{"id":6468,"date":"2025-06-24T23:19:03","date_gmt":"2025-06-24T23:19:03","guid":{"rendered":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/"},"modified":"2025-06-25T04:15:26","modified_gmt":"2025-06-25T04:15:26","slug":"security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019","status":"publish","type":"post","link":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/","title":{"rendered":"Security Challenges: Appraisal of Threats to Nigeria\u2019s  Sovereignty in the Fourth Republic (1999-2019)"},"content":{"rendered":"<p>This article was originally published as: <strong>Security Challenges: Appraisal of Threats to Nigeria\u2019s  Sovereignty in the Fourth Republic (1999-2019)<\/strong><\/p>\n<p>Original Article Link: <a href='https:\/\/wissjournals.com.ng\/index.php\/wiss\/article\/view\/140' target='_blank' rel='noopener'>Read Original Article<\/a><\/p>\n<p>Download PDF: <a href='https:\/\/wissjournals.com.ng\/index.php\/wiss\/article\/download\/140\/127' target='_blank' rel='noopener'>Click Here to Download PDF<\/a><\/p>\n<h2>Abstract<\/h2>\n<p>Peace and security asprimacy of sovereign states is crucial forharmonious human relations and economic development. In the recent past, insecurity has been the greatest challenge to Nigeria\u201fs corporate existence as a sovereign state.Ironically, these challenges are not externally propelled rather, they areinternally impelled byinter-ethnic conflict, religious insurrection, electoral violence, banditry, kidnapping, ritualism, pipeline vandalism, separatists\u201f agitation, and farmers[1]herders crises among many others.These generate insecurity in the polity to the boiling point of fractured and failed state.The objective of the study, therefore, is to investigate the nexus between internally induced insecurity and failed stateposture experienced in the Nigeria\u201fs Fourth Republic. Theoretical framework adopted for the analysis is State Fragility-cum-Elite Theory. The study adopted qualitative research methods in which secondary data are employed for analysis. The study identifies poor intelligence information gathering and usage by security agents, militarization of civil society, poor harmonizationof resources for development, inadequate knowledge onmodern state system management, poormaintenance of balance between competing interests\/values, liberalization of military industrial complex, poor judgement of emerging political issues and inability of state\/government to live up toexpectations as causes of security challenges. The study recommends good governance and unadulterated fiscal federalism, free and fair elections; discourage culture of impunity, proactiveresponse to intelligence information gathering\/usage; and non[1]politicization of unfolding socio-political issues. The study concludes that emergence of popularly elected action-centered or functional leadershipwith good economic development blueprintand national integration strategies can reduce identified insecurity issues.<\/p>\n<h2>Authors<\/h2>\n<ul>\n<li>Olanrewaju Rafiu Memud (Southwestern University Nigeria, Okun-Owa, Ogun State, Nigeria)<\/li>\n<li>Solomon A.  Ojo (Southwestern University Nigeria, Okun-Owa, Ogun State, Nigeria)<\/li>\n<\/ul>\n<h2>Keywords<\/h2>\n<p>Challenges, Security, State failure, Political elites, Governance<\/p>\n<h2>References<\/h2>\n<p>References not available for this article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was originally published as: Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) Original&#8230;<\/p>\n","protected":false},"author":21,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[124],"tags":[1438,1012,3684,2544,3683],"class_list":["post-6468","post","type-post","status-publish","format-standard","hentry","category-articles","tag-challenges","tag-governance","tag-political-elites","tag-security","tag-state-failure","wpcat-124-id"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) - IJSSASS Repository<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) - IJSSASS Repository\" \/>\n<meta property=\"og:description\" content=\"This article was originally published as: Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) Original...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"IJSSASS Repository\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ijssass\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T23:19:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T04:15:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"195\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771\"},\"headline\":\"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019)\",\"datePublished\":\"2025-06-24T23:19:03+00:00\",\"dateModified\":\"2025-06-25T04:15:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\"},\"wordCount\":326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#organization\"},\"keywords\":[\"challenges\",\"Governance\",\"Political elites\",\"Security\",\"State failure\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\",\"url\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\",\"name\":\"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) - IJSSASS Repository\",\"isPartOf\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#website\"},\"datePublished\":\"2025-06-24T23:19:03+00:00\",\"dateModified\":\"2025-06-25T04:15:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ijssass.com\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ijssass.com\/journal\/#website\",\"url\":\"https:\/\/ijssass.com\/journal\/\",\"name\":\"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES\",\"description\":\"Open Access Library\",\"publisher\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#organization\"},\"alternateName\":\"IJSSASS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ijssass.com\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ijssass.com\/journal\/#organization\",\"name\":\"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES\",\"alternateName\":\"IJSSASS\",\"url\":\"https:\/\/ijssass.com\/journal\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png\",\"contentUrl\":\"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png\",\"width\":300,\"height\":195,\"caption\":\"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES\"},\"image\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ijssass\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/ijssass.com\/journal\"],\"url\":\"https:\/\/ijssass.com\/journal\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) - IJSSASS Repository","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/","og_locale":"en_US","og_type":"article","og_title":"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) - IJSSASS Repository","og_description":"This article was originally published as: Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) Original...","og_url":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/","og_site_name":"IJSSASS Repository","article_publisher":"https:\/\/www.facebook.com\/ijssass","article_published_time":"2025-06-24T23:19:03+00:00","article_modified_time":"2025-06-25T04:15:26+00:00","og_image":[{"width":300,"height":195,"url":"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#article","isPartOf":{"@id":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/"},"author":{"name":"admin","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771"},"headline":"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019)","datePublished":"2025-06-24T23:19:03+00:00","dateModified":"2025-06-25T04:15:26+00:00","mainEntityOfPage":{"@id":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/"},"wordCount":326,"commentCount":0,"publisher":{"@id":"https:\/\/ijssass.com\/journal\/#organization"},"keywords":["challenges","Governance","Political elites","Security","State failure"],"articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/","url":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/","name":"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019) - IJSSASS Repository","isPartOf":{"@id":"https:\/\/ijssass.com\/journal\/#website"},"datePublished":"2025-06-24T23:19:03+00:00","dateModified":"2025-06-25T04:15:26+00:00","breadcrumb":{"@id":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ijssass.com\/journal\/security-challenges-appraisal-of-threats-to-nigerias-sovereignty-in-the-fourth-republic-1999-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ijssass.com\/journal\/"},{"@type":"ListItem","position":2,"name":"Security Challenges: Appraisal of Threats to Nigeria\u2019s Sovereignty in the Fourth Republic (1999-2019)"}]},{"@type":"WebSite","@id":"https:\/\/ijssass.com\/journal\/#website","url":"https:\/\/ijssass.com\/journal\/","name":"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES","description":"Open Access Library","publisher":{"@id":"https:\/\/ijssass.com\/journal\/#organization"},"alternateName":"IJSSASS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ijssass.com\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ijssass.com\/journal\/#organization","name":"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES","alternateName":"IJSSASS","url":"https:\/\/ijssass.com\/journal\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/","url":"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png","contentUrl":"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png","width":300,"height":195,"caption":"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES"},"image":{"@id":"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ijssass"]},{"@type":"Person","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/ijssass.com\/journal"],"url":"https:\/\/ijssass.com\/journal\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts\/6468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/comments?post=6468"}],"version-history":[{"count":1,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts\/6468\/revisions"}],"predecessor-version":[{"id":6673,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts\/6468\/revisions\/6673"}],"wp:attachment":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/media?parent=6468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/categories?post=6468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/tags?post=6468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}