E. B. J. Iheriohanma, Chinyere C. Emenyonu


The general objective of the paper examines critically the synergic relationship between effective information and intelligence needs gathering, analysis and utilization in relation to security situation in Nigeria. Effective pursuit and execution of security needs in every nation depend critically on the conscious security information drive, intelligence gathering, the existence of the necessary security gadgets and apparatus, the zeal of the citizenry to be security conscious and to provide information needed, the will power of the government in place and security institutions to analyze and utilize the available information and intelligence gathered. The challenging problems of study indicate that budgetary funds are made available to security agencies and institutions yet insecurity prevails in Nigeria, lives and properties are destroyed on daily basis, foreign investors relocate out of Nigeria for fear of insecurity, inability of security agencies to pro-actively respond to security demands, seemingly government complicity in curtailing the incessant insecurity, etc. These point to the lack of information and intelligence needs gathering and analysis, lack of relevant modern ICT security equipment and personnel, sharing intelligence information and collaborative efforts among these agencies. The paper is discursive and analytical in methodology. While the paper examined the challenges faced by these agencies and reasons for their ineffectiveness, it avers that, in order to buttress security and grow the economy, the government of Nigeria should, among others, ensure that there are collaborative and effective information and intelligence drive, analysis, sharing and utilization in relation to security pursuit; high technological military hardware for surveillance should be in use; sentiments, individualism, exclusionism, ethnicity and parochialism should not be above national interest; economy should be boosted through job creation, employment, empowerment, entrepreneurship, industrialization and manufacture to mitigate the burden on the agencies and create opportunity for individuals and institutions to explore their potentials and the economy to blossom.


Article visualizations:

Hit counter



effective information needs, intelligence, information analysis, utilization, insecurity, Nigeria

Full Text:



Achebe, C. (1998). The trouble with Nigeria. Enugu: Fourth Dimension.

Adeleke, A. (2013). Insecurity: A threat to human existence and economic development in Nigeria. Political Policy and Administration, 3(2). Assessed 23/04/2018.

Aina, L.O., Mutula, S.M. and Tiamiya, M.A. (2008). Information and knowledge management in the digital age: Concepts, technologies and Africa perspectives. Ibadan, Third World Information Services limited.

Borosage, R. L. and Marks, J. (1976). The CIA file. Grassman Publishers.

Bwanson, M. H. & Vogel, K. M. (2017). Big data, intelligence and analyst privacy: Investigating information dissemination at an NSA-funded research lab. Intelligence and National Security, 33 Issue 3, 2017, pp. 357 – 375. Accessed 06/03/2018.

Ezema, O. (2016). Challenges of youth unemployment in Nigeria: Effective career guidance as a panacea. Afr. Res. Rev. 7(1): 30 – 43.

Gill, P. (2014). Thinking about intelligence within, without and beyond the state. Journal of Foreign Policy and Peace, 3(2): 5.

Heets, R. (2004). Information systems and developing countries: Failure, success and local improvisations. The Information Society 18 (2).

Iheriohanma, E. B. J. (2002). Sociology: A practical understanding of social reality, Owerri: Tropical Publications in conjunction with Polynek Consultants Ltd.

Iheriohanma, E. B. J. (2006). The national question, human rights violation and national development: Strategic issues, implications and challenges in a globalizing world. Knowledge Review, 13(5): 26 – 35.

Nte, N. D. (2012). Exploring the Benefits of Inter Agency Collaboration and Community Partnership for Public Safety and National Security: Lessons for Nigeria’s Security Agencies, SCS Journal 2(4): 75 – 85.

Ogah, D., Fanimo, D., Shadare, W., Ebosele, Y., Okere, R., Adepetun, A., and Lawrence, F. (2011, December, 22). “Expatriates, some semi-skilled, take over even menial jobs from Nigerians”. Retrieved April 26, 2018, from

Parkes, A. (2017). Lessons through reform: Australian’s security intelligence. International Journal of Intelligence, Security and Public Affairs, pp. 157 – 170. 06/03/2018.

Robbins, S. P. (1983). Essentials of organizational behaviour, N.J., Prentice-Hall, INC., Englewood Cliffs.

Ugoanachie, E.A. (2003). Security systems and problems in Federal University of Technology, Owerri (FUTO) library. Thesis submitted to the Department of Library and Information Science, Imo State University Owerri.

Uhegbu, A.N. (2006). Strategies for effective rural information networking, Research Librarian 1 (1).

Uhegbu, A.N. (2007). The information user: Issues and themes. 2nd ed. Okigwe, Whytem.

Unegbu, M.C. and Nwanekezie, N. (2014) Economics and marketing of information services and products. Owerri, Cel. Bez.


Copyright (c) 2018 E. B. J. Iheriohanma, Chinyere C. Emenyonu

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

The research works published in this journal are free to be accessed. They can be shared (copied and redistributed in any medium or format) and\or adapted (remixed, transformed, and built upon the material for any purpose, commercially and\or not commercially) under the following terms: attribution (appropriate credit must be given indicating original authors, research work name and publication name mentioning if changes were made) and without adding additional restrictions (without restricting others from doing anything the actual license permits). Authors retain the full copyright of their published research works and cannot revoke these freedoms as long as the license terms are followed.

Copyright © 2016 - 2023. European Journal Of Social Sciences Studies (ISSN 2501-8590) is a registered trademark of Open Access Publishing Group. All rights reserved.

This journal is a serial publication uniquely identified by an International Standard Serial Number (ISSN) serial number certificate issued by Romanian National Library. All the research works are uniquely identified by a CrossRef DOI digital object identifier supplied by indexing and repository platforms. All the research works published on this journal are meeting the Open Access Publishing requirements and standards formulated by Budapest Open Access Initiative (2002), the Bethesda Statement on Open Access Publishing (2003) and  Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities (2003) and can be freely accessed, shared, modified, distributed and used in educational, commercial and non-commercial purposes under a Creative Commons Attribution 4.0 International License. Copyrights of the published research works are retained by authors.


Hit counter