The Northern West part of Nigeria is faced with several security challenges that have threatened the existence of peace and security in the region. These threats to public safety and regional security have greatly undermined the governments primary responsibility of guaranteeing public safety and national security. This work, therefore, is on the prognosis of theories of intelligence in counterterrorism The case of North Western Nigeria. The study utilised primary and secondary data sources. The Primary data sources were from questionnaires administered physically and electronically via emails while, secondary data came from published books, journals, articles, lecture guides and videos. Acquired data were statistically analysed using simple percentage and Chi Square statistics. Sequel to the statistical results, findings revealed that there is a significant relationship between intelligence gathering and terrorism in Nort West, Nigeria. The study recommends that there should be training and retraining of personnel of the intelligence community to be able to meet up with the current trends and changes in the contemporary Nigerian environments for the effective gathering of intelligence and the ability to utilize it for productive law enforcement. Jonjon, Emmanuel "Prognosis of Theories of Intelligence in Counter-Terrorism: The Case of the Northwestern Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40057.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/sociology/40057/prognosis-of-theories-of-intelligence-in-counterterrorism-the-case-of-the-northwestern-nigeria/jonjon-emmanuel
The document discusses crimes in Southwestern Nigeria. It finds that the once peaceful region is becoming the crime capital of the country, with increasing cases of kidnapping, cultism, land disputes, rape, oil bunkering, robbery, and other crimes. These crimes have led to loss of lives and property worth millions annually. The study examines the major causes of crimes in the region, such as unemployment, resource control issues, political parties support, and an unresponsive government. The effects of crime include business shutdowns, poor economic development, and increased poverty. The document recommends measures to curb crime like youth empowerment, job creation, educational reforms, and establishing grazing colonies and laws to protect farmers and herders.
The Role of Military Logistics Supports in Safeguarding National Security in ...ijtsrd
Traditionally, security is conceptualized within the context of the ability and capacity of the government to ensure the protection of their countries from internal insurrection or external aggression of any kind through adequate preparedness of the military to ensure intelligence gathering, secrecy and the protection of resources and rights considered critical to the existence of states. In this vein, the study examines the extent to which logistics supports from the Nigerian government to the Nigerian Armed Forces impacts the national security of the nation. The study delves to analyze the violent insurgencies and insecurity issues in the Niger Delta and the Boko Haram terrorism in the northeast, and how they have undermined Nigeria's national security. The paper adopts the Structural Functional theory to analyze the issues that facilitate the persistence of the insurgent groups in Nigeria. The study argues that in fighting insecurity in Nigeria the military personnel do not receive the needed logistics support promptly. Likewise, the paper highlights that the phenomenon of ethnicity and religious intolerance have led to incessant recurrence of ethnoreligious conflicts, which have claimed the lives of thousands of Nigerians, and birthed copious ethnic militias like the Movement for the Actualization of the Sovereign State of Biafra MASSOB , Boko Haram, and Niger Delta Avengers NDA , amongst others. The study, therefore, recommends that the Federal government should monitor the funds allocated to the defence sector and ensure proper accountability of such funds and that the government should facilitate the local production of arms by the Ministry of Defence this could be done through the government's proper funding and supervision of the activities of DICON, so as to boost the domestic production of arms and ammunition for use by the military and other related agencies all encapsulated within the Nigerian defence sector. Otu Offiong Duke "The Role of Military Logistics Supports in Safeguarding National Security in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26505.pdfPaper URL: https://www.ijtsrd.com/humanities-and-the-arts/political-science/26505/the-role-of-military-logistics-supports-in-safeguarding-national-security-in-nigeria/otu-offiong-duke
The document discusses the need for the National Defence College of Tanzania to conduct a study exploring Tanzania's security landscape and developing a Grand National Security Strategy. It notes that Tanzania faces increasing complex threats from changes in the global, regional and national environment. The study would examine how economic shifts towards mining and resources, societal changes from globalization, evolving political dynamics, and military needs overlap and impact Tanzania's security. The aim is to construct a holistic security framework that addresses both traditional and non-traditional threats to Tanzania's sovereignty, integrity and values in the 21st century.
Kenya Workshop 1540 Dual Benefit Assistancestimson
1) Donor governments prioritize counterterrorism and WMD nonproliferation, with vast resources committed.
2) UN Security Council Resolution 1540 calls on states to enact laws and enforce mechanisms to prevent non-state actors from acquiring WMD.
3) Capacity needs in Kenya include developing legal frameworks, border controls, and public health infrastructure to address security and development challenges like arms trafficking and disease.
Increase Wave of Violent Crime and Insecurity: A Threat to Socio-Economic Dev...iosrjce
This document summarizes a research paper that examines the increasing rate of violent crime in Nigeria and its implications for socio-economic development. It finds that violent crime such as armed robbery, kidnapping, and terrorism have risen dramatically in Nigeria and created a climate of fear that hinders business activity and discourages investment. If not properly addressed, the rising violent crime could threaten Nigeria's socio-economic development. The paper analyzes this issue using the relative deprivation theory, which posits that frustration from the gap between expectations and capabilities can increase aggression and violence. It recommends that the government must prioritize security by improving intelligence, training, resources for security agencies, and also work to reduce unemployment in order to decrease crime and support socio-economic
Securitization or Politicization of Movement System C paperFredric Stany
This document analyzes the securitization of Uganda's "Movement system" under President Yoweri Museveni. It examines Museveni's designation of multipartyism as an existential threat that could increase sectarianism and conflict. The paper seeks to determine if Museveni successfully securitized the Movement system to consolidate power and block multiparty democracy. It will analyze Museveni's speech acts linking opponents to past atrocities and potential sectarianism. It will also examine signs of public acceptance, including election results, fears of multipartyism, and the importance placed on reconciliation and security. The goal is to generate knowledge on securitization as a phenomenon in Ugandan politics.
The document discusses crimes in Southwestern Nigeria. It finds that the once peaceful region is becoming the crime capital of the country, with increasing cases of kidnapping, cultism, land disputes, rape, oil bunkering, robbery, and other crimes. These crimes have led to loss of lives and property worth millions annually. The study examines the major causes of crimes in the region, such as unemployment, resource control issues, political parties support, and an unresponsive government. The effects of crime include business shutdowns, poor economic development, and increased poverty. The document recommends measures to curb crime like youth empowerment, job creation, educational reforms, and establishing grazing colonies and laws to protect farmers and herders.
The Role of Military Logistics Supports in Safeguarding National Security in ...ijtsrd
Traditionally, security is conceptualized within the context of the ability and capacity of the government to ensure the protection of their countries from internal insurrection or external aggression of any kind through adequate preparedness of the military to ensure intelligence gathering, secrecy and the protection of resources and rights considered critical to the existence of states. In this vein, the study examines the extent to which logistics supports from the Nigerian government to the Nigerian Armed Forces impacts the national security of the nation. The study delves to analyze the violent insurgencies and insecurity issues in the Niger Delta and the Boko Haram terrorism in the northeast, and how they have undermined Nigeria's national security. The paper adopts the Structural Functional theory to analyze the issues that facilitate the persistence of the insurgent groups in Nigeria. The study argues that in fighting insecurity in Nigeria the military personnel do not receive the needed logistics support promptly. Likewise, the paper highlights that the phenomenon of ethnicity and religious intolerance have led to incessant recurrence of ethnoreligious conflicts, which have claimed the lives of thousands of Nigerians, and birthed copious ethnic militias like the Movement for the Actualization of the Sovereign State of Biafra MASSOB , Boko Haram, and Niger Delta Avengers NDA , amongst others. The study, therefore, recommends that the Federal government should monitor the funds allocated to the defence sector and ensure proper accountability of such funds and that the government should facilitate the local production of arms by the Ministry of Defence this could be done through the government's proper funding and supervision of the activities of DICON, so as to boost the domestic production of arms and ammunition for use by the military and other related agencies all encapsulated within the Nigerian defence sector. Otu Offiong Duke "The Role of Military Logistics Supports in Safeguarding National Security in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26505.pdfPaper URL: https://www.ijtsrd.com/humanities-and-the-arts/political-science/26505/the-role-of-military-logistics-supports-in-safeguarding-national-security-in-nigeria/otu-offiong-duke
The document discusses the need for the National Defence College of Tanzania to conduct a study exploring Tanzania's security landscape and developing a Grand National Security Strategy. It notes that Tanzania faces increasing complex threats from changes in the global, regional and national environment. The study would examine how economic shifts towards mining and resources, societal changes from globalization, evolving political dynamics, and military needs overlap and impact Tanzania's security. The aim is to construct a holistic security framework that addresses both traditional and non-traditional threats to Tanzania's sovereignty, integrity and values in the 21st century.
Kenya Workshop 1540 Dual Benefit Assistancestimson
1) Donor governments prioritize counterterrorism and WMD nonproliferation, with vast resources committed.
2) UN Security Council Resolution 1540 calls on states to enact laws and enforce mechanisms to prevent non-state actors from acquiring WMD.
3) Capacity needs in Kenya include developing legal frameworks, border controls, and public health infrastructure to address security and development challenges like arms trafficking and disease.
Increase Wave of Violent Crime and Insecurity: A Threat to Socio-Economic Dev...iosrjce
This document summarizes a research paper that examines the increasing rate of violent crime in Nigeria and its implications for socio-economic development. It finds that violent crime such as armed robbery, kidnapping, and terrorism have risen dramatically in Nigeria and created a climate of fear that hinders business activity and discourages investment. If not properly addressed, the rising violent crime could threaten Nigeria's socio-economic development. The paper analyzes this issue using the relative deprivation theory, which posits that frustration from the gap between expectations and capabilities can increase aggression and violence. It recommends that the government must prioritize security by improving intelligence, training, resources for security agencies, and also work to reduce unemployment in order to decrease crime and support socio-economic
Securitization or Politicization of Movement System C paperFredric Stany
This document analyzes the securitization of Uganda's "Movement system" under President Yoweri Museveni. It examines Museveni's designation of multipartyism as an existential threat that could increase sectarianism and conflict. The paper seeks to determine if Museveni successfully securitized the Movement system to consolidate power and block multiparty democracy. It will analyze Museveni's speech acts linking opponents to past atrocities and potential sectarianism. It will also examine signs of public acceptance, including election results, fears of multipartyism, and the importance placed on reconciliation and security. The goal is to generate knowledge on securitization as a phenomenon in Ugandan politics.
This document provides an introduction to security sector transformation processes in developing countries. It begins by making the case that security sector transformation is needed in Africa to place people at the center of security and protect them from violence. It defines security from a human security perspective that includes both national security and individual protection. The document discusses how transformation differs from and is more profound than reform. It outlines principles of democratic governance that should underlie security sector processes and discusses challenges that African countries face in implementing security sector transformation.
SECCON 2014 - Terrorism Dimensions – Countering the threat of terrorism ‘Stra...MesseIntl
Terrorism Dimensions – Countering the threat of terrorism ‘Strategies - Achieving nation security’
Sardar Shoukat Popalzai
President, Balochistan Economic Forum
Topics Covered:
• Terrorism Dimensions
• Global Insight on Terrorism
• Domestic Dimensions of Terrorism
• Countering Terrorism
• Terrorism: A Challenge to Political Government
• Terrorism Economic impact
• Terrorism & Media
HRRAC conducted more than twice as many surveys and in-depth interviews in order to capture a
broader range of perceptions of the security situation today in Afghanistan.
Multidisciplinary Journal Supported by TETFund. The journals would publish papers covering a wide range of subjects in journal science, management science, educational, agricultural, architectural, accounting and finance, business administration, entrepreneurship, business education, all journals
The document discusses various types and causes of global terrorism, including political and non-political terrorism, state terrorism, and terrorist groups operating in different countries like Sri Lanka, China, Pakistan, India, and others. It also outlines counter-terrorism strategies used by governments, such as intelligence agencies, paramilitary forces, and international cooperation. Emerging threats discussed include cyber-terrorism, biological warfare, nuclear threats, corporate hijackings, and other forms of terrorism.
This document discusses the relationship between human rights and combating violent extremism in three key points:
1) Violating human rights undermines efforts to prevent and counter extremism, and can push people towards extremist ideologies. Respecting civil liberties and ensuring justice, prosperity, and equity are important for social harmony.
2) New anti-terrorism laws in Tunisia are controversial because their vague language risks violating rights to freedom of press, fair trials, and movement. The laws should be amended to protect these rights while still allowing authorities to restrict extremists.
3) A balanced approach is needed where governments respect rights to life, fair trials, and expression, while engaging communities and adopting inclusive strategies against
Library and information services for nationalOnyema Nsirim
This document discusses the role of library and information services in addressing national security and insurgency in Nigeria. It outlines the security information needs of different groups like policymakers, security agents, citizens, and youths/children. It also examines the causes of insurgency in Nigeria and traces the emergence of groups like Boko Haram. The document recommends that libraries should collaborate with security agencies to provide relevant security information to different groups. It argues that an informed society through effective library services can help address the root causes of insecurity and promote peace.
Tactful Intelligence Sharing and Synergy among the Nigerian Security Operativ...AJHSSR Journal
ABSTRACT: Nigeria‟s peace and human security is currently engulfed in turmoil. And one of the notable
problems of insecurity in the country is menace of advanced cult killings on daily basis most especially the
upsurge of a dreaded cult group known as “Badoo”, that carries out attacks on human lives in Ikorodu suburb of
Lagos State, Nigeria. Residents of Ikorodu and others suburbs in Lagos State, Nigeria now live in perpetual
phobia and the menace has forced several others to have fled the state. The dreaded “Badoo” cult group killings
and attacks pose dangerous threats to human lives, national peace and security. Among the notable factors
aiding the emergence of such dreaded cult group in the state are; poor intelligence gathering and synergy on the
part of Nigerian security operatives, frustration, financial assistance, injustice, forced membership,
unemployment among youths, get-rich-quick syndrome on the part of many Nigerian youths, drug abuse among
others. The study examines threats posed by the menace to human lives, state‟s peace and security; it assesses
the concerted efforts of Nigerian government and security operatives in combating the menace. The study
concludes that, lack of adequate intelligence gathering, general insecurity in the country, corruption, abject
poverty and youth unemployment remain the factors hindering a total arrest of the menace in Nigeria. It also
requests the need for giving adequate support to security operatives by the citizens; continuous
orientation/education for the youths, good laws and governance, adequate intelligence gathering on the part of
security agents to nip the menace in the bud.
KEYWORDS: Badoo cultists, Human security, Security intelligence, Unemployment, Good governance,
Lagos.
This document summarizes a study that examined emerging trends in private security companies (PSCs) and security services in Southwest Nigeria. It investigated the establishment and justification of PSCs, government regulations of PSCs, and the relationship between PSCs and public security forces. The study found that while security is the government's responsibility, the government has failed to effectively provide security. Unemployment and systemic failures have contributed to rising security threats. PSCs have emerged to fill security gaps left by understaffed and inefficient public security forces. The study concludes that PSCs can complement government efforts in protecting citizens, but regulations are needed to ensure effective security provision.
This document examines the link between bad governance and perpetuation of insecurity in Nigeria. It argues that the current security challenges plaguing Nigeria stem from injustice, corruption, and selfish governance by political leaders. Since Nigeria's return to democracy in 1999 after military rule, incidents of ethnic, communal, religious and resource conflicts have persisted across much of the country. This is exacerbated by leaders failing to address issues like poverty alleviation, unemployment, resource allocation and infrastructure development. The document concludes that overcoming insecurity in Nigeria requires strong political will from leaders and commitment to fighting it, as well as unity among Nigerians.
This document summarizes an article about insurgencies and national security in Nigeria. It discusses several insurgencies plaguing Nigeria, including Boko Haram, Fulani herdsmen, militancy, kidnapping, banditry, and cattle rustlers. These insurgencies have undermined national security and development by escalating issues like migration, political instability, decreasing foreign investment, and underdevelopment. The document recommends that the Nigerian government improve intelligence gathering and sharing across security agencies, equip and train armed forces with modern weapons, and eliminate corruption to help curb the menace of insurgencies.
An Appraisal of the Challenges and Legal Protection Available for Internally ...ijtsrd
This paper has investigated the challenges and Legal Protection available for the benefit of Internally Displaced Persons in Nigeria. The study relied on content analysis of extant literature to ascertain the level of challenges and legal protections given to them. The study found that Internally Displaced Persons in Nigeria face a myriad of challenges which include loss of home, loss of traditional livelihood and sources of generating income, break up of families and community support networks, loss of intangible goods, and loss of documentation. A cursory look at the various causes of internal displacement in Nigeria revealed that forced migration and internal displacement in Nigeria in over a decade has been triggered by violent conflict particularly, the deadly activities Boko Haram and the militant Fulani Herdsmen. These displaced persons suffer a lot of human right violations without any significant legal protection for them. Rather, it has been identified that the existing institutional arrangement keepers, although struggling to manage the situation particularly, in the short term, are hindered by current policy deficits and the lack of a specific framework to adequately address the situation or cover medium to longer requirements for the IDPs. It is therefore, imperative to purposively design a legal framework that will specifically address the challenges bedeviling the Internally Displaced Persons in Nigeria while other security measures are being taken to ensure their safety and wellbeing. Stephen Chuka Unachukwu "An Appraisal of the Challenges and Legal Protection Available for Internally Displaced Persons in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49485.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/49485/an-appraisal-of-the-challenges-and-legal-protection-available-for-internally-displaced-persons-in-nigeria/stephen-chuka-unachukwu
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
Insecurity a threat to human existence and economic development in nigeriaAlexander Decker
This document examines the causes and effects of insecurity in Nigeria. It discusses how insecurity has become a major problem that threatens human existence and economic development. Some of the key causes identified include political factors like the power shift from northern to southern rule, as well as unemployment, jobs racketeering, and poor leadership. Insecurity has led to bombings, killings, kidnappings and destruction of property. It has also negatively impacted people's well-being and the economy through business disruptions and relocations. The study recommends allowing dialogue between ethnic and minority groups to find more peaceful solutions to insecurity in Nigeria.
Approximating the operational and intelligence vulnerability of the nigerian ...Alexander Decker
The document discusses the operational and intelligence vulnerabilities of the Nigerian Police Force in combating terrorism from 1999 to 2010. It argues that the police force has not been able to effectively guarantee security in Nigeria due to major institutional, operational, and intelligence limitations. Specifically, the failure to implement an arms tracking system to register and monitor legal weapons has hindered the ability to identify the source of many illegal arms used by terrorist groups in Nigeria.
This document discusses how data mining can be used as an active solution for crime investigation in Nigeria. It suggests that law enforcement agencies could analyze large volumes of data using data mining techniques to detect patterns related to criminal activities and predict future crime trends. Specifically, data mining algorithms could be used to cluster populations sizes to impute missing values, cluster changes in crime rates between years to forecast future trends, and detect deceptive identities by criminals through comparing identity fields across criminal records. The goal is to help security agencies prevent, arrest, and investigate crimes like terrorism more effectively.
Impact of Corruption on Insurgency in the North-Eastern Region of NigeriaIOSRJBM
This study is on the Impact of Corruption on Boko Haram Insurgency in the North Eastern Region of Nigeria, specifically, Adamawa, Borno and Yobe States. The study adopted content and observational analysis. Documentary ideas as expressed in text books, journal articles, magazines, Internet and Newspapers was analysed and utilised. The documentary materials were complemented with the observation methodology of data collection. The period of the study is 2009 to 2015. In the course of the study, it was discovered that the failure of the Nigerian Military to defeat the Boko Haram Insurgents within the study period was due to corruption perpetuated by the office of the former National Security Adviser. In conclusion, it was clear without doubt that corruption had negatively impacted on the war against insurgency in the North Eastern Region of Nigeria and this was due to the sharing of the $2.1 billion dollars and the questionable contracts awarded which were not executed by some companies and persons. The study therefore recommended that the Federal Government under President Muhammadu Buhari should continue with his war against corruption and ensure that all outstanding funds with the former National Security Adviser and his collaborators were retrieved.
The document announces the 6th annual conference of the Society for Peace Studies and Practice in collaboration with the Nigeria Army Peacekeeping Centre. The conference will take place from March 7-9, 2012 in Jaji, Kaduna, Nigeria. The conference aims to discuss challenges to national and international security in a globalized world, with sub-themes including domestic and international terrorism, border security, and the role of civil society in peacebuilding. It calls for abstract and paper submissions on topics related to security issues in Africa.
An Assessment of Government Policies in Curbing Arms Proliferation in Nigeria...ijtsrd
The proliferation of small arms and light weapons in Nigeria has been a major security concern over the last few decades. The availability and misuse of these weapons has contributed to increased violence and insecurity, especially in the northern, southeastern and Niger Delta parts of the country. The Nigerian government has taken several measures to address the problem, including initiatives to strengthen the legal framework, improve the regulation of arms transfers, amnesty programs and increase public awareness of the issue. Despite the adoption of several strategies, the country is still facing the menace of arms proliferation, which has resulted in a series of security challenges, especially in the northeast, middle belt and other flash points of Nigeria. To this end, this study was undertaken to assess government policies on arms proliferation in Nigeria. The theoretical framework underpinning the menace of arms proliferation and its concomitant insecurity challenges is stability””security theory. The study adopted a qualitative design, and the secondary data collected were thoroughly subjected to content analysis. The study revealed that the government has adopted several policies to curb the proliferation of arms in Nigeria, including NCSALW and the Firearms Act of 2018. Amnesty program, cash for arms surrender and the use of armed forces to support the police for mop up of arms. Despite these strategies, there are some challenges, such as a lack of adequate resources and capacity to monitor the proliferation of arms, vast territory, a large population and high level of unemployment and its consequences of high level of criminality which make it difficult to effectively track the movements of arms and their sources of supply. To address the issue of arms proliferation in Nigeria, the government should focus on creating a secure environment by providing stability and security for its citizens. This can be done by tackling corruption, creating employment, increasing economic equality, justice, addressing age long issues of marginalization and adequate funding for police and other security services. AYAH David Bonny Preye | ANYALEBECHI, Shammah Mahakwe | HART, Akie Opuene | PETER, Peter Finebone "An Assessment of Government Policies in Curbing Arms Proliferation in Nigeria, 1999-2022" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57524.pdf Paper URL: https://www.ijtsrd.com.com/other-scientific-research-area/other/57524/an-assessment-of-government-policies-in-curbing-arms-proliferation-in-nigeria-1999-2022/ayah-david-bonny-preye
This study interrogates the place of leadership and strategic communication in the actualization of overall national security in Nigeria. These tools of communication have been used to both incite violence as well as carry messages that help prevent violent conflict, and promote peace and reconciliation and Nigerian military is not exceptional. For instance, countering the Boko Haram insurgency was psychological operations. The Army was more successful in using this approach when Boko Haram’s use of violence was at its peak. Details for this are not hard to decipher, though they have never publicly explained why they engaged in psychological operations nor have they even admitted using them. There was a collective fear then, even among journalists and media establishments, some of whom were victims of Boko Haram’s attacks. The support the security services received from the media might have come from the need to address this for lasting solution in the nearest future. Due to government negligence on strategic communicate for national security, these gaps have unavoidably resulted in the resilience and devastating consequences in the state. Therefore, there is need for leaders to integrate a new culture of communication among agencies which can leads to greater efficiency in information and intelligence sharing under the established Strategic Communication Inter – Agency Policy Coordination Committee in overseeing strategic communication for national security.
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
This document provides an introduction to security sector transformation processes in developing countries. It begins by making the case that security sector transformation is needed in Africa to place people at the center of security and protect them from violence. It defines security from a human security perspective that includes both national security and individual protection. The document discusses how transformation differs from and is more profound than reform. It outlines principles of democratic governance that should underlie security sector processes and discusses challenges that African countries face in implementing security sector transformation.
SECCON 2014 - Terrorism Dimensions – Countering the threat of terrorism ‘Stra...MesseIntl
Terrorism Dimensions – Countering the threat of terrorism ‘Strategies - Achieving nation security’
Sardar Shoukat Popalzai
President, Balochistan Economic Forum
Topics Covered:
• Terrorism Dimensions
• Global Insight on Terrorism
• Domestic Dimensions of Terrorism
• Countering Terrorism
• Terrorism: A Challenge to Political Government
• Terrorism Economic impact
• Terrorism & Media
HRRAC conducted more than twice as many surveys and in-depth interviews in order to capture a
broader range of perceptions of the security situation today in Afghanistan.
Multidisciplinary Journal Supported by TETFund. The journals would publish papers covering a wide range of subjects in journal science, management science, educational, agricultural, architectural, accounting and finance, business administration, entrepreneurship, business education, all journals
The document discusses various types and causes of global terrorism, including political and non-political terrorism, state terrorism, and terrorist groups operating in different countries like Sri Lanka, China, Pakistan, India, and others. It also outlines counter-terrorism strategies used by governments, such as intelligence agencies, paramilitary forces, and international cooperation. Emerging threats discussed include cyber-terrorism, biological warfare, nuclear threats, corporate hijackings, and other forms of terrorism.
This document discusses the relationship between human rights and combating violent extremism in three key points:
1) Violating human rights undermines efforts to prevent and counter extremism, and can push people towards extremist ideologies. Respecting civil liberties and ensuring justice, prosperity, and equity are important for social harmony.
2) New anti-terrorism laws in Tunisia are controversial because their vague language risks violating rights to freedom of press, fair trials, and movement. The laws should be amended to protect these rights while still allowing authorities to restrict extremists.
3) A balanced approach is needed where governments respect rights to life, fair trials, and expression, while engaging communities and adopting inclusive strategies against
Library and information services for nationalOnyema Nsirim
This document discusses the role of library and information services in addressing national security and insurgency in Nigeria. It outlines the security information needs of different groups like policymakers, security agents, citizens, and youths/children. It also examines the causes of insurgency in Nigeria and traces the emergence of groups like Boko Haram. The document recommends that libraries should collaborate with security agencies to provide relevant security information to different groups. It argues that an informed society through effective library services can help address the root causes of insecurity and promote peace.
Tactful Intelligence Sharing and Synergy among the Nigerian Security Operativ...AJHSSR Journal
ABSTRACT: Nigeria‟s peace and human security is currently engulfed in turmoil. And one of the notable
problems of insecurity in the country is menace of advanced cult killings on daily basis most especially the
upsurge of a dreaded cult group known as “Badoo”, that carries out attacks on human lives in Ikorodu suburb of
Lagos State, Nigeria. Residents of Ikorodu and others suburbs in Lagos State, Nigeria now live in perpetual
phobia and the menace has forced several others to have fled the state. The dreaded “Badoo” cult group killings
and attacks pose dangerous threats to human lives, national peace and security. Among the notable factors
aiding the emergence of such dreaded cult group in the state are; poor intelligence gathering and synergy on the
part of Nigerian security operatives, frustration, financial assistance, injustice, forced membership,
unemployment among youths, get-rich-quick syndrome on the part of many Nigerian youths, drug abuse among
others. The study examines threats posed by the menace to human lives, state‟s peace and security; it assesses
the concerted efforts of Nigerian government and security operatives in combating the menace. The study
concludes that, lack of adequate intelligence gathering, general insecurity in the country, corruption, abject
poverty and youth unemployment remain the factors hindering a total arrest of the menace in Nigeria. It also
requests the need for giving adequate support to security operatives by the citizens; continuous
orientation/education for the youths, good laws and governance, adequate intelligence gathering on the part of
security agents to nip the menace in the bud.
KEYWORDS: Badoo cultists, Human security, Security intelligence, Unemployment, Good governance,
Lagos.
This document summarizes a study that examined emerging trends in private security companies (PSCs) and security services in Southwest Nigeria. It investigated the establishment and justification of PSCs, government regulations of PSCs, and the relationship between PSCs and public security forces. The study found that while security is the government's responsibility, the government has failed to effectively provide security. Unemployment and systemic failures have contributed to rising security threats. PSCs have emerged to fill security gaps left by understaffed and inefficient public security forces. The study concludes that PSCs can complement government efforts in protecting citizens, but regulations are needed to ensure effective security provision.
This document examines the link between bad governance and perpetuation of insecurity in Nigeria. It argues that the current security challenges plaguing Nigeria stem from injustice, corruption, and selfish governance by political leaders. Since Nigeria's return to democracy in 1999 after military rule, incidents of ethnic, communal, religious and resource conflicts have persisted across much of the country. This is exacerbated by leaders failing to address issues like poverty alleviation, unemployment, resource allocation and infrastructure development. The document concludes that overcoming insecurity in Nigeria requires strong political will from leaders and commitment to fighting it, as well as unity among Nigerians.
This document summarizes an article about insurgencies and national security in Nigeria. It discusses several insurgencies plaguing Nigeria, including Boko Haram, Fulani herdsmen, militancy, kidnapping, banditry, and cattle rustlers. These insurgencies have undermined national security and development by escalating issues like migration, political instability, decreasing foreign investment, and underdevelopment. The document recommends that the Nigerian government improve intelligence gathering and sharing across security agencies, equip and train armed forces with modern weapons, and eliminate corruption to help curb the menace of insurgencies.
An Appraisal of the Challenges and Legal Protection Available for Internally ...ijtsrd
This paper has investigated the challenges and Legal Protection available for the benefit of Internally Displaced Persons in Nigeria. The study relied on content analysis of extant literature to ascertain the level of challenges and legal protections given to them. The study found that Internally Displaced Persons in Nigeria face a myriad of challenges which include loss of home, loss of traditional livelihood and sources of generating income, break up of families and community support networks, loss of intangible goods, and loss of documentation. A cursory look at the various causes of internal displacement in Nigeria revealed that forced migration and internal displacement in Nigeria in over a decade has been triggered by violent conflict particularly, the deadly activities Boko Haram and the militant Fulani Herdsmen. These displaced persons suffer a lot of human right violations without any significant legal protection for them. Rather, it has been identified that the existing institutional arrangement keepers, although struggling to manage the situation particularly, in the short term, are hindered by current policy deficits and the lack of a specific framework to adequately address the situation or cover medium to longer requirements for the IDPs. It is therefore, imperative to purposively design a legal framework that will specifically address the challenges bedeviling the Internally Displaced Persons in Nigeria while other security measures are being taken to ensure their safety and wellbeing. Stephen Chuka Unachukwu "An Appraisal of the Challenges and Legal Protection Available for Internally Displaced Persons in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49485.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/49485/an-appraisal-of-the-challenges-and-legal-protection-available-for-internally-displaced-persons-in-nigeria/stephen-chuka-unachukwu
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
Insecurity a threat to human existence and economic development in nigeriaAlexander Decker
This document examines the causes and effects of insecurity in Nigeria. It discusses how insecurity has become a major problem that threatens human existence and economic development. Some of the key causes identified include political factors like the power shift from northern to southern rule, as well as unemployment, jobs racketeering, and poor leadership. Insecurity has led to bombings, killings, kidnappings and destruction of property. It has also negatively impacted people's well-being and the economy through business disruptions and relocations. The study recommends allowing dialogue between ethnic and minority groups to find more peaceful solutions to insecurity in Nigeria.
Approximating the operational and intelligence vulnerability of the nigerian ...Alexander Decker
The document discusses the operational and intelligence vulnerabilities of the Nigerian Police Force in combating terrorism from 1999 to 2010. It argues that the police force has not been able to effectively guarantee security in Nigeria due to major institutional, operational, and intelligence limitations. Specifically, the failure to implement an arms tracking system to register and monitor legal weapons has hindered the ability to identify the source of many illegal arms used by terrorist groups in Nigeria.
This document discusses how data mining can be used as an active solution for crime investigation in Nigeria. It suggests that law enforcement agencies could analyze large volumes of data using data mining techniques to detect patterns related to criminal activities and predict future crime trends. Specifically, data mining algorithms could be used to cluster populations sizes to impute missing values, cluster changes in crime rates between years to forecast future trends, and detect deceptive identities by criminals through comparing identity fields across criminal records. The goal is to help security agencies prevent, arrest, and investigate crimes like terrorism more effectively.
Impact of Corruption on Insurgency in the North-Eastern Region of NigeriaIOSRJBM
This study is on the Impact of Corruption on Boko Haram Insurgency in the North Eastern Region of Nigeria, specifically, Adamawa, Borno and Yobe States. The study adopted content and observational analysis. Documentary ideas as expressed in text books, journal articles, magazines, Internet and Newspapers was analysed and utilised. The documentary materials were complemented with the observation methodology of data collection. The period of the study is 2009 to 2015. In the course of the study, it was discovered that the failure of the Nigerian Military to defeat the Boko Haram Insurgents within the study period was due to corruption perpetuated by the office of the former National Security Adviser. In conclusion, it was clear without doubt that corruption had negatively impacted on the war against insurgency in the North Eastern Region of Nigeria and this was due to the sharing of the $2.1 billion dollars and the questionable contracts awarded which were not executed by some companies and persons. The study therefore recommended that the Federal Government under President Muhammadu Buhari should continue with his war against corruption and ensure that all outstanding funds with the former National Security Adviser and his collaborators were retrieved.
The document announces the 6th annual conference of the Society for Peace Studies and Practice in collaboration with the Nigeria Army Peacekeeping Centre. The conference will take place from March 7-9, 2012 in Jaji, Kaduna, Nigeria. The conference aims to discuss challenges to national and international security in a globalized world, with sub-themes including domestic and international terrorism, border security, and the role of civil society in peacebuilding. It calls for abstract and paper submissions on topics related to security issues in Africa.
An Assessment of Government Policies in Curbing Arms Proliferation in Nigeria...ijtsrd
The proliferation of small arms and light weapons in Nigeria has been a major security concern over the last few decades. The availability and misuse of these weapons has contributed to increased violence and insecurity, especially in the northern, southeastern and Niger Delta parts of the country. The Nigerian government has taken several measures to address the problem, including initiatives to strengthen the legal framework, improve the regulation of arms transfers, amnesty programs and increase public awareness of the issue. Despite the adoption of several strategies, the country is still facing the menace of arms proliferation, which has resulted in a series of security challenges, especially in the northeast, middle belt and other flash points of Nigeria. To this end, this study was undertaken to assess government policies on arms proliferation in Nigeria. The theoretical framework underpinning the menace of arms proliferation and its concomitant insecurity challenges is stability””security theory. The study adopted a qualitative design, and the secondary data collected were thoroughly subjected to content analysis. The study revealed that the government has adopted several policies to curb the proliferation of arms in Nigeria, including NCSALW and the Firearms Act of 2018. Amnesty program, cash for arms surrender and the use of armed forces to support the police for mop up of arms. Despite these strategies, there are some challenges, such as a lack of adequate resources and capacity to monitor the proliferation of arms, vast territory, a large population and high level of unemployment and its consequences of high level of criminality which make it difficult to effectively track the movements of arms and their sources of supply. To address the issue of arms proliferation in Nigeria, the government should focus on creating a secure environment by providing stability and security for its citizens. This can be done by tackling corruption, creating employment, increasing economic equality, justice, addressing age long issues of marginalization and adequate funding for police and other security services. AYAH David Bonny Preye | ANYALEBECHI, Shammah Mahakwe | HART, Akie Opuene | PETER, Peter Finebone "An Assessment of Government Policies in Curbing Arms Proliferation in Nigeria, 1999-2022" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57524.pdf Paper URL: https://www.ijtsrd.com.com/other-scientific-research-area/other/57524/an-assessment-of-government-policies-in-curbing-arms-proliferation-in-nigeria-1999-2022/ayah-david-bonny-preye
This study interrogates the place of leadership and strategic communication in the actualization of overall national security in Nigeria. These tools of communication have been used to both incite violence as well as carry messages that help prevent violent conflict, and promote peace and reconciliation and Nigerian military is not exceptional. For instance, countering the Boko Haram insurgency was psychological operations. The Army was more successful in using this approach when Boko Haram’s use of violence was at its peak. Details for this are not hard to decipher, though they have never publicly explained why they engaged in psychological operations nor have they even admitted using them. There was a collective fear then, even among journalists and media establishments, some of whom were victims of Boko Haram’s attacks. The support the security services received from the media might have come from the need to address this for lasting solution in the nearest future. Due to government negligence on strategic communicate for national security, these gaps have unavoidably resulted in the resilience and devastating consequences in the state. Therefore, there is need for leaders to integrate a new culture of communication among agencies which can leads to greater efficiency in information and intelligence sharing under the established Strategic Communication Inter – Agency Policy Coordination Committee in overseeing strategic communication for national security.
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
This document summarizes a journal article that examines the relationship between conflicts and national development in Nigeria. It discusses several key concepts including conflict, national security, and development. It then analyzes some of the main challenges to security in Nigeria that have implications for development, including ethno-religious conflicts, high youth unemployment, and issues with electoral politics and political violence. The document concludes that addressing security challenges is critical to achieving sustainable development in Nigeria.
OSPAC Vigilante Outfit and Crime Control in Emohua and Etche Local Government...ijtsrd
This study examined OSPAC vigilante and crime control in Emohua and Etche Local Government Areas. The study adopted three 3 research questions and objectives and they guided the study. The study adopted community implant theory propounded by Rosenbaum 1987 to support the use of OSPAC vigilante on crime control. The descriptive survey research design was used. The study population is about 633,700 people, with a sample size of 400. The purposive sampling technique was used. The method of data collection utilized both primary and secondary sources. However, simple percentages, mean and standard deviation were used for data analysis. The study found out that the failure of the Nigerian security in curbing crime, high level of poverty, lack of quality leadership, cult clashes for supremacy, high level of unemployment and desire to get rich quick are factors responsible for insecurity. Further findings showed that since the inception of OSPAC vigilante security in Emohua and Etche local government areas, there have been crime reductions in the areas as people go about their daily activities. The study recommended that despite reductions in crime in Emohua and Etche by OSPAC vigilante there is a need for its sustainability, and one way to achieve this would be to provide employment, entrepreneurship education and training. Adiele, Ikemefule Blessing | Emeodu, Elijah Nwabueze "OSPAC Vigilante Outfit and Crime Control in Emohua and Etche Local Government Areas of Rivers State" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49378.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/sociology/49378/ospac-vigilante-outfit-and-crime-control-in-emohua-and-etche-local-government-areas-of-rivers-state/adiele-ikemefule-blessing
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...SP. Zems Mathias, PhD.
1) The document is a dissertation defense presentation by Zems Mathias for their Doctoral degree. It examines the normalcy of crime as a requirement for intelligence analysis in Nigerian law enforcement agencies.
2) It discusses how crimes like terrorism, human trafficking, and money laundering require proactive, scientific approaches that cross jurisdictions. Understanding crime is important for intelligence gathering and analysis.
3) The study aims to analyze the relationship between criminal intelligence and law enforcement practice, internal security, and national security in Nigeria. It examines challenges to intelligence gathering and the importance of sharing information between agencies.
Similar to Prognosis of Theories of Intelligence in Counter Terrorism The Case of the Northwestern Nigeria (20)
This document provides an overview of cosmetic science, summarizing different types of cosmetics including skin, hair, face, eye, and nail cosmetics. It describes key ingredients and formulations for different cosmetic products like moisturizers, cleansers, hair conditioners, mascara, lipstick, and nail polish. The document also discusses trends in cosmetic use throughout history and how cosmetics help beautify and care for skin, hair, nails, and facial features.
Standardization and Formulations of Calotropis ProceraYogeshIJTSRD
Plants growing in arid regions have elicited increased attention, because the hostile environment, in which these plants survive, forces them to develop chemical protective systems through adaptation which is rarely found in vegetation of other ecosystems. Furthermore, many of the plants grow in areas, where the dependence on traditional, plant based medicines over industrially produced pharmaceuticals persists to this day. The two plants, Calotopris Procera giant milkweed, also named C. Persica and Calotropis gigantea crown ower , have been used widely in traditional medicine in North Africa, the Middle East, and South and South East Asia. This has led to extensive research on the chemical constituents of the plants. Both plants are known to be sources of cardenolides, and newer research has yielded a number of interesting cancer active constituents. In addition, extracts of both plants have remarkable nematocidal, molluscidal and insecticidal activities. In many regions, the wood of Calotropis plants has been used as a building material and as a source of fuel. In addition, certain parts of the plants have been used as feed for livestock. In other regions, Calotropis plants are seen as invasive species that threaten local plant life and that due to their toxicity also pose a threat to grazing eld animals. Jaffar Khan | Pankaj Chasta | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "Standardization and Formulations of Calotropis Procera" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45145.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45145/standardization-and-formulations-of-calotropis-procera/jaffar-khan
Review of the Diagnosis and Treatment of ParalysisYogeshIJTSRD
Paralysis is a complete loss of motor power in any muscle group. When paralysis affects all four extremities, it is called quadriplegia when it affects only the lower extremities, paraplegia and when it affects the extremities on one side of the body, hemiplegic. For this reason, the term paralysis is generally reserved for more focal, less stereotyped weakness, for instance, affecting all the muscles innervated by a peripheral nerve. Many different anatomical lesions and etiologies can cause paralysis and determine its treatment. Bikash Debsingha | Dr. Gourav Kr. Sharma | Dr. Kausal Kishore Chandrul "Review of the Diagnosis and Treatment of Paralysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45108.pdf Paper URL: https://www.ijtsrd.com/pharmacy/pharmacology-/45108/review-of-the-diagnosis-and-treatment-of-paralysis/bikash-debsingha
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...YogeshIJTSRD
Cooling towers make use of evaporation whereby some of the water is evaporated into a moving air stream and subsequently discharged into the atmosphere which results in cooling of the remainder water. The current research reviews various studies conducted on cooling tower using experimental and numerical techniques. Different design configuration and operating conditions on cooling towers are evaluated by various researchers. Significant findings from researches have shown new and improved design of cooling tower with much better performance as compared to conventional design. Neetish Kumar Sao | Dr. Surendra K. Dwivedi "Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45100.pdf Paper URL: https://www.ijtsrd.com/engineering/mechanical-engineering/45100/comparative-analysis-of-forced-draft-cooling-tower-using-two-design-methods-a-review/neetish-kumar-sao
Criminology Educators Triumphs and StrugglesYogeshIJTSRD
This document summarizes a research study about the triumphs and struggles of criminology educators in the Philippines. It finds that most respondents enjoy seeing their students succeed but find grading and dealing with difficult students stressful. Financially, only one respondent felt stable while others said their salaries were just enough to get by. Respondents did not initially intend to become teachers but stayed for reasons like family and valuing the teaching profession. While teaching had rewards, low salaries and qualifications impacted job satisfaction for some. Overall, the study provides insights into criminology educators' experiences in the Philippines.
A Review Herbal Drugs Used in Skin DisorderYogeshIJTSRD
The human bodys skin is an organ that allows it to interact with the environment while also shielding it from harmful external influences. People of all ages suffer from skin diseases all over the world. Its vital to keep your skin in good form for a healthy physique. Plants have been employed in some form or another since the beginning of time. This research has highlighted some prevalent skin disease issues, as well as the herbals utilized in disease therapy and the various formulations accessible in the pharmaceutical industry. Some medicinal plants have been shown to be quite effective in removing or reducing skin infection disorders. Chandramita Borah | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "A Review: Herbal Drugs Used in Skin Disorder" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45118.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45118/a-review-herbal-drugs-used-in-skin-disorder/chandramita-borah
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...YogeshIJTSRD
The aim of information retrieval systems is to retrieve relevant information according to the query provided. The queries are often vague and uncertain. Thus, to improve the system, we propose an Automatic Query Expansion technique, to expand the query by adding new terms to the user s initial query so as to minimize query mismatch and thereby improving retrieval performance. Most of the existing techniques for expanding queries do not take into account the degree of semantic relationship among words. In this paper, the query is expanded by exploring terms which are semantically similar to the initial query terms as well as considering the degree of relationship, that is, “fuzzy membership- between them. The terms which seemed most relevant are used in expanded query and improve the information retrieval process. The experiments conducted on the queries set show that the proposed Automatic query expansion approach gave a higher precision, recall, and F measure then non fuzzy edge weights. Tarun Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectivity Measures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45074.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/45074/automatic-query-expansion-using-word-embedding-based-on-fuzzy-graph-connectivity-measures/tarun-goyal
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
This paper proposes a Smartphone based system for the detection of drowsiness in automotive drivers. The proposed system uses three stage drowsiness detection technique. The first stage uses the percentage of eyelid closure PERCLOS which is obtained by capturing images with the front camera of the Smartphone with a modified eye state classification method. The system uses near infrared lighting for illuminating the face of the driver during night driving. The second step uses the voiced to the unvoiced ratio VUR obtained from the speech data from the microphone, in the event PERCLOS crosses the threshold. The VUR is also compared with a threshold and if it is a value greater than that of the threshold, it moves on to the next verification stage. In the final verification stage, touch response is required within the stipulated time to declare whether the driver is drowsy or not and subsequently sound an alarm. To awake the driver, a vibrating mechanism is done and also the live GPS location is also sent to an emergency contact. We have studied eight other reference papers for the literature review. The system has three advantages over existing drowsiness detection systems. First, the three stage verification process makes the system more reliable. The second advantage is its implementation on an Android smart phone, which is readily available to most drivers or cab owners as compared to other general purpose embedded platforms. The third advantage is the use of SMS service to inform the control room as well as the passenger regarding the loss of attention of the driver. Abishek K Biju | Godwin Jolly | Asif Mohammed C A | Dr. Paul P Mathai | Derek Joseph "A New Proposal for Smartphone-Based Drowsiness Detection and Warning System for Automotive Drivers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45083.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/45083/a-new-proposal-for-smartphonebased-drowsiness-detection-and-warning-system-for-automotive-drivers/abishek-k-biju
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal
Antimicrobial and Phytochemical Screening of Phyllantus NiruriYogeshIJTSRD
Theorigin of Phyllanthus niruri is tropical America from there it spread as a weed to other tropic and sub tropics. It is a tropical annual herb shrub which grows as weed in moist humid waste land. Phyllanthus niruri is among more than 500 Phyllanthus species that are widely spread in temperate and tropical climates region Lizuka et al., 2007. It grows 30 40 cm in height, has small leaves and yellow flowers the stem has green capsule, and blooms with flowers with 5 white sepals and apical acute anther.38g of Mueller Hinton Agar was dissolved in 1000ml distilled water in a conical flask, the mouth of the conical flask was plugged with cotton woo wrapped in aluminium foil. This was sterilized in an autoclave at 121oC for 15mns. The media was removed and allowed to cool to 45oC, later poured into a sterilized plastic petri plates which were appropriately labeled. The present study revealed the antimicrobial activity and phytochemical screening of phyllanthus niruri. The antimicrobial activity of phyllanthus niruri shows great significant against pathogens which are responsible for common infections of skin, respiratory, urinary and gastrointestinal tracts. The phytochemical screening of oxalate, terpenoids, tannins, phenols, quinones, flavonoids, alkaloids, saponins and steroids were all found to be active within the plant. This bioactive phytochemicals present in P. niruri can be useful for further researches on the plant P. nururi since the phytochemicals have shown preclinical efficacies for treating human diseases’ which include hepatitis and HIV AIDS. This work has compiled the chemical constituents present and can be useful for further researches Dr. Mohammed Musa Lawan | Yusuf Sale Baba "Antimicrobial and Phytochemical Screening of Phyllantus Niruri" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44948.pdf Paper URL: https://www.ijtsrd.com/chemistry/other/44948/antimicrobial-and-phytochemical-screening-of-phyllantus-niruri/dr-mohammed-musa-lawan
There is a need for temperature drop in a buried pipeline based on the media and process. Need of some methodology and design requirement for a set of conditions by reducing pipeline surface temperature and the temperature drops to atmospheric temperature at a particular distance of pipeline. Based on the conduction principle, desire reduction up to atmospheric temperature can be possible. Let us understand by below methods and design of Heat sink for buried pipe line. Natvarbhai Prabhudas Gajjar "Heat Sink for Underground Pipe Line" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45117.pdf Paper URL: https://www.ijtsrd.com/engineering/other/45117/heat-sink-for-underground-pipe-line/natvarbhai-prabhudas-gajjar
Newly Proposed Multi Channel Fiber Optic Cable CoreYogeshIJTSRD
Fiber optic cables have single core and multiple core options, but single and multiple core fiber cable -˜s core design need to be updated. Newly proposed design gives facilities to multiple usage than traditional design of cable core. Cable core design needs improvement by using present technology for decreasing material and cost and by improving efficiency of cable. Research need to be carried out in this direction. What do you think Natvarbhai Prabhudas Gajjar "Newly Proposed Multi Channel Fiber-Optic Cable Core" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45116.pdf Paper URL: https://www.ijtsrd.com/engineering/other/45116/newly-proposed-multi-channel-fiberoptic-cable-core/natvarbhai-prabhudas-gajjar
Security Sector Reform toward Professionalism of Military and PoliceYogeshIJTSRD
The need to understand and at the same time give prescriptions for the direction of security reform in Third world countries after the end of World War II has prompted the emergence of a big project called the study of security reform SSR . Within this framework emerge various theories and strategies for security reform, with various variations, including ideological variations that underlie these theories. The reform of the structural aspect is a reform of the institutional and structure of an institution, the instrumental reform includes the reform of the system, laws and regulations, while the reform of the cultural aspect is a reform of the habits or organizational culture in institutions in general and in particular the Timor Leste’s security institutions, both military and police. Arquimino Ramos "Security Sector Reform toward Professionalism of Military and Police" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45061.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/political-science/45061/security-sector-reform-toward-professionalism-of-military-and-police/arquimino-ramos
Stress An Undetachable Condition of LifeYogeshIJTSRD
Stressful life events affects human body, which may lead to cardiovascular diseases and effect metabolism and immune system. Recent studies showed increase in stress levels in developing countries. This study aimed to determine the stress levels in MBBS students. The objectives of the study are a To determine the current stress level, b To assess relation between stress level and lifestyle of college students. The present study was carried out in Ahmedabad City of Gujarat State. A total of 400 medical students were included in the study, which were selected using multi stage sampling aged between 18 years to 25 years. Students were questioned regarding their socioeconomic and life style parameters. The results showed that physical activity such as walking, exercise, yoga, meditation etc. were associated to stress levels. College students showed high stress levels with more satisfaction were mostly smokers. Their major reason for eating junk food and smoking was, increase in stress. Conclusion Majority of students suffered from moderate stress levels. Despite of having stress they were happy and satisfied with life with less no internet addiction. Spirituality and stress scales had a positive correlation as most of the students were averagely highly spiritual. Discriminant function can be used to determine the stress level of a person using age, BMI, internet addiction, spirituality, happiness scale and life satisfaction scale of that person. Jayshree N. Tolani | Dr. Nitinkumar D. Shah "Stress: An Undetachable Condition of Life" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45054.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/45054/stress-an-undetachable-condition-of-life/jayshree-n-tolani
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...YogeshIJTSRD
The study sought to determine the extent to which the usage of social media in the marketing of agricultural products in South West Nigeria can enhance farmers turnover. It employed the survey research design to collect data with the help of a structured questionnaire to elicit information from respondents selected from six 6 south western states. Research data were analysed using structural equation modelling. The results showed that the use of social media WhatsApp and Facebook in marketing of agricultural products significantly enhances farmers turnover. The managerial implication is that use of Whatsapp and Facebook in the marketing of agricultural products for the enhancement of farmers’ turnover was found to have significant influence on the enhancement in farmers’ turnover from agricultural products. Policy makers in government should provide the enabling environment for the telecommunication companies to enhance their reach by installing their facilities across the length and breadth of the country so that the network coverage will be strong at all times so that the benefits of social media usage will not be constrained. Egejuru, Leonard O | Akubugwo, Emmanuel I | Ugorji, Beatrice N "Comparative Studies of Diabetes in Adult Nigerians: Lipid Profile and Antioxidants Vitamins (A and C)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45021.pdf Paper URL: https://www.ijtsrd.com/biological-science/biochemistry/45021/comparative-studies-of-diabetes-in-adult-nigerians-lipid-profile-and-antioxidants-vitamins-a-and-c/egejuru-leonard-o
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...YogeshIJTSRD
The severity and mortality of COVID 19 cases has been associated with the Three category such as vaccination status, severity of disease and outcome. Objective presently study was aimed to assess the severity and mortality among covid 19 patients. Methods Using simple lottery random method 100 samples were selected. From these 100 patients, 50 patients were randomly assigned to case group and 50 patients in control group after informed consents of relative obtained. Patients in the case group who being died after got COVID 19 whereas 50 patients in the control group participated who were survive after got infected from COVID 19 patients. Result It has three categories such as a Vaccination status For the vaccination status we have seen 59 patients were not vaccinated and 41 patients was vaccinated out of 100. b Incidence There were 41 patients were vaccinated whereas 59 patients were not vaccinated. c Severity In the case of mortality we selected 50 patients who were died from the Corona and I got to know that out of 50 patients there were 12 24 patients were vaccinated whereas 38 76 patients were non vaccinated. Although for the 50 control survival group total 29 58 patients were vaccinated and 21 42 patients was not vaccinated all graph start. Conclusion we have find out that those people who got vaccinated were less infected and mortality rate very low. Prof. (Dr) Binod Kumar Singh | Dr. Saroj Kumar | Ms. Anuradha Sharma "To Assess the Severity and Mortality among Covid-19 Patients after Having Vaccinated: A Retrospective Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45065.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/45065/to-assess-the-severity-and-mortality-among-covid19-patients-after-having-vaccinated-a-retrospective-study/prof-dr-binod-kumar-singh
Novel Drug Delivery System An OverviewYogeshIJTSRD
In present scenario evolution of an existing drug molecule from a old form to a novel delivery system can significantly improve its performance in terms of patient compliance, safety and efficacy. In the form of a control drug delivery system an existing drug molecule can get a new life. An appropriately designed Novel Drug Delivery System can be a major advance for solving the problems related towards the release of the drug at specific site with specific rate. The porpuse for delivering drugs to patients efficiently and with fewer side effects has prompted pharmaceutical companies to engage in the development of new drug delivery system. This article covers the basic information regarding Novel Drug Delivery Systems and also advantages, factor etc. Chiranjit Barman | Dr. Gaurav Kumar Sharma | Dr. Kausal Kishore Chandrul "Novel Drug Delivery System: An Overview" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45068.pdf Paper URL: https://www.ijtsrd.com/pharmacy/novel-drug-delivery-sys/45068/novel-drug-delivery-system-an-overview/chiranjit-barman
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
Comparative Analysis of Different Numerical Methods for the Solution of Initi...YogeshIJTSRD
A mathematical equation which involves a function and its derivatives is called a differential equation. We consider a real life situation, from this form a mathematical model, solve that model using some mathematical concepts and take interpretation of solution. It is a well known and popular concept in mathematics because of its massive application in real world problems. Differential equations are one of the most important mathematical tools used in modeling problems in Physics, Biology, Economics, Chemistry, Engineering and medical Sciences. Differential equation can describe many situations viz exponential growth and de cay, the population growth of species, the change in investment return over time. We can solve differential equations using classical as well as numerical methods, In this paper we compare numerical methods of solving initial valued first order ordinary differential equations namely Euler method, Improved Euler method, Runge Kutta method and their accuracy level. We use here Scilab Software to obtain direct solution for these methods. Vibahvari Tukaram Dhokrat "Comparative Analysis of Different Numerical Methods for the Solution of Initial Value Problems in First Order Ordinary Differential Equations" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45066.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/45066/comparative-analysis-of-different-numerical-methods-for-the-solution-of-initial-value-problems-in-first-order-ordinary-differential-equations/vibahvari-tukaram-dhokrat
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentYogeshIJTSRD
Bituminous mixes are most commonly used all over the world in flexible pavement construction. It consists of asphalt or bitumen used as a binder and mineral aggregate which are mixed together, laid down in layers and then compacted. Under normal circumstances, conventional bituminous pavements if designed and executed properly perform quite satisfactorily but the performance of bituminous mixes is very poor under various situations. Today’s asphaltic concrete pavements are expected to perform better as they are experiencing increased volume of traffic, increased loads and increased variations in daily or seasonal temperature over what has been experienced in the past. In addition, the performance of bituminous pavements is found to be very poor in moisture induced situations. Considering this a lot of work has been done on use of additives in bituminous mixtures and as well as on modification of bitumen. Research has indicated that the addition of polymers to asphalt binders helps to increase the interfacial cohesiveness of the bond between the aggregate and the binder which can enhance many properties of the asphalt pavements to help meet these increased demands. However, the additive that is to be used for modification of mix or binder should satisfy both the strength requirements as well as economical aspects. Naveen Kumar | Ms. Shivani "Evaluation of Different Paving Mixes Using Optimum Stabilizing Content" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45089.pdf Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/45089/evaluation-of-different-paving-mixes-using-optimum-stabilizing-content/naveen-kumar
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD40057 | Volume – 5 | Issue – 3 | March-April 2021 Page 999
the CIA (as cited in Warner 2015) intelligence is the
information and foreknowledge of the world around us, a
prelude to political decision-making and intervention.
Hoffman (2011) as cited in Oghi (2014) sees intelligence as
"collecting, reviewing, assessing, combining, and
understanding all availableinformationapplicabletotactical
areas and potentially important to readiness.
Specifically, the security intelligence or intelligence
gathering process according to Lownthal (2012) is the
process by which specific types of information relevant to
national security are requested, collected, analyzedandsent
to policy makers; the productsofthatprocess;the protection
of those processes and information by counter-intelligence
activities; and the carrying out of such activities; Before
every law enforcement organization may continue
responding to criminal threats, it must first understand
them. Law enforcement officers are required to recognize
and work efficiently in a diverse social, political and
organizational context (Casey and Mitchell, 2017). Murray
(2010) also argued that it is important for law enforcement
authorities to provide an awareness of the current climate
and formulate policies and plans to address the perceived
issues. This can only be done by collecting information.
Capacity must be created to gather, compile, analyze and
disseminate intelligence on illegal activity and various
security issues, in order to enable the requisite law
enforcement officers to respond efficiently in the fight
against such challenges.
It is generally agreed by scholars that effective intelligence
reports and analyses could help quench the uprising of
terrorism activities in the Northern part of Nigeria
(Achumba, Ighomereho, &Akpan-Robaro, 2013; Aliemeka,
2012). However, the collection and analysis of intelligenceis
the least visible but in some ways the most important
counter-terrorism tool and is rightly thought of as the “first
line of defense” against terrorism. But this instrument also
has its limitations, chief of which is that the type of very
specific, tactical intelligence required to thwart terrorist
plots is rare (Hughbankand Githens, 2018). It is, however,of
great importance to look at intelligence in counter-
terrorism: The case of North-Western Nigeria.
Statement of Problem
The challenges of security in North-West Nigeria can be
traced back to the lack of intelligence gathering to tackle
bandits’ activities in the region. As important as intelligence
can be, Nigeria's security forces have not been able to
maximize the use of tactical and strategic intelligence to
counter terrorist activities (Olabanji, 2019). This is evident
with the growing terrorism activities springing up in the
North West. As the violence has unfolded between the
vigilantes and herder-allied groups, it has also increasingly
drawn in people and communities that were not previously
directly implicated. Some have taken sides voluntarily,
lending support to fighters from their ethnic groups; others
have been coerced into collaboration following threats.
Security intelligence that could help to quench security
breaches are not utilized by agencies responsible. This has
further encouraged criminal gangs like bandits to have seen
kidnapping as means of generating revenue and raiding
communities for loot across the North West.
Objective of the study
This study is on the prognosis of theories of intelligence in
counter-terrorism, while other specific objectives are:
1. To examine the relationship between intelligence
gathering and terrorism in North-West, Nigeria.
2. To ascertain how citizen’s unwillingness to share
intelligence with the security agenciesaffectssecurityin
North-West, Nigeria.
Research Questions
1. Is there a relationship between intelligence gathering
and terrorism in North-West, Nigeria?
2. Is citizen’s unwillingness to share intelligence with the
security agencies affects security in North-West,
Nigeria?
Literature Review
Conceptual
The Concept of Intelligence
The term intelligence has different meanings. The term
intellect is seen as the capacity to gainandapplyinformation
(The American Heritage Dictionary, 2010). Intelligence is a
very general mental capacity that includes, among other
things, the ability to reason, prepare, solve problems, think
abstractly, understand complex concepts, learn rapidly and
learn from experience; the abilitytolearnfactsandskillsand
to apply them, particularly when this ability is highly
developed (Encarta World English Dictionary, 2016).
Intelligence is a property of the mind that includes many
similar mental capacities, such as the ability to reason,
prepare, solve problems, think abstractly, understand
concepts and words, and read.
It is worth noting, though, that information is not
intelligence, and that information collection is not
competitive intelligence (Rudolph,Gilmont, Magee & Smith,
2011). According to Lowenthal (2015), intelligence is the
mechanism through which particular forms of knowledge
relevant to national security are requested, gathered,
processed and delivered to policy makers; the products of
that phase; the protection of those processes and
information by counter-intelligence activities; and the
conduct of operations as required by lawful authority.
Aliemeka (2012) opined that intelligence collection is a vital
method for statecraft to provide the requisitewarningabout
potential threats to policy makers in order to prevent a
country from being exposed to unexpected military attacks.
Intelligence as an organization can prevent potential threats
to a country by delivering timely, processed intelligence to
national security decision-makers. The collection of
intelligence (information) that is essential to national
security is gathered, analyzed and disseminated for use in
support of the policy.
However, there is no connection between intelligence
producers and intelligence consumers in Nigeria. The value
of intelligence in the eyes of its customers, not of its
producers; intelligence is at its finest when it is completely
incorporated with its users. Efficient cooperation between
intelligence and security servicesisthen establishedinorder
to ensure the consistency of national security.
Aliemeka(2012) argues that Nigeria has hadtostruggleover
the years with the problem of insufficient information
exchange betweenitsdefenseandlawenforcementagencies.
Information is important for countries, thus the need to set
up and maintain national intelligence organisations. Among
the security agencies of the Federal Government of Nigeria,
the Department of State Services (DSS) is also known as the
SSS, the Defense Intelligence Agency (DIA) and the National
IntelligenceCommunity(NIC).Modernintelligencegathering
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD40057 | Volume – 5 | Issue – 3 | March-April 2021 Page 1000
relies essentially on both human efforts and electronic
gadgets. It transcends mere stealing of someone’s secrete
and it is operated strategically in a comprehensive
environment and more often than not covertly (Ngboawaji,
2013).
Terrorism
Terrorism has been a major concern for the United Nations
and national governments since the 1960s.The9/11attacks
changed the structure, character, actors and concepts of
terrorism. Terrorism has been an important cause of
insecurity in the world. “Terrorism also represents themost
serious threat to human life and liberty, democracy and
other fundamental values that the democratic communities
promote” (National Security Strategy of Romania,
2017).Terrorist attacks are designed to achieve three goals:
to create a sense of insecurity among the public, to show the
inability to contain terrorism, andtopromotetheideology of
the terrorists (Hazard Mitigation Plan, 2011). However,
there have been several debates over the years on what the
concept of terrorism means. The fact that there is no
universally accepted definition of the concept has made it
difficult for intelligence to be carried out on terrorist
activities.
However, the word ‘terrorism’ in general is linked to the
French word ‘terreur’ which means fear or dread. The term
is also linked to the Latin derivative ‘terrorem’, which
equally means fright, fear, or terror. Literally, terrorism is
defined as ‘the systematic use of violence, terror and
intimidation to achieve an end’ (Oche, 2017). Their targets
are usually the government, the public, or individual andthe
objective is political.
Imobighe (2016) contends that terrorism and counter-
terrorism are mutually linked in a confrontational, action-
reaction relationship and ‘have been with the human race
since the dawn of recorded history’. However, terrorism
assumed a global scale after the September 11, 2001,
bombing of the World Trade Centre in New York and the
Pentagon in Washington D.C. in the United States.
The US government defines terrorism as “premeditated,
politically motivated violence perpetrated against non-
combatant targets by subnational groups or clandestine
agents, usually intended to influence an audience” (US
Department of State, 2011). The Federal Bureau of
Investigation (FBI) defines terrorism as "the unlawful use of
force against persons or property to intimidate or coerce a
government, the civilian population, oranysegmentthereof,
in the furtherance of political or social objectives." This
definition includes three elements: terrorist activities are
illegal and involve the use of force, the actions intend to
intimidate or coerce, and the actions are committed in
support of political or social objectives.
United Nations General Assembly Resolution 49/60 of 1994
defines terrorism as “criminal acts intended or calculated to
provoke a state of terror in the general public, a group of
persons or particular persons for political purposes in any
circumstance unjustifiable, whatever the considerations ofa
political, philosophical, ideological,racial,ethnic,religiousor
any other nature that may be invoked to justify them.
However, in the Nigerian context terrorism is a crime
codified by law. The Organization for African Unity, now the
African Union, 1999 Convention on the Prevention and
Combating of Terrorism defines terrorism Article 1:
Any act which is a violation of the criminal laws of a
state and which may endanger the life, physical
integrity, freedom, or cause serious injury or death
to, any person, any member of or group of persons,
or cause or may cause damage to public or private
property, natural resources, environmental or
cultural heritage, and is calculated or intended to
intimidate, put fear, force, coerce or induce any
government, body, institution, the general public or
any segment thereof, to do or abstain from doingany
act, or to adopt or abandon a particularstandpointor
to act according to certain principles or; disrupt any
public service, the delivery of any essential serviceto
the public or create a public emergency or; create
general insurrection in a state.
Nigeria’s Terrorism Prevention Act 2011, as Amended in
2013, (Part 1, Sections 1&2, Pg. 4) defines a “terrorist as a
person who knowingly does, attempts or threatens to do an
act preparatory to or in furtherance of an act of terrorism;
commits to do anything that is reasonably necessary to
promote an act of terrorism; or assists or facilitates the
activities of persons engaged in an act of terrorism commits
an offence under this Act.”
However, demonstration or stoppage of work is not a
terrorist act within the meaning of this definition provided
that the act is not intended to result in any harm referred to
in subsection (2) (b) (i), (ii), or (iv) of this section. In the
context of law enforcement and policing, terrorism presents
itself in deliberate incidents and acts of sabotage, criminal
bombings, arsons, vandalism; assassination; kidnapping;
armed robbery, militancy, trafficking in illegal small arms
and light weapons, transnational organised crimes,
subversion and propaganda, espionage, cyber-terror, echo-
terror, bioterror and the attendant criminal acts and
consequences.
Theoretical Framework
The study adopted Critical Theory to give a theoretical
foundation to this study. The critical Theory was developed
by Max Horkheimer in 1937. The theory is an approach to
social philosophy that focuses on reflective assessment and
critique of society and culture in order to reveal and
challenge power structures. It offers a descriptive and
normative foundation for social inquiry and is designed to
decrease domination and increase freedom in all forms
(Stanford, 2016). It is applied through critiquing and
analyzing the social issues that are responsible for the
domination of tribes that have emerged as terrorists, using
inhumanity as a justification for their actions.
Critical theory was developed in response to conventional
approaches to uncover the ideological, conceptual, and
institutional foundations of terrorism. It is used to critique
dominant conventional approaches that link terrorism with
technical capitalism and claimsthatviolentactivitiesusedby
the state, in a case of state terrorism againstitscitizens,have
been ignored by traditional terrorism scholars (George &
Kline, 2016).
Critical theory is concerned with critiquing and changing
society in its entirety, as against traditional theory,
concerned only with understanding or explaining it. It is
aimed at digging into social life, to reveal the assumptions
that keep people from a true and complete understanding of
how the world works. The critical theory emerged from the
Marxist tradition and was advanced by a group of
4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD40057 | Volume – 5 | Issue – 3 | March-April 2021 Page 1001
sociologists at the University of Frankfurt in Germany,
referred to as Frankfurt School (Crossman, 2019).
Looking critically at the causes of terrorism in Nigeria and
the strategies applied in countering insurgency, state
terrorism which encompassesviolentactionagainstcitizens,
neglect, domination, and deprivation has been a leading
cause of terrorism in Nigeria and must be addressed as one
of the strategies to combat terrorism. Because “a theory is
critical to the extent that it seeks human emancipation from
slavery, acts as a liberating influence, and works to create a
world which satisfies the needs and powers of human
beings” (Horkheimer 1972, 246), counterterrorism
strategies applied in Nigeria must absorb these
considerations in seeking solutions to the insurgency.
Empirical Review
Nte, Abdulaziz andUzorka (2020) reviewed the applicability
of Geospatial Intelligence and all its components and sub-
field, with a view to understanding and or establishing their
respective relevance in devising effective counter-terrorism
strategies in Nigeria. This was done, taking Boko Haram
activities between 2015 and 2018 for specific study, against
the background of Geospatial-Intelligence capabilities. The
researchers utilised primary and secondary data sources in
this work. The Primary data sources were from
questionnaires administered physically and electronically
via emails while, secondarydata camefrompublishedbooks,
journals, articles, lecture guides, videos etc. Acquired data
were statistically analysed using simple percentageandChi-
Square statistics. Sequel to the statistical results, findings
were made that Geospatial-Intelligence is relevant and
remains the most potent frontier in developing effective
counter-terrorismstrategies againstBokoHaramandindeed
other similar insurgencies in Nigeria.
Ngboawaji (2013) carried out an analysis of intelligence
support to security operations in Nigeria: A review of some
Joint Task Force Operations. The study adopted the
quantitative and analytical methods of analyzing data from
primary and secondary sources to arrive at the conclusion
and recommendations. The study revealed that intelligence
gathering and management has not been able to effectively
support the conduct of security operations in Nigeria.This is
because the impact of intelligence has not been significant
for many reasons. From the study, it is clear that the
intelligence community lacked the requisite technological
platform to effectively support the conduct of security
operations.
Adedire, Ake and Olowojolu (2016) examined the attempts
made by the Nigerian government as well as international
actors towards curbing the menace of terrorism and
insurgency. Suchdomesticmeasuresincludethedeployment
of troops to the affected areas, joint task force by the
neighbouring countries, declaration of a state of emergency
and encouragement of public and media to provide
intelligence support. The international actors use economic
sanctions to punish the state sponsors of terrorism, the
deployment of security assets abroad, the monitoring of the
expanding scope and the diversityoffacilitationnetworks.It,
therefore, recommends the cutting off of the sources of
contact of Boko Haram, an empowerment programme that
reduces unemployment, conflict resolution among parties
and strict enforcement of the law against terrorism.
Gap in Knowledge
The studies reviewed have shown the important
contribution of intelligence in supporting military and civil
operations to counter insurgency and terrorism. However,
none of these works directly link intelligence support to
counter-terrorism in North West, Nigeria. This study,
therefore, seeks to fill that void consequently the study will
focus on the prognosis of theories of intelligence in counter-
terrorism.
Methodology
Research Design
The research design that is deemed most suitable and
appropriate by the researcher for this study is the Survey
design and this was adopted. The survey method involves
the systematic use of a questionnaire to generatetheneeded
Data for Analysis
Population of the Study
The population of this study comprises Nigerians residing
within North-Western part of Nigeria where the activities of
bandits and other insurgency activities are more alarming.
The states in this part of Nigeria are Jigawa, Kaduna, Kano,
Katsina, Kebbi, Sokoto and Zamfara. Obviously, the
population of this study is very large and thusmaybealmost
impossible to be covered by the Researcher,Hencesampling
becomes imperative.
Sampling Technique
Due to the largeness of population of the study, as earlier
noted above, the researcher adopted a sampling method in
order to obtain data about the general population from a
subset of the population. The sampling method adopted by
the researcher is the probability sampling method,
otherwise known as random sampling. In probability
sampling, various techniques are used to ensure that every
individual person in the population or universe has anequal
chance of being selected. Here, the researcher adopted
probability sampling due to itssuitabilityandapplicabilityin
this study as it eliminates errors and possible bias to a very
large extent.
Sample Size
Another critical factor is identifying the size of the sample to
draw out from the population of study and doing so via
objective means. In order to draw a sample size, the Taro-
Yamane quantitative method for sample selection was
applied for the study. Stated below is the formula:
Formula
n =
Where:
N= Population
n = Sample size
I = Constant
e = Tolerable error and can be assumed e.g 0.05, 0.10or0.25
etc.
This formula helped the researcher to determine what
sample size to study. Using a tolerableerrorof0.10,a sample
size of 250 individuals was selected for the study. The
persons selected for the study include retired/serving
security personnel, students and experts in Intelligence and
Security, host community members and settlers.
5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD40057 | Volume – 5 | Issue – 3 | March-April 2021 Page 1002
Method of Data Analysis
The method adopted for the analysis of data in this research
is the frequency distribution table showing responses,
frequency, and percentages. The raw data are collected,
collated, and further converted to a percentage. Each item is
analyzed on that basis alongwiththedividedaffirmationand
negation of the proposition. From the total percentage of
response, the inference is drawn. The result obtained also
forms the basis of the discussion of findings. A test of the
hypothesis was also done in order to ascertain the rejection
and acceptability of the suppositions. The hypothesis is
tailored towards buttressing the data acquired through the
questions. The hypothesis is tested using the Chi-square
statistical method.
Analysis and Findings
Contained herein is the presentation, analysis and
interpretation of data acquired during the research through
the use of Questionnaires. For the purpose of this work, a
total of one hundred and fifty (150) questionnaires were
distributed. However, only 130 questionnaires were
retrieved. It is important to recall that the researcher
employed both research questions and hypothesis for the
purpose of this work and thus, there shall be a presentation
of data in simple percentage and also statistical analysis of
data all in this section.
Question 1: Is Geospatial Intelligence relevant in
developing effective counter-terrorism strategy?
Table 1: Response to question 1
Response Frequency Percentage (%)
Yes 85 65.4
No 18 13.8
Don’t know 27 20.8
Total 130 100
From the above table, 85 (65.4%) of the respondents voted
“Yes” to the question while 18 (13.8%)said“No”.27(20.8%)
are indecisive, probably because they are not familiar with
the term. Thus, analysis on the basis of the data aboveshows
that it is obvious that Geospatial Intelligence is developing
an effective counter-terrorism strategy.
Question 2: Is there relationship between intelligence
gathering and terrorism in North West, Nigeria
Table 2: Response to Question 2
Response Frequency Percentage (%)
Yes 71 54.6
No 31 23.8
Don’t know 28 21.5
Total 130 100
The above table shows that 71 (54.6%) agree while 31
(23.8%) disagree and 28 (21.5%) are indecisive as to
whether there is the relationship between intelligence
gathering and terrorism in North West, Nigeria. However, a
majority of the respondents voted ‘yes’ to the question.
Question 3: Is intelligence relevant in the fight against
terrorism in the North West, Nigeria?
Table 3: Response to question 3
Response Frequency Percentage (%)
Yes 95 73.1
No 13 10
Don’t know 22 16.9
Total 130 100
From the above table, 95 (73.1%) voted ‘yes’ while only a
negligible figure of 13 (10%) are in disagreement. 22 (16.9)
showed indecisiveness. Thus, drawing from the figures
above, intelligence is relevant in the fight against terrorism
in the North West, Nigeria.
Question 4: Is it healthy for Intelligence agencies to keep
information from one another?
Table 4: Response to question 4
Response Frequency Percentage (%)
Yes 6 4.6
No 119 91.5
Don’t know 5 3.8
Total 130 100
The above table shows that only 6 (4.6%)oftherespondents
voted “yes”, 5 (3.8%) stayed indecisive while119(91.5%) of
the respondents voted “no” to the opinion that it is healthy
for Intelligence agencies to keep information from one
another. Therefore, drawing from the figures above, it is
unhealthy for Intelligence agenciestokeepinformationfrom
one another.
Test of Hypotheses
Hi There is a relationship between intelligence gathering
and terrorism in North West, Nigeria
H0 There is no relationship betweenintelligencegathering
and terrorism in North West, Nigeria
Observed frequency
Variables
No. of Respondents
Total
Physical
Administration
Online
Administration
Agree 31 34 65
Strongly Agree 20 16 36
Disagree 11 13 24
Strongly Disagree 4 1 5
Total 65 65 130
Expected frequency
Variables
No. of Respondents
Total
Physical
Administration
Online
Administration
Agree 32.5 32.5 65
Strongly Agree 18 18 36
Disagree 12 12 24
Strongly Disagree 2.5 2.5 5
Total 65 65 130
For a degree of freedom of 3 at 0.05 significant level, theChi-
square value of 2.54 is greater than the tablevalueof0.0153.
Therefore, we reject the Null hypothesis and accept the
alternate hypothesis which states that thereisa relationship
between intelligence gathering and terrorisminNorth West,
Nigeria.
Conclusion
Intelligence gathering is the product of the process
information by the agencies of the government which are
provided for both policy makers and other law enforcement
agencies. It is useful processed information for the
maintenance of security in any country. This is because it
gives a good idea and direction in getting the trend and
pattern of criminal activities within a system. Itistheduty of
a government to provide for the security of the lives and
properties of its citizens. It becomes important for state
security service and other national intelligence agencies to
6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD40057 | Volume – 5 | Issue – 3 | March-April 2021 Page 1003
protect various important blind sports as its relation to the
safety and wellbeing of the citizen of the country.
Recommendations
The following are the recommendations proffered by the
paper
1. For efficiency to be attained in security operations, the
government should harness information from both the
members of the public and the national intelligence
communities and ensure timely, adequate and reliable
sharing of intelligence among the law enforcement
agencies.
2. Government should foster a protected relationship
between the public and law enforcement agencies, to
remove the fear within them and ensure the protection
of information relating to their privacy
3. There should be training and retraining of personnel of
the intelligence community to be able to meet up with
the current trends and changes in the contemporary
Nigerian environments for the effective gathering of
intelligence and the ability to utilize it for productive
law enforcement.
4. Timely and continuous funding of intelligence to ensure
the provision of and adequate evaluated and analyzed
information reliable and adequate enough to tackle
current situation of insecurity
REFERENCES
[1] Achumba, I. C., Ighomereho, O. S., &Akpan-Robaro, M.
O. M (2013). Security Challenges in nigeria and the
Implications for Business Activities and Sustainable
Development. Journal of Economics and Sustainable
Development, 4 (2), pp. 79-99.
[2] Adedire, S. A., Ake, M. &Olowojolu, O. (2016).
Combating terrorism and insurgency in Nigeria: An
international collaborations against Boko Haram.
Fountain University Journal of Management and
Social Sciences: 5(1) Special Edition, (2016), 67 – 74
[3] Agbiboa, D. (2015). Resistance to Boko Haram:
Civilian Joint Task Forces in North-Eastern Nigeria.
Conflict Studies Quarterly.
[4] Agbiboa, D. E. (2014). Peace at Daggers Drawn? Boko
Haram and the state of emergency in Nigeria. Studies
in Conflict & Terrorism, 37, 41-67.
[5] Aliemeka, E. O. (2012), Intelligence- Led Policing in
the 21st Century, Operationalizing Intelligence led-
Policing in Nigeria (p 12-25), Lagos, Cleen
Foundation.
[6] Aluko, M. A. O. &Adesopo, A. A. (2013). Bureaucratic
corruption in Nigeria: A general and sociological
insight. Journal of Social Science, 7, 47–54.
[7] Baylis, J; Wirtz, J. J. & Colin, S. G. (2006). US
government’s national strategy of combating
Terrorism. White House.
[8] Bowei, B. S. (2019). Evaluating the Effects of
Counterterrorism Strategies onInsurgencyinNigeria.
Walden Dissertations and Doctoral Studies
[9] Casey, J. and Mitchell, M. (2017). Requirements of
Police Managers and Leaders from Sergeant to
Commissioner. Police Leadership and Management
Journal. Pp. 4-20.
[10] Crossman, A. (2019). Understanding critical theory.
Thought Co. Retrieved from: https: //www.
thoughtco. com/critical-theory-3026623
[11] Duyan, A. (2012), AnalyzingDifferentDimensionsand
New Threats in Defence Against Terrorism,
Amsterdam: IOS Press.
[12] Eme, O. I., Okpaga, A. &Ugwu, S. C. (2012). Activitiesof
Boko Haram and insecurity questioninNigeria.Oman
Chapter of Arabian Journal of Business and
Management Review, 1, 77-99.
[13] George, R. Z. & Kline, R. D. (2016). Intelligenceandthe
national security strategist: enduring issues and
challenges, Rowman& Littlefield.
[14] Hughbank, R. J. and Githens, D. (2018). "Intelligence
and Its Role in Protecting AgainstTerrorism."Journal
of Strategic Security 3, no. 1 (2010) : 31-38.
[15] Imobighe, T. A & A. N. T Eguavoen (2016) Terrorism
and Counter terrorism: An African Perspective.
Ibadan: Heinemann Educational Books (Nigera) PLC
[16] Lownethal, M. M. (2012). Intelluigence: From Secrets
to Policy. 2nd Edition, WashingtonD.C:Congressional
Quarterly Press.
[17] Murray. Y. (2010). Police and the Challenges of the
21st Century: Managing Change in Police
Organisations, Ontario: Canadian Police College.
[18] National Bureau of Statistics (2020). “2019 Poverty
and Inequality in Nigeria: Executive Summary”, May
2020.
[19] National Security Strategy of Romania. (2017),
Retrieved from https: //www. bbn. gov.
pl/ftp/dok/07/ROU_National_Security_Strategy_Rom
ania_2017. pdf
[20] Ngboawaji, O. N., (2013). An analysis of Intelligence
Support to Security Operations in Nigeria: A Review
of Some Joint Task Force Operations. Peace and
Security Review, 5(9): 1-23.
[21] Nte, N. D., Abdulaziz, B. A., &Uzorka, M. (2020).
Understanding Geospatial Intelligence and the
Challenges of Effective Counter-TerrorismStrategy:A
Case Study of Nigeria’s Boko Haram Challenge.Unnes
Law Journal, 6(2), 163-186.
[22] Oche, G. D (2017). The Phenomennon of Terrorism.
Lagos: FOG V entures
[23] Oghi, F. E and Nnumen, J. O (2014). Military
Intelligence and the Challenge of National Security in
Contemporary Nigeria: International Journal of
Research in Humanities and Social Sciences. Vol. 1,
Issue 2.
[24] Oghi, F. E. (2014). Military Intelligence and the
Challenge of National Security in Contemporary
Nigeria, 1(2), 7–13.
[25] Olabanji, O. E. (2019). Insecurity and Socio-Economic
Development in Nigeria Journal of Sustainable
Development Studies Volume 5, Number 1, 40-63
[26] Phenson, U. A., Ojie, P. A., Esin, J. O. and Atai. A. J.
(2014). Essential Elements of Security and their
Applications in Ensuring Stability and Integration of
Nigeria. Internation Journal of Politics and Good
Governance. Volume 5, No. 5. 3, Quarter III 2014.
Retrieved online.
[27] United States Department of Defence (2011)
Department of Defence Dictionary of Military and
Associated Terms. (Accessed online at http: //www.
dtic. mil/doctrine/dod, 15/12/2016
[28] Warner, M. (2015). Wanted: A Definition of
Intelligence, 15–22.