scholarly journals Examining the Human Security Challenges Emanating from the Weaponisation of Women. A Case study of Boko Haram and the Islamic State 2001-2018

2021 ◽  
Vol 37 ◽  
pp. 423-451
Author(s):  
Norman Sempijja ◽  
Collin Olebogeng-Mongale

The post-cold war period has witnessed an evolution in the nature of conflict from the new wars of the 1990s to asymmetric conflicts involving the weaponisation of civilians. This has achieved the twin objective of operating within the ranks of the combatants (in the case of women) as wives and child-bearers of the fighters, and inflicting harm on adversaries through suicide attacks. The weaponisation of women in the case of the wars in Syria and Nigeria has therefore elicited both human security challenges for the communities being targeted, and for the weaponised women. The biggest dilemma facing states of origin has been whether to accept the weaponised women’s return and rehabilitate them or declare them stateless. There has been a clear tendency to securitise them, especially when internal political dynamics are factored in. This qualitative study uses a case study approach to delve into the human security challenges emanating from the weaponisation of women in the case of Boko Haram and the Islamic State between 2001 and 2018. The paper further relies on content analysis to delve deeper into the discourse on human security. Through the use of a human security conceptual framework and securitisation theory, the paper argues that although once weaponised, some women become human security threats to targeted communities, and also face human security challenges during and after the insurgency, there is a need to deal with the women on a case-by-case basis rather than pursuing a blanket policy of securitising them. States need to work with international organisations to action processes aimed at delivering justice, demobilisation, rehabilitation, and the reintegration of these women. This will uphold international law and respect for human rights.

Author(s):  
Audu Bako Susan ◽  
Chijioke, N. Joy ◽  
Uwakwe Stanley Ikechukwu

The deep and far-reaching fear, chaos and uncertainties related to the Boko Haram insurgency make an empirical study of its impacts significant. Boko Haram insurgency has not only resulted in many deaths but has adversely affected agricultural production in Nigeria and distorted local economy. The Global Terrorism Index (GTI) said Boko Haram has killed more people than any other terrorist group in the world, including the Islamic State. Boko Haram is also responsible for deaths and deprivation in an indirect way of starve-killing. Their operations have caused food shortages, created food insecurity in Nigeria resulting in many farmers either being killed, displaced or their livelihoods destroyed. Infrastructural facilities on the other hand, as well as businesses have not been spared of the devastating impacts of the Boko Haram insurgency. This study strategically examined the effectiveness of security agencies management of Boko Haram insurgencies, identified its impact and examined the best management mechanisms for the insurgency, within the contextual preview of Abuja metropolis. The study adopted a quantitative research design of purposive sampling approach and discovered from the research that attacks on the metropolis resulted in urban dislocation and migration. It therefore recommends increased security partnership, improved welfare for security agencies, training of security agencies in intelligence gathering and management, encourage and strengthen grass root community policing.


2021 ◽  
Vol 6 (1) ◽  
pp. 136-155
Author(s):  
Norliza Dolhan ◽  
Zarina@Zairina Othman ◽  
Nor Azizan Idris

Background and Purpose: In the modern globalisation epoch, security threats no longer concern the state’s hostilities, military operation, or nuclear proliferation. It involves non-traditional menaces like human trafficking, which is believed to escalate quickly. The goal of this research is to identify human trafficking activities and to reveal the experiences of victims in the Southeast Asia region, particularly in Malaysia.   Methodology: This study used a qualitative method through a case study approach. It involved an in-depth interview session with five primary informants (represented as Cases 1 to 5) who were the victims of human trafficking from Bangladesh, a government officer from related agency, two local academicians and a representative of Bangladesh foreign workers’ vending system company.   Findings: The study discovered that human trafficking crimes produce detrimental effects on the survival of the victims, especially on the economic and individual security aspect. Their wages are not fully paid and their freedom to socialize is restricted.   Contribution: This study calls for policy formulation and policy implementation to protect the interest and security of people despite their citizenship which is considered the most trustworthy, relevant and universal approach in rectifying these illegal activities within Southeast Asia region especially in Malaysia. Keywords: Bangladesh, labour migration, human security, human trafficking.   Cite as: Dolhan, N., Othman, Z., & Idris, N. A. (2021). Human trafficking and human security in Southeast Asia: A case study of Bangladeshi foreign workers in Malaysia. Journal of Nusantara Studies, 6(1), 136-155. http://dx.doi.org/10.24200/jonus.vol6iss1pp136-155


Author(s):  
Felix Chidozie Chidozie ◽  
Augustine Ejiroghene Oghuvbu

This chapter addresses the under-reportage of the challenges confronting the male population of the IDPs by the mainstream media in Nigeria. It argues that the challenges facing the IDPs as a result of the Boko Haram terrorism, natural and man-made disasters, as well as the Hausa-Fulani mayhem, are peculiar to all the IDPs irrespective of demographic disparities. With the aid of 256 copies of questionnaires distributed among the male population of IDPs, recording 100 percent return rate and interviews conducted at Durumi Area One IDPs Camps in Abuja, FCT, the study answered the research questions posed here. Findings show that the plights of the male population of the IDPs ranging from hunger, starvation, water, electricity, accommodation shortages, and lack of sustainable occupation, portend serious human security threats for the country. It proposes policy-relevant actions for the government and other related agencies working with the IDPs; while concluding the role of media in trumpeting the challenges of the male population of the IDPs will mitigate their plights.


2020 ◽  
Vol 37 (1) ◽  
Author(s):  
Awino Okech

This paper focuses on contemporary challenges to the human security framework through an examination of asymmetrical conflict generated by extremist insurgents, specifically Al Shabaab in Kenya. The political and security dynamics generated by extremist groups often find reinforcement in local contestations over power and territory, resulting in an interaction between local and 'external'. It is the product of these interactions in the form of opportunities, resultant discourses, responses and what they offer to an expansion of normative ideas about human security and conflict that this paper focuses on. Using Kenya as a case study, this paper explores the interface between the growth of Al Shabaab, securitisation of governance and political elite consensus on the policy relationship between human security versus a state security model. This paper pursues the argument that the rise in the intensity and nature of Al Shabaab attacks in Kenya has influenced the interpretation of the country's security  threats and the application of strategies. Rather than aiding the application of human security as central to national security, it has rolled back previous gains.


Author(s):  
John C. Pendergrass ◽  
Karen Heart ◽  
C. Ranganathan ◽  
V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.


Nigeria ◽  
2018 ◽  
Author(s):  
John Campbell ◽  
Matthew T. Page

Some of Nigeria’s greatest security threats—such as Boko Haram and militancy in the oil-rich Niger Delta—routinely grab international headlines. Others, like deadly communal conflict and violent crime, rarely do. Nevertheless, these security challenges have something in common: all are a product of Nigerian state...


2018 ◽  
Vol 62 (2) ◽  
pp. 225-253 ◽  
Author(s):  
Joy Ngozi Ezeilo ◽  
Uchechukwu Nwoke ◽  
Sylvester Ndubuisi Anya

AbstractSecurity challenges have continued to trouble governments internationally. From the Islamic State terrorists in the Gulf region, to the murderous activities of Boko Haram and “herdsmen” in Nigeria in recent times, it has become imperative for those entrusted with maintaining security to redefine the conditions of national security. In this context, it is now conventional for various governments in Nigeria to appropriate enormous amounts of money in their budgets for “national security” (“tagged security vote”). This article explores the emergence, configuration, constitutionality and abuses of security votes in Nigeria. It also explores the appropriation and expenditure of security funds in the USA and attempts to draw lessons from this jurisdiction. It argues that there is a robust connection between security votes and corruption and, thus, attempts to identify legal structures for preventing the misspending and embezzlement of public funds (security votes) in the country's monetary appropriation and expenditure.


2020 ◽  
pp. 349-360
Author(s):  
Artur Wejkszner

This article analyzes the rise and evolution of Boko Haram, a Nigerian jihadist organization operating since March 2015 under the banner of Islamic State. The key changes in the ideology, tactics, and goals of Boko Haram have been identified providing in-depth insight into how and why the organization has evolved. The evolution of jihadist activity of Boko Haram included at least two dimensions: firstly – the extreme radicalization of paramilitary struggle manifested in the massacres of civilians in rural areas; and secondly – the feminization of jihadist activity with special regard to the involuntary participation of young women in suicide bombings. The analysis of the facts discussed in the article is based on one of the qualitative scientific methods, namely case study. The main reason to apply this method is the need to investigate the above-mentioned changes in the activity of Islamic terrorists within the time limits indicated in the title of the article.


2021 ◽  
Author(s):  
Lydie Belporo

In the countries of the Lake Chad Basin, Boko Haram’s emergence has created major new security challenges for the region’s governments. Cameroon’s Far North region, the most populous in the country, is at the heart of these security issues. Since late 2020, Boko Haram has intensified attacks in Far North localities with assassinations targeting civilians, kidnappings, and looting in small towns along the Nigerian border. In response, the Cameroonian government has pursued a hardline strategy and militarized the affected localities. In addition to arbitrary arrests, prolonged pre-trial detention, prison overcrowding, and the death penalty are all sources of concern. This policy note outlines core findings from a case study of the Boko Haram ex-associates reintegration process in Cameroon. The note examines how existing community norms or mechanisms might be as useful as more standard approaches to disarmament, demobilization, and reintegration (DDR) in addressing challenges presented by Boko Haram ex-associates in Cameroon.


FIKRAH ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Iu Rusliana ◽  
Dadang Kahmad

<span lang="EN-MY">This study aims to reveal the religious understanding of millennials (focus on ‘Rohis’ in senior high school) in Bandung. The authors will try to analyze how the views and attitudes of millennials towards several issues consisting of Islamic law, religious freedom, tolerance, and Pancasila. The research methodology used is a case study approach. Also, data is collected through in-depth interviews, focus group discussions, and observations. This study found that the majority of millennials in Bandung have inclusive and moderate understanding. The majority of them reject various ideas and discourses such as the Islamic state, intolerance, violence in the name of religion, and to replace Pancasila as the principle of the nation. Besides, they also rejected several radical groups that wanted to replace the basis of the nation. However, some students approve the existence of hard-line groups and they agree to replace Pancasila as the basis of the Indonesian nation</span>


Sign in / Sign up

Export Citation Format

Share Document