Understanding the Nigerian Way of National Security Towards a Theoretical Framework for National Security Strategic Personality

Understanding the Nigerian Way of National Security Towards a Theoretical Framework for National Security Strategic Personality

Olamide Samuel - 1401236 - University of Buckingham Understanding the Nigerian Way of National Security Towards a theoretical Framework for National Security Strategic Personality Olamide Mobolaji Samuel A Thesis Submitted for the Degree of PhD At the University of Buckingham 2017 1 Olamide Samuel - 1401236 - University of Buckingham ABSTRACT This thesis develops an explanatory typology, called the "National Security Strategic Personality theory (NSSP)". This theory is aimed at revealing how the operationalisation of national security, against threats with agency, is different from state to state. In developing this theory, the author focuses on identifying Nigerian state behaviour towards its perceived malicious threats, from 1960 through 2014. The NSSP theory is the result of an informed development of existing theoretical frameworks namely; Strategic Culture, and National Strategic Personality, into a coherent analytical tool. This framework utilises a constructivist ontology, to carefully extract viable elements (such as the state, security and referent objects) of the strategic culture and national strategic personality theoretical frameworks respectively. The NSSP framework then proceeds to reapply the extracted concepts, into an explanatory typology, so as to maximise their explanatory and predictive efficiency. The National Security Strategic Personality framework proposes that national security strategies of states, indeed share discernible similarities, but also possess distinct differences in character. This proposition is based on a systemic investigation into state behaviour against malicious threats, which identifies where state behaviour occurs, why such behaviour occurs, and how it occurs. The framework then proposes that the similarities and differences which one observes amounts to unique strategic personalities that can be documented. The hypotheses put forward in this thesis ascertain that: Every State possesses a unique National Security Strategic Personality which guides state actions against its perceived malicious threats to its referent objects. The unique National Security Strategic Personalities of states can be identified and adequately characterised by utilising the three elements of the National Security Strategic Personality Theoretical Framework The three elements proposed to be of fundamental importance to understanding the personality of national security strategies, are: Orientation, the physical location which a state considers as being within its theatre of operations, within which one can observe state behaviour. i Olamide Samuel - 1401236 - University of Buckingham Inflationary Containment, active and passive coercive means enacted by a state, which enables one to identify what referent objects the state prioritises. Compression, the strategic means which a state chooses to control or exterminate its perceived malicious threats. Orientation, Inflationary Containment and Compression are treated as independent variables which enable us to characterise the individual dimensions of a National Security Strategic Personality. Together, the characterised independent variables provide us with a comprehensive understanding of the characteristics of the National Security Strategic Personality as a whole, which is identified as a dependent variable. The development of an explanatory typological theory and the case study method of evaluation go hand-in-hand. The typological nature of the NSSP theory enables researchers to identify the NSSP of a state at any given time, while the implementation of case study analysis enables the researcher to comparatively analyse and distinguish between NSSPs of a state which may change over time. The researcher views the case study method of analysis, as the most appropriate tool to superimpose the NSSP theory on the selected case studies to evaluate its validity. The employment of the case study method in this thesis, facilitates comparative analysis of four phases of governance in Nigeria. These comparative observations highlight the creation and normalisation of essential aspects of Nigeria's national security strategy, which have a significant impact on the nature of Nigeria's response to national security threats today. This method also increases the probability of identifying developmental patterns, by ascertaining the aspects of Nigeria's National Security Strategic Personality which have persisted over the period under review, and also detects the aspects of the NSSPs which have been relatively flexible. The author believes that analysing state behaviour against threats with agency, enables one to understand the nature of state strategic behaviour against them. This analysis enables crisp scholarly characterisation of the true nature of what, up until now, we have believed to be a fog of strategic culture that influences the delivery of national security. The identification and characterisation of National Security Strategic Behaviour is capable of empowering scholars with more accurate predictive capabilities when anticipating the future of the security strategy of an observed state. These predictive capabilities would be reliably based on the observed dynamics of state behaviour. ii Olamide Samuel - 1401236 - University of Buckingham iii Olamide Samuel - 1401236 - University of Buckingham ACKNOWLEDGEMENTS I was fortunate to have been surrounded by the most considerate and helpful individuals during the course of this research. I would like to extend my sincerest gratitude to the following people for their help and support: At the University of Buckingham, Professor Julian Richards proved to be the most insightful and engaging supervisor, who was a constant source of encouragement and guidance during this research. Professor Anthony Glees, from whom conversations and critical engagements originally sparked the author's interest in the subject, and Dr Vassilis Kappis for his invaluable comments and feedback. I also wish to thank my wife Natasha, for the thoughtful and supportive role she played, especially through the most difficult phases of this work. I would like to acknowledge my father Mr Bayode Samuel, for encouraging and enabling me to embark on this research in the first place. I just wish he had been alive to witness the completion of this work, which is dedicated to him. I also wish to thank my mother Mrs Remi Samuel, for all her thoughts and prayers. To Lieutenant General Tukur Yusuf Buratai, Major General Adeosun, Mr Kabir Adamu, Colonel Sagir Musa, Brigadier S.K. Usman, and Captain A. Isa, who assisted me in innumerable ways during the course of this work. iv Olamide Samuel - 1401236 - University of Buckingham v Olamide Samuel - 1401236 - University of Buckingham TABLE OF CONTENTS Abstract ....................................................................................................................................... i Acknowledgements ................................................................................................................... iv List of Tables ............................................................................................................................ xi List of Figures .......................................................................................................................... xii Abbreviations and Acronyms ................................................................................................ xiii 1 Chapter One: Introduction .................................................................................................. 1 1.1 Introduction ................................................................................................................. 1 1.2 Research Objectives .................................................................................................... 3 1.3 Methodology ............................................................. Error! Bookmark not defined. 1.3.1 Explanatory Typology ......................................................................................... 4 1.3.2 The Case-Study Method ...................................................................................... 6 1.3.3 Fuzzy-Set ............................................................................................................. 6 1.4 Selected Case Studies .................................................................................................. 7 1.5 Data Sources .............................................................................................................. 10 1.6 Structure of This Dissertation ................................................................................... 10 2 Chapter Two: Literature Review ...................................................................................... 14 2.1 Conceptual Discourse ................................................................................................ 14 2.1.1 The Role of Subjective Perceptions in Determining National Security Agendas 14 2.1.2 A Constructivist Approach to Security and National Security .......................... 16 2.1.3 Security and the subjectivity of Referent Objects.............................................. 20 2.1.4 Different Versions of National Security Exist ................................................... 25 2.1.5 Culture, Strategy and Strategic Culture ............................................................. 28 2.1.6 Culture and Strategy as Intervening Variables .................................................. 31 2.1.7 The Cultural

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    276 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us