|
|
|
|
LEADER |
03754nam a22005415i 4500 |
001 |
978-3-319-14935-6 |
003 |
DE-He213 |
005 |
20151030041339.0 |
007 |
cr nn 008mamaa |
008 |
150303s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319149356
|9 978-3-319-14935-6
|
024 |
7 |
|
|a 10.1007/978-3-319-14935-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Taft, Patricia.
|e author.
|
245 |
1 |
0 |
|a Violence in Nigeria
|h [electronic resource] :
|b Patterns and Trends /
|c by Patricia Taft, Nate Haken.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIV, 136 p. 53 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Terrorism, Security, and Computation,
|x 2197-8778
|
505 |
0 |
|
|a Introduction -- Niger Delta Overview -- North Central Overview -- Middle Belt Overview -- Northwest Overview -- Southwest Overview -- Conclusion.
|
520 |
|
|
|a This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict risk that must be understood for effective, conflict-sensitive approaches to development and direct conflict mitigation efforts. Moving beyond analyses that use a broad religious, ethnic or historical lens, this book focuses on the country’s 774 local government areas and incorporates over 10,000 incidents coded by location, date and indicator to identify patterns in conflict risk between 2009 and 2013. It is the first book to track conflict in Nigeria during this period, which covers the Amnesty Agreement in the Niger Delta and the birth of Boko Haram in the North. It also includes conflict risk heat maps of each state and trend-lines of violence. The authors conclude with a discussion of the nuanced factors that lead to escalating violence, such as resource competition and trends in terrorism during this critical point in Nigeria’s history. Violence in Nigeria is designed as a reference for researchers and practitioners working in security, peacebuilding and development, including policy makers, intelligence experts, diplomats, national defense and homeland security experts. Advanced-level students studying public policy, international relations or computer science will also find this book useful as a secondary textbook or reference.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Culture
|x Study and teaching.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Geographical information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Geographical Information Systems/Cartography.
|
650 |
2 |
4 |
|a Computer Appl. in Social and Behavioral Sciences.
|
650 |
2 |
4 |
|a Regional and Cultural Studies.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
|
|a Haken, Nate.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319149349
|
830 |
|
0 |
|a Terrorism, Security, and Computation,
|x 2197-8778
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-14935-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|