Violence in Nigeria Patterns and Trends /

This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict fa...

Full description

Saved in:
Bibliographic Details
Main Authors: Taft, Patricia. (Author, http://id.loc.gov/vocabulary/relators/aut), Haken, Nate. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edition:1st ed. 2015.
Series:Terrorism, Security, and Computation,
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-14935-6
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 04364nam a22005775i 4500
001 978-3-319-14935-6
003 DE-He213
005 20200701151026.0
007 cr nn 008mamaa
008 150303s2015 gw | s |||| 0|eng d
020 |a 9783319149356  |9 978-3-319-14935-6 
024 7 |a 10.1007/978-3-319-14935-6  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Taft, Patricia.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Violence in Nigeria  |h [electronic resource] :  |b Patterns and Trends /  |c by Patricia Taft, Nate Haken. 
250 |a 1st ed. 2015. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a XIV, 136 p. 53 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Terrorism, Security, and Computation,  |x 2197-8778 
505 0 |a Introduction -- Niger Delta Overview -- North Central Overview -- Middle Belt Overview -- Northwest Overview -- Southwest Overview -- Conclusion. 
520 |a This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict risk that must be understood for effective, conflict-sensitive approaches to development and direct conflict mitigation efforts. Moving beyond analyses that use a broad religious, ethnic or historical lens, this book focuses on the country’s 774 local government areas and incorporates over 10,000 incidents coded by location, date and indicator to identify patterns in conflict risk between 2009 and 2013. It is the first book to track conflict in Nigeria during this period, which covers the Amnesty Agreement in the Niger Delta and the birth of Boko Haram in the North. It also includes conflict risk heat maps of each state and trend-lines of violence. The authors conclude with a discussion of the nuanced factors that lead to escalating violence, such as resource competition and trends in terrorism during this critical point in Nigeria’s history. Violence in Nigeria is designed as a reference for researchers and practitioners working in security, peacebuilding and development, including policy makers, intelligence experts, diplomats, national defense and homeland security experts. Advanced-level students studying public policy, international relations or computer science will also find this book useful as a secondary textbook or reference. 
650 0 |a Computer security. 
650 0 |a Geographical information systems. 
650 0 |a Application software. 
650 0 |a Culture—Study and teaching. 
650 1 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Geographical Information Systems/Cartography.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/J13000 
650 2 4 |a Computer Appl. in Social and Behavioral Sciences.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I23028 
650 2 4 |a Regional and Cultural Studies.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/411000 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040 
700 1 |a Haken, Nate.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319149363 
776 0 8 |i Printed edition:  |z 9783319149349 
776 0 8 |i Printed edition:  |z 9783319360195 
830 0 |a Terrorism, Security, and Computation,  |x 2197-8778 
856 4 0 |u https://doi.org/10.1007/978-3-319-14935-6 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)