8,838
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

Ghana’s Readiness to Combat Terrorism: Strategies of Security Institutions

&
Pages 367-399 | Received 01 Jul 2020, Accepted 11 Aug 2021, Published online: 30 Sep 2021

References

  • Ackleson, J. (2005). Border security technologies: Local and regional implications. Review of Policy Research, 22(2), 137–155. doi:https://doi.org/10.1111/j.1541-1338.2005.00126.x
  • Adarkwah, S. B. (2020). Counter-terrorism framework and individual liberties in Ghana. African Journal of International and Comparative Law, 28(1), 50–65. doi:https://doi.org/10.3366/ajicl.2020.0301
  • Afrobarometer. (2014/2015) Ghana.
  • Agbemabiesse, G. E. (2011). An assessment of the operations of police officers in Ghana: A case study of police officers at the Cantonments Police Station (Doctoral dissertation)
  • Akanji, O. O. (2019). Sub-regional Security Challenge: ECOWAS and the war on terrorism in West Africa. Insight on Africa, 11(1), 94–112. doi:https://doi.org/10.1177/0975087818805842
  • Alvarez, J. E. (2006). Re-thinking (in) security discourses from a critical perspective. asteriskos, 1, 61–82.
  • Anim, E. (2016) Ghana’s vulnerability to the threat of domestic and transnational terrorism: Real, emerging or imagined?: Norwegian University of Life Sciences, Ås.
  • Aning, E. K. (2005). The anatomy of Ghana’s secret arms industry. Nicolas Florquin and Eric Berman, 78–107.
  • Aning, K. (2008). From ‘voluntary’ to a ‘binding’ process: Towards the securitisation of small arms. Journal of Contemporary African Studies, 26(2), 169–181. doi:https://doi.org/10.1080/02589000802124706
  • Anita, P. (2007). Mass media and Terrorism. Medij. Istraž, 13, 5–22.
  • Archick, K. (2010). US-EU cooperation against terrorism. DIANE Publishing.
  • Ball, K., Lyon, D., & Haggerty, K. D. (2012). Routledge handbook of surveillance studies. Routledge.
  • Bamba, R. (2014). The emerging threats of terrorism in West Africa: An analysis of ghana’s response. University Of Ghana.
  • Best, R. A., Jr (2002) Intelligence to counter terrorism: Issues for congress. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.
  • Bin Hassan, M. H., & Pereire, K. G. (2006). An ideological response to combating terrorism – the singapore perspective. Small Wars and Insurgencies, 17(4), 458–477. doi:https://doi.org/10.1080/09592310601060815
  • Briggs, R. (2010). Community engagement for counterterrorism: Lessons from the United Kingdom. International Affairs, 86(4), 971–981. Royal Institute of International Affairs 1944-). doi:https://doi.org/10.1111/j.1468-2346.2010.00923.x
  • Brown, H. (1983). Thinking about national security:. defense and foreign policy in a dangerous world: Westview Pr.
  • Brown, L. R. (1977). Redefining national security. Washington.
  • Bryden, A., & N’Diaye, B. (2011). Security sector governance in Francophone West Africa: Realities and opportunities. LIT Verlag Münster.
  • Bryman, A. (2016). Social research methods. Oxford university press.
  • Butt, R., & Tuck, H. (2014). European counter-radicalisation and de-radicalisation: A comparative evaluation of approaches in the Netherlands, Sweden, Denmark and Germany. London: Institute for Strategic Dialogue.
  • Buzan, B. (1991). New patterns of global security in the twenty-first century. International Affairs, 67(3), 19. doi:https://doi.org/10.2307/2621945
  • Cavoukian, A. (2013). Surveillance, then and now: Securing privacy in public spaces. Information and Privacy. Ontario, Canada.
  • Centre(KAIPTC) KAIPT. (2016) GHANA WORKSHOP ON ADDRESSING THE ROOT CAUSES OF VIOLENT EXTREMISM: A HUMAN SECURITY CONCEPTUAL APPROACH.
  • Christensen, M. M., & Edu-Afful, F. (2019) GHANA’S RESPONSE TO THE THREAT OF TERRORISM REQUIRES ENHANCED INTEROPERABILITY.
  • Cohen-Almagor, R. (2005) Media coverage of terror: Troubling episodes and suggested guidelines.
  • Crenshaw, M., & LaFree, G. (2017). Countering terrorism. Brookings Institution Press.
  • Creswell, J. W. (2009). Research design: Qualitative and mixed methods approaches. London and Thousand Oaks: Sage Publications.
  • Darkwa, L. (2011). The challenge of sub-regional security in West Africa: The case of the 2006 ECOWAS convention on small arms and light weapons. Nordiska Afrikainstitutet.
  • Don, B. W., Frelinger, D. R., Gerwehr, S., et al. (2007). Network technologies for networked terrorists: Assessing the value of information and communication technologies to modern terrorist organizations. Rand Corporation.
  • Dyekman, G. J. (2007) Security cooperation: A key to the challenges of the 21st Century. ARMY WAR COLL CARLISLE BARRACKS PA.
  • (EC) EC. (2004) Research for a secure Europe: Report of the group of personalities in the field of security research. European Comission Luxembourg, 12.
  • Ehiane, S. O. (2018). Strengthening the African Union (AU) counter-terrorism strategy in Africa : A re-awakened order. Journal of African Union Studies, 7(2), 109–126. doi:https://doi.org/10.31920/2050-4306/2018/v7n2a6
  • Eren, Y. (2013) The impact of land border security on terrorism financing: Turkey’s Southeast land border and the PKK. NAVAL POSTGRADUATE SCHOOL MONTEREY CA.
  • Flick, U. (2018). An introduction to qualitative research. Sage Publications Limited.
  • Francis, D. J. (2013). The regional impact of the armed conflict and French intervention in Mali. Norwegian Peacebuilding Resource Center.
  • Frontex. (2018) RISK Analysis.
  • Gänzle, S. (2011). AFRICOM and US Africa policy: ‘pentagonising’ foreign policy or providing a model for joint approaches? African Security Review, 20(1), 70–82. doi:https://doi.org/10.1080/10246029.2011.561020
  • Gherbaoui, T. (2020). Criminalising foreign fighter travel in order to prevent terrorism in Europe: An illegitimate assault on human dignity? In Human Dignity and Human Security in Times of Terrorism (pp. 241–267). Springer.
  • GIABA. (2013) The nexus between small arms and light weapons and money laundering and terrorist financing in West Africa.
  • Giannetto, L. (2012). The borders of accountability: The Case of FRONTEX. In Studi Europei e Internazionali. Universitat Degli Studi Di Trento.
  • Ginsburg, S. (2006) Countering terrorist mobility: Shaping an operational strategy. Report of the Independent Task Force on Immigration and America’s Future: Migration Policy Institute.
  • Gunaratna, R. (2016). Ivory coast attack: Africa’s terror footprint expands. Counter Terrorist Trends and Analyses, 8, 14–18.
  • Gunaratna, R. (2018). ASEAN’s greatest counter-terrorism challenge: The shift from’Need to know’to’Smart to share’. Combatting Violent Extremism and Terrorism in Asia and Europe, 111–128.
  • Guo, R. (2015). Cross-border crimes and border control. In Cross-border management (pp. 363–379). Springer.
  • Hardy, K. (2019). Countering right-wing extremism: Lessons from Germany and Norway. Journal of Policing, Intelligence and Counter Terrorism, 14(3), 262–279. doi:https://doi.org/10.1080/18335330.2019.1662076
  • Harrison, L., & Startin, N. (2013). Political research An introduction. Routledge.
  • Hendrickson, J. (2014). COUNTER-RADICALIZATION: COMBATING TERRORISM AT THE CORE, A STUDY OF THE MOTIVATIONS AND INSPIRATIONAL LEADERS BEHIND RADICALIZATION TO VIOLENT EXTREMISM AND THE PROGRAMS DESIGNED TO COMBAT THEM. Johns Hopkins University.
  • Hoffman, B. (2003). Al Qaeda, trends in terrorism, and future potentialities: An assessment. Studies in Conflict & Terrorism, 26(6), 429–442. doi:https://doi.org/10.1080/10576100390248275
  • Horgan, J., & Altier, M. B. (2012). The future of terrorist de-radicalization programs. Georgetown Journal of International Affairs, 83–90.
  • Houston, T. (2017) Mass surveillance and terrorism: Does PRISM keep americans safer?
  • Jain, B. M. (1985). South asian security: Problems and prospects. Radiant Publishers.
  • (JCS) JCoS. (2017) Security Cooperation.
  • Jalili, D. (2015). The Use of Professional Military Education as a Soft Power Asset in US International Security Policy. Strife Journal, 58–67
  • Jones, D. M. (2018). Intelligence and the management of national security: The post 9/11 evolution of an australian national security community. INTELLIGENCE AND NATIONAL SECURITY, 33(1), 1–20. doi:https://doi.org/10.1080/02684527.2016.1259796
  • Kahn, J. (2017). Terrorist watchlists. In THE CAMBRIDGE HANDBOOK OF SURVEILLANCE LAW (pp. 71–100).
  • Karlsson Norman, N. (2018) Human rights law as an intervention in covert surveillance of communication: The right to private life and communication in large-scale surveillance.
  • Katzenstein, P. J. (1996). The culture of national security: Norms and identity in world politics. Columbia University Press.
  • Kershner, I. (2005). Barrier: The seam of the israeli-palestinian conflict (pp. 161–167). New York: Palgrave.
  • Khera, K. K. (2017). International military exercises: An indian perspective. Journal of Defence Studies in Conflict & Terrorism, 11, 17–40.
  • Klein, P. (2009) International convention for the suppression of the financing of terrorism. United Nations Audiovisual Library of International Law: 1–5.
  • Krasner, S. D. (1999). Sovereignty: Organized hypocrisy. Princeton University Press.
  • Krouse, W. J. (2013) Terrorist watch list screening and background checks for firearms. Library of Congress, Congressional Research Service.
  • Kwarkye, S., Abatan, E. J., & Matongbada, M. (2019). Can the Accra Initiative prevent terrorism in West African coastal states? Pretoria, South Africa: Institute for Security Studies.
  • Laqueur, W. (2000). The new terrorism: Fanaticism and the arms of mass destruction. Oxford University Press on Demand.
  • Levy, M. A. (1995). Is the environment a national security issue? International Security, 20(2), 35–62. doi:https://doi.org/10.2307/2539228
  • Libicki, M. C., Chalk, P., Sisson, M. W., et al. (2007). Exploring terrorist targeting preferences. Rand Corporation.
  • Lumbaca, S., & Gray, D. H. (2011). The media as an enabler for acts of terrorism. Global Security Studies, 2, 45–54.
  • Lyon, D. (2008). Biometrics, identification and surveillance. Bioethics, 22(9), 499–508. doi:https://doi.org/10.1111/j.1467-8519.2008.00697.x
  • Lyon, D. (2015). Surveillance after Snowden. John Wiley & Sons.
  • Macnamara, W. D., & Fitz-Gerald, A. (2002). A national security framework for Canada. IRPP.
  • Marc, A., Verjee, N., & Mogaka, S. (2015). The challenge of stability and security in West Africa. World Bank Publications.
  • Martins, B. O., & Ziegler, M. (2018). Counter-radicalization as counter-terrorism: The european union case. In Expressions of radicalization (pp. 321–352). Springer.
  • Matthews, B., & Ross, L. (2014). Research methods. Pearson Higher Ed.
  • Mattis, J. (2018) Summary of the 2018 national defense strategy of the United States of America. Department of Defense Washington United States.
  • McCaul, M. (2016) A national strategy to win the war against islamist terror. House Homeland Security Committee. https://homeland.house.gov/wp-content/uploads/2016/09/A-National-Strategy-to-Win-the-War.pdf (accessed January 24, 2018).
  • Menkhaus, K. (2009). False start in AFRICOM. Contemporary Security Policy, 30(1), 53–57. doi:https://doi.org/10.1080/13523260902767905
  • Millar, J. (2008) Work is good for you”: Lone mothers, children, work and well-being, social security and health research. Working Papers [60/2008]). Helsinki, Finland: KELA, 9.
  • Millard, G. (2004). Post-September 11 terrorism measures. Fla. J. Int’l L, 16, 97.
  • Miller, T. (2014). Border patrol nation: Dispatches from the front lines of homeland security. City Lights Publishers.
  • Mohammed, L. I. (2018) Fighting for peace: Assessing the role of the government in the Guinea Fowl War of 1994. UiT Norges arktiske universitet.
  • Monahan, T. (2012). Surveillance and terrorism. In Routledge handbook of surveillance studies (pp. 285–291). New York: Routledge.
  • Nacos, B. L. (1994a). The terrorism and the media. In From the Iran hostage crisis to the Ocklahoma City Bombing. New York: Columbia University Press.
  • Nacos, B. L. (1994b). Terrorism and the media: From the Iran hostage crisis to the World Trade Center bombing. Columbia University Press.
  • Nan, T. (2015) Terrorism: The need to enhance global cooperation against the threat to democracy and individual rights.
  • Navarrete, A. C., Mellouli, S., Pardo, T. A., et al. (2009) Information sharing at national borders: Extending the utility of border theory. 2009 42nd Hawaii International Conference on System Sciences. 1–10.
  • Nesser, P. (2010). Joining jihadi terrorist cells in Europe. In Understanding violent radicalisation (pp. 81–114). Routledge.
  • Neumann, P. R. (2003). The trouble with radicalization. International Affairs, 89(4), 873–893. doi:https://doi.org/10.1111/1468-2346.12049
  • Norman, I., Aikins, M., Binka, F., et al. (2014). Ghana’s legal preparedness against the perceived threat of narcotics trafficking and terrorism: A case study for West Africa. Issues in Business Management and Economics, 2, 201–209.
  • Okeke, J. (2019) Repositioning the AU’s role in counter-terrorism operations.
  • Organisation(ICAO) ICA. (2018). ICAO TRIP Guide on BORDER CONTROL MANAGEMENT. Montréal, QC, Canada: International Civil Aviation Organisation(ICAO).
  • Osei-Appiah, D. A. O. (2016). 2.3 Million small arms circulating in the country. In Daily Graphic. Ghana: Daily Graphic Press.
  • Owen, T. (2004). Human security-Conflict, critique and consensus: Colloquium remarks and a proposal for a threshold-based definition. Security Dialogue, 35(3), 373–387. doi:https://doi.org/10.1177/0967010604047555
  • Peace(FFP) FF. (2018) VOLUNTARY PRINCIPLES IN GHANA: FINAL PROJECT REPORT.
  • Pettinger, T. (2017). De-radicalization and Counter-radicalization: Valuable tools combating violent extremism, or harmful methods of subjugation? Journal for Deradicalization, 1–59.
  • Precht, T. (2007) Home grown terrorism and Islamist radicalisation in Europe. Retrieved on 11.
  • Profile, C. (2017). Mauritania. Positivity, 40, 60.
  • Program(CTFP) CTF. (2015) Regional defense combating terrorism fellowship program report to congress- Fiscal Year 2015 -. In: Defence Do (ed). Washington DC: Office of the Assistant Secretary of Defence.
  • Richards, N. M. (2012). The dangers of surveillance. Harv. L. Rev, 126, 1934.
  • Ridde, V., Lechat, L., & Meda, I. B. (2016). Terrorist attack of 15 January 2016 in Ouagadougou: How resilient was Burkina Faso’s health system? BMJ Global Health, 1(1), e000056. doi:https://doi.org/10.1136/bmjgh-2016-000056
  • Rosand, E. (2004). The security council as Global Legislator: Ultra vires or ultra innovative. Fordham Int’l LJ, 28, 542.
  • Rosand, E., Millar, A., & Ipe, J. (2008). Civil Society and the UN global counter-terrorism strategy: Opportunities and challenges. Center on Global Counterterrorism Cooperation.
  • Rostow, N. (2001). Before and after: The changed UN response to terrorism since September 11th. Cornell Int’l LJ, 35, 475.
  • Salter, M. B. (2011). International cooperation on travel document security in the developed world. In Global mobility regimes (pp. 115–129). Springer.
  • Schmid, A. P. (2013) Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper 97: 22.
  • Searcey, D., & Schmitt, E. (2018) Deal with U.S. military sets off protests in Ghana. The New York Times. New York, USA.
  • Shai, K., Molapo, R., & Sodi, T. (2017). The United States of America’s post-1990 foreign policy toward West Africa: The case study of Ghana. Journal for Contemporary History, 42(1), 154–173. doi:https://doi.org/10.18820/24150509/JCH42.v1.9
  • Shaibu, A. M. (2014). Ghana armed forces’ participation in peace support operations in mali: Potential security threats to Ghana. University of Ghana.
  • Sosuh, M. M. (2011) Border security in Ghana: Challenges and prospects.
  • Spalek, B., & Weeks, D. (2017). Community-Based Counterterrorism. Studies in Conflict & Terrorism, 40(12), 987–990. doi:https://doi.org/10.1080/1057610X.2016.1253984
  • Spencer, A. (2006) The problems of evaluating counter-terrorism. Revista UNISCI: 179–201.
  • Spencer, A. (2012). Lessons learnt. Terrorism and the media. Wiltshire: Arts and Humanities Research Council Polaris Publishing House.
  • Steinbach, M. (2016) “ISIL online: Countering terrorist radicalization and recruitment on the internet and social media,” Statement before the Senate Committee on Homeland Security and Governmental Affairs, Permanent Subcommittee on Investigation.
  • Stone, M. (2009). Security according to Buzan: A comprehensive security analysis. Security Discussion Papers Series, 1, 1–11.
  • Store, J. G. (2012) Learning From Norway’s Tragedy. New York Times. New York: New York Times Press.
  • Tashakkori, A., & Teddlie, C. (2003). Handbook on mixed methods in the behavioral and social sciences. Thousand Oaks, CA: Sage.
  • Theroux-Benoni, L.-A. (2019). West Africa doesn’t need another counter-terrorism force. In A. Portal, (ed).
  • Tholen, B. (2010). The changing border: Developments and risks in border control management of Western countries. International Review of Administrative Sciences, 76(2), 259–278. doi:https://doi.org/10.1177/0020852309365673
  • (UNSC) USC. (2015) Letter dated 2 September 2015 from the Chair of the Security Council Committee established pursuant to resolution 1373 (2001) concerning counter-terrorism addressed to the President of the Security Counci. United Nations.
  • (UNCTC) UNC-TC. (2016) General assembly adopts the fifth review of the global counterterrorism strategy by consensus.
  • (USDS) UDoS. (2019) U.S. relations With Ghana. In: State UDo (ed). USA.
  • Van Ginkel, D. (2012) Engaging civil society in countering violent extremism: Experiences with the UN global counter-terrorism strategy.
  • Venhaus, J. M. (2010). Why youth join al-Qaeda. US Institute of Peace.
  • (WANEP) WANFP. (2019) West Africa early warning outlook 2019: Potential flashpoints and simmering conflicts in the region. Accra, Ghana.
  • Von Hippel, K. (2005). Europe confronts terrorism. Springer.
  • Wehrey, F. (2019). Control and Contain: Mauritania’s clerics and the strategy against violent extremism. Carnegie Endowment for International Peace.
  • Wilkinson, P. (1997). The media and terrorism: A reassessment. Terrorism and Political Violence, 9(2), 51–64. doi:https://doi.org/10.1080/09546559708427402
  • Williams, D., Okon, E., & Onibasa, T. (2018). The utility of military force and the global war on terror (GWOT): Strategic or Tactical? 4, 1–11.
  • Wisdom, J., & Creswell, J. W. (2013). Mixed methods: Integrating quantitative and qualitative data collection and analysis while studying patient-centered medical home models. Rockville: Agency for Healthcare Research and Quality.
  • Wolfers, A. (1962). National security as an ambiguous symbol, discord and collaboration. In Hopkins Un. Baltimore: Press.
  • Woo, G. (2002). Quantitative terrorism risk assessment. The Journal of Risk Finance, 4(1), 7–14. doi:https://doi.org/10.1108/eb022949
  • Wu, W. Y.-T. (2018) Addressing maritime violence through a changing dynamic of international law-making: Supplementation within evolution.
  • Yagerman, R. (2016). Mali and Islamic extremism: Applying lessons learned from Afghanistan. UNITED STATES AGENCY FOR INTERNATIONAL DEVELOPMENT WASHINGTON DC WASHINGTON DC.
  • Zagoon-Sayeed, H. (2018). Islam and peacebuilding in the context of the Muslim community in Ghana. University of Birmingham.