References
- Ackleson, J. (2005). Border security technologies: Local and regional implications. Review of Policy Research, 22(2), 137–155. doi:https://doi.org/10.1111/j.1541-1338.2005.00126.x
- Adarkwah, S. B. (2020). Counter-terrorism framework and individual liberties in Ghana. African Journal of International and Comparative Law, 28(1), 50–65. doi:https://doi.org/10.3366/ajicl.2020.0301
- Afrobarometer. (2014/2015) Ghana.
- Agbemabiesse, G. E. (2011). An assessment of the operations of police officers in Ghana: A case study of police officers at the Cantonments Police Station (Doctoral dissertation)
- Akanji, O. O. (2019). Sub-regional Security Challenge: ECOWAS and the war on terrorism in West Africa. Insight on Africa, 11(1), 94–112. doi:https://doi.org/10.1177/0975087818805842
- Alvarez, J. E. (2006). Re-thinking (in) security discourses from a critical perspective. asteriskos, 1, 61–82.
- Anim, E. (2016) Ghana’s vulnerability to the threat of domestic and transnational terrorism: Real, emerging or imagined?: Norwegian University of Life Sciences, Ås.
- Aning, E. K. (2005). The anatomy of Ghana’s secret arms industry. Nicolas Florquin and Eric Berman, 78–107.
- Aning, K. (2008). From ‘voluntary’ to a ‘binding’ process: Towards the securitisation of small arms. Journal of Contemporary African Studies, 26(2), 169–181. doi:https://doi.org/10.1080/02589000802124706
- Anita, P. (2007). Mass media and Terrorism. Medij. Istraž, 13, 5–22.
- Archick, K. (2010). US-EU cooperation against terrorism. DIANE Publishing.
- Ball, K., Lyon, D., & Haggerty, K. D. (2012). Routledge handbook of surveillance studies. Routledge.
- Bamba, R. (2014). The emerging threats of terrorism in West Africa: An analysis of ghana’s response. University Of Ghana.
- Best, R. A., Jr (2002) Intelligence to counter terrorism: Issues for congress. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.
- Bin Hassan, M. H., & Pereire, K. G. (2006). An ideological response to combating terrorism – the singapore perspective. Small Wars and Insurgencies, 17(4), 458–477. doi:https://doi.org/10.1080/09592310601060815
- Briggs, R. (2010). Community engagement for counterterrorism: Lessons from the United Kingdom. International Affairs, 86(4), 971–981. Royal Institute of International Affairs 1944-). doi:https://doi.org/10.1111/j.1468-2346.2010.00923.x
- Brown, H. (1983). Thinking about national security:. defense and foreign policy in a dangerous world: Westview Pr.
- Brown, L. R. (1977). Redefining national security. Washington.
- Bryden, A., & N’Diaye, B. (2011). Security sector governance in Francophone West Africa: Realities and opportunities. LIT Verlag Münster.
- Bryman, A. (2016). Social research methods. Oxford university press.
- Butt, R., & Tuck, H. (2014). European counter-radicalisation and de-radicalisation: A comparative evaluation of approaches in the Netherlands, Sweden, Denmark and Germany. London: Institute for Strategic Dialogue.
- Buzan, B. (1991). New patterns of global security in the twenty-first century. International Affairs, 67(3), 19. doi:https://doi.org/10.2307/2621945
- Cavoukian, A. (2013). Surveillance, then and now: Securing privacy in public spaces. Information and Privacy. Ontario, Canada.
- Centre(KAIPTC) KAIPT. (2016) GHANA WORKSHOP ON ADDRESSING THE ROOT CAUSES OF VIOLENT EXTREMISM: A HUMAN SECURITY CONCEPTUAL APPROACH.
- Christensen, M. M., & Edu-Afful, F. (2019) GHANA’S RESPONSE TO THE THREAT OF TERRORISM REQUIRES ENHANCED INTEROPERABILITY.
- Cohen-Almagor, R. (2005) Media coverage of terror: Troubling episodes and suggested guidelines.
- Crenshaw, M., & LaFree, G. (2017). Countering terrorism. Brookings Institution Press.
- Creswell, J. W. (2009). Research design: Qualitative and mixed methods approaches. London and Thousand Oaks: Sage Publications.
- Darkwa, L. (2011). The challenge of sub-regional security in West Africa: The case of the 2006 ECOWAS convention on small arms and light weapons. Nordiska Afrikainstitutet.
- Don, B. W., Frelinger, D. R., Gerwehr, S., et al. (2007). Network technologies for networked terrorists: Assessing the value of information and communication technologies to modern terrorist organizations. Rand Corporation.
- Dyekman, G. J. (2007) Security cooperation: A key to the challenges of the 21st Century. ARMY WAR COLL CARLISLE BARRACKS PA.
- (EC) EC. (2004) Research for a secure Europe: Report of the group of personalities in the field of security research. European Comission Luxembourg, 12.
- Ehiane, S. O. (2018). Strengthening the African Union (AU) counter-terrorism strategy in Africa : A re-awakened order. Journal of African Union Studies, 7(2), 109–126. doi:https://doi.org/10.31920/2050-4306/2018/v7n2a6
- Eren, Y. (2013) The impact of land border security on terrorism financing: Turkey’s Southeast land border and the PKK. NAVAL POSTGRADUATE SCHOOL MONTEREY CA.
- Flick, U. (2018). An introduction to qualitative research. Sage Publications Limited.
- Francis, D. J. (2013). The regional impact of the armed conflict and French intervention in Mali. Norwegian Peacebuilding Resource Center.
- Frontex. (2018) RISK Analysis.
- Gänzle, S. (2011). AFRICOM and US Africa policy: ‘pentagonising’ foreign policy or providing a model for joint approaches? African Security Review, 20(1), 70–82. doi:https://doi.org/10.1080/10246029.2011.561020
- Gherbaoui, T. (2020). Criminalising foreign fighter travel in order to prevent terrorism in Europe: An illegitimate assault on human dignity? In Human Dignity and Human Security in Times of Terrorism (pp. 241–267). Springer.
- GIABA. (2013) The nexus between small arms and light weapons and money laundering and terrorist financing in West Africa.
- Giannetto, L. (2012). The borders of accountability: The Case of FRONTEX. In Studi Europei e Internazionali. Universitat Degli Studi Di Trento.
- Ginsburg, S. (2006) Countering terrorist mobility: Shaping an operational strategy. Report of the Independent Task Force on Immigration and America’s Future: Migration Policy Institute.
- Gunaratna, R. (2016). Ivory coast attack: Africa’s terror footprint expands. Counter Terrorist Trends and Analyses, 8, 14–18.
- Gunaratna, R. (2018). ASEAN’s greatest counter-terrorism challenge: The shift from’Need to know’to’Smart to share’. Combatting Violent Extremism and Terrorism in Asia and Europe, 111–128.
- Guo, R. (2015). Cross-border crimes and border control. In Cross-border management (pp. 363–379). Springer.
- Hardy, K. (2019). Countering right-wing extremism: Lessons from Germany and Norway. Journal of Policing, Intelligence and Counter Terrorism, 14(3), 262–279. doi:https://doi.org/10.1080/18335330.2019.1662076
- Harrison, L., & Startin, N. (2013). Political research An introduction. Routledge.
- Hendrickson, J. (2014). COUNTER-RADICALIZATION: COMBATING TERRORISM AT THE CORE, A STUDY OF THE MOTIVATIONS AND INSPIRATIONAL LEADERS BEHIND RADICALIZATION TO VIOLENT EXTREMISM AND THE PROGRAMS DESIGNED TO COMBAT THEM. Johns Hopkins University.
- Hoffman, B. (2003). Al Qaeda, trends in terrorism, and future potentialities: An assessment. Studies in Conflict & Terrorism, 26(6), 429–442. doi:https://doi.org/10.1080/10576100390248275
- Horgan, J., & Altier, M. B. (2012). The future of terrorist de-radicalization programs. Georgetown Journal of International Affairs, 83–90.
- Houston, T. (2017) Mass surveillance and terrorism: Does PRISM keep americans safer?
- Jain, B. M. (1985). South asian security: Problems and prospects. Radiant Publishers.
- (JCS) JCoS. (2017) Security Cooperation.
- Jalili, D. (2015). The Use of Professional Military Education as a Soft Power Asset in US International Security Policy. Strife Journal, 58–67
- Jones, D. M. (2018). Intelligence and the management of national security: The post 9/11 evolution of an australian national security community. INTELLIGENCE AND NATIONAL SECURITY, 33(1), 1–20. doi:https://doi.org/10.1080/02684527.2016.1259796
- Kahn, J. (2017). Terrorist watchlists. In THE CAMBRIDGE HANDBOOK OF SURVEILLANCE LAW (pp. 71–100).
- Karlsson Norman, N. (2018) Human rights law as an intervention in covert surveillance of communication: The right to private life and communication in large-scale surveillance.
- Katzenstein, P. J. (1996). The culture of national security: Norms and identity in world politics. Columbia University Press.
- Kershner, I. (2005). Barrier: The seam of the israeli-palestinian conflict (pp. 161–167). New York: Palgrave.
- Khera, K. K. (2017). International military exercises: An indian perspective. Journal of Defence Studies in Conflict & Terrorism, 11, 17–40.
- Klein, P. (2009) International convention for the suppression of the financing of terrorism. United Nations Audiovisual Library of International Law: 1–5.
- Krasner, S. D. (1999). Sovereignty: Organized hypocrisy. Princeton University Press.
- Krouse, W. J. (2013) Terrorist watch list screening and background checks for firearms. Library of Congress, Congressional Research Service.
- Kwarkye, S., Abatan, E. J., & Matongbada, M. (2019). Can the Accra Initiative prevent terrorism in West African coastal states? Pretoria, South Africa: Institute for Security Studies.
- Laqueur, W. (2000). The new terrorism: Fanaticism and the arms of mass destruction. Oxford University Press on Demand.
- Levy, M. A. (1995). Is the environment a national security issue? International Security, 20(2), 35–62. doi:https://doi.org/10.2307/2539228
- Libicki, M. C., Chalk, P., Sisson, M. W., et al. (2007). Exploring terrorist targeting preferences. Rand Corporation.
- Lumbaca, S., & Gray, D. H. (2011). The media as an enabler for acts of terrorism. Global Security Studies, 2, 45–54.
- Lyon, D. (2008). Biometrics, identification and surveillance. Bioethics, 22(9), 499–508. doi:https://doi.org/10.1111/j.1467-8519.2008.00697.x
- Lyon, D. (2015). Surveillance after Snowden. John Wiley & Sons.
- Macnamara, W. D., & Fitz-Gerald, A. (2002). A national security framework for Canada. IRPP.
- Marc, A., Verjee, N., & Mogaka, S. (2015). The challenge of stability and security in West Africa. World Bank Publications.
- Martins, B. O., & Ziegler, M. (2018). Counter-radicalization as counter-terrorism: The european union case. In Expressions of radicalization (pp. 321–352). Springer.
- Matthews, B., & Ross, L. (2014). Research methods. Pearson Higher Ed.
- Mattis, J. (2018) Summary of the 2018 national defense strategy of the United States of America. Department of Defense Washington United States.
- McCaul, M. (2016) A national strategy to win the war against islamist terror. House Homeland Security Committee. https://homeland.house.gov/wp-content/uploads/2016/09/A-National-Strategy-to-Win-the-War.pdf (accessed January 24, 2018).
- Menkhaus, K. (2009). False start in AFRICOM. Contemporary Security Policy, 30(1), 53–57. doi:https://doi.org/10.1080/13523260902767905
- Millar, J. (2008) Work is good for you”: Lone mothers, children, work and well-being, social security and health research. Working Papers [60/2008]). Helsinki, Finland: KELA, 9.
- Millard, G. (2004). Post-September 11 terrorism measures. Fla. J. Int’l L, 16, 97.
- Miller, T. (2014). Border patrol nation: Dispatches from the front lines of homeland security. City Lights Publishers.
- Mohammed, L. I. (2018) Fighting for peace: Assessing the role of the government in the Guinea Fowl War of 1994. UiT Norges arktiske universitet.
- Monahan, T. (2012). Surveillance and terrorism. In Routledge handbook of surveillance studies (pp. 285–291). New York: Routledge.
- Nacos, B. L. (1994a). The terrorism and the media. In From the Iran hostage crisis to the Ocklahoma City Bombing. New York: Columbia University Press.
- Nacos, B. L. (1994b). Terrorism and the media: From the Iran hostage crisis to the World Trade Center bombing. Columbia University Press.
- Nan, T. (2015) Terrorism: The need to enhance global cooperation against the threat to democracy and individual rights.
- Navarrete, A. C., Mellouli, S., Pardo, T. A., et al. (2009) Information sharing at national borders: Extending the utility of border theory. 2009 42nd Hawaii International Conference on System Sciences. 1–10.
- Nesser, P. (2010). Joining jihadi terrorist cells in Europe. In Understanding violent radicalisation (pp. 81–114). Routledge.
- Neumann, P. R. (2003). The trouble with radicalization. International Affairs, 89(4), 873–893. doi:https://doi.org/10.1111/1468-2346.12049
- Norman, I., Aikins, M., Binka, F., et al. (2014). Ghana’s legal preparedness against the perceived threat of narcotics trafficking and terrorism: A case study for West Africa. Issues in Business Management and Economics, 2, 201–209.
- Okeke, J. (2019) Repositioning the AU’s role in counter-terrorism operations.
- Organisation(ICAO) ICA. (2018). ICAO TRIP Guide on BORDER CONTROL MANAGEMENT. Montréal, QC, Canada: International Civil Aviation Organisation(ICAO).
- Osei-Appiah, D. A. O. (2016). 2.3 Million small arms circulating in the country. In Daily Graphic. Ghana: Daily Graphic Press.
- Owen, T. (2004). Human security-Conflict, critique and consensus: Colloquium remarks and a proposal for a threshold-based definition. Security Dialogue, 35(3), 373–387. doi:https://doi.org/10.1177/0967010604047555
- Peace(FFP) FF. (2018) VOLUNTARY PRINCIPLES IN GHANA: FINAL PROJECT REPORT.
- Pettinger, T. (2017). De-radicalization and Counter-radicalization: Valuable tools combating violent extremism, or harmful methods of subjugation? Journal for Deradicalization, 1–59.
- Precht, T. (2007) Home grown terrorism and Islamist radicalisation in Europe. Retrieved on 11.
- Profile, C. (2017). Mauritania. Positivity, 40, 60.
- Program(CTFP) CTF. (2015) Regional defense combating terrorism fellowship program report to congress- Fiscal Year 2015 -. In: Defence Do (ed). Washington DC: Office of the Assistant Secretary of Defence.
- Richards, N. M. (2012). The dangers of surveillance. Harv. L. Rev, 126, 1934.
- Ridde, V., Lechat, L., & Meda, I. B. (2016). Terrorist attack of 15 January 2016 in Ouagadougou: How resilient was Burkina Faso’s health system? BMJ Global Health, 1(1), e000056. doi:https://doi.org/10.1136/bmjgh-2016-000056
- Rosand, E. (2004). The security council as Global Legislator: Ultra vires or ultra innovative. Fordham Int’l LJ, 28, 542.
- Rosand, E., Millar, A., & Ipe, J. (2008). Civil Society and the UN global counter-terrorism strategy: Opportunities and challenges. Center on Global Counterterrorism Cooperation.
- Rostow, N. (2001). Before and after: The changed UN response to terrorism since September 11th. Cornell Int’l LJ, 35, 475.
- Salter, M. B. (2011). International cooperation on travel document security in the developed world. In Global mobility regimes (pp. 115–129). Springer.
- Schmid, A. P. (2013) Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper 97: 22.
- Searcey, D., & Schmitt, E. (2018) Deal with U.S. military sets off protests in Ghana. The New York Times. New York, USA.
- Shai, K., Molapo, R., & Sodi, T. (2017). The United States of America’s post-1990 foreign policy toward West Africa: The case study of Ghana. Journal for Contemporary History, 42(1), 154–173. doi:https://doi.org/10.18820/24150509/JCH42.v1.9
- Shaibu, A. M. (2014). Ghana armed forces’ participation in peace support operations in mali: Potential security threats to Ghana. University of Ghana.
- Sosuh, M. M. (2011) Border security in Ghana: Challenges and prospects.
- Spalek, B., & Weeks, D. (2017). Community-Based Counterterrorism. Studies in Conflict & Terrorism, 40(12), 987–990. doi:https://doi.org/10.1080/1057610X.2016.1253984
- Spencer, A. (2006) The problems of evaluating counter-terrorism. Revista UNISCI: 179–201.
- Spencer, A. (2012). Lessons learnt. Terrorism and the media. Wiltshire: Arts and Humanities Research Council Polaris Publishing House.
- Steinbach, M. (2016) “ISIL online: Countering terrorist radicalization and recruitment on the internet and social media,” Statement before the Senate Committee on Homeland Security and Governmental Affairs, Permanent Subcommittee on Investigation.
- Stone, M. (2009). Security according to Buzan: A comprehensive security analysis. Security Discussion Papers Series, 1, 1–11.
- Store, J. G. (2012) Learning From Norway’s Tragedy. New York Times. New York: New York Times Press.
- Tashakkori, A., & Teddlie, C. (2003). Handbook on mixed methods in the behavioral and social sciences. Thousand Oaks, CA: Sage.
- Theroux-Benoni, L.-A. (2019). West Africa doesn’t need another counter-terrorism force. In A. Portal, (ed).
- Tholen, B. (2010). The changing border: Developments and risks in border control management of Western countries. International Review of Administrative Sciences, 76(2), 259–278. doi:https://doi.org/10.1177/0020852309365673
- (UNSC) USC. (2015) Letter dated 2 September 2015 from the Chair of the Security Council Committee established pursuant to resolution 1373 (2001) concerning counter-terrorism addressed to the President of the Security Counci. United Nations.
- (UNCTC) UNC-TC. (2016) General assembly adopts the fifth review of the global counterterrorism strategy by consensus.
- (USDS) UDoS. (2019) U.S. relations With Ghana. In: State UDo (ed). USA.
- Van Ginkel, D. (2012) Engaging civil society in countering violent extremism: Experiences with the UN global counter-terrorism strategy.
- Venhaus, J. M. (2010). Why youth join al-Qaeda. US Institute of Peace.
- (WANEP) WANFP. (2019) West Africa early warning outlook 2019: Potential flashpoints and simmering conflicts in the region. Accra, Ghana.
- Von Hippel, K. (2005). Europe confronts terrorism. Springer.
- Wehrey, F. (2019). Control and Contain: Mauritania’s clerics and the strategy against violent extremism. Carnegie Endowment for International Peace.
- Wilkinson, P. (1997). The media and terrorism: A reassessment. Terrorism and Political Violence, 9(2), 51–64. doi:https://doi.org/10.1080/09546559708427402
- Williams, D., Okon, E., & Onibasa, T. (2018). The utility of military force and the global war on terror (GWOT): Strategic or Tactical? 4, 1–11.
- Wisdom, J., & Creswell, J. W. (2013). Mixed methods: Integrating quantitative and qualitative data collection and analysis while studying patient-centered medical home models. Rockville: Agency for Healthcare Research and Quality.
- Wolfers, A. (1962). National security as an ambiguous symbol, discord and collaboration. In Hopkins Un. Baltimore: Press.
- Woo, G. (2002). Quantitative terrorism risk assessment. The Journal of Risk Finance, 4(1), 7–14. doi:https://doi.org/10.1108/eb022949
- Wu, W. Y.-T. (2018) Addressing maritime violence through a changing dynamic of international law-making: Supplementation within evolution.
- Yagerman, R. (2016). Mali and Islamic extremism: Applying lessons learned from Afghanistan. UNITED STATES AGENCY FOR INTERNATIONAL DEVELOPMENT WASHINGTON DC WASHINGTON DC.
- Zagoon-Sayeed, H. (2018). Islam and peacebuilding in the context of the Muslim community in Ghana. University of Birmingham.