- Format
- Pages
- Chapters
GOVERNMENT AND THE MANAGEMENT OF SECURITY CHALLENGES IN NIGERIA
GOVERNMENT AND THE MANAGEMENT OF SECURITY CHALLENGES IN NIGERIA
- Format: Ms Word Document
- Pages: 78
- Price: N 3,000
- Chapters: 1-5
- Get the Complete Project
SECURITY CHALLENGES
TABLE OF CONTENTS
CHAPTER
Title Page – – i
Declaration – – ii
Certification – – iii
Dedication – – iv
Acknowledgements – – v
Abstract – – vi
Table of Contents – – vii
List of Tables – – viii
List of Pictures (Plates) – – xvi
List of Diagrams – – xv
List of Appendices – – xiv
List of Abbreviations – – xvii
INTRODUCTION: – – 1
Background of the Study. – – 1
Statement of the Research Problem. 5
Objectives of the Study. – – 15
Main Objective. – – 15
Subsidiary Objectives. – – 16
Hypotheses. – – 16
Significance of the Study. – 16
Scope and Limitations of the Study. – 20
Definition of Terms. – – 21
Background to the Centralization of Security System in Nigeria. 23
1.8.1 The Negative Effects of Centralized Security System in Nigeria. 27
Objectives and Principles of Security. – 29
2.0 REVIEW OF RELATED LITERATURE AND THEORETICAL FRAMEWORK.
2.1 Literature Review (Introduction) – 34
2.2 General Literature on State Security Management Mandate. – 34
Comparative Literature on Systems of Government and Countries with Oil-Related Security Challenges. – 68
Unitary or Centralist System of Government – Iran. 68
Federalist or Democratic System of Government – Nigeria. 72
Countries with Crude Oil-related Security Problem- Venezuela and Angola. – 75
Venezuela and Oil-Related Security Challenges. – 76
Angola and Oil-Related Security Challenges. – 84
Nigeria and Oil-Related Security Challenges. – 87
Comparative Discussion. – 89
Case Study Literature Focusing on Crude Oil Discovery and Exploitation as a Major Source of Insecurity in Akwa Ibom.- 92
2.5 Configurative Literature Focusing on the State Security Structures. – 103
2.5.1 The State Security Service (SSS). – 106
2.5.2 The Nigerian Police Force (NPF). – 109
2.6 Ideological Literature on the Central Ideas of Philosophers,
Experts and Scholars of Security. – 111
Summary of the Reviewed Literatures. – 113
Theoretical Framework. – 122
Structural-Functionalist Approach. – 122
Levels 1, 2, 3 of Security Model. – 124
Harmonization of Theories. – 126
2.8.4 Role Expectation of Citizens. – 132
2.9 Historical Background and Objectives of Security. – 135
3.0 RESEARCH METHODOLOGY
Research Methodology. – 139
Research Design. – 140
Population of the Study. – 144
Research Area. – 145
Sources of Data Collection. – 145
Sample and Sampling Techniques. – 146
Research Instrument and Administration. – 146
Validity and Reliability of Test Instrument. – 147
Method of Data Analysis. – 147
4.0 DATA PRESENTATION, ANALYSIS AND DISCUSSION OF FINDINGS:
4.1 Introduction. – 148
4.2 Data presentation and Interpretation – 150
4.3 Testing of Hypotheses. – 150
4.3.1 Hypothesis I – 150
4.3.2 Evaluation of Hypothesis Qualitatively. – 152
4.3.3 Evaluation of Hypothesis I – 153
4.3.4 Hypothesis II – 163
4.3.5 Evaluation of Hypothesis II – 164
4.3.6 Hypothesis III – 174
4.3.7 Evaluation of Hypothesis III – 176
4.3.8 Hypothesis IV – 181
4.3.9 Evaluation of Hypothesis IV – 183
4.3.10 Discussion of Findings. – 205
5.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS:
5.1 Summary. – 212
5.2 Conclusions. – 218
5.3 Recommendations. – 220
BIBLIOGRAPHY – 229
JOURNALS – 239
NEWSPAPERS – 241
HOLY BIBLE – 243
APPENDIX 1 – 244
APPENDIX 2 – 245
APPENDIX 3 – 249
APPENDIX 4 – 252
APPENDIX 5 – 256
APPENDIX 6 – 258
APPENDIX 7 – 260
APPENDIX 8 – 262