The Challenges and Prospects of ICT Utilisation in Counter Terrorism Efforts in a Transitional Democracy: The Case of Nigeria

Main Article Content

Ngboawaji Daniel Nte
https://orcid.org/0000-0002-1331-3511
Otega Okinono
Awal Isa
Debi Amadedon
Tovie Bodise-Ere Oba

Abstract

The global quest to fight terror worldwide cannot be over emphasised as extremists and non -state actors continue to ravage the ungoverned spaces opening up around the globe. Consequently this work is an evaluation of the use of ICT in counter terrorism efforts in Nigeria as a fledgling democracy. The study reviewed the challenges and prospects of the application of ICT to counter terror in a country where Boko Haram, ISWAP, and other militant groups have continue to challenge the legitimacy and territorial integrity of the Nigerian state. The work used the mixed method –comprising qualitative and quantitative analytical efforts and found out that for the Nigerian State to make sustainable impacts in her counter terrorism efforts ICT should be the pivot. In the same vein, the study advocated adequate training and sustainable Information Technology policy and culture that will encourage the development of substantial capacity to drive an ICT-driven counter terrorism in a world full of rapidly mutating terrorism.

Article Details

How to Cite
Nte, Ngboawaji Daniel, Otega Okinono, Awal Isa, Debi Amadedon, and Tovie Bodise-Ere Oba. 2023. “The Challenges and Prospects of ICT Utilisation in Counter Terrorism Efforts in a Transitional Democracy: The Case of Nigeria”. Indonesian Journal of Counter Terrorism and National Security 2 (1), 63-114. https://doi.org/10.15294/ijctns.v2i1.65708.
Section
Articles

References

Abolurin, A. (2012). Religion: A Precursor of Terrorism in Nigerian State: A commo-sensical perspective. Retrieved from https://www.ajol.info>article>view.

Adedire, S. A., Ake, M. and Olowojolu, O. (2016). Combating Terrorism and Insurgency in Nigeria: An International Collaborations against Boko Haram. Fountain University Journal of Management and Social Sciences: 5(1): 67 – 74.

Adewoye, T. A. (2017): Counter terrorism strategies and Nigeria’s foreign policy objectives. M.Sc. Thesis, Babcock University.

Afoaku, O. G. (2017). Islamist terrorism and state failure in northern Nigeria. Africa Today, 63(4): 21-42.

Ageyi, J. (2017). Human Capacity Development in Technology: Challenges and Strategies. Nigerian Journal of International Affairs; 36(2).

Akande, S. (2015). Causes of terrorism in Nigeria. Retrieved from https://www.thenews-writer.ng.com

Azigbo, O. (2008, February 18). Paying lip service to Niger Delta Development. Vanguard, p. 18.

Azumah, J. (2015). Boko Haram in retrospect. Islam and Christian-Muslim Relations, 26 (1): 33-52.

Campbell, J. (2017). Nnamdi Kanu and the indigenous people of Biafra. Council on Foreign Relations. Retrieved from https://www.cfr.org

Chinda, F. E., Shuaibu, A. N. and Dyikuk, J. (2018). Information Technology as an Indispensable Security Tool: Nigeria’s Boko Haram Sect in Focus. International Journal of Applied Research and Technology, 7(8):39 – 51.

Cornish, D. B. and Clarke, R. V. eds. (2006). The Reasoning Criminal. New York, N.Y.: Springer-Verlag.

Duru, E. J. C. and Ogbonnaya, U. M. (2012). The poverty of crisis management strategies in the Niger Delta Region of Nigeria: A focus on the amnesty programme. An International Multidisciplinary Journal, Ethiopia, 6(2): 162-170.

Eijkman, Q. (2012). Counter-terrorism, Technology and Transparency: Reconsidering state accountability. The Journal of International Security and Terrorism (IST, 1–

Enders, W. and Sandler, T. (2003). The Effectiveness of Antiterrorism Policies: A Vector-Auto-regression-Intervention Analysis. American Political Science Review, 87(4):829-844.

Garba, E. J. and Ahmadu, A. S. (2015). ICT Implementation Framework for Integrated National Security, Emergency and Disaster Management for Nigeria, 15(1): 27–37.

Ham, S. and Atkinson, R. D. (2002). Using Technology to Detect and Prevent Terrorism. Progressive Policy Institute 600 Pennsylvania Ave., SE, Suite 400, Washington, DC 20003, United States.

Ibrahim, Y. (2011). Why we struck - Boko Haram. Daily Trust. Retrieved from https://www.dailytrust.com.ng

Idowu, A. A. (2013). Security laws and challenges in Nigeria: The Boko Haram insurgency. Journal of Applied Security Research, 8(1): 118-134.

Kemi, A. O. and Happiness, K. P. (2016). The Role of Information Technology in National Security: A Case Study of Nigeria, 16(9): 220–227.

Koerchler, H. (2002). “The War on Terror, its Implication on the Sovereignty of States, and it Implications for Human Rights and Civil Liberties”, Lecture delivered at the International Ecumenical Conference on Terrorism in a Global World, NCCP, the World Council of Churches and the Christian Conference in Asia, September, 25th.

Mamud, Y. A. (2020). Leveraging Technologies for Counterinsurgency Operations in Nigeria: Available Options.

Moore, S. (2011). Terrorism: Nigeria and Global Dimensions POSTS Tagged Science and Technology, Ibadan: Golden Gems Unique Multi-ventures.

Morgen, S. (2017). A look at Nigeria´s security situation.

Ndukwe, E. C. A., Hall, C. and Abuja, T. H. (2009). By Nigerian Communications Commission.

Neumann, P. R. (2008). Terrorism in the 21st century. The rule of law as a guideline for German policy. Compass 2020, Germany in international relations Aims, instruments and prospects.

Niworu, S. M. (2013). Boko Haram Sect: Terrorists or a Manifestation of the Failed Nigerian State. Journal of Politics and Law; 6(2): 245-249.

Ogedebe, P. M. and Jacob, B. P. (2012). The Role of Information Technology in Combating Security Challenges in Nigeria. Academic Research International, 2(1): 124 – 130.

Oghorodi, D. U. O. (2014). Deployment of Information and Communication Technology Tools as a Means of Combating National Insecurity in Nigeria. International Journal of Computer Science Trends and Technology (IJCST), 2(4): 142 – 147.

Ogu, Emmanuel C., and Oyeyinka D. Oyerinde. “ICT And National Security in Developing and Underdeveloped Countries–The Good, the Bad and the Ugly: A Case Study of Nigeria’s Cyberspace.” International Journal of Computer Science and Information Technologies 5, No. 4 (2014): 5625–5633. https://dspace.unijos.edu.ng/jspui/bitstream/123456789/1911/1/ijcsit20140504176.pdf

Ogundiya, I. S. and Amzat, J. (2008). “Nigeria and the Threats of Terrorism: Myth and Reality”. Journal of Sustainable Development in Africa, 10 (2): 165-89.

Okoli, A. and Orinya, S. (2013). Evaluating the Strategic Efficacy of Military Involvement in Internal Security Operations (ISOPs) in Nigeria. IOSR Journal of Humanities and Social Science (IOSR-JHSS), 9(6).

Okpaga, A., Chijioke, U. S. and Okechukwu, I. (2012). Activities of Boko Haram and insecurity question in Nigeria. Arabian Journal of Business and Management Review (OMAN Chapter, 1(9): 77-100.

Okupe, D. (2015). The Guardian February 26. p. 4.

Oludare, A. A., Omalara, O. E., Umar, A. M. and Kemi, D. V. (2015). The use of ICT tools in tackling insecurity and terrorism problem in Nigeria. (5): 21-40.

Oludare, A. I., Omolara, O. E., Umar, A. M. and Kemi, D.V. (2015). The Use of ICT Tools in Tackling Insecurity and Terrorism Problem in Nigeria. Network and Complex Systems, 5(5): 21 – 39.

Omale, D. J. O. (2013). Terrorism and counter terrorism in Nigeria: Theoretical paradigms and lessons for public policy. Canadian Social Science, 9(3): 96-103.

Omede, J. and Omede, A. A. (2015). Terrorism and insecurity in Nigeria: Moral, values and religious education as panaceas. Journal of Education and Practice, 6(11): 120-128.

Pierskalla, J. H. and Hollenbach, F. M. (2013). Technology and collective action: The effect of cell phone coverage on political violence in Africa. American Political Science Review 107(2): 207–224.

Shatimah, A. A. and Adamu, H. (2016). Effective Use of ICT Tools to Combat Insecurity, 357–362.

Shatimah, A. A., Adamu, H. and Modu, A. A. (2016). Effective Use of ICT Tools to Combat Insecurity Menace in Nigeria. International Journal of Modern Trends in Engineering and Research, 3 (5): 357 – 362.

Silke, A. (2003). Beyond Horror: Terrorist Atrocity and the Search for Understanding: The Case of the Shankill Bombing. Studies in Conflict and Terrorism, 26(1): 37-60.

Sulaiman, Y. Y., Umar, M. A. and Bari, A. S. (2018). Confronting Nigeria’s Security Challenges through Information and Communication Technology: Way Forward to Terrorism. International Journal of Advanced Academic Research, Sciences, Technology & Engineering, 4(6): 124 – 131.

Swearngin, L. W. (2019). “Terrorism in the 2020s: Examining the Global Threat Landscape”. MSU Graduate Theses. 3361.

Taşpinar, Ö. (2009). Fighting radicalism, not terrorism root causes of an international actor redefined. SAIS Review, XXIX (2), 75-86.

The Cable, Video, (2020). “Boko Haram Bow to Superior Firepower of Soldiers”, https://www.youtube.com/watch?v=tLDUYyPcUKI

Umar, S. (2011). The Discourses of Khawarij Radicalism and Khawarij Counter-radicalism in Nigeria: A Case-study of Boko Haram,” Northwestern University.

UNDP Programme. “Information Communications Technology for Development”. Essentials: Synthesis of Lessons Learned, 5 (2001): 1–31.

Most read articles by the same author(s)