Contemporary Challenges Associated with Border Security Operations to Promote Socio-Economic Development at Aflao Border in Ghana
DOI:
https://doi.org/10.47941/ijppa.1531Keywords:
Border Security, Operations, Socio-Economic DevelopmentAbstract
Purpose: The study investigated challenges associated with border security operations to promote socio-economic development using an integrated border management model at Aflao Border in Ghana. Using a mixed method approach, which is in line with the transformative philosophical underpinning.
Methodology: Both interviews and questionnaires were employed as data collection tools. The population was sampled from four security service institutions manning the operations at Afloa border. Given the premise that border security forces were selected from the four coordinated security forces. The study respectively drew 112 security personnel drawn at random from the Afloa border. Using the sampling ratio proposed by Cochran (1963: 75) to arrive at variability p = 0.5 (maximum variability) and with the desire of 95% confidence level and ±5% precision. The sampled population was composed of 106 border security personnel, and 6 senior border security personnel serving in the hierarchy of the General, Patrol, Intelligence, and Anti-Human Smuggling and Trafficking Units at the borders were interviewed to furnish the qualitative data for this study. The study adopted a descriptive research design using personnel from the Ghana Immigration Service, Customs Division of Ghana Revenue Authority, Ghana Police Service, and Ghana Armed Forces in charge of security at the Aflao border.
Findings: The study concludes that specific challenges which confront the border security apparatus are, in order of priority, inadequate logistics and equipment, inadequate coordination among border officials, and inadequacy of border security personnel.
Unique Contribution to Theory, Practice and Policy: Improve border control, the government should make needed resources available by providing modern equipment/gadgets and logistics for patrol teams and the operations of the security system.
Downloads
References
Afolabi, M. B. (2015). Concept of security. Readings in intelligence and security studies.
Ajayi, K. (2015). Readings in Intelligence and Security Studies. Ado-Ekiti: Afe Babalola University.
Bakewell, O., & De Haas, H. (2007). African Migrations: continuities, discontinuities and recent transformations. In African alternatives (pp. 95-117).
BODUNDE, D. O., OLA, A. A., & AFOLABI, M. B. (2014). Internal insecurity in Nigeria, the irony of multiplicity of security outfits and security challenges. International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL), 2(5).
Brettell, C. B., & Hollifield, J. F. (Eds.). (2014). Migration theory: Talking across disciplines.
Buzan, B. (1991). New patterns of global security in the twenty-first century. International affairs, 67(3), 431-451.
Carrera, S. (2007). The EU border management strategy: FRONTEX and the challenges of irregular immigration in the Canary Islands (No. 261). CEPS.
Chaichian, M. (2013). Empires and walls: globalization, migration, and colonial domination. Brill.
Czaika, M., & De Haas, H. (2013). The effectiveness of immigration policies. Population and Development Review, 39(3), 487-508.
Elmane-Helmane, K., & Ketners, K. (2012). Integrated customs control management in Latvia: Lessons learned. Economics and Management, 17(2), 528-533.
Ferreira & de Castro (2016). per Concordiam: Journal of European Security and Defense Issues- Vol 7, Issue 3.
Group.
Hlovor, I., & Botchway, T. P. (2021). COVID-19 and the Borderlands in Africa: Some Reflections on Ghana’s Approach. African Journal of Social Sciences Education, 1(1), 69-91.
Ikome, F. N. (2012). Africa's international borders as potential sources of conflict and future threats to peace and security. Institute for Security Studies Papers, 2012(233), 16-16.
Kogut, B. (1991). Country capabilities and the permeability of borders. Strategic Management Journal, 12(S1), 33-47.
Lamptey, A.A (2013). Rethinking Border Management Strategies in West Africa: Experiences from the Sahel. Kofi Annan International Peacekeeping Training Centre Policy Brief 12.
Leonard, S. (2009). The creation of FRONTEX and the politics of institutionalisation in the EU external borders policy. Journal of Contemporary European Research, 5(3), 371-388.
Miranda, R. A., Casebeer, W. D., Hein, A. M., Judy, J. W., Krotkov, E. P., Laabs, T. L., ... & Ling, G. S. (2015). DARPA-funded efforts in the development of novel brain–computer interface technologies. Journal of neuroscience methods, 244, 52-67.
Niamir-Fuller, M. (1999). Managing mobility in African rangelands. Property rights, risk and livestock development in Africa, 102-31.
Phukan, M. D. (2013). Ethnicity, conflict and population displacement in Northeast India. Asian Journal of Humanities and Social Sciences (AJHSS), 1(2).
Routledge.
Scott, J. W. (Ed.). (2016). EU enlargement, region building and shifting borders of inclusion and exclusion. Routledge.
Sosuh, M.M. (2011). Border Security in Ghana: Challenges and Prospects. KAIPTC Occasional Paper No.32
Sosuh, M.M. (2011). Border Security in Ghana: Challenges and Prospects. KAIPTC Occasional Paper No.32
Walters, W. (2006). Border/control. European journal of social theory, 9(2), 187-203.
Walther, O. (2022). Security and Trade in African Borderlands–An Introduction. Journal of Borderlands Studies, 37(2), 229-234.
Walther, O. (Ed.). (2022). Security and Trade in African Borderlands. Routledge.
Williams, P. D. (2008). Security Studies: An Introduction. London: Routledge Taylor and Francis
Wohlfeld, M. (2014). Is migration a security issue? Migration in the Mediterranean: Human Rights, Security and Development Perspectives, University of Malta, 61-77.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Millicent Yengkangyi, Kwadwo Bioh Agyei, Dr. George Asumadu
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.