2023
DOI: 10.15294/ijctns.v2i1.65708
|View full text |Cite
|
Sign up to set email alerts
|

The Challenges and Prospects of ICT Utilisation in Counter Terrorism Efforts in a Transitional Democracy: The Case of Nigeria

Abstract: The global quest to fight terror worldwide cannot be over emphasised as extremists and non -state actors continue to ravage the ungoverned spaces opening up around the globe. Consequently this work is an evaluation of the use of ICT in counter terrorism efforts in Nigeria as a fledgling democracy. The study reviewed the challenges and prospects of the application of ICT to counter terror in a country where Boko Haram, ISWAP, and other militant groups have continue to challenge the legitimacy and territorial in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
0
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
0
0
Order By: Relevance
“…Although intelligence alone may not thwart a possible attack, it is fundamentally the primary step to identification and prevention of an attack (Flavius-Cristian & Andreea, 2013). There are two fundamental purposes served by intelligence gathering in the War on Terror: the primary one is informing policies and the secondary one is supporting military and or police operations that aim at guarding the country against terrorists and preventing their proliferation (Nte, 2011). However, existing literature has made little efforts to connect the dots on how these shapes in particular, the intelligence operations framework in combating terrorism.…”
Section: Literature Review Intelligence Gathering and Sharing In Figh...mentioning
confidence: 99%
See 2 more Smart Citations
“…Although intelligence alone may not thwart a possible attack, it is fundamentally the primary step to identification and prevention of an attack (Flavius-Cristian & Andreea, 2013). There are two fundamental purposes served by intelligence gathering in the War on Terror: the primary one is informing policies and the secondary one is supporting military and or police operations that aim at guarding the country against terrorists and preventing their proliferation (Nte, 2011). However, existing literature has made little efforts to connect the dots on how these shapes in particular, the intelligence operations framework in combating terrorism.…”
Section: Literature Review Intelligence Gathering and Sharing In Figh...mentioning
confidence: 99%
“…Intelligence sharing contributes significantly to other counterterrorism strategies where according to Nte (2011), it contributes significantly to both defensive and offensive strategies making it fundamental in collective strategies in the fight against transnational terrorism. Its main advantages include its strong ability in uncertainty reduction, provision of early warning as well as provide insight to policy making in fighting terrorist attacks (Martin, 2016).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In Africa, different states have also established different intelligence sharing mechanisms. For instance, in Nigeria, Nte (2011) In Kenya, the National Intelligence Service (NIS) is the main institution charged with the responsibility of intelligence gathering under Article 242 of Kenya's constitution. The Criminal Intelligence Unit of the CID also contributes greatly in intelligence gathering under its mandate as stipulated under the National Police service Act, 2011(Directorate of Criminal Investigations, 2015.…”
Section: Introductionmentioning
confidence: 99%