The onset of new and emerging threats to peace and security in West Africa has added another layer of threat to security in West Africa. There is a need for research on the interconnectedness among existing and new and emerging threats to security in the region. The purpose of this study was to explore the Economic Community of West African States’ (ECOWAS’) approach to its regional security management strategy. The punctuated equilibrium theory and policy feedback theory were used to conceptualize the problem within the context of ECOWAS’ policy inertia and the wide range of security and sociopolitical dynamics in the region. The research questions focused on assessing the effectiveness of ECOWAS’ approach to security management in West Africa. The research was a qualitative exploratory case study based on a grounded theory design. Purposive and snowball sampling techniques were used to recruit 12 regional security experts from ECOWAS headquarters and regional peace and security institutions in Ghana and Nigeria. Data collection techniques included in-depth interviews and document analysis. The findings showed that the ECOWAS’ security management strategy, which was effective during the internecine conflicts, was no longer successful with the advent of new and emerging threats to security in the region. Recommendations of this study include developing ECOWAS strategic concept for security management and drafting an ECOWAS framework for accountability. The study has implications for positive social change (e.g., improving perceptions of security among West African citizens) and policy making and professional practice (e.g., supporting an integrated conceptual approach to security management that is threat focused).
|Department:||Public Policy and Administration|
|School Location:||United States -- Minnesota|
|Source:||DAI-A 82/4(E), Dissertation Abstracts International|
|Subjects:||Public administration, Public policy, African Studies|
|Keywords:||ECOWAS security management, ECOWAS strategic concept, Emerging security threats, Integrated threat management, Terrorism in the Sahel region, West Africa regional security|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be