality and poverty, extremism, human trafficking, corruption, migration and trans-boundary crime. In addition, Nepal also faces several security threats, traditional and non–traditional, including terrorism and insurgency. These threats possess serious implications on peace and security of Nepal and the South Asian region. There is a need of serious study about the major internal and external security challenges that Nepal faces in recent decades. This study aims at examining some of the major security challenges, explore the factors behind it, and attempt to suggest few policy recommendations to the government of Nepal to deal with them. The study is conducted by reviewing the primary and secondary sources of data. The primary data includes documents of the government agencies, press release, joint statement and organizational reports. It also includes the interviews with security experts, bureaucrats, policy makers and academicians. Similarly, secondary data includes books, news reports, academic journals, seminars report and reports of research institutes and think tanks. The study highlights that Nepal should prepare itself to meet with the emerging internal and external security challenges what have emerged in recent times. With the rise of India and China, two adversarial powers in the region, Nepal possess extreme challenges in days to come. Similarly, hardly any countries of the world had prepared itself to deal with recent pandemic like COVID-19 that has shattered even the most powerful countries of the world. Taking lessons from these, it is time for Nepal to learn and prepare to mitigate the challenges.


2014 ◽  
Vol 1 (4) ◽  
pp. 129-138
Author(s):  
Marius Ikpe ◽  
Alwell Nteegah

Social insecurity has in recent time constituted a major hurdle to the Nigeria authorities.  Theoretically, it is believed to have a strong negative link with Foreign Direct Investment (FDI) and levels of economic growth. This in Nigeria’s context ranges from Niger Delta crises, to the un-going Boko-Haram Islamists Militants insurgency. Given paucity of empirical literature on this line of investigation into this form of socioeconomic problem, this study empirically examines the link amongst social insecurity, FDI and growth of the Nigerian economy. The study adopted the Augmented Cob-Douglas production function in its analysis, introducing the variable (social insecurity) into the FDI model and subsequently traces its impact on economic growth. Result indicates that social insecurity stimulates the inflow of foreign technology, rather than inhibit it. The paper attributes this to merging of these distinct forms of social insecurity in the study and consequently recommend an explicit examination of these forms of social insecurity-FDI association Nigeria.DOI: http://dx.doi.org/10.3126/ijssm.v1i4.10944 Int. J. Soc. Sci. Manage. Vol-1, issue-4: 129-138 


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Author(s):  
Mohammad Tariq Banday

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.


Author(s):  
Danilo Mandić

This chapter focuses on West Africa during 1989–2019. West Africa's transnational smuggling enterprises are hardly a novelty — or as menacing as they sound. Troc, or barter trade, is a way of life that preceded and survived colonialism. Commerce is known as al-frud, from the French fraude (fraud), reflecting the World War II-era tradition of regional smuggling. What is new in the globalized period is that mafias in five nations — and just as many budding ones — have played formative roles in regional politics. Three of the host states (Mali, Senegal, and Nigeria) were significantly torn by ethnocentric, separatist-controlled rackets in drugs and migrants (Azawad), marijuana (Casamance), and extortion (Boko Haram). Nigeria employed ethnocentric Niger Delta mafias to fight its northern separatists. In Niger's Agadez and Cameroon's Ambazonia, however, organized crime promoted cohesion.


Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 203
Author(s):  
Antonio López Vivar ◽  
Alberto Turégano Castedo ◽  
Ana Lucila Sandoval Orozco ◽  
Luis Javier García Villalba

Smart contracts have gained a lot of popularity in recent times as they are a very powerful tool for the development of decentralised and automatic applications in many fields without the need for intermediaries or trusted third parties. However, due to the decentralised nature of the blockchain on which they are based, a series of challenges have emerged related to vulnerabilities in their programming that, given their particularities, could have (and have already had) a very high economic impact. This article provides a holistic view of security challenges associated with smart contracts, as well as the state of the art of available public domain tools.


Author(s):  
Felix Chidozie Chidozie ◽  
Augustine Ejiroghene Oghuvbu

This chapter addresses the under-reportage of the challenges confronting the male population of the IDPs by the mainstream media in Nigeria. It argues that the challenges facing the IDPs as a result of the Boko Haram terrorism, natural and man-made disasters, as well as the Hausa-Fulani mayhem, are peculiar to all the IDPs irrespective of demographic disparities. With the aid of 256 copies of questionnaires distributed among the male population of IDPs, recording 100 percent return rate and interviews conducted at Durumi Area One IDPs Camps in Abuja, FCT, the study answered the research questions posed here. Findings show that the plights of the male population of the IDPs ranging from hunger, starvation, water, electricity, accommodation shortages, and lack of sustainable occupation, portend serious human security threats for the country. It proposes policy-relevant actions for the government and other related agencies working with the IDPs; while concluding the role of media in trumpeting the challenges of the male population of the IDPs will mitigate their plights.


Sign in / Sign up

Export Citation Format

Share Document