This document discusses security challenges threatening national unity in Nigeria. It examines the causes of security challenges, the relationship between security challenges and national unity, and suggestions for prevention. The key causes identified are a failing state as evidenced by inability to ensure national security and food/social security for citizens, bad governance including corruption, overlapping/inadequate security agencies, and extremist religious ideologies. The paper aims to enhance national unity through addressing these root causes of security threats in Nigeria.
This document discusses terrorism, including defining it as the unlawful use of force against people or property to intimidate governments or populations for political goals. It outlines some terrorist groups like Al-Qaeda, causes of terrorism like religious extremism and poverty, and examples of terrorist attacks over the years such as in Mumbai, London, and Delhi. These attacks have social, political, and economic impacts. Prevention measures discussed include education, security, and unity. Government acts against terrorism are also mentioned.
The document summarizes Freescale's automotive airbag solution, including its main components, working principle, and interface. It describes the airbag system basis chip MC33789, which provides a complete solution. It also outlines Freescale's portfolio of sensors, MCUs, and other chips that support airbag systems using the PSI5 and DSI protocols.
Security challenges as threats to national unity in nigeriaAlexander Decker
This document discusses security challenges threatening national unity in Nigeria. It examines the causes of security challenges, including a failing state as evidenced by inability to ensure national security and food/social security, bad governance including corruption, duplicated/inefficient security agency functions and inadequate training/equipment, and religious ideologies that divide people. The document aims to enhance national unity by suggesting ways to prevent security challenges that endanger Nigeria's heterogeneous state and development.
Seat belts are designed to protect vehicle occupants during crashes or sudden stops by spreading the inertial forces across rigid parts of the body. A typical seat belt system uses a retractor mechanism with a spool that winds the webbing. The retractor has a locking mechanism to stop spool rotation during collisions. Some modern seat belts also use pretensioners that tighten the belt immediately before impact to further reduce occupant movement. Load limiters then release a small amount of additional webbing under high forces to prevent injury from overly tight seat belts.
The project report summarizes activities conducted from September 2020 to September 2021 to support the goals of UN Resolution 1325. An online training curriculum on women's leadership and prevention of gender-based violence was developed, consisting of 4 modules and 3 videos. A training for 63 women leaders from NGOs in Lithuania was also held. These trained women then conducted workshops that reached 166 more local women leaders. Additionally, a Women's Leadership Forum was hosted with 118 participants from 13 countries, commemorating 20 years of Resolution 1325. Evaluation found participants significantly increased their knowledge on topics covered. The project reached a total of 36,141 people.
This document provides information about anti-lock braking systems (ABS) and anti-slip regulation (ASR) for commercial vehicles. It discusses the development and benefits of ABS and ASR, how they work, their components, and additional systems like electronic stability control. The document covers the theoretical basics of ABS and ASR, explaining concepts like brake force coefficient, cornering force coefficient, and brake slip. It also includes diagrams illustrating the slip curves under different road conditions.
This document provides a presentation on terrorism given by Roly Singh and Farhin Siddiqui at the Laxmi Institute of Computer Application on October 11, 2011. The presentation defines terrorism, discusses the most common terrorist attack types and motives. It also covers the major types of terrorism, causes of terrorism, effects of terrorism, terrorist units and cells. The presentation examines where terrorism is going, recent attacks in India, prevention of terrorism, and concludes by stating that terrorism has a long history of being used to achieve political, religious, and ideological objectives.
Terrorism threatens humanity, society, and economies around the world. It has caused tremendous loss of life in many countries, including Pakistan, leaving widows, orphans, and demolished assets. However, Muslims are often wrongly labeled and blamed as terrorists due to biased media control and propaganda spread by non-Muslim nations. Pakistan in particular has suffered greatly from numerous terrorist attacks over the years, damaging its image, though the root causes are poverty, injustice, and international politics rather than any one religion. Addressing these social and economic issues is key to reducing terrorism long term.
This document discusses terrorism, including defining it as the unlawful use of force against people or property to intimidate governments or populations for political goals. It outlines some terrorist groups like Al-Qaeda, causes of terrorism like religious extremism and poverty, and examples of terrorist attacks over the years such as in Mumbai, London, and Delhi. These attacks have social, political, and economic impacts. Prevention measures discussed include education, security, and unity. Government acts against terrorism are also mentioned.
The document summarizes Freescale's automotive airbag solution, including its main components, working principle, and interface. It describes the airbag system basis chip MC33789, which provides a complete solution. It also outlines Freescale's portfolio of sensors, MCUs, and other chips that support airbag systems using the PSI5 and DSI protocols.
Security challenges as threats to national unity in nigeriaAlexander Decker
This document discusses security challenges threatening national unity in Nigeria. It examines the causes of security challenges, including a failing state as evidenced by inability to ensure national security and food/social security, bad governance including corruption, duplicated/inefficient security agency functions and inadequate training/equipment, and religious ideologies that divide people. The document aims to enhance national unity by suggesting ways to prevent security challenges that endanger Nigeria's heterogeneous state and development.
Seat belts are designed to protect vehicle occupants during crashes or sudden stops by spreading the inertial forces across rigid parts of the body. A typical seat belt system uses a retractor mechanism with a spool that winds the webbing. The retractor has a locking mechanism to stop spool rotation during collisions. Some modern seat belts also use pretensioners that tighten the belt immediately before impact to further reduce occupant movement. Load limiters then release a small amount of additional webbing under high forces to prevent injury from overly tight seat belts.
The project report summarizes activities conducted from September 2020 to September 2021 to support the goals of UN Resolution 1325. An online training curriculum on women's leadership and prevention of gender-based violence was developed, consisting of 4 modules and 3 videos. A training for 63 women leaders from NGOs in Lithuania was also held. These trained women then conducted workshops that reached 166 more local women leaders. Additionally, a Women's Leadership Forum was hosted with 118 participants from 13 countries, commemorating 20 years of Resolution 1325. Evaluation found participants significantly increased their knowledge on topics covered. The project reached a total of 36,141 people.
This document provides information about anti-lock braking systems (ABS) and anti-slip regulation (ASR) for commercial vehicles. It discusses the development and benefits of ABS and ASR, how they work, their components, and additional systems like electronic stability control. The document covers the theoretical basics of ABS and ASR, explaining concepts like brake force coefficient, cornering force coefficient, and brake slip. It also includes diagrams illustrating the slip curves under different road conditions.
This document provides a presentation on terrorism given by Roly Singh and Farhin Siddiqui at the Laxmi Institute of Computer Application on October 11, 2011. The presentation defines terrorism, discusses the most common terrorist attack types and motives. It also covers the major types of terrorism, causes of terrorism, effects of terrorism, terrorist units and cells. The presentation examines where terrorism is going, recent attacks in India, prevention of terrorism, and concludes by stating that terrorism has a long history of being used to achieve political, religious, and ideological objectives.
Terrorism threatens humanity, society, and economies around the world. It has caused tremendous loss of life in many countries, including Pakistan, leaving widows, orphans, and demolished assets. However, Muslims are often wrongly labeled and blamed as terrorists due to biased media control and propaganda spread by non-Muslim nations. Pakistan in particular has suffered greatly from numerous terrorist attacks over the years, damaging its image, though the root causes are poverty, injustice, and international politics rather than any one religion. Addressing these social and economic issues is key to reducing terrorism long term.
The document provides technical specifications and design details for an electric vehicle called ANDROSPHIN. It includes the vehicle's dimensions, weight, performance characteristics, component designs, analysis, and project planning. Key details are the vehicle's wheelbase of 1517.41mm, max speed of 60kmph, stopping distance of 7.867m, and total weight of 294kg. The chassis is made of AISI 4130 steel alloy. Components like the suspension, brakes, steering, and powertrain are also described in detail along with analysis of stresses and forces. The project timeline is outlined in a Gantt chart spanning 2017-2018.
This presentation is first in the series of lectures for a programme on International Humanitarian Law in the curriculum of law degree.However ,it will also be useful to the students of Law of Armed Conflict in military, para- military forces and other security elements.
40 short essay on terrorism in english the college studyMary Smith
Terrorism means using force and threats against people, groups, or governments for political purposes. Now terrorism is quite organized, with terrorist organizations that train terrorists and are sometimes supported by foreign governments with funds and weapons. Terrorism is used by some groups to gain independence or freedom, like Sikhs in India seeking self-rule in Punjab and Irish people in Northern Ireland seeking independence from Britain. Countries need to work together to stop terrorism by preventing illegal money and weapons, strengthening security forces, and addressing the root causes that lead people to support terrorist groups.
This document summarizes a class seminar on car crash testing. It discusses how crash tests are conducted by driving vehicles into barriers at high speeds and using crash test dummies equipped with sensors. The standard types of crash tests are frontal, side impact, and offset tests. Safety systems like seatbelts and airbags help absorb the kinetic energy during impacts. Crash test ratings provide probabilities of injury based on test outcomes. While crash testing has improved safety, the document notes that mandatory crash testing and safety standards are still lacking in India.
This document discusses definitions of terrorism from various government and international organizations. It notes that there is no universally agreed upon definition. The US Department of Defense, FBI, and Department of State each have their own definitions that focus on unlawful violence or threats of violence intended to create fear and coerce for political, religious or ideological goals. The UN and British government also have their own definitions. The document examines key elements of terrorism, such as it being a tactic to influence audiences beyond the immediate victims, and how terrorists seek publicity through violence. Experts note challenges in defining terrorism given its politically charged nature.
This document discusses the history and issues faced by the transgender community. It notes that transgender people may identify as transwomen or transmen. It outlines some of the major problems they face such as lack of access to education, employment discrimination, and health issues. While some countries have made progress in recognizing transgender rights, in Pakistan transgender people still face significant challenges and lack of legal protections and social acceptance. The document calls for more awareness and education efforts to promote inclusion and equality for transgender individuals.
Young people are promoting understanding and providing education on the values of tolerance and coexistence, especially in areas affected by an influx of refugees and conflict. Learn how the Rotaract Club of Nicosia-Aspelia, Cyprus, sponsored by the Rotary Club of Nicosia-Aspelia, is working with NGOs to create awareness and dialogue among refugees and non-refugees, asylum seekers, and their host communities.
Intervju med Anna Ullenius i tidningen Hästfolk om workshopen "The joy of being" - de helande hästarna - en återkommande workshop på No Mind festivalen, 2-9 juli på Ängsbacka.
Anti lock braking (ABS) Model based Design in MATLAB-SimulinkOmkar Rane
This document describes the modeling and simulation of an anti-lock braking system (ABS) using Simulink. It includes models of vehicle dynamics, wheel dynamics, and a simplified ABS controller. The vehicle model accounts for mass, friction forces, and acceleration. The wheel model includes torque from braking and friction. Simulation results show wheel slip and stopping distance with and without the ABS controller engaged. The ABS system helps maintain optimal slip to minimize stopping distance.
The document discusses the goals and impacts of terrorism through examples like the September 11 attacks and 2002 Bali bombings. It led to significant loss of life and economic impacts like losses to the insurance and airline industries totaling $40 billion. The attacks also caused social impacts like fear, suspicion, and loss of tourism income in Bali of 50%. The document advocates for unity and vigilance against terrorism through total defense and international cooperation.
Women’s human rights situation in egypt in 2013Event Manager
Women's rights in Egypt have faced many challenges throughout history, from discrimination in previous constitutions to sexual harassment and violence that is still prevalent today due to a culture of impunity. While laws have improved to guarantee equal rights, women still face significant barriers to equality and representation in practice due to conservative social values and a lack of enforcement against ongoing discrimination and violence.
A terrorist is defined as a member of a group that engages in acts like kidnapping or murdering civilians for political intimidation or as the leader of an armed group that kills civilians. Terrorism methods include the use of firearms, explosives, chemical and biological agents, and potentially nuclear weapons. Prevention of terrorism involves primary prevention through education to understand differences in cultures and beliefs, prioritizing peace and equality for all people, and eliminating root causes. It also involves secondary prevention such as surveillance systems, protective measures for citizens, and improving security systems.
Automotive Systems course (Module 10) - Active and Passive Safety Systems for...Mário Alves
This presentation browses the most relevant safety systems for road vehicles. It is organized according to the traditional classification of safety systems: active safety and passive safety. Active safety systems help preventing accidents, so they they control the dynamics of the vehicle. Passive safety systems help mitigating the consequences of accidents, thus they protect occupants and pedestrians upon a crash.
This document discusses different types of terrorism and examples of terrorist attacks. It defines civil disorder, political terrorism, non-political terrorism, quasi terrorism, limited political terrorism, and official or state terrorism. It also discusses the 2008 Mumbai attacks where Islamist attackers received assistance and support from Pakistan's intelligence agency. The coordinated attacks lasted three days and killed 164 people across several locations in Mumbai, including the Chhatrapati Shivaji Terminus train station, Oberoi Trident hotel, Taj Mahal Palace hotel, Leopold Cafe, and Nariman House Jewish community center.
This document discusses definitions and types of terrorism as well as profiles of terrorists and how they are recruited. It examines similarities between terrorist groups and cults, and explores psychological theories for why people engage in terrorist behavior, such as groupthink, social learning of aggression, and moral disengagement. Media coverage of terrorism is also discussed as terrorists seek attention, while government terror warnings may increase presidential approval ratings due to social identity and halo effects.
The document provides an overview of terrorism, including definitions, causes, impacts, rates according to the Global Terrorism Index, reasons why people become terrorists, and examples of terrorist attacks in Pakistan, Syria, and the US. It discusses the Peshawar school attack in Pakistan in detail and provides counterterrorism recommendations such as education, understanding cultural differences, eliminating root causes, and being prepared in emergency situations. The conclusion argues that captured terrorists should be tried in criminal rather than military courts.
This dissertation analyzes women's empowerment and approaches to empowering women in Pakistani society. It includes an abstract, introduction, theoretical orientation, research strategy, thematic interpretation, and conclusion. The document discusses key themes like women's social status, health, education, violence against women, economic dependency, and politics. It analyzes women's conditions under different political regimes and suggests empowering women through mobility, access to resources, decision-making power, and education to build confidence and contributions to society and the economy. The dissertation provides a framework to understand women's empowerment dimensions and approaches in Pakistani cultural and social contexts.
The document discusses different types and definitions of terrorism. It notes that terrorism involves acts of violence to achieve political change, but definitions depend on views of the legitimacy of causes. Terrorist groups include left-wing, right-wing, ethno-nationalist/separatist, and religious groups. While most terrorist groups achieve little, some like the PLO negotiated gains after entering politics. The document traces the history of terrorism and its evolution, including the rise of al-Qaeda and its influential 9/11 attacks, which dramatically impacted subsequent international relations events like the US "War on Terror".
Sexava nubila behavioral analysis in every changes of imitation sound from le...Alexander Decker
1. The document analyzes the behavioral response of the insect Sexava Nubila to modifications in the intensity of imitation sounds from its mating calls.
2. An experiment was conducted where sounds recorded from Sexava Nubila were modified and played back to females at varying distances and intensity levels, ranging from 40-80 dB. The number of females approaching the sound source was counted.
3. The results showed that females were most responsive when sounds were played at 60-70 dB intensity levels from distances of 1-3 meters, with over 80% approaching the source. Fewer females approached at lower (40-50 dB) or greater (4-5m) distances and intensities.
María creó tres diapositivas para una presentación: la primera con su nombre, la segunda con una imagen de invierno y la tercera con una puesta de sol en la playa.
Este documento describe las características básicas de las redes de computadoras, incluyendo los tipos de redes, medios de transmisión, capacidad, topología, métodos de acceso y protocolos. Explica conceptos como LAN, WAN, cable coaxial, cable de par trenzado, fibra óptica, ancho de banda, topologías como bus, estrella y árbol. También cubre conceptos como Internet, direcciones IP, dominios y formas de acceder a la red mundial.
This document contains a job performance evaluation form for a surgical assistant. It includes sections to rate the assistant on various performance factors like administration, knowledge, communication, and decision-making. It also includes sections to document the assistant's strengths, areas for improvement, and a review of their job description. The final pages provide examples of performance review phrases that could be used in the evaluation, focusing on attitudes, creativity, and decision-making.
The document provides technical specifications and design details for an electric vehicle called ANDROSPHIN. It includes the vehicle's dimensions, weight, performance characteristics, component designs, analysis, and project planning. Key details are the vehicle's wheelbase of 1517.41mm, max speed of 60kmph, stopping distance of 7.867m, and total weight of 294kg. The chassis is made of AISI 4130 steel alloy. Components like the suspension, brakes, steering, and powertrain are also described in detail along with analysis of stresses and forces. The project timeline is outlined in a Gantt chart spanning 2017-2018.
This presentation is first in the series of lectures for a programme on International Humanitarian Law in the curriculum of law degree.However ,it will also be useful to the students of Law of Armed Conflict in military, para- military forces and other security elements.
40 short essay on terrorism in english the college studyMary Smith
Terrorism means using force and threats against people, groups, or governments for political purposes. Now terrorism is quite organized, with terrorist organizations that train terrorists and are sometimes supported by foreign governments with funds and weapons. Terrorism is used by some groups to gain independence or freedom, like Sikhs in India seeking self-rule in Punjab and Irish people in Northern Ireland seeking independence from Britain. Countries need to work together to stop terrorism by preventing illegal money and weapons, strengthening security forces, and addressing the root causes that lead people to support terrorist groups.
This document summarizes a class seminar on car crash testing. It discusses how crash tests are conducted by driving vehicles into barriers at high speeds and using crash test dummies equipped with sensors. The standard types of crash tests are frontal, side impact, and offset tests. Safety systems like seatbelts and airbags help absorb the kinetic energy during impacts. Crash test ratings provide probabilities of injury based on test outcomes. While crash testing has improved safety, the document notes that mandatory crash testing and safety standards are still lacking in India.
This document discusses definitions of terrorism from various government and international organizations. It notes that there is no universally agreed upon definition. The US Department of Defense, FBI, and Department of State each have their own definitions that focus on unlawful violence or threats of violence intended to create fear and coerce for political, religious or ideological goals. The UN and British government also have their own definitions. The document examines key elements of terrorism, such as it being a tactic to influence audiences beyond the immediate victims, and how terrorists seek publicity through violence. Experts note challenges in defining terrorism given its politically charged nature.
This document discusses the history and issues faced by the transgender community. It notes that transgender people may identify as transwomen or transmen. It outlines some of the major problems they face such as lack of access to education, employment discrimination, and health issues. While some countries have made progress in recognizing transgender rights, in Pakistan transgender people still face significant challenges and lack of legal protections and social acceptance. The document calls for more awareness and education efforts to promote inclusion and equality for transgender individuals.
Young people are promoting understanding and providing education on the values of tolerance and coexistence, especially in areas affected by an influx of refugees and conflict. Learn how the Rotaract Club of Nicosia-Aspelia, Cyprus, sponsored by the Rotary Club of Nicosia-Aspelia, is working with NGOs to create awareness and dialogue among refugees and non-refugees, asylum seekers, and their host communities.
Intervju med Anna Ullenius i tidningen Hästfolk om workshopen "The joy of being" - de helande hästarna - en återkommande workshop på No Mind festivalen, 2-9 juli på Ängsbacka.
Anti lock braking (ABS) Model based Design in MATLAB-SimulinkOmkar Rane
This document describes the modeling and simulation of an anti-lock braking system (ABS) using Simulink. It includes models of vehicle dynamics, wheel dynamics, and a simplified ABS controller. The vehicle model accounts for mass, friction forces, and acceleration. The wheel model includes torque from braking and friction. Simulation results show wheel slip and stopping distance with and without the ABS controller engaged. The ABS system helps maintain optimal slip to minimize stopping distance.
The document discusses the goals and impacts of terrorism through examples like the September 11 attacks and 2002 Bali bombings. It led to significant loss of life and economic impacts like losses to the insurance and airline industries totaling $40 billion. The attacks also caused social impacts like fear, suspicion, and loss of tourism income in Bali of 50%. The document advocates for unity and vigilance against terrorism through total defense and international cooperation.
Women’s human rights situation in egypt in 2013Event Manager
Women's rights in Egypt have faced many challenges throughout history, from discrimination in previous constitutions to sexual harassment and violence that is still prevalent today due to a culture of impunity. While laws have improved to guarantee equal rights, women still face significant barriers to equality and representation in practice due to conservative social values and a lack of enforcement against ongoing discrimination and violence.
A terrorist is defined as a member of a group that engages in acts like kidnapping or murdering civilians for political intimidation or as the leader of an armed group that kills civilians. Terrorism methods include the use of firearms, explosives, chemical and biological agents, and potentially nuclear weapons. Prevention of terrorism involves primary prevention through education to understand differences in cultures and beliefs, prioritizing peace and equality for all people, and eliminating root causes. It also involves secondary prevention such as surveillance systems, protective measures for citizens, and improving security systems.
Automotive Systems course (Module 10) - Active and Passive Safety Systems for...Mário Alves
This presentation browses the most relevant safety systems for road vehicles. It is organized according to the traditional classification of safety systems: active safety and passive safety. Active safety systems help preventing accidents, so they they control the dynamics of the vehicle. Passive safety systems help mitigating the consequences of accidents, thus they protect occupants and pedestrians upon a crash.
This document discusses different types of terrorism and examples of terrorist attacks. It defines civil disorder, political terrorism, non-political terrorism, quasi terrorism, limited political terrorism, and official or state terrorism. It also discusses the 2008 Mumbai attacks where Islamist attackers received assistance and support from Pakistan's intelligence agency. The coordinated attacks lasted three days and killed 164 people across several locations in Mumbai, including the Chhatrapati Shivaji Terminus train station, Oberoi Trident hotel, Taj Mahal Palace hotel, Leopold Cafe, and Nariman House Jewish community center.
This document discusses definitions and types of terrorism as well as profiles of terrorists and how they are recruited. It examines similarities between terrorist groups and cults, and explores psychological theories for why people engage in terrorist behavior, such as groupthink, social learning of aggression, and moral disengagement. Media coverage of terrorism is also discussed as terrorists seek attention, while government terror warnings may increase presidential approval ratings due to social identity and halo effects.
The document provides an overview of terrorism, including definitions, causes, impacts, rates according to the Global Terrorism Index, reasons why people become terrorists, and examples of terrorist attacks in Pakistan, Syria, and the US. It discusses the Peshawar school attack in Pakistan in detail and provides counterterrorism recommendations such as education, understanding cultural differences, eliminating root causes, and being prepared in emergency situations. The conclusion argues that captured terrorists should be tried in criminal rather than military courts.
This dissertation analyzes women's empowerment and approaches to empowering women in Pakistani society. It includes an abstract, introduction, theoretical orientation, research strategy, thematic interpretation, and conclusion. The document discusses key themes like women's social status, health, education, violence against women, economic dependency, and politics. It analyzes women's conditions under different political regimes and suggests empowering women through mobility, access to resources, decision-making power, and education to build confidence and contributions to society and the economy. The dissertation provides a framework to understand women's empowerment dimensions and approaches in Pakistani cultural and social contexts.
The document discusses different types and definitions of terrorism. It notes that terrorism involves acts of violence to achieve political change, but definitions depend on views of the legitimacy of causes. Terrorist groups include left-wing, right-wing, ethno-nationalist/separatist, and religious groups. While most terrorist groups achieve little, some like the PLO negotiated gains after entering politics. The document traces the history of terrorism and its evolution, including the rise of al-Qaeda and its influential 9/11 attacks, which dramatically impacted subsequent international relations events like the US "War on Terror".
Sexava nubila behavioral analysis in every changes of imitation sound from le...Alexander Decker
1. The document analyzes the behavioral response of the insect Sexava Nubila to modifications in the intensity of imitation sounds from its mating calls.
2. An experiment was conducted where sounds recorded from Sexava Nubila were modified and played back to females at varying distances and intensity levels, ranging from 40-80 dB. The number of females approaching the sound source was counted.
3. The results showed that females were most responsive when sounds were played at 60-70 dB intensity levels from distances of 1-3 meters, with over 80% approaching the source. Fewer females approached at lower (40-50 dB) or greater (4-5m) distances and intensities.
María creó tres diapositivas para una presentación: la primera con su nombre, la segunda con una imagen de invierno y la tercera con una puesta de sol en la playa.
Este documento describe las características básicas de las redes de computadoras, incluyendo los tipos de redes, medios de transmisión, capacidad, topología, métodos de acceso y protocolos. Explica conceptos como LAN, WAN, cable coaxial, cable de par trenzado, fibra óptica, ancho de banda, topologías como bus, estrella y árbol. También cubre conceptos como Internet, direcciones IP, dominios y formas de acceder a la red mundial.
This document contains a job performance evaluation form for a surgical assistant. It includes sections to rate the assistant on various performance factors like administration, knowledge, communication, and decision-making. It also includes sections to document the assistant's strengths, areas for improvement, and a review of their job description. The final pages provide examples of performance review phrases that could be used in the evaluation, focusing on attitudes, creativity, and decision-making.
Restarting asset backed securities and current developments in the securitiza...Alexander Decker
This document summarizes a research paper on restarting asset-backed securities (ABS) in Europe after the 2007-2008 financial crisis. It discusses how securitization contributed to the crisis but can also help address economic crises and distressed companies' needs for capital. The paper examines how regulatory reforms are reshaping ABS business. It analyzes data on recent ABS activity in Europe to test the hypothesis that the crisis had a minimal impact on reshaping the ABS market. The results show that regulatory changes, not the crisis itself, have mainly driven changes to the ABS market post-crisis.
El documento describe cómo IBM anunció que ha desarrollado el ordenador cuántico más avanzado del mundo, el cual es capaz de realizar en segundos las mismas operaciones que llevarían cientos de años a una persona, mientras que hace sólo unos años los ordenadores cuánticos se veían más como una teoría que como una posibilidad práctica.
Increase Wave of Violent Crime and Insecurity: A Threat to Socio-Economic Dev...iosrjce
This document summarizes a research paper that examines the increasing rate of violent crime in Nigeria and its implications for socio-economic development. It finds that violent crime such as armed robbery, kidnapping, and terrorism have risen dramatically in Nigeria and created a climate of fear that hinders business activity and discourages investment. If not properly addressed, the rising violent crime could threaten Nigeria's socio-economic development. The paper analyzes this issue using the relative deprivation theory, which posits that frustration from the gap between expectations and capabilities can increase aggression and violence. It recommends that the government must prioritize security by improving intelligence, training, resources for security agencies, and also work to reduce unemployment in order to decrease crime and support socio-economic
Insecurity a threat to human existence and economic development in nigeriaAlexander Decker
This document examines the causes and effects of insecurity in Nigeria. It discusses how insecurity has become a major problem that threatens human existence and economic development. Some of the key causes identified include political factors like the power shift from northern to southern rule, as well as unemployment, jobs racketeering, and poor leadership. Insecurity has led to bombings, killings, kidnappings and destruction of property. It has also negatively impacted people's well-being and the economy through business disruptions and relocations. The study recommends allowing dialogue between ethnic and minority groups to find more peaceful solutions to insecurity in Nigeria.
This document summarizes a journal article that examines the relationship between conflicts and national development in Nigeria. It discusses several key concepts including conflict, national security, and development. It then analyzes some of the main challenges to security in Nigeria that have implications for development, including ethno-religious conflicts, high youth unemployment, and issues with electoral politics and political violence. The document concludes that addressing security challenges is critical to achieving sustainable development in Nigeria.
Library and information services for nationalOnyema Nsirim
This document discusses the role of library and information services in addressing national security and insurgency in Nigeria. It outlines the security information needs of different groups like policymakers, security agents, citizens, and youths/children. It also examines the causes of insurgency in Nigeria and traces the emergence of groups like Boko Haram. The document recommends that libraries should collaborate with security agencies to provide relevant security information to different groups. It argues that an informed society through effective library services can help address the root causes of insecurity and promote peace.
This document examines the link between bad governance and perpetuation of insecurity in Nigeria. It argues that the current security challenges plaguing Nigeria stem from injustice, corruption, and selfish governance by political leaders. Since Nigeria's return to democracy in 1999 after military rule, incidents of ethnic, communal, religious and resource conflicts have persisted across much of the country. This is exacerbated by leaders failing to address issues like poverty alleviation, unemployment, resource allocation and infrastructure development. The document concludes that overcoming insecurity in Nigeria requires strong political will from leaders and commitment to fighting it, as well as unity among Nigerians.
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
Running head: ISOL 534 – Application Security 1
Running head: ISOL 534 – Application Security 2
Week-2 Research Paper Topic
Name: Nikhil Vasani
Course: ISOL-534
Professor: Dr. Jerry Alsay
University of the Cumberland
May 23, 2019
Introduction
The topic of security has been an issue for many countries and citizens alike as countries struggle to root out the vice of insecurity that is posing a great threat especially during this technological era where everything is virtually done online. Today every country around the world is grappling with keeping its citizens and institutions safe from external attacks and threats. Some of these threats could be motivated by various factors ranging from political, economic and social issues which make individuals or groups plan some sort of leveling score mission. If we were to review history in the early days during the 17th and 18th century the issues of insecurity among various nations were in existence but not at the height it is in the wake of the 21st century. Those days’ strategic alliances worked best in culminating threats of external and internal invasion, various leaders would call for peaceful resolution of the indifference that might exist between or among groups of nations. The mode or means of attack was not as sophisticated as it today since the only way terrorists would invade empires those days were through the physical means of actually leading an invasion group or plotting with a team on the ground to execute their plan.
Today this tactic has changed leaving institutions mandated with protecting our boundaries and keeping the people safe with a huge task of coming up with various ways of knowing how, where and when the security threats might actually occur. Some of the world leading security institutions that have earned a name for themselves are the homeland security, the Federal Bureau of Investigation FBI and Scotland Yard. These institutions have in the recent past prevented so many attacks plotted against the United States of America and many countries around the world through tapping the wide insecurity network around the world.
Background research
The issue of terrorism and external attacks has led to numerous loss of lives and property and must be cubed and properly managed using the most efficient methods so as to ensure proper security. It is evident that terrorists no longer use outdated strategies while carrying out attacks. With technology evolving with time, they have learned and mastered the use of new technology and have succeeded in coming up with some of the toughest attacks to prevent. Therefore, the DHS is left with a tough task and must improvise some of the best tactics in their strategic plan so as to have a proper chance in managing the situation. The intelligent gathering is one of the best elements that can be applied by the DHS in order to come up with the right solutions that will stop or prevent external attacks and terrorism.
Globalization and nigeria border security issues and challengesAlexander Decker
This document discusses security challenges at Nigeria's borders in the era of globalization. It notes that porous borders have allowed terrorist groups like Boko Haram to enter Nigeria and carry out attacks. Globalization calls for open borders but without proper controls this can enable criminal activities. The paper examines issues of national security, transnational crimes affecting Nigeria, and the implications of globalization. It argues that despite efforts, incursions at Nigeria's borders continue and this has spread internal insecurity within Nigeria. Better border security and control measures are needed to protect lives and property.
Running head INTERNAL AND EXTERNAL STAKEHOLDERS .docxcowinhelen
Running head: INTERNAL AND EXTERNAL STAKEHOLDERS 1
INTERNAL AND EXTERNAL STAKEHOLDERS 5
Internal and External Stakeholders
Tiara Miller
Strayer University
CRJ 499
4/29/16
Internal and External Stakeholders
Identify the Internal and External Stakeholders.
Internal stakeholders are the people who the individuals and the parties of a certain organization in a country while the external stakeholders are the individuals or the groups of people that are not part of an organization, but they are directly affected by the activities of that organization (Henisz, 2014). In this context regarding to terrorism, the internal stakeholders are the people who are involved in the criminal groups that organize and conduct the terrorist activities such as mass killing, raping, bombing buildings and other nasty activities in order to change some laws that are in operation in a certain country or as a result of the religious differences. External stakeholders, on the other hand, can be attributed to the loyal citizens of a country who are innocent but end up being affected by the activities conducted by these terroristic activities. The external stakeholders also include the children and women who are not part of the terrorist activities, but they get to suffer as a result of the humiliating and the negative activities that are performed by the terrorists in these organizations leaving them as orphans and widows when their fathers and their husbands respectively die.
Discuss how internal or external stakeholders have influenced the situation in a positive or negative way?
One of the ways in which the internal stakeholders in the terrorist groups have influenced the situation of the continuously increasing terrorists’ activities in the different countries is that once the parents of the children have been killed, the terrorist groups takes up the helpless kids. When the victims of terrorism die, the terrorists take their helpless children and induct them in their vices. For example in the country of Somali, the Al Shabaab abducts the children left by the parents behind after their death and takes them in their hideouts. It is in these places that they train them and introduce them to the terrorist group. This increases the instances of terrorism due to the increased manpower to conduct the inhuman activities leading to so much suffering on the loyal citizens in the country.
The other way in which the stakeholders have influenced the situation negatively is that some of the external stakeholders find it a pleasure to support the al-Shabaab and other terrorist groups by giving them the finances to support their activities. The support given to these groups fuel their inhuman activities since it becomes easy for them t attain the amount of funds that they require purchasing the ammunitions that they require using for the bombing activities ...
Tactful Intelligence Sharing and Synergy among the Nigerian Security Operativ...AJHSSR Journal
ABSTRACT: Nigeria‟s peace and human security is currently engulfed in turmoil. And one of the notable
problems of insecurity in the country is menace of advanced cult killings on daily basis most especially the
upsurge of a dreaded cult group known as “Badoo”, that carries out attacks on human lives in Ikorodu suburb of
Lagos State, Nigeria. Residents of Ikorodu and others suburbs in Lagos State, Nigeria now live in perpetual
phobia and the menace has forced several others to have fled the state. The dreaded “Badoo” cult group killings
and attacks pose dangerous threats to human lives, national peace and security. Among the notable factors
aiding the emergence of such dreaded cult group in the state are; poor intelligence gathering and synergy on the
part of Nigerian security operatives, frustration, financial assistance, injustice, forced membership,
unemployment among youths, get-rich-quick syndrome on the part of many Nigerian youths, drug abuse among
others. The study examines threats posed by the menace to human lives, state‟s peace and security; it assesses
the concerted efforts of Nigerian government and security operatives in combating the menace. The study
concludes that, lack of adequate intelligence gathering, general insecurity in the country, corruption, abject
poverty and youth unemployment remain the factors hindering a total arrest of the menace in Nigeria. It also
requests the need for giving adequate support to security operatives by the citizens; continuous
orientation/education for the youths, good laws and governance, adequate intelligence gathering on the part of
security agents to nip the menace in the bud.
KEYWORDS: Badoo cultists, Human security, Security intelligence, Unemployment, Good governance,
Lagos.
Predictors and Incidence of Kidnapping in Contemporary Nigeria: A Socio-Crimi...paperpublications3
Abstract: In this paper, which is essentially a literature review, the researcher undertook a critical investigation into the major predictors and incidence of kidnapping in contemporary Nigeria. The paper further reviewed the various scholars’ and media pundits’ perspectives on kidnapping. Nigeria is in the throes of kidnapping occasioned by a multiplicity of both individual risk factors and social forces. The rising incidence of kidnapping is disturbingly high and destructive to both human and capital development in the country. The current pattern or trend of kidnapping in contemporary Nigeria is a basket case; little wonder therefore that the latest global ranking placed Nigeria as the fourth most notorious kidnapping nation where people can be easily kidnapped with impunity. The quest to settle political differences, inordinate ambition to acquire and accumulate wealth, poverty and social exclusion, perpetual pains of unemployment, and reaction to existing detestable social and political developments are some of the main causes of kidnapping in Nigeria. The central policy implication of this paper is that it will guide security agencies and policy makers on crime and criminality in making reliable policies that will reduce the incidence of kidnapping in Nigeria to the barest minimum.
Corruption Political Party System and Nigerian Democracy An Historical Analys...ijtsrd
Liberal democracy all over the world is a welcome phenomenon. In every modern society the game of politics is influenced tremendously by the elite class that projects the political culture which could make or mar democracy, as a result of the activities of the political parties. The adoption of western democracy is a mixed bag of blessing and catastrophes in the body politics of the country. Today, it is difficult to reconcile Nigerian democracy with that of the advanced democratic Countries. In Nigeria, politics is regarded as a “dirty game” which scares away the down trodden people. It has been noted that the level of socio economic development in the country is significantly related to the nature of politics in vogues. Political parties are primarily aimed at primitive accumulation of wealth. Where, “the end justifies the means” . The prevailing election rigging, thuggery, corruption, fear and intimidation by security agencies as well as hate speech in the campaigns of the politicians reflect value degeneration with the attendant instability in the country’s democracy. To this send, the paper examined political parties in Nigeria An historical Perspective from 1960 – 2019 looking at the roles of political parties as they affect the consolidation of democracy in Nigeria. Three 3 theoretical frameworks were used in the study namely Social learning theory SLT , Social Disorganization theory SDT and Corruption Permissiveness theory CPT .The study noted that Nigeria’s political parties from 1960 2019 has witnessed some challenging situation like ethnicity, corruption, violence, military intervention, civil and electoral deficiencies. Based on the findings, the study recommended among others that registered political parties should not be vehicles for the articulation and implementation of ethnic, religious or regional projects and programmes and that they should remain national in scope, courage and orientation. Aristotle Isaac Jacobs | Tarabina Veronica Pamo | Abidde Kilegha Victoria "Corruption, Political Party System and Nigerian Democracy: An Historical Analysis from 1960 – 2019" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38079.pdf Paper URL : https://www.ijtsrd.com/humanities-and-the-arts/social-science/38079/corruption-political-party-system-and-nigerian-democracy-an-historical-analysis-from-1960-– -2019/aristotle-isaac-jacobs
The scourge of socio economic insecurity in nigeria’s fourth republic, and th...Alexander Decker
1) The document discusses socio-economic insecurity in Nigeria since the return to civilian rule in 1999. While expectations were high that an elected government would improve living standards, paradoxically Nigerians have faced harsh socio-economic conditions and a deterioration in their standard of living.
2) Issues like unemployment, collapse of industries, poor infrastructure, sectarian clashes, assassinations and kidnappings have created a high sense of insecurity. This undermines Nigeria's goal of becoming a top 20 global economy and its competitiveness in Africa.
3) The failure of leaders to provide "public goods" like education, healthcare, jobs and reducing inequality has been the source of violence and threatens Nigeria's relevance as an anchor country in
Defence, Security And Human Security ConceptsAnurag Gangal
The document discusses India's traditional and modern concepts of defence, security, and human security. It outlines India's internal security threats such as terrorism, naxalism, and communalism. It argues that India's approach needs to shift from a traditional territorial focus to a more comprehensive human security approach that ensures the welfare of individual citizens.
This document summarizes research on Western Muslims who have volunteered to fight for ISIS in Syria and Iraq. It provides historical context of Americans volunteering to fight in foreign wars. It discusses polls finding that many U.S. Muslims feel there is a "war on Islam" and experience discrimination. While only a small percentage justify suicide attacks, this could equate to around 80,000 people among U.S. Muslims. The document suggests these feelings could make some Western Muslims more receptive to extreme messages and more open to volunteering abroad. It raises doubts about current approaches that criminalize and block would-be volunteers.
Towards Addressing Global Security Challenges Through Professional Counsellin...iosrjce
This paper sought to discuss the pervading challenges of crises and insecurity on the surface of the
globe, the consequences which invariably affect human beings in different parts of the world. Insecurity knows
no boundary, hence no country of the world, developed or developing is exonerated or immuned. Measures have
been taken at different times by governments of world countries, but all to no avail. Seemingly, the problems of
insecurity tend to defy all tried solutions. Resources, energies and times have been expended as well as other
strategies adopted. Professional counseling, at both micro and macro levels will go a long way in addressing
and assuaging the negative impacts or effects of insecurity. Counselling models, frameworks and specific
approaches if applied will help prevent, manage or cope with the devastation of insecurity at the level of
individuals, groups or society. Human lives and properties are so precious that conserving and utilizing them
will foster development. Negative consequences of insecurity will gradually slide to naught, to guarantee peace,
unity, tranquility and well being of the citizenry the world over
Could tough anti corruption laws and an exclusive anti-corruption court safeg...Alexander Decker
This document proposes several aggressive legal and therapeutic approaches to combat corruption in Nigeria, which is described as widespread and unmanageable. It suggests establishing special anti-corruption courts that could impose harsh punishments like death, amputation, or blindness to deter corruption. It also proposes developing forensic institutions to psychologically evaluate "corruptomania" in suspects and potentially treat convicts. Harsh penalties enforced quickly by these courts and the threat of severe punishment are argued to potentially curb corruption if enshrined in the constitution and carried out compassionately under medical supervision.
This document summarizes the findings of a national survey on impunity in Nigeria conducted by Human Development Initiatives. The survey aimed to assess the public's knowledge, attitudes, and perceptions around impunity. It covered topics like fiscal responsibility, the rule of law, electoral processes, civic responsibility, and causes and solutions to impunity. The survey used quantitative and qualitative methods, collecting data from the public and key institutions across multiple Nigerian states. The results provide insight into how impunity manifests in Nigeria and recommendations for addressing it.
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”John LEE
This document summarizes Lee's perceptions on human security in Africa. It discusses how human security is threatened in multiple ways across Africa, including economic, food, health, environmental, personal, community, and political security dimensions. It also examines factors that shape security, like conflicts, instability, attacks, poverty, and disease. Conflict is prevalent in Africa due to factors like colonial boundaries, poverty, competition over resources, and refugee crises undermine stability. To improve human security, the document recommends policies promoting social inclusion, equitable access to resources, human rights protections, and partnerships between security institutions and other organizations.
Youth Restiveness in Nigeria: Challenge for CounsellingIJAEMSJORNAL
The paper examined the meaning of youth restiveness in Nigeria, its causes and challenge for counselling. The youths were seen as young people who are still in the most active period of their lives. They are cognitively capable of hypothetical deductions, analysis and synthesis of situations by which they find themselves. They are restive; in other words impatient, obstinate and agitated especially when they are not satisfied with the state of things around them. The complexity of modern life makes the situation to be even more difficult for the youths, while the Nigerian factor further complicates matters for them. Some of the factors that contributed to the restiveness of youths in Nigeria include: leadership styles, economic situation, educational pursuits, poverty, unemployment, marginalization, exuberance, drugs, sexually transmitted diseases and activities of significant adults in the communities. Good guidance and counselling were seen as possible strategies that could help in harnessing the inert potentials of the youths and channeling them into vehicles for national development (if the challenges are dealt with); otherwise their restiveness could become fuel for mal-adaptive and mal-adjustive behaviour, thus constituting social problems for the nation as a whole.
Similar to Security challenges as threats to national unity in nigeria (20)
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
𝐔𝐧𝐯𝐞𝐢𝐥 𝐭𝐡𝐞 𝐅𝐮𝐭𝐮𝐫𝐞 𝐨𝐟 𝐄𝐧𝐞𝐫𝐠𝐲 𝐄𝐟𝐟𝐢𝐜𝐢𝐞𝐧𝐜𝐲 𝐰𝐢𝐭𝐡 𝐍𝐄𝐖𝐍𝐓𝐈𝐃𝐄’𝐬 𝐋𝐚𝐭𝐞𝐬𝐭 𝐎𝐟𝐟𝐞𝐫𝐢𝐧𝐠𝐬
Explore the details in our newly released product manual, which showcases NEWNTIDE's advanced heat pump technologies. Delve into our energy-efficient and eco-friendly solutions tailored for diverse global markets.
Satta matka fixx jodi panna all market dpboss matka guessing fixx panna jodi kalyan and all market game liss cover now 420 matka office mumbai maharashtra india fixx jodi panna
Call me 9040963354
WhatsApp 9040963354
Efficient PHP Development Solutions for Dynamic Web ApplicationsHarwinder Singh
Unlock the full potential of your web projects with our expert PHP development solutions. From robust backend systems to dynamic front-end interfaces, we deliver scalable, secure, and high-performance applications tailored to your needs. Trust our skilled team to transform your ideas into reality with custom PHP programming, ensuring seamless functionality and a superior user experience.
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineCIOWomenMagazine
In this article, we will dive into the extraordinary life of Ellen Burstyn, where the curtains rise on a story that's far more attractive than any script.
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Stone Art Hub
Stone Art Hub offers the best competitive Marble Pricing in Dubai, ensuring affordability without compromising quality. With a wide range of exquisite marble options to choose from, you can enhance your spaces with elegance and sophistication. For inquiries or orders, contact us at ☎ 9928909666. Experience luxury at unbeatable prices.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART INDIA MATKA KALYAN SATTA MATKA 420 INDIAN MATKA SATTA KING MATKA FIX JODI FIX FIX FIX SATTA NAMBAR MATKA INDIA SATTA BATTA
Cover Story - China's Investment Leader - Dr. Alyce SUmsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Niswey
50 million companies worldwide leverage WhatsApp as a key marketing channel. You may have considered adding it to your marketing mix, or probably already driving impressive conversions with WhatsApp.
But wait. What happens when you fully integrate your WhatsApp campaigns with HubSpot?
That's exactly what we explored in this session.
We take a look at everything that you need to know in order to deploy effective WhatsApp marketing strategies, and integrate it with your buyer journey in HubSpot. From technical requirements to innovative campaign strategies, to advanced campaign reporting - we discuss all that and more, to leverage WhatsApp for maximum impact. Check out more details about the event here https://events.hubspot.com/events/details/hubspot-new-delhi-presents-unlocking-whatsapp-marketing-with-hubspot-integrating-messaging-into-your-marketing-strategy/
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Security challenges as threats to national unity in nigeria
1. International Affairs and Global Strategy
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol.14, 2013
www.iiste.org
Security Challenges as Threats to National Unity in Nigeria:
Causes, Prevention and Treatment
PROF. CHARLES OKECHUKWU IWUNDU
IGNATIUS AJURU UNIVERSITY OF EDUCATION, RIVERS STATE, NIGERIA.
BLESSING E.N. THOM-OTUYA, PhD
IGNATIUS AJURU UNIVERSITY OF EDUCATION, RIVERS STATE, NIGERIA
thomotuyaben@yahoo.com
Abstract
Every country on earth is faced with the problem of security challenges in her process of national development;
it is not peculiar to Nigeria. But the security challenges confronting Nigeria is capable of disintegrating the
Country and even metamorphose to civil war. The experiences of Nigerians during her civil war from 1966 to
1970 called for caution and academic intervention in other not to cause disaffection, disunity and human
suffering. This paper seeks to probe into the etiology of security challenges in Nigeria, draw a nexus between
security challenges and national unity and seek for prevention of these causes of security challenges in Nigeria.
This paper is aimed at enhancing national unity, good governance and sensitizing Nigeria as a regional power.
Key words: Security Challenges and National Unity
Introduction
Global insecurity orchestrated by both man- made and natural disaster such as: erosion, terrorism,
kidnapping, armed robbery and armed banditry is gradually becoming a national embarrassment to the Nigerian
people. The upsurge in criminal activities seems to have taken a new dimension to the extent that Nigerians are
becoming worried, as it portents a great danger to the unity of the country. Peace and harmony seem to be
eluding our people. A lot of things seem to have fallen apart and the Centre can no longer hold. Our existence as
a nation is threatened, and our existence as people is equally being threatened.
Yesterday was the menace called kidnapping, but today is the deadly and dastardly group called Boko
Haram. Before Boko Haram we had the Niger Delta militants, the Egbesus from Bayelsa, OPC from the west,
the MASSOB from the east, the MOSSOP from the Ogoni land and all forms of political assassinations and
armed robberies. There is no society that does not have headache with crime, but when a nation begins to have
organized groups that take a position against the state such as Movement for the Emancipation of Niger Delta
(MEND), the epidemic kidnapping in the South East, and now the Boko Haram which is an extension of
international trend, it also inform one that the apparatus of the state for maintaining security, law and order is
threatened. Two, that one should look for the causes of that insecurity, because when you get a situation where
people carry arms irrespective of whether they themselves are going through during the process, then, you begin
to wonder about the state of discontentment in our society. And when you analyze the age bracket of the
criminals it also tells one about the rate of unemployment in the country that cannot accommodate this army of
youths (Business day, 28 May, 2012).
In view of the level of uncertainly, tension and anxiety, this palpable fear has generated in Nigerians, and
which has tumultuously affected their everyday activity, there is need for extra vigilance and sensitization among
the people. This is because no meaningful development can be attained when a nation and her people are being
ravaged by a horrendous organized criminal gang causing insecurity in the land. (Business day, 28 May, 2012).
This paper will examine the security challenges threatening Nigeria National Unity, trace the etiology of
security challenges in Nigeria, examine the nexus between security challenges and national unity, and suggest
preventive treatment. This paper is aimed at enhancing the national unity of the heterogeneous Nigerian State for
national development.
Operational Definition of key concepts
It is pertinent to define the key concepts being used in this paper. The concepts are operationally defined, that is,
in the writers own concept.
Security Consciousness: The term in this paper, implies vigilance. It means being proactive in deflating,
combating crime
nipping it in the bud in advance before it begins to manifest. It equally means readiness to
suppress and detect crime using social intelligence and emotional intelligence (that is, psychology of human
relations). It equally requires intelligence gathering or criminalistics.
Security Challenges:
The term simply applies to our in-ability to walk and work freely, peacefully and
harmoniously without fear of molestation, intimidation, assault, and inflicting of harm anywhere we find
ourselves.
National unity:
The term subsumes a non- negotiable peaceful coexistence of the Nigerian people and
corporate existence of the Nigerian state as a nation or entity.
16
2. International Affairs and Global Strategy
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol.14, 2013
www.iiste.org
The Etiology of Security Challenges in Nigeria
Students of political history are not oblivious of the two major ways a nation can be besieged or its corporate
existence threatened which are either by individuals taking arms against humanity. In the case of Nigeria, what
we now witness is a consuming barracuda appolo of individuals taken arms against humanity. Now, the mindbogging questing is, what are the immediate and remote causes of this unwelcomed visitor?
1
The Glaring Syndrome of a failing state: First, what is a syndrome? It means a
collection of signs. There are three major signs or indices for assessing a failed or a failing state.
(a)
National Security: A failed or failing state is measured by its inept or incapacity to
protect the lives and properties of its citizenry. The case of Boko haram is a case in point, going by
the recent statement credited to the country’s Head of state where he admitted that members of
Boko Haram have infiltrated his government as it is now difficult to identify who are members of
the sect. He went further to say: “some are also in the armed forces, the police and other security
agencies. Some continue to dip their hands and eat with you and you won’t even know the person
who will point a gun at you or plant a bomb behind your house” (Business Day 2012 p 6.). This
explanation points to one direction. And that is, the enemy is within the house- hold. It is indeed a
pitiable helpless situation that requires urgent attention.
(b)
Food Security: Poverty, the bible says is a sin. The bible says; “Lazy hands market a
man poor but diligent hands bring wealth”. Another popular adage equally concurs: “An idle brain
is the devil’s work shop”. If a man has a job and has enough money to keep body and soul together,
where he can afford the basic needs of life, he is not likely to go seeking explosives to tie around
himself; he is also not likely to go looking for gun to kill people. There is also insecurity that is not
physical violence, this comes in the form of job insecurity, people go to work today, tomorrow they
are told there is no more job for them hence they are afraid because they do not know what
tomorrow holds. The economic uncertainly is part of the insecurity. (Business day, 28 May, 2012).
As prof. Sam Aluko of the blessed memory puts it “the poor cannot sleep because they are hungry.
And the rich can hardly sleep because the poor are awake”.
(c)
Social Security:
Lack or absence of basic necessities of life unarguably threatens the security of any nation. A
country that cannot provide constant electricity, good education, employment opportunities,
recreational facilities, good health care services, and good social welfare services is on the brink of
national- calamity and chaos.
2 Bad Governance: Leadership demands courage, vision, and mission. A good leader must have strong
political will in order to deal with the exigencies of the times. That is the courage or temerity to confront an
obvious obstacle that encumbers the process of smooth governance or has become a clog in the wheel of
progress. A good leader must have the wisdom for discernment and the strength to withstand pressure as
demanded by his office. When corruption pervades, especially in high places and allowed to stay, citizens begin
to loose confidence in governance and the consequence is better Imagined than said. A good leader must be able
to combine intellectual capacity with political sagacity. “Lootocracy” (looting of the nation’s treasury), and
judicial corruption must be discouraged. A society where there is no purchased justice is a safe home for
everybody. A country where its security agencies are not engrossed in mass corruption and gross inefficiency is
a paradise to all.
3. Duplicated Functions of Security Agencies/ Inadequate Training and Equipment: Conspicuous and
huge over-lapping functions of our security agencies tend to deflate and undermine their efficiency and
responsibility. There are instances where the SSS (State Security Service), the police, the EFCC (Economic,
Financial crime commission), the customs, immigrations, the army, the civil defense corps seem to have their
functions remarkably undefined. Moreover, our security agents seem to be lagging in the modern day technical
knowhow in combating crime, including lack or inadequate equipment for perfect execution of their duty.
4. Religious Ideology: Let us begin by citing example with what happened during the .last years of apartheid
in South Africa. A young lad was asked to speak on what made him go into crime. His reply was: “I want you to
know that I was raised to think you were an animal”. The world is divided into two: The children of light and the
children of darkness, the sheep and the goats, the elect and the damned. Righteousness, intelligence, integrity,
humanity and victory are our prerogatives, while we belong to them. This is the wickedness; stupidity,
hypocrisy, and ultimate defeat belong to them. This is the evil of religious ideology. It is said some people have
17
3. International Affairs and Global Strategy
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol.14, 2013
www.iiste.org
used religion for evil purposes. It is also sad some religious leaders seemed to have encouraged terrorism or
support war either by their utterances or behavior. (Goleman, 2006, watch Tower, May 1, 2010).
Our world since 1914 the First World War and 1967-70 Nigeria Civil War have become known as one of
crime and violence. In many places no one feels safe on the streets even during daytime. At night people stay in
their homes behind locked and barricaded doors, afraid to go outside. This means the end of the world is near
(Watch Tower, 2005).
5. Militarization of Youth By Political Irredentists: The root of evil summarizes the psychological forces that
spawn such crime. When youths are unable to speak up to defend themselves and those who used them for their
self-seeking political ambition, dump them after achieving their selfish ambition and fail to disarm them, what
then do we expect/ The answer is not farfetched, it is to unleash terror and violence on their exploiters and
cohorts. This explains why the rich are not happy. A good number of wealthy people do not use their wealth
wisely by trying to affect the lives of those close to them. (Goleman, 2006).
6. Border crime: Border crime otherwise known as transnational crime refers to crime that take place across
national borders. It is a term commonly used in the law enforcement and academic communities. They include
human trafficking of goods, arms trafficking and drug trafficking etc. Smuggling is a seminal threat to national
security as it undermines the security of the nation, for it represents a formidable national and security problem.
(Wakili, 2009, and Olayode, 2009),
7. Weak Family Responsibilities: Most homes today are found wanting in the discharge of their traditional
responsibilities. The causes range from civilization and economic problems. When parents fail to discharge their
duty in the bid to bring up their children properly, then that nation is in danger.
8. Weak Scholastic Education: A good number of our schools have lost their moral authority. The school is
another home where a child spends most of his active hours. If a school cannot inculcate moral virtues to
children and sound academic knowledge, them that society is at loss. This explains why some parents these days
take their time before deciding on the type of institutions their children will attend as cultism and other vices
seem to be the trend of the day (Iwundu 2007).
9. Wide Spread of Uncensored Movies/ Media lapses: All manner of sex provocative and violence cultivated
movies, have found their way into our markets and homes today. When innocent children begin to watch such
movies unchecked, subconsciously, they begin to imbibe such ideas exposed in the movies as a way of life.
Sadly enough, most of the media houses are culprits in this regard. Another way of their culpability is in the area
of over celebration of evil rather than condemning it. The good is hardly celebrated. They forget that children are
watching and are likely to take them serious since they are potent agents of education in the society (Iwundu,
2007).
Security Challenges and National Unity in Nigeria.
The security challenges bedeviling Nigeria is a serious threat to her national unity. The national unity of Nigeria
is sacrosanct by the provisions of her constitution. Most threat to national unity of Nigeria has met brutal force
and coercion. An attempt by the Igbo tribe to secede from the federation resulted to a civil war in 1966; another
attempt of Isaac Adaka Boro to secede the Niger Delta area from the federation landed him in jail. The recent
attempt by MASSOB leader Umezurike to re-kindle the Biafran spirit landed him in jail. The recent security
challenges confronting Nigeria as noted by the Nobel Laureate Professor Wole Soyinka that, the country is
already drifting (Oderemi, 2013) i.e., it is gradually returning to the inglorious era of disunity, which precipitated
a civil war some thirty years ago.
Similarly, the United Nations and the United States of America have separately expressed deep concern on the
state of affairs in Nigeria and called on Nigerians to tread softly in the interest of national unity. The 1999
constitution of Nigeria provides a legal framework of Nigeria’s national unity. Specifically, section one under
the General Provision in part one states that, “Nigeria is one indivisible and indissoluble sovereign state to be
known by the name Federal Republic of Nigeria”. The implementation of this provision is a function of the
government. The government has the task of promoting and protecting national unity. This could be done
through promotion of public welfare, justice, democracy and for Nigerians to understand one another and to see
each other as equal part of an indivisible nation; and for Nigerians to believe there is a place for them under the
Nigerian State.
National Unity should be a key target of government policy at all levels. Nigerians are not too satisfied with the
progress made by government in promoting greater integration amongst the countries various tribes or ethnic
groups. However, numerous government policies and laws differentiate Nigerians on the basis of ethnic
background, to the point that, some tribes or ethnic group feels they have been the target of discrimination.
Government should create a Ministry of National Unity as in the case of Malaysia, tasked with promoting greater
integration amongst the Countries various communities.
Those that are instrumental to the disunity of Nigeria are not knowledgeable and pragmatic about the trends of
globalization and activities in the international state system. Those things/issues used in polarizing Nigeria are
18
4. International Affairs and Global Strategy
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol.14, 2013
www.iiste.org
rather strength than weaknesses to the Nigerian state. In a statement issued in Washington, the United States
Department identified Nigeria’s ethnic and religious diversity as a source of strength (Oderemi, 2013). Moreso,
Nigeria is expected to play a leading role in Africa and the United Nations; internal disunity will prevent Nigeria
from becoming a regional linchpin.
In addition, Nigeria is very strategic to the interest of the United States of America. America as a unipolar
power, she has a lot of responsibility in maintaining world peace, this she cannot achieve without positioning
regional powers, that will assist her to police their regions, and for peace keeping missions. Therefore, Nigerians
should stop being used to create disaffection, disunity nor security breaches because of her national and primary
interest of becoming a foremost balancer of power in Africa. The United States of America should assist Nigeria
to fight against agents of insecurity in Nigeria.
The Way Forward: Prevention and Treatment: In the human kingdom, solutions abound. This seemingly
intractable problem surely requires the following preventive measures and treatment:
(1). Review of the 1999 constitution: There seems to be high insidious wave of disenchantment,
discontentment, discouragement and demotivation across the length and breathe of this nation due to the present
configuration and composition of the 1999 constitution, which many believe has failed to address salient issues
in nationhood such as: citizenship against indegeneship or residency right. Others include the immunity clause,
judicial reforms, police reforms (that will address policing methods in Nigeria, the lapses in entry requirement,
work environment, orientation and appearance), political restructuring ( take the case of multiplicity of parties),
local government reforms etc. the status-quo seems to widen the gap between, ethnicity, tribalism nepotism,
favoritism, bribery, corruption and patriotism, and commitment and hard work. Therefore, there is the penchant
need for a new constitution that will launch Nigeria on the part of true federalism.
(2) A National Conference should be convoked to enable the ethnic groups articulate and dialogue on issues of
national importance. Resolutions there can be reflected in the constitution and in government policies and
programmes.
(3) A Ministry of National Unity should be created, tasked with promoting greater integration amongst the
Countries various communities.
(4) Strong Political Will: Our leaders should be courageous enough to stamp out the menace of terrorism and
other crimes irrespective of whose Ox are gored. When a leader sits back and watch the nation gradually rocked
the boat, people begin to question his intellectual capability.
(5) Visible police patrol: Police training does not end in check points. In Europe and other civilized nations,
the police are always on the move and not in the habit of mounting illegal and irrelevant road blocks and be
collecting money from motorist.
(6) Intelligence Gathering: It is like our security agencies are not well schooled in the techniques of
intelligence gathering, which seems to suggest that it may be basically one of the reasons why they are not
proactive in forestalling crime.
(7) Negotiation Breeds Motivation: It is anarchious for a country or a leader to begin to negotiate with
criminals. By doing so, he might be sending the wrong message to the law abiding citizens who perhaps have no
job. The signal is that, it is only by taking arms against the state and humanity one can be recognized and
rewarded.
(8) Redefining the Role of Security Agencies: There are so many overtly
functions or visibly
demonstrated over-lapping functions of our security agencies. The SSS, police, the army, customs, etc. need their
functions properly redefined in order to allow for efficiency, and be held culpable when any lapse is recorded
from any quarter.
(9) Stiff penalty for Political Offenders: There is need for stiff penalty against political thurgery, rigging of
elections and monetary inducement. Our people should be allowed to choose their leaders. It is only when
transparency thrives in politics that the masses can trust government
(10) Stiff Penalty for Transnational Crime: Our Border, both land and sea need proper policing. Offenders
should be adequately punished in order to serve as deterrent to others. God- fatherism should not be allowed to
prevail.
(11) Education: Education is the key to human development. Illiteracy and half-backed literacy are two sides of
the coin that breed stupid ignoramus. If a man is properly schooled, imparted with sound moral and academic
knowledge he will hardly be swayed into joining gangs. Therefore, parents, schools, government, the religious
organizations, the mass media and the society have a big role to play in this regard.
19
5. International Affairs and Global Strategy
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol.14, 2013
www.iiste.org
(12) Job Creation: The army of the unemployed youth in our country today calls for serious concern. Nigeria is
rich to a point where her youths need not to be massively unemployed. All those projects that corrupt politicians
abandoned or money stolen by corrupt politicians should be channeled into creating jobs for the youth. If youths
are gainfully occupied, crime will certainly reduce.
(13) Welfarism: Our youths, including the elderly unemployed are serious with the word patriotism today,
because they feel that government does not care for them, the otherwise publicized sovereign wealth fund will
make meaning if only our government can learn and borrow from that of Germany, Sweden, Britain and
America.
(14) Security Consciousness: one adage prominently during the Nigerian /Biafra War and still remains
indelible in mind, goes thus for the Biafrans: “: Anyone surrendered by the Enemy must not fail to be vigilant at
all times”. One major key to the prophylactic treatment of insecurity is being recommended by McNab and
Rabiger (2003).
(15) Home Security and Safety: The following are measures to ensure home security and safety;
(i)
Proper back and front door security and window security.
(ii)
Installation of home burglar alarm system,
(iii)
Setting of timer lights and lighting up dark nooks, (places)
(iv)
Trimming back three branches,
(v)
Using suitable security dog breeds (e.g. bull, mastiff, Rott-Weller, German
(vi)
Cultivating a safe neighborhood by forming a neighborhood watch,
(vii)
Having a nice gun lock and safe,
(viii) Avoid opening the door for an unknown persons,
(ix)
Planning and constructing a safe room (a hide way within the house to which occupants can easily
withdraw in order to call for help in the event of break in. Typically a safe room is created from a
master bedroom. It should have a solid, ideally metal core door that locks instantly from the inside
and well – ventilated, with a mobile phone to call the police or alert neighbours.
(a) Safety on the Streets and Traveling;
The following precautious measures are to be taking;
(i) Be streetwise: be aware of the unwanted attention that your style of dressing and belongings may attract
and avoid taking shortcuts through unfamiliar part of the city,
(ii) Close to Home: Be alert and take the safest route possible from your parked car to your front door,
(iii) Carjacking: Plan your route carefully and never stop your car in unfamiliar or lonely parts of the city and
keep the car doors and windows locked always,
(iv) Road range: If you encounter an angry driver, never get out of your car or risk getting into an argument
and if possible call the police to the scene on a cell phone.
(v) Aggressive driving: Avoid making angry gestures when driving because your behavior could lead to a
road range attack,
(vi) Learn to say sorry: One of the responses widely recommended when driving is a clear apology. So, do not
risk rolling down the window.
(b) Terrorist reats: The following techniques are recommended for countering terrorist attack.
Night clubs, restaurants, hostel, schools, public vehicles, aircrafts, churches etc. are prone to terrorist
attack. Abandoned bags, objects and suspicious movements should be reported to the police.
(i) Suspicious Package: Beware of strange letters in an Envelope or parcel, or unidentified suitcase
(ii) Complete vehicle and individual search: Cars and individual entering public places need to be
thoroughly searched using detective devices.
(16) Creation of National Transparency and Accountability Vanguard (NTAV).
The present day professional misconduct, human rights abuses and security challenges call for an independent
volunteer organization that shall under law monitor and report to the appropriate quarters cases just mentioned.
Membership of this organization shall be drawn from such associations like De-Norsemen, the civil society or
liberties, Asuu, the Nigeria Bar Association, and the Nigeria Medical Association etc.
20
6. International Affairs and Global Strategy
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol.14, 2013
www.iiste.org
(17) Prisons / Agencies Reforms: In Nigeria, prisons are hellish realm, where convicts struggle in a toot -andnail battle; everyone fights to get respect, toughness wins prestige. The question we should ask ourselves is, are
the prisons the best “schools” for a society to be sending law offenders as so many go back to crime and on their
release end upright back in those festering holes? Here the system continues to breed incurable recidivists. There
is need for total reformation of our prisons or detention units form the angle of dehumanization to correction by
adopting a system known as “restorative justice programme”. The emotional subtext of restorative justice urges
offenders to change their perception of their victims from that of unleashing terror to that of demonstrating
empathy (Goleman, 2007). In addition, the police psychological disposition towards crime offenders needs to
be changed. This is because the very best police officers are adamant at exercising influence, the sense of
constructively shaping the outcome of an interaction, using tack and self-control. Paragons of law enforcement
use the last force necessary, though they may make a strong show of force to back it up. They approach volatile
people with a professional demeanor, calmly and attentively (Goleman, 2007).
Conclusion
Security undoubtedly is every body’s business. The challenges that confront us today, threatening the corporate
existence of Nigeria as a nation are the problems of national security. This paper has highlighted the causes and
way forward. There is need for every hand to be on deck to fight this monster ravaging our beloved nation,
Nigeria.
References
Amended 2004 Constitution of the Federal Republic of Nigeria.
Businessday, May 28, 2012. Pp. 6 and 44
Goleman, D. (2007). Social intelligence. Bantam Books. New York.
Iwundu, C.O. (2007). Criminological Psychology. Rodi Pub. Port Harcourt.
McNab, C. and Rabiger, J. (3003). The personal security Hand Book. The Ultimate Guide to protect your Home
and Family. The Lyons Press. London.
Oderemi, K. (2013). Saturday Tribune, online, Wednesday march 27.
Olayode, K. (2009). The Diverse forms of transnational criminal Activities in West Africa. In Transnational
crime and Security in Africa. (Ed) onafowokan, O. and Oche, O. Foreign Service Academy. Lagos. Pp. 109-135.
Wakili, A. (2009). The challenges of Trans- border crimes. In Transnational crime and Security in West Africa.
(Ed) Onafowokan, O. and Oche, O. Foreign Service Academy. Lagos. Pp. 87- 106.
Watch Tower, 2005 P. 3.
Watch Tower, May 1, 2012 P 16.a
21
7. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar