Technological Stratigies to Mitigate Insecurity in Nigerian Schools: Implications for Educational Administrators
Abstract
The paper discusses technological strategies to mitigate insecurity in Nigerian schools: implications for educational administrators. The paper observed that there is prevalence of insecurity at all levels of Nigerian educational system which poseS serious threats to human lives and properties.
References
2. Adesulu, D. (2019). Insecurity: The untold story in Nigerian schools. International political sociology, 8(4), 396-415
3. Akintunde, O. & Selzing-Musa, G. (2016). Environmental insecurity and the Nigerian child’s learning : coping strategies. Asia Pacific Journal of Multidisciplinary Research. 4(1), 13-17.
4. Eons Intelligence (2020). Analysis of Nigeria insecurity challenges from June 2011 to June, 2012.
5. Eugene, O.R. (2001). Trends and issues in schools safety. https://eric.uoregon.edu/trend/safetyindex.html.
6. Global Coalition to Protect Education from Attack (GCPEA, 2020). A global study of attacks on schools, universities, their students, and staff, 2017-2019 https://www. ua2020.protectingeducation.org
7. Hornby, S.A. (2015). Oxford advanced learner’s dictionary (9th ed). Oxford University press. Oxford: United Kingdom.
8. Iheamnachor, M.H. (2015). Incidence of insecurity in secondary schools in Rivers State. http://www.chow.com>education.
9. Manga, S.D. (2019). Assessment of causes and forms of insecurity in educational institutions in Kebbi State: Implications for school administration. International Journal of Current Research, 11(10), 7676-7680.
10. Metiri, G. (2019). Technology in schools: What the research says. Commissioned by Cisco, 2008. San
11. National Center for Education Statistics (2021). Global report of security threats 2019-2020. www.arc.org, "Research on violence"
12. Okoli, A. C. (2013). The securitization of dual citizenship. National security concerns and the making of overseas citizenship of India. Diaspora Studies, 8(1), 18-36.
13. Onyiri, U.O.J., & Walson, O.B.A. (2021). Educational leadership: A discourse analysis. Ikensity press.
14. Paul, N. (2015). The effects of insecurity on quality tertiary education in Nigeria. Asian Journal of Applied Sciences. 3(6), 965-976.
15. Samuel, S. J. & Chukuma. T.C. (2015). School security: Issues and prospects. www.schoolsecurity.org/resources/2015 NASRO Survey.pdf.
16. Shuaibu, F.B. (2015). Psychological perspective of insecurity in Nigerian schools environment. Keynote address presented at NISEP on 15th annual national conference. Abuja
In submitting the manuscript to the International Journal on Integrated Education (IJIE), the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere,
- The publication has been approved by the author(s) and by responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
License and Copyright Agreement
Authors who publish with International Journal on Integrated Education (IJIE) agree to the following terms:
- Authors retain copyright and grant the International Journal on Integrated Education (IJIE) right of first publication with the work simultaneously licensed under Creative Commons Attribution License (CC BY 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the International Journal on Integrated Education (IJIE) published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.