SOCIAL MEDIA AND NATIONAL SECURITY: ISSUES, CHALLENGES AND PROSPECTS

Charles Chukwuma Eze

Abstract


This study offers a descriptive account of the relationship between the social media and national security in some identified countries and Nigeria. The theoretical anchorage of the study is the Uses and Gratification theory. The study critically observed that the social media has long evolved beyond being a mere social platform to satisfying other needs and purposes for which anti – terrorism is paramount since it is observed by proven news stories that terrorists are also infiltrating the social media and hijacking  it for nefarious activities averse to national security. Some advanced techniques advocated by security experts through whom the social media networks and other Information and Communication Technologies can be utilized to counter and stem the current waves of national insecurities occasioned by the nefarious activities of Boko Haram were highlighted. Recommendations were offered starting from commendations to the Nigeria’s senate for the passage of the bill for an act to provide for the prohibition and punishment for electronic fraud and crime in all electronic transactions.


Full Text:

PDF

References


Adibe,K.N, Odemelam, C.C.,Orji – Egwu, A., Nwankwo, S.U. & Nweze, S. (2013)

Social Media and Political participation in Africa: Issues, Challenges and Prospect. In

D. Wilson (Ed), Communication and the Media in Nigeria: Social Engagements, Political

Development and Public Discourse (pp.64 – 84). ACCE, Nigeria chapter.

Asemah, E.S. (2011). Selected Mass Media Themes. Jos: Jos University Press.

Brown, H (2010, September 24). Thinking about national security: defence and foreign policy

in a dangerous world. In C.A Watson (Ed.), National security: a reference handbook.

Retrieved from http:// www.wkipedia.org/national security.

Douglas, k. (2014, April 23). Social media in Nigeria: Mobile chat dominates.

retrieved from http: www. Housemadeitnafrica.com

Galvin, k. (2013, October 6). The internet age is changing the face of terrorism.

Retrieved from http: www.policymic.com/articles/66443/html

Heathfied, S. (2014). What is social media? Retrieved from http: www.about.com

Meclan, P (2014). Social media and the changing face of terrorism. Retrieved from http:

www.trumanproject.org.

Okauru, A.B (2012, July). Information communication technology and National security in

Nigeria. Retrieved from http: www.cpn.gov.ng

Okenyodo, K. (2013, August) National security and the freedom of information in Nigeria: the

quest for open governance. Retieved from http:www.cleenfoundation. blogspot. com/2013/08

Oladele, k. (2013, May 15). Corruption and national security: what role for the media? Retrieved

from http: www. Saharareporters.com/article/corruption

Reuters. (2013, October 28) Syrian hackers hit Obama – link Twitter, Facebook accounts.

Retrieved from http: www.reuters.com/article/2013/10/28/net - usa obama - twitter

Ruggiero, J. E (2000). Uses and gratification theory in the 21st century. Mass Communication

and Society, 3:3 -37.

Washington post. (November1, 2013). For the national security and social media

communities a delicate relationship persists. Retrieved from

http:www.washingtonpost.com/politics for the national – security – and – social –

media – communities – a delicate _ partnership. Html

Wilson, C. (2010, February 22). Searching for Saddam: A five – part series on how the U.S.

military used social networking to capture the Iraqi detector. Retrieved form http:

hhtp: www.slate.com/articles/news

Ward, S (2014.). Social media definition. Retrieved from

http.www.sbinforcanda.about.com/od.socialmedia.htm

The Punch. (2014, April 21) Al – Shabab aided Boko Haram in Abuja Bombing.. Retrieved

from http: www. Punch.com.news

The Daily Independent. (2012, March 07) .Mark worries over social media, applauds Nigerian

press. Retrieved from http. www. Thedailyindependenting.com/2012/07/march

The National Security Journalism Initiative (2014) War 2:0 introduction to the

science of networks. Retrieved from http:

www.nationlsecurityzone. Org/war2.0/introduction the _science of


Refbacks

  • There are currently no refbacks.


ISSN (Print): 2276-8645

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.