TRANS-BORDER CO-OPERATION AND THE ENFORCEMENT OF MARITIME SECURITY IN THE GULF OF GUINEA

  • Type: Project
  • Department: Political Science
  • Project ID: POL0669
  • Access Fee: ₦3,000 ($9)
  • Pages: 106 Pages
  • Format: Microsoft Word
  • Views: 59
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

Trans-border co-operation in the mitigation of maritime insecurity has remained a veritable and time-honoured measure for the control of illicit maritime activities the world over. Essentially, this is because of the trans-boundary character of such criminal activities. The resource-laden Gulf of Guinea region has remained largely under-utilized because of the high incidence of piracy, sea banditry and illegal, unreported and unregulated (IUU) fishing within the maritime domain. This study pursued twofold objectives. First, it investigated the interface between the repressive measures adopted in the Yaoundé Code of Conduct of June 25, 2013 and the rising spate of piracy and armed robbery at sea in the Gulf of Guinea. Second, it examined the role of weak institutional and infrastructural capabilities of the Signatories to the Yaoundé Code of Conduct of June 2013 in the control of IUU fishing in the Gulf of Guinea. The study employed the qualitative method of data collection and the qualitative descriptive method of data analysis. The single case ex-post-facto research design was used to demonstrate structural causality in the relationship between the independent and dependent variables. Utilizing the Marxist Political Economy paradigm, the study found that the repressive measures adopted in the Yaoundé Code of Conduct of June 25, 2013 were implicated in the rising spate of piracy and armed robbery at sea within the region. Second, the study concluded that the weak institutional and infrastructural capabilities of the Signatories to the Yaoundé Code of Conduct of 2013 undermined the effective control of IUU fishing in the convention area. Consequently, it recommended that the key stakeholders, especially the Signatories to the Code of Conduct of 2013, ECOWAS, ECCAS, GGC, among others should fashion and implement an all-inclusive security policy that would address the structural and economic disarticulation in these littoral states which accounted for the origin and sustainment of the illicit maritime activities.


TABLE OF CONTENTS

Title Page- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - i

Approval Page- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ii

Dedication - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - iii

Acknowledgements- - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - iv

Table of Contents- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - vi

List of Tables- - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - viii

List of Figures- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ix

Abbreviations and Acronyms - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x

Abstract- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - xi

CHAPTER ONE: INTRODUCTION- - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - 1

1.1 Background to the Study- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1

1.2 Statement of the Problem- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8

1.3 Objectives of the Study- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 11

1.4 Significance of the Study- - - - - - - - - - - - - - - - -- - - - - -- - - - - - - - - - - - - - - - - - 11

CHAPTER TWO: LITERATURE REVIEW- - - - - - - - - - - - - - - - - - -- - - - - - - - - - 13

2.1 The Yaoundé Code of Conduct and Rising Insecurity in the Gulf of Guinea- - - - - - - - 15

2.2 Capabilities of the Signatories to the Yaoundé Code of Conduct and Control of Illegal Fishing in the Gulf of Guinea- - - - - - - - - - - - - - - - - - - - - - - - - - 22

CHAPTER THREE: METHODOLOGY- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 30

3.1 Theoretical Framework- - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - 30

3.2 Hypotheses- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 34

3.3 Research Design- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 34

3.4 Methods of Data Collection- - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - 37

3.5 Method of Data Analysis- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 38

3.6 Logical Data Framework- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 39

CHAPTER FOUR: THE YAOUNDÉ CODE OF CONDUCT AND INSECURITY IN THE GULF OF GUINEA - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - - 41

4.1 Piracy/Armed Robbery at Sea and Maritime Security- - - - - - - - - - - - - - - - - - - - - - 41

4.2 Personnel Strength and Surveillance Infrastructure of the Signatories to the Code of Conduct and Rising Insecurity in the Gulf of Guinea- - - - - - - - - - - - - - - - - 44

4.3 The Repressive Focus of the Yaoundé Code of Conduct and Rising Spate of Piracy and Armed Robbery at Sea in the Gulf of Guinea- - - - - - - - - - - - - -- - - - - - - - - 48

CHAPTER FIVE: CAPABILITIES OF THE SIGNATORIES TO THE YAOUNDÉ CODE OF CONDUCT AND THE CONTROL OF ILLEGAL FISHING IN THE GULF OF GUINEA- -- - - - - - - - - - - - - - - - - - - 60

5.1 Significance of Fisheries and the Rising Incidence of Illegal, Unreported and Unregulated Fishing in the Gulf of Guinea Region- - - - - - -- - - - - - - - - - - - - - 60

5.2 The Impacts of IUU Fishing on the Signatories to the Yaoundé Code of Conduct - - 66

5.3 Institutional and Infrastructural Capacity of the Signatories to the Yaoundé Code of Conduct and the Control of IUU Fishing in the Gulf of Guinea- - - - - - - - - - - - - - - - - - - - - 73

CHAPTER SIX: SUMMARY, CONCLUSION AND RECOMMENDATIONS- - - 84

6.1 Summary- - - - - - - -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - 84

6.2 Conclusion- - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - -- - - - - - - - 85

6.3 Recommendations- - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - -- - - - - - - - 87

Bibliography- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 89

Appendixes- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 94

TRANS-BORDER CO-OPERATION AND THE ENFORCEMENT OF MARITIME SECURITY IN THE GULF OF GUINEA
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Political Science
  • Project ID: POL0669
  • Access Fee: ₦3,000 ($9)
  • Pages: 106 Pages
  • Format: Microsoft Word
  • Views: 59
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 3,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0003 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Political Science
    Project ID POL0669
    Fee ₦3,000 ($9)
    No of Pages 106 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Trans-border co-operation in the mitigation of maritime insecurity has remained a veritable and time-honoured measure for the control of illicit maritime activities the world over. Essentially, this is because of the trans-boundary character of such criminal activities. The resource-laden Gulf of Guinea region has remained largely... Continue Reading
    Abstract The Gulf of Guinea is the coastal region running south from Senegal in West Africa to Angola in Central Africa. The geo-strategic and maritime significance of the region are undeniable. The Gulf of Guinea is endowed with enormous mineral and marine... Continue Reading
    ABSTRACT Piracy and insecurity in Gulf of Guinea maritime environment has been of serious concern to member states as well foreign investors. The abundant mineral resources most especially hydrocarbon, has attracted major multi-national oil firms as well other investors to the oil rich region. However, the region is battered by sophisticated... Continue Reading
    ABSTRACT Petroleum Fiscal System (PFS) is a major determinant of investment decision in the exploration and production of oil and gas in any country. It basically describes the profitability relationship between the host government of the producing community and the International Oil Companies (IOCs). The comparative analysis of the performance of... Continue Reading
    ABSTRACT Information Communication Technology (ICT) refers to several forms of information exchange between two or more devices like computers, mobile PDAs and hi-tech devices through which any of the several methods of interconnection, principally through the Internet can be initiated to perform a defined task. These technologies provide speedy,... Continue Reading
    ABSTRACT Information Communication Technology (ICT) refers to several forms of information exchange between two or more devices like computers, mobile PDAs and hi-tech devices through which any of the several methods of interconnection, principally through the Internet can be initiated to perform a defined task. These technologies provide speedy,... Continue Reading
    The purpose of this research is to critique the Principle of Collective Security and proffer possible solutions to help policy makers in the international arena devise means of calling off collective actions and improve the tenets of Collective Security. Gulf War 1 (1990-1991) is the major focus in critiquing the Principle of Collective Security.... Continue Reading
    The purpose of this research is to critique the Principle of Collective Security and proffer possible solutions to help policy makers in the international arena devise means of calling off collective actions and improve the tenets of Collective Security. Gulf War 1 (1990-1991) is the major focus in critiquing the Principle of Collective Security.... Continue Reading
    CHAPTER ONE INTRODUCTION Background of the study Worldwide Port and Maritime operations and their associated facilities and infrastructure collectively represent one of the single greatest unaddressed challenges to the security of nations and the global economy today. The reason that ports and shipping activity are so difficult to secure lies... Continue Reading
    TABLE OF CASES 1. 3502 Lending, LLC v CTC Real Estate 229 P. 3d 1016 (Ariz. Ct. App. 2010). 2. Abdulrahman v Oduneye (2009) 17 NWLR (Part 1170) 220 C.A 3. Adenekan v Owolewa (2004) ALL FWLR (Part 216) 510. 4. Adetona & Anor. v Zenith International Bank Plc (2011) 12 SC (Part IV) 44; (2011) 18 NWLR (Part 1279) 627 S.C. 5. Adjei v Dabanka (1930) 1... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us