Homeland Security and Insurgency Management in North East Nigeria

Download Article

DOI: 10.21522/TIJAR.2014.03.01.Art017

Authors : Emmanuel Chinweuba Nwani

Abstract:

Terrorism has become a global peril, and the North East Nigeria has got its own share of the insurgency by a dreaded Sect. Three states of North East Nigeria were the worst hit, leaving more than one million people comprising women and children displaced and homeless. However, on a daily basis, more people are displaced from their homes by the ruinous bombing which cause emergencies, and the emergency usually created, as a result, overwhelm the National Emergency Management Agency (NEMA) and other government agencies that take care of the Internally Displayed People (IDP). The planning and management of insurgency-related cases, though a government responsibility in Nigeria has a top-down approach which has not actually given prompt response during disasters and rescue to victims of the bomb attack. This article examines the role of a community-based Local Response Squad (LRS) when equipped with Information Technology (IT) infrastructure within the communities to assist in giving prompt responses to emergencies when it occurs. The LRS plan collaboratively for potential emergencies is also important to become more aware of local community-level values, planning, involvement and skill. This thesis also looks at the Human-Computer Interaction studies the interaction between people and computers to know how information technology affects insurgency management. The aim is to advance on emergency management resulting from insurgency through the plan of useful interfaces to technology. Conclusively, this article offers some implications for community insurgency management technology.

References:

[1.] Bardram, J. E. Plans as Situated Action: An Activity Theory Approach to Workflow Systems. In Proc. of the Fifth European Conference on Computer Supported Cooperative Work, 1997.

[2.] Brewer, I. and McNeese, M.D. Supporting Work in Hurricane Management Centers: An Application of Cognitive Systems Engineering Techniques. In Proc. of the Human Factors and Ergonomics Society 48th Annual Meeting, 2004, 2426-2430.

[3.] Brewer, I. Understanding Work with Geospatial Information in Emergency Management: A Cognitive Systems Engineering Approach in GIScience. Ph.D. Dissertation, The Pennsylvania State University, University Park, PA, 2004.

[4.] Cutter, S. L GI Science, Disasters, and Emergency Management. Transactions in GIS 7, 4(2003), 439-445.

[5.] Government Technology, “Body Worn Camera Data Storage: The Gorilla in the Room,” http://www.govtech.com/dc/articles/Body-Worn-Camera-Data-Storage-The-Gorilla-in-the-Room.html

[6.] Government Technology, “Body Worn Camera Data Storage: The Gorilla in the Room,” http://www.govtech.com/dc/articles/Body-Worn-Camera-Data-Storage-The-Gorilla-in-the-Room.html

[7.] Gurstein, M. Community Informatics: Current Status and Future Prospects - Some Thoughts’, Community Technology Review, Winter-Spring 2002, Available online: http://www.comtechreview.org/winter-spring- 2002/000056.html.

[8.] Haddow, G. D. and Bullock, J.A. Introduction to Emergency Management. Butterworth-Heinemann, Amsterdam, 2003.

[9.] J. Steinfeld and J. Wormhoudt, “Explosives Detection: A Challenge for Physical Chemistry,” Ann. Rev. Phys. Chem., vol. 49, 1998, pp. 203–232.

[10.] Jian, X., Chen, N.C., Hong, J.I., Wang, K., Takayama, L., and Landay, J. A. SIREN: Context-Aware Computing for Firefighting. In Proc. of The Second International Conference on Pervasive Computing, 2004, 87-105.

[11.] Jian, X., Hong, J. I., Takayama, L.A., and Landay, J.A. Ubiquitous Computing for Firefighters: Field Studies and Prototypes of Large Displays for Incident Command. In Proc. CHI 2004, ACM Press (2004), 679-686.

[12.] Johnson, C. W. Applying the Lessons of the Attack on the World Trace Center, 11th September 2001, to the Design and Use of Interactive Evacuation Simulations. In Proc CHI 2005, ACM Press (2005), 651-660.

[13.] Jones, A. C. The Information-Technology-People Abstraction Hierarchy: A Tool for Complex Information System Design. Masters Thesis, The Pennsylvania State University, University Park, PA, 2004.

[14.] Jones, R. E. T., McNeese, M.D., Connors, E. S., Jefferson, T., and Hall, D.L. A Distributed Cognition Simulation Involving Homeland Security and Defense: The Development of Neo CITIES’. In Proc. of the Human Factors and Ergonomics Society 48th Annual Meeting, 2004, 631-634.

[15.] Journal for IED by Charles M. Wynn, Stephen Palmacci, Roderick R. Kunz, and Mordechai Rothschild https://www.ll.mit.edu/publications/journal/pdf/vol17_no2/17_2_1Wynn.pdf

[16.] Mayer-Schönberger, V. Emergency Communications: The Quest for Interoperability in the United States and Europe. International Journal of Communications Law and Policy, Issue 7, Winter 2002/2003.

[17.] McKinsey and Company. Increasing FDNY's Preparedness. 2002. Available online: http://www.nyc.gov/html/fdny/html/mck_report/toc.html

[18.] National Commission on Terrorist Attacks. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States. W.W Norton and Company, New York and London, 2004.

[19.] National Research Council, Existing and Potential Standoff Explosives Detection Techniques (The National Academies Press, Washington, D.C., 2004).

[20.] PC Ninja, “How much can a 1 TB external hard drive hold?” http://www.pcninja.us/how-much-can-a-1-tb-external-hard-drive-hold/

[21.] Pettersson, M., Randall, D., and Helgeson, B. Ambiguities, Awareness, and Economy: A Study of Emergency Service Work, Computer Supported Cooperative Work, 13, 2004, 125-154.

[22.] Quarantelli, E. L. A Half Century of Social Science Disaster Research: Selected Major Findings and Their Applicability. Preliminary Paper# 336, Disaster Research Center. Available online: http://dspace.udel.edu:8080/dspace/handle/19716/297.

[23.] Rauscher, I., Agrawal, P., Fuhrmann, S., Brewer, I., Wang, H., Sharma, R., Cai, G., and MacEachren, A. Designing a Human-Centered, Multimodal GIS Interface to Support Emergency Management. In Proc. of ACM Symposium on Advances in Geographic Information Systems, 2002, 119-124.

[24.] Schafer, W. A., Ganoe, C. H., and Carroll, J.M. Supporting Community Emergency Management Planning through a Geocollaboration Software Architecture. Computer Supported Cooperative Work: The Journal of Collaborative Computing, 16(4-5), 2007, 501-537.

[25.] Sharma, R., Yeasin, M., Krahnstoever, N., Rauschert, I., Cai, C., Brewer, I, MacEachren, A., Sengupta, K. Speech-Gesture Driven Multimodal Interfaces for Crisis Management. In Proc. of the IEEE, 91(9), 2003, 1327-1354.

[26.] Star, S. L. and Strauss, A. Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work. Computer Supported Cooperative Work, 8, 1999, 9-30.

[27.] Suchman, L.A. Plans and Situated Actions: The Problem of Human-Machine Communication, Cambridge University Press, Cambridge, UK, 1987.

[28.] Terrell, I. S., McNeese, M.D., & Jefferson, T. Exploring Cognitive Work Within a 911 Dispatch Center: Using Complementary Knowledge Elicitation Techniques. In Proc. of the Human Factors and Ergonomics Society 48th Annual Meeting, 2004, 605-609.

[29.] Turoff, M., Chumer, M., Van de Walle, B., and Yao, X. The Design of a Dynamic Emergency Response Management Information System (DERMIS). Journal of Information Technology Theory and Application, 5(4), 2004, 1-35