##plugins.themes.bootstrap3.article.main##

Statism or Realism proffers that the State is the main actor in politics, and, therefore, the Referent Object. This belief appears to be the predominate basis of governance in Sub-Saharan Africa, despite the region’s efforts towards mainstreaming democratic principles in governance. There are several other progressive schools of thought that inure society with authority superior to that of the State on the basis of Rule of law. The resulting polarity of power presents problems for aligning State Security influenced by realist securitization theories and Societal Security influenced by the United Nations Development Program’s Human Development Report since 1994 and the Welsh School of Security Studies.

In this analytical, correctional research approach, I will show that the States seem to apply mechanical and substantive modalities through authoritarian control over society, since the State is the sole provider of security, making the citizens less significant in the eyes of the ruling elite, Security Forces and Police Services with delegated State powers. Although the Constitutional frameworks of the common law, English Language speaking nations in Africa provide that sovereignty emanates from the citizens and, therefore, the repository and custodians of all laws, the concept of Statism or Realism ignores such provisions analytically, legislatively and constructively.

There is considerable disregard for the citizens as the custodians of power which has led the State to create National Security institutions, backed by legislation and public policy, whose primary pre-occupations are the rendition of protective and intelligence services to perpetuate the regime’s control over the citizens.

There are also researchers and political scientists that seem to legitimize the emasculation of the larger members of Society, since they are deemed as part of the existential and imminent threats to State power. The history of democracy in Sub-Saharan Africa provides to date, blatant lack of the Rule of Law, Justice and Equal Protections, where citizens compete against the State interests.

This introductory study contextually teases out from the literature on security studies, the thrust of the Copenhagen and the Welsh School’s approaches towards governance; to demonstrate that, the pursuit of authoritarian rule in Africa is rather a deviation from both Schools of Security Studies, with recommendations for change towards a more measurable deliverables of the Human Development Report of 1994 and its progeny of progressive international development policies.

References

  1. Abrahams, R. (1998). Vigilant Citizens: Vigilantism and the State. Cambridge, United Kingdom: Polity Press.
     Google Scholar
  2. Afolabi, M. (2015). Concept of Security. Readings in Intelligence and Security Studies, 1-2.
     Google Scholar
  3. Andersson, A-K. (2013). Choices, Interests, and Potentiality: What Distinguishes Bearers of Rights? Journal of Value Inquiry, 47, 175–90.
     Google Scholar
  4. Aradau, C. (2004). Security and the Democratic Scene: Desecuritization and Emancipation. Journal of International Relations and Development, 7(4), 388–413.
     Google Scholar
  5. Asamoah, O. Y. (2014). The political history of Ghana (1950–2013): The experience of a non-conformist (p. 187). Bloomington: Author House.
     Google Scholar
  6. Ayn Rand. (1957). Atlas Shrugged. Random House, Inc. 201 East 50th Street, New York, New York 10022. ISBN: 47-48-49-50-51-52-53-54.
     Google Scholar
  7. Badong, P. A. (2009). Security Provision in Ghana: What is the Role and Impact of non-State Actors? African Leadership Center, Research Report 5, 11–12.
     Google Scholar
  8. Ballyn, S. (2011). Lives in migration: Rapture and Continuity, Barcelona: University of Barcelona, In Oni, E. O. and Okunade, S. K. 2018. The context of Xenophobia in Africa: Nigeria and South Africa in Comparison. A. O. Kinola (ed.). The Political Economy of Xenophobia in Africa, Advances in African Economic, Social and Political Development. https://doi.org/10.1007/978-3-319-64897-2_4. 22.
     Google Scholar
  9. Barry, B. M. (1998). Social exclusion, social isolation and the distribution of income: Centre for Analysis of Social Exclusion, London School of Economics London.
     Google Scholar
  10. Betz, H.G. (2002) Conditions Favoring the Success and Failure of Radical Right-Wing Populist Parties in Contemporary Democracies. In Y. Mény and Y. Surel (eds.). Democracies and the Populist Challenge. New York: Palgrave, pp. 197–213.
     Google Scholar
  11. Bigo, D. (2002). Security and immigration: toward a critique of governmentality of unease. Alternative, 27(1), pp. 63–92.
     Google Scholar
  12. Bjorklund, T., and Andersen, J.G. (2002) Anti-Immigration Parties in Denmark and Norway: The Progress Parties and the Danish People’s Party. In M. Schain, A. Zolberg, and P. Hossay (eds.) Shadows over Europe: The Development and Impact of the Extreme Right in Western Europe. New York: Palgrave, pp. 107–36.
     Google Scholar
  13. Blumer, H. (1958) Race Prejudice as a Sense of Group Position. Pacific Sociological Review 1 (Spring), 3–7.
     Google Scholar
  14. Bluwey, G. K. (1998). State Organizations in the Transition to Constitutional Democracy, in K. A. Ninsin (ed.), Ghana: Transition to Democracy, Accra, Freedom Publications.
     Google Scholar
  15. Bond, P. (2006). Persistent court corruption. Economic Journal 118, 1333–1353. http://finance.wharton.upenn.edu/~pbond/research/ms2004460r.pdf.
     Google Scholar
  16. Mark, B., and Michael, K. (2013). Winning Hearts and Minds?, pp. 36–37, Independent, 21 Feb. 2013, In Fisher, J. and Anderson, M. D. (2015). Authoritarianism and the securitization of development in Africa. International Affairs, 91(1), 131–151.
     Google Scholar
  17. Brodeur, J.P. (2007). High and Low Policing in Post-9/11 Times, Oxford J., 1(1), 25–37, http://policing.oxfordjournals.org/cgi/content/full/1/1/25.
     Google Scholar
  18. Brown, C. and Ainley, K. (2005). Understanding International Relations, 3rd ed. New York, NY: Macmillan.
     Google Scholar
  19. Buzan, B and Hansen, L. (2009) Evolution of International Security studies, Cambridge University Press, UK.
     Google Scholar
  20. Buzan, B. (1991). People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era. Essex: Longman.
     Google Scholar
  21. Buzan, B. and Hansen, L. (2009). The Evolution of Security Studies. New York, NY: Cambridge University Press.
     Google Scholar
  22. Buzan, B. and Wæver, O. (1997). Slippery? Contradictory? Sociologically Untenable? The Copenhagen School Replies. Review of international studies, 23(2), 241–250.
     Google Scholar
  23. Buzan, B. (1997). Rethinking Security after the Cold War. Cooperation and Conflict, 32(1), 5–28.
     Google Scholar
  24. Buzan, B. and O. Wæver. (2003). Regions and Powers: The Structure of International Security. New York, NY: Cambridge University Press.
     Google Scholar
  25. Buzan, B., Ole, W. and Jaap de W. (1998). Security: A New Framework for Analysis, Boulder, CO: Lynne Rienner. Cambridge: Cambridge University Press.
     Google Scholar
  26. Charrett, C. (2009). A critical application of Securitization Theory: Overcoming the Normative Dilemma of Writing Security. (Ed.) Javier Alcalde and Rafael Grasa. SSRN Electronic Journal, International Catalan Institute for Peace, Barcelona. http://ssrn.come/abstract=1884149. ISSN 2013.5793.
     Google Scholar
  27. Csepe, V. (2004). The Psychological Dimensions of Subjective Security. Hungarian Academy of Sciences. https://www.bm-tt.hu.
     Google Scholar
  28. Desanctis, G. & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5, 132.
     Google Scholar
  29. Duffield, M. (2001). Governing the borderlands: decoding the power of aid. Disasters, 25(4), 308–320.
     Google Scholar
  30. Eleanor, P. (2019). https://www.newstatesman.com/2019/04/, accessed, 6/20/2019.
     Google Scholar
  31. Emile Short Commission of Inquiry: Ayawaso West Wuogon Election Violence, Ghana (2020). Government Printers, Barnes Avenue, Accra.
     Google Scholar
  32. Eroukhmanoff, C. (2018). Securitization Theory: An Introduction. E-International Relations Theory, E-IR Foundations Beginner’s Book, pp. 1–4, ISSN 2053-8626.
     Google Scholar
  33. Eriksson, J. (1999). Observers or Advocates? On the political role of Security Analysts. Cooperation and Conflict 34(3), 311–3.
     Google Scholar
  34. Espenshade, T.J., and Hempstead, K. (1996). Contemporary American Attitudes toward U.S. Immigration. The International Migration Review, 30(114), 535–70.
     Google Scholar
  35. Esses, V. M., Dovidio, J. F., Jackson, L. M., & Armstrong, T. L. (2001). The immigration dilemma: The role of perceived group competition, ethnic prejudice, and national identity. Journal of Social Issues, 57, 389–412.
     Google Scholar
  36. Essel-Lamptey, V. 2021. Police Officer arrested for insulting Akufo-Addo, Bawumia, https://www.ghanaplus.com, accessed 23/04/2022.
     Google Scholar
  37. Estivill, J. (2006). Concepts and Strategies for Combating Social Exclusion: An Overview. Journal of Sociology and Social Welfare, 33(1), 273.
     Google Scholar
  38. Fisher, J. and Anderson, M. D. (2015). Authoritarianism and the securitization of development in Africa. International Affairs, 91(1), pp. 13-151.
     Google Scholar
  39. Fjader, C. (2014). The nation-state, national security and resilience in the age of globalization. Resilience, 2(2), 114–129. DOI: 10.1080/216933293.2014.914771.
     Google Scholar
  40. Fleisher, L. M. (2000). “Sungusungu”: State-Sponsored Village Vigilante Groups among the Kuria of Tanzania. Journal of the International African Institute, 70(2), 209–22.
     Google Scholar
  41. Fligstein, N., Polyakova, A. & Sandholtz, W. (2012). European Integration, Nationalism and European Identity. Journal of Common Market Studies, 50(1), 106–122.
     Google Scholar
  42. Frimpong-Ansah, J. H. (1991). The Vampire State in Africa: The Political Economy of Decline in Ghana. Africa World Pres.
     Google Scholar
  43. Frölich-Steffen, S., and Rensmann, L. (2007). Conditions for Failure and Success of Right-Wing Populist Parties in Public Office in the New European Union. In P. Poirier and P. Delwit (eds.) The New Right in Power. Brussels: Editions de l’Université de Bruxelles, pp. 117–140 York University Press.
     Google Scholar
  44. Ghana’s National Security Strategy, 2020. Ministry of National Security, Ministries, Accra, Ghana. Government Printers, Barnes Avenue, Accra, Ghana.
     Google Scholar
  45. Ghanafeed.com. 2022. Akufo Addo appoints his 80 year old in-law into government, accessed 28/02/2022.
     Google Scholar
  46. Hama, H. H. (2017). State Security, Societal Security and Human Security. Jadavpur Journal of International Relations. Jadvpur University. Sage Publications. Sage pub.in/home.nav. Doi: 10.1177/0973598417706591. http://jnr.sagepub.com.
     Google Scholar
  47. Haynes, J. (1993). Sustainable democracy in Ghana? Problems and Prospects. Third World Quarterly, 14(3), 451–467. https://www.jstor.org/stable/3992481.
     Google Scholar
  48. Hensen, L. (2000). The Little Marmaid’s Silent Security Dilemma and the Absence of Gender in the Copenhegan School. Journal of International Studies, 29(2), 285-306, doi:10.1177/03058298000290020501.
     Google Scholar
  49. Hjerm, M. (1998). National Identities, National Pride and Xenophobia: A Comparison of Four Western Countries. Acta Sociologica, 41(4), 335–47.
     Google Scholar
  50. Hohfeld, W. (1919). Fundamental Legal Conceptions, W. Cook (ed.), New Haven: Yale University Press.
     Google Scholar
  51. Holmes, D. R. (2009). Experimental Identities (after Maastricht). In: J. T. Checkel & P. J. Katzenstein (Eds.), European Identity. Cambridge University Press.
     Google Scholar
  52. Horowitz, D.L., and Noiriel, G. (eds.) (1992). Immigrants in Two Democracies: French and Afghanistan. http://www.msnbc.msn.com/id/46813803/ns/world_news-europe/t/road-mohamedmerahs-radicalization-goes-through-afghanistan/#.T8P1zNVtpCg.
     Google Scholar
  53. Huffman, A. O. (2015). Homegrown Terrorism and Radicalization. Perspective on Terrorism, 9(6), 119–153. https://www.jstor.org/stable/26297466.
     Google Scholar
  54. Human Development Report. (1994). UNDP, New York.
     Google Scholar
  55. Huysmanns, J. (2004a). Minding Exceptions: Politics of Insecurity and Liberal Democracy. Contemporary Political Theory 3(3).
     Google Scholar
  56. Huysmanns, J. (2004b). Conceptualizing Spill-over through a Foucaultian Lens: Freedom and Security in the EU. Journal of International Relations and Development, 7(3).
     Google Scholar
  57. Igbogo, E. J. (2015). National Security and National Development: A critique. International Journal of Arts and Humanities, 4(2), 14. Doi: http://dx.doi.org/10.4314/ijah.v4i2.l.
     Google Scholar
  58. Ishmael N., Blandina M. A., Moses K. A., and Fred N. B. (2014). The review of Ghana’s legislative preparedness to critical national risks: Terrorism and money laundering. Issues in Business Management and Economics, 2 (11), pp. 201-209, November 2014. Available online at http://www.journalissues.org/IBME/ http://dx.doi.org/10.15739/IBME.2014.007.
     Google Scholar
  59. Janusauskiene, D. (2019). The perception of Security Threats in Lithuania: A human Security Perspective. Qualitative Sociology Review, 15(2), 186-198.
     Google Scholar
  60. Jedidigah, A. K; Opoku, P; Dagba, G; Amankwa, M. (2020). Security Challenges in Ghana, the imperatives of State Security Agencies: A study of the Ghana Police Service. Global Journal of Human-Social Science: F Political Science, 20(2).
     Google Scholar
  61. Krebs, R. (2022). Personal Communications, Decision on Manuscript ID SECSTU-2021-3748. Security Studies, (accessed, 01/12/2022).
     Google Scholar
  62. Kyerematen, A. (2021). Personal communications. Ghana Spends over Ghc6.8 billion on importation of rice in three years, Minister of Trade and Industry, Ghana News Agency. (Retrieved 16th December, 2021).
     Google Scholar
  63. Liddell Har, B. H. (1967). Strategy, Basic Books.
     Google Scholar
  64. Miller J. and Rensmann, L. (2010). Xenophobia and Anti-Immigrant Politics. Oxford Research Encyclopedia of International Studies. Doi: 10.1093/acrefore/978019084-6626.013.368.
     Google Scholar
  65. Minkenberg, M. (2001). The Radical Right in Public Office: Agenda-Setting and Policy Effects. West European Politics, 24(4),1–21.
     Google Scholar
  66. Minkenberg, M. (2003). The West European Radical Right as a Collective Actor: Modeling the Impact of Cultural and Structural Variables on Party Formation and Movement Mobilization. Comparative European Politics, 1(2), 149–70.
     Google Scholar
  67. Monisha, B., Ameena, G. K., and Karishma, D. (2016). Brown Bodies and Xenophobic Bullying in US Schools: Critical Analysis and Strategies for Action. Harvard Educational Review: Winter 2016, 86(4), pp. 481–505. https://doi.org/10.17763/1943-5045-86.4.481.
     Google Scholar
  68. Mwakikagile, G. (2008). African immigrants in South Africa (p. 335). Pretoria: New Africa Press.
     Google Scholar
  69. National Security Strategy, Ghana, 2020.
     Google Scholar
  70. Neocleous, M. (2008). Critique of Security. Edinburgh: Edinburgh University Press.
     Google Scholar
  71. Nickols, F. (2016). Strategy: Definitions and Meaning. 1 – 14, http://www.nnickels.us/articles.html.
     Google Scholar
  72. Norman, I. D and Jatuat, M. Y. (2021). Study to assess State and Society Security, Ghana. Institute for Security, Disaster and Emergency Studies, NYD 54/55 Langma, CR, Accra, Ghana.
     Google Scholar
  73. O’Grady, S. (2015). In Nigeria, $2 Billion in Stolen Funds is just a drop in the Corruption Bucket. www.foreignpolicy.com, (accessed, 04/18/2022).
     Google Scholar
  74. Peace, R. (2001). Social exclusion: A concept in need of definition? Social Policy Journal of New Zealand, 2001, 17–36.
     Google Scholar
  75. Peil, M. (1974). Ghana’s aliens. International Migration Review, 8(3).
     Google Scholar
  76. Porter, M. (1996). What is Strategy? Harvard Business Review,(Nov-Dec Issue).
     Google Scholar
  77. Radicalization Trajectories in Britain and America, MA Thesis, Washington DC: Georgetown University.
     Google Scholar
  78. Radkiewicz, P. (2003). The national values as a concept helpful in explaining the development of nationalistic attitudes and xenophobia. Polish Psychological Bulletin, 34, 5–13.
     Google Scholar
  79. Richardson, SA, Goodman, N, Hastorf, AH, Dornbusch, SM. (1961). Cultural uniformity in reaction to physical disabilities. American Sociological Review, 1961, 241–7.
     Google Scholar
  80. Romola, A. (2015). Preventing xenophobia in Africa: What must the African union do? AHMR, 1(3), 254–259.
     Google Scholar
  81. Rufai, A. S. (2017). Boko Haram and its modalities of recruiting and radicalizing members. Peace Review: A Journal of Social Justice, 29, 99–206.
     Google Scholar
  82. Sen, A. (1993). Capability and Well-Being. The quality of life. 1993:30. https://plato.stanford.edu/entries/capability-approach/
     Google Scholar
  83. Serebour, A. (2021). Attack on CitiTv Journalist. Statement by the Ministry of National Security. Ministry of National Security, Ministries, Accra, Ghana.
     Google Scholar
  84. Steiner, G. (1979). Strategic Planning, Free Press.
     Google Scholar
  85. Synder, J. (2002). One World, Rival Theories. Journal of Foreign Policy, 145, 52.
     Google Scholar
  86. Tiefenbrun, S (2003). A Semiotic Approach to a Legal Definition of Terrorism, ILSA J. Int. & Comparative Law, 9, 357–402. http//www.pegc.us/archive/journal/tietenbrun_terrorism_def.pdf.
     Google Scholar
  87. Transparency International: Corruption Perception Index, 2019.
     Google Scholar
  88. Treisman, D. (2000). The causes of corruption: A cross-national study. Journal of Public Economics, 76(3), 399-457.
     Google Scholar
  89. United Nations Development Program. (1994) Human Development Report 1994: New Dimensions of Human Security. http://www.hdr.undp.org/en/content/human-development-report-1994.
     Google Scholar
  90. Van Rijckeghem, C and Weder, B. (2001). Bureaucratic Corruption and the Rate of Temptation: How much do Wages in the Civil Service Affect Corruption? Journal of Development Economics, 65(2), 307–311.
     Google Scholar
  91. Vileikeine, E and Janusauskiene, D. (2016). Subjective Security in a volatile Geopolitical Situation: Does Lithuanian Society feel safe? Journal of Baltic Society, 2(2), 109–143. 10.1515/jobs-2016-0047.
     Google Scholar
  92. Wang, J; Long, R; Chen, H; and Li, Q. (2019). Measuring the Psychological Security of Urban Residents. Frontiers of Psychol, 10, 2423. Doi: 10.3389/psyg.2019.02423.
     Google Scholar
  93. Williams, M. (1998). Modernity, Identity and Security: A Comment on the Copenhagen Controversy. Review of International Studies, 24(3), 435–439.
     Google Scholar
  94. Williams, P. (2008). Security Studies: An Introduction. London and New York, NY: Routledge.
     Google Scholar