1,039
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Nigerian women and the trends of kidnapping in the era of Boko Haram insurgency: patterns and evolution

ORCID Icon &
Pages 1151-1168 | Accepted 17 Jun 2019, Published online: 19 Sep 2019

Bibliography

  • Adebayo, Anthony A. “Implications of ‘boko Haram’ Terrorism on National Development in Nigeria: A Critical Review.” Mediterranean Journal of Social Sciences 5, no. 6 (2014): 480–489.
  • Agbiboa, D. E., and B. Maiangwa. “Nigeria United in Grief; Divided in Response: Religious Terrorism, Boko Haram, and the Dynamics of State Response.” African Journal of Conflict Resolution 14, no. 1 (2014): 63–97.
  • Akinlabi, A. A. “The Lack that Carries Lacks: the Paradox of Women Amidst the Boko Haram Insurgency.” Journal of Philosophy, Culture and Religion, no. 38 (2018): 47–52. https://iiste.org/Journals/index.php/JPCR/article/view/42878/44172
  • Albert, Isaac O. Beyond Nigeria’s Sambisa: Forests, Insurgency and Counterinsurgency in Africa. Ibadan: Ibadan University Press, 2017.
  • Attoh, F. “Rethinking Crimes and Violent Behaviour in Nigeria: an Appraisal of the Challenges and Solutions.” British Journal of Arts and Social Sciences 8, no. 11 (2012): 213–221.
  • Awoniyi, Olufemi H. The Search for Terrorists: A Case Study of the Council of Ulama of Nigeria. Lagos: Centre for Religion and Public Issues, 2002.
  • Bappah, H. Y. “Nigeria’s Military Failure against the Boko Haram Insurgency.” African Security Review 25, no. 2 (2016): 146–158. doi:10.1080/10246029.2016.1151799.
  • Bavier, Joe. “Who are Boko Haram and Why are They Terrorizing Nigerian Christians?” The Atlantic. January 24, 2012. http://www.theatlantic.com/international/archive/2012/01/who-are-boko-haram-and-why-are-they-terrorizing-nigerian-christians/251729/
  • Brinkel, Theo, and Soumia. Ait-Hida. “Boko Haram and Jihad in Nigeria.” Scientia Militaria, South African Journal of Military Studies 40, no. 2 (2012): 1–21. doi:10.5787/40-2-994.
  • Ceccato, V. “Women’s Victimisation and Safety in Transit Environments.” Crime Prevention and Community Safety 19 (2017): 163–167. doi:10.1057/s41300-017-0024-5.
  • Clarke, R. V., and M. Felson, Eds. Routine Activity and Rational Choice. New Brunswick, NJ: Transaction, 1993.
  • Cohen, L., and M. Felson. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44 (1979): 588–608. doi:10.2307/2094589.
  • Delice, M. “How the Routine Activity Theory Can Help Police Understand and Prevent Burglary?” Turkish Journal of Police Studies 13, no. 1 (2011): 137–154.
  • Felson, M., and L. E. Cohen. “Human Ecology and Crime: A Routine Activity Approach.” Human Ecology 8, no. 4 (1980): 389–405. doi:10.1007/BF01561001.
  • Greenawalt, K. Speech, Crime, and the Uses of Language. New York: Oxford University Press, 1989.
  • Hipp, J. R., D. J. Bauer, P. J. Curran, and K. A. Bollen. “Crimes of Opportunity or Crimes of Emotion? Testing Two Explanations of Seasonal Change on Crime.” Social Forces 82 (2004): 1333–1372. doi:10.1353/sof.2004.0074.
  • Idahosa, O. “Boko Haram and the Nigerian State: A Different Perspective.” Glocalism: Journal of Culture, Politics and Innovation 3 (2015): 1–28.
  • Imam, N. Z. “Women in Nigeria the Way I See It In.” In Women and the Family, edited by A Imam, R. Pittin, and H. Omole, 7–16. Zaria: Codesria Book Series, 1985.
  • Ionova, A. “Fresh Boko Haram Abductions Threaten Gains for Girls’ Education in Nigeria.” Relief web. Thomson Reuters Foundation. 23 February, 2018. https://reliefweb.int/report/nigeria/fresh-boko-haram-abductions-threaten-gains-girls-education-nigeria
  • Irabor, L. Update on Security Situation in the Lake Chad Basin. Paper presented at the International Conference on Saving the Lake Chad to revitalize the Basin’s Ecosystem for Sustainable Livelihood, Security and Development, Organised by the Federal Government of Nigeria and the Lake Chad Basin Commission, 26-28 February, 2018. Transcorp Hilton Hotel, 1 Aguiyi Ironsi Street, Maitama, Abuja.
  • Iyi, J. M. “On the Brink? the Nigerian State and the Making of Boko Haram.” In Boko Haram and International Law, edited by J.M. Iyi and H. Strydom, 3–15. Cham, Switzerland: Springer, 2018.
  • Iyi, J. M. “The Weaponisation of Women by Boko Haram and the Prospects of Accountability.” In Boko Haram and International Law, edited by J.M Iyi and H. Strydom, 259–291. Cham, Switzerland: Springer, 2018.
  • Mantzikos, I. “Boko Haram Attacks in Nigeria and Neighbouring Countries: A Chronology of Attacks.” Perspectives on Terrorism 8, no. 6 (2014): 63–81.
  • Mason, A. “Colombia’s Democratic Security Agenda: Public Order in the Security Tripod.” Security Dialogue 34, no. 4 (2003): 391–409. doi:10.1177/0967010603344002.
  • Matfess, H. Women and the War on Boko Haram: Wives, Weapons, Witnesses. London: Zed Books, 2017.
  • Miro, F. 2014. Routine Activity Theory. In The Encyclopedia of Theoretical Criminology First, edited by J. Mitchell Miller, 1–7. Hoboken, NJ: John Wiley & Sons.
  • Odoemene, A. “The Nigerian Armed Forces and Sexual Violence in Ogoniland of Niger Delta Nigeria, 1990-1999.” Armed Forces and Society 38, no. 2 (2012): 225–251. doi:10.1177/0095327X11418319.
  • Okolie-Osemene, R. I. Women and Food Production in Ikaland, 1900-1996. Prefield Seminar, Department of History, University of Ibadan, Ibadan, Nigeria, April 2017.
  • Okoye, I. E. “Trends in Terrorism Incidents in Nigeria and the United States: Analysis of Data from 1980–2013.” International Journal of Criminal Justice Sciences 13, no. 1 (2018): 200–211. http://www.sascv.org/ijcjs/pdfs/OkoyeVol13Issue1IJCJS.pdf
  • Olaniyan, A., and L. Asuelime. “Boko Haram Insurgency and the Widening of Cleavages in Nigeria.” African Security 7, no. 2 (2014): 91–109. doi:10.1080/19392206.2014.909246.
  • Onuoha, F. C., and T. A. George. “Boko Haram’s Use of Female Suicide Bombing in Nigeria.” Al Jazeera Center for Studies 17, no. March (2015): 1–9.
  • Onuoha, F. C., and J. Okolie-Osemene. “The Evolving Threat of Kidnapping for Ransom in Nigeria.” In Internal Security Management in Nigeria: Perspectives, Challenges and Lessons, edited by O. O. Oshita, I. M. Alumona, and F. C. Onuoha, 233–258. Singapore: Palgrave Macmillan, 2019.
  • Osasumwen, O. F., O. Adekunle, L. E. Roland, and J. Segun. “Implications of the Release of Chibok Girls on Nigeria’s War on Terrorism.” Covenant University Journal of Politics & International Affairs 5, no. 1 (2017): 40–59.
  • Panwar, N. “Explaining Cohesion in an Insurgent Organization: the Case of the Mizo National Front.” Small Wars & Insurgencies 28, no. 6 (2017): 973–995. doi:10.1080/09592318.2017.1374602.
  • Pérouse de Montclos, Marc-Antoine. “Nigeria’s Interminable Insurgency? Addressing the Boko Haram Crisis.” Research Paper. London: Chattam House, Royal Institute of International Affairs, 2014, 1–36.
  • Rosen, A. “Boko Haram’s Insurgency Is Now One of the Deadliest Conflicts on Earth.” Business Insider. January 13, 2015. https://www.businessinsider.com/boko-harams-insurgency-is-now-one-of-the-deadliest-conflicts-on-earth-2015-1?IR=T
  • Rossmo, D. Kim, and Lucia Summers. “Routine Activity Theory in Criminal Investigation.” In The Criminal Act, edited by M.A Andrews and G. Farrell, 19–32. London: Palgrave Macmillan, 2015.
  • Sanchez, W. A., and E. Illingworth. “Can Governments Negotiate with Insurgents? the Latin American Experience.” Small Wars & Insurgencies 28, no. 6 (2017): 1014–1036. doi:10.1080/09592318.2017.1374607.
  • Sani, Abubakar B. “Military Adventures of Some Generals in the Central Sudan in the 19th and Early 20th Centuries.” In Perspective in African Historical Studies: Essays in Honour of Professor Chinedu Nwafor Ubah, edited by Ojong Echum Tangban and Chukwuma C. C. Osakwe, 107–108. Kaduna: Nigerian Defence Academy Press, 2013.
  • Taylor, Jim. “The Kidnapping Selection and Planning Process.” Academia.edu. 2016. 1–2. http://www.academia.edu/5630831/The_Kidnapping_Selection_and_Planning_Process
  • Zenn, J. “Demystifying al-Qaida in Nigeria: Cases from Boko Haram’s Founding, Launch of Jihad and Suicide Bombings.” Perspectives on Terrorism 11, no. 6 (2017): 174–190.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.