Home / Criminology / Government and the management of security challenges in nigeria

Government and the management of security challenges in nigeria

 

Table Of Contents


<p> </p><p>CHAPTER &nbsp; &nbsp; &nbsp;</p><p>Title Page &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; i</p><p>Declaration &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ii</p><p>Certification &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; iii</p><p>Dedication &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; iv</p><p>Acknowledgements &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; v</p><p>Abstract &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; vi</p><p>Table of Contents &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; vii</p><p>List of Tables &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; viii</p><p>List of Pictures (Plates) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; xvi</p><p>List of Diagrams &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; xv</p><p>List of Appendices &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; xiv</p><p>List of Abbreviations &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; xvii</p><p>&nbsp; &nbsp; INTRODUCTION: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Background of the Study. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Statement of the Research Problem. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Objectives of the Study. &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 15</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Main Objective. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 15</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Subsidiary Objectives. &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 16</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Hypotheses. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 16</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Significance of the Study. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 16</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Scope and Limitations of the Study. &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 20</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Definition of Terms. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 21</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Background to the Centralization of Security System in Nigeria. &nbsp; 23</p><p>1.8.1 &nbsp; &nbsp; &nbsp; &nbsp; The Negative Effects of Centralized Security System &nbsp; in Nigeria. 27</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Objectives and Principles of Security. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 29</p><p>2.0 &nbsp; &nbsp; &nbsp; REVIEW OF RELATED LITERATURE AND THEORETICAL FRAMEWORK.</p><p>2.1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Literature Review (Introduction) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 34</p><p>2.2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; General Literature on State Security Management Mandate. – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 34</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Comparative Literature on Systems of Government and Countries with Oil-Related Security Challenges. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 68</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Unitary or Centralist System of Government – Iran. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 68</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Federalist or Democratic System of Government – Nigeria. 72</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Countries with Crude Oil-related Security Problem- Venezuela and Angola. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 75</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Venezuela and Oil-Related Security Challenges. – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 76</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Angola and Oil-Related Security Challenges. &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 84</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Nigeria and Oil-Related Security Challenges. &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 87</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Comparative Discussion. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 89</p><p>&nbsp; &nbsp; &nbsp; &nbsp; Case Study Literature Focusing on Crude Oil Discovery and Exploitation as a Major Source of Insecurity in Akwa Ibom.- &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 92</p><p>&nbsp; &nbsp; &nbsp; &nbsp; 2.5 &nbsp; Configurative Literature Focusing on the State Security Structures. &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 103</p><p>&nbsp; &nbsp; &nbsp; &nbsp; 2.5.1 &nbsp; &nbsp; &nbsp; The State Security Service (SSS). &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;– &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 106</p><p>2.5.2 &nbsp; &nbsp; &nbsp; &nbsp; The Nigerian Police Force (NPF). &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 109</p><p>2.6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Ideological Literature on the Central Ideas of Philosophers,</p><p>Experts and Scholars of Security. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 111</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Summary of the Reviewed Literatures. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 113</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Theoretical Framework. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 122</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Structural-Functionalist Approach. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 122</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Levels 1, 2, 3 of Security Model. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 124</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Harmonization of Theories. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 126</p><p>2.8.4 &nbsp; &nbsp; &nbsp; Role Expectation of Citizens. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 132</p><p>2.9 &nbsp; &nbsp; &nbsp; &nbsp; Historical Background and Objectives of Security. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 135</p><p>3.0 &nbsp; &nbsp; &nbsp; RESEARCH METHODOLOGY</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Research Methodology. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 139</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Research Design. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 140</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Population of the Study. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 144</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Research Area. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 145</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sources of Data Collection. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 145</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Sample and Sampling Techniques. &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 146</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Research Instrument and Administration. – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 146</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Validity and Reliability of Test Instrument. – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 147</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Method of Data Analysis. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 147</p><p>4.0 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; DATA PRESENTATION, ANALYSIS AND DISCUSSION OF FINDINGS:</p><p>4.1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Introduction. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 148</p><p>4.2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Data presentation and Interpretation &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 150</p><p>4.3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Testing of Hypotheses. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 150</p><p>4.3.1 &nbsp; &nbsp; &nbsp; &nbsp; Hypothesis I &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 150</p><p>4.3.2 &nbsp; &nbsp; &nbsp; &nbsp; Evaluation of Hypothesis Qualitatively. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 152</p><p>4.3.3 &nbsp; &nbsp; &nbsp; &nbsp; Evaluation of Hypothesis I &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 153</p><p>4.3.4 &nbsp; &nbsp; &nbsp; &nbsp; Hypothesis II &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 163</p><p>4.3.5 &nbsp; &nbsp; &nbsp; &nbsp; Evaluation of Hypothesis II &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 164</p><p>4.3.6 &nbsp; &nbsp; &nbsp; &nbsp; Hypothesis III &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 174</p><p>4.3.7 &nbsp; &nbsp; &nbsp; &nbsp; Evaluation of Hypothesis III &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 176</p><p>4.3.8 &nbsp; &nbsp; &nbsp; &nbsp; Hypothesis IV &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;– &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 181</p><p>4.3.9 &nbsp; &nbsp; &nbsp; &nbsp; Evaluation of Hypothesis IV &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 183</p><p>4.3.10 &nbsp; &nbsp; &nbsp; Discussion of Findings. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 205</p><p>5.0 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; SUMMARY, CONCLUSION AND RECOMMENDATIONS:</p><p>5.1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Summary. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 212</p><p>5.2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Conclusions. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 218</p><p>5.3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Recommendations. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;– &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 220</p><p>BIBLIOGRAPHY &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 229</p><p>JOURNALS &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 239</p><p>NEWSPAPERS &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 241</p><p>HOLY BIBLE &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 243</p><p>APPENDIX 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 244</p><p>APPENDIX 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 245</p><p>APPENDIX 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&amp;n</p> <br><p></p>

Thesis Abstract

<p> Security concerns have existed since time immemorial. But, the challenges have never been as readily manifested as they are presently. This is rather disconcerting. Moreso, because some of the security challenges and problems we encounter daily in the contemporary society are almost entirely unpredictable. Indeed, rapid growth and use of mechanical arts, applied science, and revolutionary dynamics of society apparently blend well with the desperate nature of the criminally minded to increase the spate of threats to life and property, a state which has assumed omnipresent and digital dimensions of crime in our society. The aim of this study is to examine Government and the Management of Security Challenges in Nigeria a case of Akwa Ibom State (1999-2011). Governments, all over the world are accountable for the provision of security and well-being of their citizens through the use of instruments of state power, including defense and security agencies, backed-up by enabling laws. For instance, the 1999 Nigerian constitution outlines the role of government and relationship among levels of government in security management. During the period, Akwa Ibom State had suffered myriad of internal security challenges namely; kidnappings and hostage takings for monetary gains, murder and political assassinations, armed robberies, cult-related criminal activities and subversion. Others include illegal possession of fire arms, insurgency, economic sabotage, oil pipelines and NEPA installations vandalization, arson and fire outbreaks and boundary disputes. This work used descriptive statistics (including charts and tabular analysis) to analyze the role of government in security management. The study however, focused on security challenges arising from dereliction of statutory duties by police personnel due to poor salary, insufficient funding and equipping of security agencies with consequent high crime rates. This work adopted structural functionalist and levels 1, 2, 3 models as theoretical frameworks. The study recommends that government at all levels should motivate, approve good remuneration to security and law enforcement agents, properly fund and equip security agencies to boost their operational capabilities for effective protection of lives and property of the citizens. <br></p>

Thesis Overview

Blazingprojects Mobile App

📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Project Journal Publishing
🎓 Undergraduate/Postgraduate
📥 Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Criminology. 2 min read

The Impact of Community Policing on Crime Reduction in Urban Areas...

The research project titled "The Impact of Community Policing on Crime Reduction in Urban Areas" aims to investigate the effectiveness of community po...

BP
Blazingprojects
Read more →
Criminology. 2 min read

The Impact of Body-Worn Cameras on Police Officer Behavior and Public Perception...

The project titled "The Impact of Body-Worn Cameras on Police Officer Behavior and Public Perception" aims to investigate the effects of implementing ...

BP
Blazingprojects
Read more →
Criminology. 2 min read

The Impact of Social Media on Crime Reporting and Investigation...

The project titled "The Impact of Social Media on Crime Reporting and Investigation" seeks to explore the dynamic relationship between social media pl...

BP
Blazingprojects
Read more →
Criminology. 3 min read

The Impact of Technology on Crime Prevention and Criminal Investigations...

The project titled "The Impact of Technology on Crime Prevention and Criminal Investigations" aims to explore the profound influence of technology on ...

BP
Blazingprojects
Read more →
Criminology. 4 min read

Exploring the Relationship Between Social Media Use and Cyberbullying Among Adolesce...

The research project titled "Exploring the Relationship Between Social Media Use and Cyberbullying Among Adolescents: A Criminological Perspective" ai...

BP
Blazingprojects
Read more →
Criminology. 4 min read

The Impact of Body-worn Cameras on Police Officer Behavior and Public Perception: A ...

The research project titled "The Impact of Body-worn Cameras on Police Officer Behavior and Public Perception: A Criminological Study" aims to investi...

BP
Blazingprojects
Read more →
Criminology. 4 min read

The Impact of Body Cameras on Police Officer Behavior and Accountability in Law Enfo...

The research project titled "The Impact of Body Cameras on Police Officer Behavior and Accountability in Law Enforcement" aims to investigate the effe...

BP
Blazingprojects
Read more →
Criminology. 4 min read

The Impact of Cybercrime on Society: A Criminological Analysis...

Research Overview: The project titled "The Impact of Cybercrime on Society: A Criminological Analysis" aims to delve into the growing concern of cybe...

BP
Blazingprojects
Read more →
Criminology. 2 min read

The Impact of Body-Worn Cameras on Police-Community Relations...

Research Overview: The use of body-worn cameras by law enforcement agencies has garnered significant attention in recent years due to its potential impact on p...

BP
Blazingprojects
Read more →
WhatsApp Click here to chat with us