Security Policy Formulation in Local Government Councils in Nigeria

Basil C. Nwankwo, Stephen Ocheni, Moses Atakpa

Abstract


Security planning policy making is an essential but regrettably neglected area of the local government council management in Nigeria and one, which has demonstrated serious implications for virtually all aspects of its operations.  The need for security planning policy making more than ever before, has become very necessary considering the current sophisticated and complicated security problems and challenges facing the Nigerian state today, especially at the local council levels.  The local government councils of recent have to deal with security challenges arising from ethno-religious riots, crises, militant groups like “MEND” in the Niger Delta, Boko Haram in the North East, kidnapping, armed robbery, hired assassins, communal clashes, chieftaincy tussles, activities of touts/transport operators, mismanagement of resources through sharp fraudulent practices, etc.  The approach of the local government councils in handling these security problems and challenges has been anything but satisfactory.  The councils had adopted reactionary approach by reacting to the challenges as they arise instead of finding a permanent solution to the problem by adopting preventive security strategy which would anticipate and develop security framework to deal with such problems before they are experienced.  The best approach for effective and efficient security management at the local government councils in Nigeria is the adoption of an institutionalized framework for security planning formulation and policy making implementation.
Key Words: Security policy; Formulation; Local government councils; Nigeria

Keywords


Security policy; Formulation; Local government councils; Nigeria

References


Arfield, J. A. (1991). Theft detection systems some practicalities. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Audit Commission (1988). Performance Review in Local Government: A Handbook for Auditors and Local Authorities, Action Guide. London: HMSO.
British Library (1981). Annual Report 1980-81. London: The British Library.
Carr, R. (1991). Problems of security in older library buildings. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Cumming, N. (1987). Security: The Comprehensive Guide to Equipment. London: Butterworth.
Fox, P. (1991). Legal process. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Friend, F. J. (1991). Theft detection systems-policies. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Harrison, A. (1991). New library concepts and security problems. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Houlgate, J. (1991). Building design and crime prevention. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Jackson, M. (1991). Where to get help. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Library Association (1987). Violence in Libraries: Preventing Aggression and Unacceptable Behaviour in Libraries. London: The Library Association.
Library Association (1990). Trade Union News, No. 28 (October). London: The Library Association.
Lincoln, A. J. (1981). Trade Union News, No. 28 (October). London: The Library Association.
Lincoln, A. J. (1981). Crime in the Library: A Study of Patterns, Impact, and Security. New York: Bowler.
Lincoln, A. J. (1981). Protection the library. Library Trends, 33 (1), 3-94.
Metcalf, K. D. (1986). Planning Academics and Research Libraries, 2nd edition. Deighton, P. D. and Weber, D.C. Chicago: American Library Association.
Morris, J. (1986). Library Disaster Preparedness Handbook. Chicago: American Library Association.
Powell, J. W. (1975). Architects, security consultants, and security planning for new libraries. Library Security Newsletter, 1(5), 6-8, (September/October).
Poyner, B. (1983). Design Against Crime: Beyond Defensible Space. London: Butterworth.
Quinsee, A. G. (1991). Introduction. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Quinsee, A. G. & McDonald, A. C. (1991). Security in academic and research libraries, Proceedings on three Seminars organized by SCONUL and the British Library, held at the British Library 1989/1990. Newcastle upon Tyne: University Library.
Rafferty, F. (1990). Missing book costs libraries E100m a year. Daily Telegraph, October 16, p.4
Sannawald, W. W. and Smith, R. S. (1988). Checklist of Library Building Design Considerations. Chicago: American Library Association.
Smethurst, J. M. (1991). Library security: An overview. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Thompson, G. (1989). Planning and Design of Library Buildings, 3rd edition. London: Butterworth.
Underwood, G. (1984). The Security of Buildings. London: Butterworth.
Wright, K. G. (1972). Cost-Effective Security. London: McGraw Hill.




DOI: http://dx.doi.org/10.3968/j.mse.1913035X20120602.3045

Refbacks

  • There are currently no refbacks.


Copyright (c)




Share us to:   


Reminder

  • How to do online submission to another Journal?
  • If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:

1. Register yourself in Journal B as an Author

  • Find the journal you want to submit to in CATEGORIES, click on “VIEW JOURNAL”, “Online Submissions”, “GO TO LOGIN” and “Edit My Profile”. Check “Author” on the “Edit Profile” page, then “Save”.

2. Submission

  • Go to “User Home”, and click on “Author” under the name of Journal B. You may start a New Submission by clicking on “CLICK HERE”.


We only use three mailboxes as follows to deal with issues about paper acceptance, payment and submission of electronic versions of our journals to databases:
[email protected]; [email protected]; [email protected]

 Articles published in Management Science and Engineering are licensed under Creative Commons Attribution 4.0 (CC-BY).

 MANAGEMENT SCIENCE AND ENGINEERING Editorial Office

Address:1055 Rue Lucien-L'Allier, Unit #772, Montreal, QC H3G 3C4, Canada.

Telephone: 1-514-558 6138
Http://www.cscanada.net Http://www.cscanada.org

Copyright © 2010 Canadian Research & Development Centre of Sciences and Cultures