Tuesday 29 May 2012



SECURITY SECTOR GOVERNANCE IN THE NIGERIAN DEMOCRATIC ERA

By

Professor Aja Akpuru-Aja
Introduction
          May 29, 1999 was heralded by many Nigerians as the arrival of a renewed democratic era, when the elected Obasanjo civilian administration was inaugurated to end authoritarian regimes. Many perceived the return of democracy as the much expected opportunity to correct some mistakes of the past and negative trends in political economy and security sector governance. It was seen as an opportunity to transform the country’s rich resource potentials into value adding chains, which is an imperative to address internal threats associated with poor conceptualization of security sector governance. Another level of euphoria of expectation came from the assumption that civilian leaders are good governors of the security sector than authoritarian regimes. This is not absolutely true. Asian tigers’ experiences, like Singapore, South Korea, Malaysia and Indonesia which fluctuated between authoritarian and civilian regimes achieved phenomenal economic growth and development. Indeed, civilian leaders are not necessarily and automatically good governors (Jega: 171). The hallmark of good security sector governance is driven by knowledge content, character and passion for public spirited service.
          Today, May 29, 2012 marks 13 years of uninterrupted democratization process (1999, 2003, 2007 and 2011). Despite several lines of security challenges, the military has demonstrated sufficient professionalism and commitment to support the survival of democracy to allow political leaders learn and correct their mistakes. Blaming the military is off the option and table. Thus far, 13 years of democratic process provides a dependable time frame for stock taking on security sector governance and looking ahead for a better Nigerian society.
          From indications, Nigeria is still largely confronted by democratic and security challenges so much so that some foreigners and Nigerians predict and fear the integration of Nigeria by 2015. This makes the choice of the theme significant on “Making Sense out of Security Sector Governance”. True, before wishes become will, and prediction becomes “prophecy”. Nigeria needs to reconceptualise and confront the sources and manifestations of threats against security sector governance


Aim
          The primary aim of this presentation is to conceptualize and address the many sidednesses to security sector governance in the Nigerian democratic era from the grand strategy domain.
          The spirits of the objectives are reflected in the organisation of presentation.
Organisation of Presentation
a)     Conceptual clarifications of key technical words;
i)                   Democracy
ii)                 Security
iii)              Good Governance
iv)              Security Sector Governance (SSG)
b)    Security Sector Governance Determinism (SSGD);
c)     Assessment of How Nigeria has faired in Security Sector Governance; and
d)    Conclusion and Recommendations.
Democracy
          Democracy is often traced more significantly to the Greek City States. In Greek works, democracy means social contract between the people and government expressed as demo meaning people and kratia meaning rule or governance. Since then, democracy has been defined in several perspectives by scholars and statesmen. For Abraham Lincolm, democracy is government of the people, by the people and for the people. There are many contending perspectives on democracy. The core fact remains that it is a social contract which involves popular participation in electing their leaders, who hold and exercise power in trust on behalf of the people. The operational elements of democracy include freedom of speech, freedom of association, including freedom to vote and be voted for, respect for rule of law, transparency, accountability and administration of social justice.
          Hence, democratic institutions are put in place for the development of political culture, including organisation of political parties, free and fair election. The legitimacy of elections are measured by transparency of the process, rather than the results. In effect, ballot boxers command the verdict, rather than court orders.
          Where transparency of elections takes place, losers concede defeat, while victors treat opponents with dignity as alternate leaders rather enemies who deserve the edge of the sword. Moreso, on national issues at executive and legislative domains, debates centre on ideas, values, politicise and programmes across party belongings. Critical views are upheld valid rather than seen as anti-ruling party, or personalities.
          Making sense of democracy includes having institutional values far stronger than strong personalities. True to the spirit of democratisation, the political space is open and broad to avoid over concentration of powers, functions and appointments at the centre. Where powers, positions and privileges are concentrated at the centre, the struggle for and control of power becomes war-like and highly commercialised. It also creates frictions and tensions on the levels of participation by tiers of government in resource exploration, exploitation, and administration of welfare and social justice. Invariably, democracy promotes security through security sector governance.
          In democracy, constitution is supreme, and spells out clearly inter-organ duties and relations. The more mutually reinforcing relations between the executive, legislature and judiciary become, the better for the promotion of purposeful governance, welfare and security that reflect and spread contentment or happiness to the people, without discrimination and marginalisation, because they are the root source of power(s).
Political Economy of Democracy
          Political economy of democracy means that it takes the unity of political and economic rights to make social contract between the people and those who have power in trust (Ake, C. 1981). Just as there is extensive campaign for the exercise of political rights through voting rights as a source of political power, the same should be true of grassroots campaigns for the broadest participation of individuals and groups in economic activities of job and wealth creation as well as enjoyment of social-welfare privileges. There should be no disconnect between political rights and socio-economic rights. Should there be any disconnect between these rights, it means people have abstract rights they cannot exercise, enjoy and defend (Karl Marx and F. Engels). However, where freedom in politics applies in socio-economic realm, people can use their voting rights to determine those worthy of holding power in trust, whether they are incumbents or not. Democracy is of the people and for the people rather than of the money bags (Akpuru-Aja 1997: 43-44).
          The foregoing analysis is very important to understand democracies in America and Western Europe. Political and socio-economic rights are fairly at work. Job and economy determine the choice of leadership power critically. Sarkozy of France in May 2012 election in France was the 11th leader in Europe to lose power of incumbency based on job and economy. In November 2012, who occupies US presidency is likely to be determined by job and economy issues. This is what “making sense out of democracy” means and when upheld translates to making sense of security sector governance.
Security
          Security defines and connotes the assured safety to life, liberty and property (Buzan 1983: McNamara 1990: 142; 2-3; Imobighe 1979: 632-650). Without security, life loses its essence; community loses value and cohesion; government loses legitimacy. Without security there can be no liberty which is the freedom from threat or fear of losing life and property. It is the liberty of life that provides socio-economic and political rights of national security and development. This explains why the chief end of any responsible and responsive government is not only to promote welfare and security of the people, but to guarantee absence of internal and external threats and fears of losing lives, liberties, properties and cherished core values of the people in a sovereign entity.
          Understood generally, the popular conception is that security is about what military and para-military forces can do with guns, small arms and light weapons, including lethal tanks and bombers of sorts. Security means far more than what “gun” can do (McNamara 1990: 142; Imobighe 1998: 13-22; Akpuru-Aja 2012). It  includes what access to food can do (food security); what access to resources can do (economic security); what education employment or engagement of labour can do (job security); what education/welfare policy can do (social security); what order and stability in a system can do (political security); what clarity of constitutional provisions can do (constitutional security); what protection of the environment can do (environmental/health security).
          Together, and particularly in democratic context, non-military driven security variables are more germane and mainstreaming rather than ‘security’ through the barrel of guns, or armoured tank security.
Having established the commanding value of non-military-security variables, it is important not to lose sight of the utility of military force against external enemies and by extension, highly threatening enemies within. While the former is clear enough, the later needs qualification. In a case of lawlessness or anarchy in domestic polity, beyond the capacity building of Police Force, the armed personnel have a secondary constitutional duty to assist in restoring civil order and public security as soon as practicable, and then return to the barracks and avoid deprofessionalism. Where the duration of the military engagement in internal security management is not time bound, it is logical to argue that fragile peace and security still exists, which leaves much to be desired. Once people are disconnected or disengaged from liberty or freedom of thoughts, movements and enterprises, security loses its real value, and good governance becomes questionable. This explains the strong nexus between security and good governance and vice-versa.
          Ultimately, security is about individuals (human centred security), rather than leadership personalities; regime protection per se, or protection of the “state” (dominant ruling class) as preoccupation. Where the security of the State or regime is more dominant than security of the citizens, then the regime or state works at cross purposes with the contractual needs of the people.
Good Governance
          Let us start by stating that governance is an imperative of social contract between the people and government (Nnamani 2009: 29; Opadiran 2009: 7-11; Jega 2007). Logically, elements of social contract include the application of rule of law, transparency and accountability in job and wealth creation, the spread of contentment to all: including individuals, communities, component units and geo-political zones. Evidently, good governance is measured by the control and exercise of power on behalf of the people. It takes leadership in learning to learn character which is the foundation of good leadership (Chinese proverb). Hence, good governance demands knowledge base so as to be knowledge driven in the development of the people and resources. According to Nnamani (2009: 29) “good governance is a leadership approach to getting at democratic governance”. Of course, it means that continuous learning is vital to help the executive, legislature, judiciary, political parties and stakeholders to understand the true spirit of democracy. It helps in respecting and managing the structures and institutions to serve the people. In all, good leadership commands good followership.

Security Sector Governance
          True, security sector governance is not an entirely a new concept in grand strategy approach. However, as a concept, Clare Short, the British Secretary for International Development, highlighted it in 1998. Its greater emphasis dates back to the post-September 11, 2001 terrorist attacks on the World Trade Centre, New York - USA. (Aligwara 2010: 254-257). The USA saw the need review the perception and management of the post 9/11 security threats in military and non-military terms known as strategic and non-strategic approaches. It is a grand strategy approach that includes the development and synchronization of all components of national power for the promotion of welfare and security of the people, political order and stability.
          Security sector governance may mean different things to different states or people due to the perception of strategic environment. In the context of democracy particularly, security sector governance is a horizon or an expanse. It is not restricted to narrow and specialised institutional military and related sector. It covers detection, control and management of structural threats arising from all the sectoral dimensions in a society.
Every political system generates:
a)     Security values of liberty, happiness, order/stability, and
b)    Security fears and threats, which are legitimate.
The assumption is that any threat in any sector of a society is a threat to governance and national security. Understood this way, internal threats are beyond stresses and revolts by the military, to include lines of tensions, anxieties, fears and crises in economics, finance, politics, health, education, environment, public utilities, culture and constitutional provisions.
          According to Robert McNamara (1968: 142);
Any society that seeks to achieve adequate military security against the background of acute food shortages, population explosion, low level of productivity and per capita income, low technological development, inadequate and inefficient public utilities and chronic problems of unemployment has a false sense of security.
McNamara (149) continues, security is not military force though it may involve it; security is not military hardware, though it may include it. Security is development and without development there can be no security. Of course, what McNamara has done is to place security premium on the human dignity; the wellbeing of the individual rather than of any territorial defence, cult personality, protection regime, or class, or state defence.
          From the foregoing, security sector governance is about a wholistic framework of “security-watch” in all sectors of the political system against threats or dangers to life, liberty, property and cherished core values of people without discrimination as to gender, class, religion, ethnicity and mental health. Any security sector governance that disconnects from the people and their values, welfare and contentment is a false sense of security sector governance.
Security Sector Governance Determinism
          Security sector governance is no abstraction. It is a complex and business-like process of guaranteeing order and stability by the reproduction of rule of law, equity and social justice necessary to maintain level-headed national consciousness and sense of patriotism. The enabling factors, which may have objective and subjective dimensions include:
       i.            The Nature of Political economy;
     ii.            National Value System;
  iii.            Constitutional Provisions/Legislature;
  iv.            Organisation of Government – Pattern of Politics;
     v.            Security Communications and Management;
  vi.            Data Blank on Security Administration;
vii.            Character of Civil Society/Faith-passed Organisations;
viii.            Media Security Control; and
  ix.            External Variables.
Noteworthy is that the list is not exhaustive but the provided are quite informative and useful in an assessment of the Nigerian democratic context.



How Has Nigeria Faired in Security Sector Governance?
          An indisputable fact remains that security and good governance are mutually reinforcing and complimentary. None of them could be attained without necessary socio-economic and political conditions (Mbachu: 21). Let us attempt to present briefly the emerging security sector scenario in Nigeria since 1999 democratic process.
Political Economy of Nigeria
          Though Nigeria is potentially a rich land in all sectoral dimensions, lost opportunities are still witch hunting its democratic process. Since 1999, nothing has changed significantly. Nigeria has not seen diversity as a necessity for survival. The class structure of the state seems contented with a mono-cultural economy, which remains over dependent on exhaustible oil and gas sector to the neglect of the rich agricultural, solid mineral, maritime, manufacturing, culture, insurance and tourism, and telecommunication sectors. Even Nigeria’s population of about 160 million is an asset in work force, market creation and marketing. From one civilian transition to the other (1999, 2003, 2007 and 2011), the ugly political economy reproduces threatening social contradictions (Akpuru-Aja 1998: 80-82). This is because knowledge of rich resource potentials is good, but unhelpful without value adding chains in determined diversification.
          How could Nigeria maintain security sector governance when about 70% of its population are in abject poverty, living on an average of US$1 daily? About 44% of its teeming youths are unemployed. Health and educational institutions suffer serious deficits. Human development index of 2011, placed Nigeria 153rd out of 158 countries. Nigeria remains the 3rd poorest country to India and China.
As logic expects, persistent mono-cultural economy and economic-financial contractions have reproduced and spread not only poverty and unemployment but inequity and social injustice. Plato holds that poverty is the parent of revolution and crime. 90% of national wealth is controlled by, perhaps, less than 10% of the population. There is no middle class but the upper class and down trodden. It creates divide and group hatred (Jega: 199). Reflecting on the Nigerian paradox of rich nation, poor people, Professor Sam Aluko once echoed that the rich cannot sleep because the poor is awake; and the poor is awake because of hunger. It is metaphorical and reflects how persistent crises of poverty and unemployment are sources of organised crimes, youth restiveness and military, and a new decade of terrorism.
          To make matters worse, unrepentant corruption in organisation of government, such as high cost of governance, pension scam, fuel subsidy scandal has reproduced a widening gulf between the rulers and the ruled. It makes for trust deficit, which limits patriotism. Even with many provocative rich Nigerians, capital flight is preferred to championing domestic investment and trade.
Decay in infrastructural development has been made worse by policy inconsistency, weak and corrupt institutional frameworks. Whatmore, Nigeria has been importing every sort of goods and services that it has the abundant capacity building to produce in surplus such as rice, tooth picks, cotton wools, clothings, hand bags and foot wears. Nigerian markets have become dumping grounds of foreign goods and services.
          Legislation to protect Nigerian trade and investment is too weak. Nigerian markets are dominated and flooded with foreign enterprises, goods and services. Driven by strategic-security trade policy, the US employs every weight of legislation and security to protect its trade and investment abroad. Recently, Argentina nationalised a Spanish coy and not only government of Spain but the European Union rose against the country. The E.U is lobbying the U.S to the effect. The question is how strong is Nigeria’s legislation and security to protect Nigerian based enterprises at home and, perhaps Dangote company enterprises abroad, if faced with nationalisation threat? It is food for thought.
          According to the Debt Management Office (DMO), Nigeria’s debt profile presently stands at $44 billion – the highest debt profile since 2007. In May 2011, it was 39 billion (Daily Sun Comment 2012, May 2: 18). Spiralling debt profile is a security anxiety, which is suggestive of the need for greater fiscal discipline, transparency and accountability.
Nature of National Ethos
          National ethos touches of national values indeed. Let us note that  Security sector governance is not wholly about politics, structures and institutional mechanisms. In the main, the human factor drives them all. Hence, attitude matters. Belief in oneness of people and mutual respect matter very much. Respect for rule of law, equity and social justice matters. Values of hardwork and honesty are important too. Sadly, Nigerians are yet to accept “Nigeria” as real and a common project with cherished rich values to preserve. Selfishness along individual, groups, ethnic, religious and political lines tends more to supercede national consciousness. It underscores the difficulty of nation building which is central for Nigerians to view and treat themselves as a corporate entity worthy to be cherished and defended. Societal values have broken down. No taboos any longer so to say. No sacredness even of life. Greed and selfishness has no limit. Differences are hardly open to dialogue as violence seems a mechanism of invitation to dialogue. No nation survives unethical attitudes and behavours.


Constitutional Provisions
          Constitutional provisions may make or mar security sector governance. Though there is no perfect constitution worldwide, tension packed constitutional provisions would heat up any political system, if unaddressed. In Nigeria, the 1999 Constitution is generally a military craftsmanship with lines of ambiguities, omissions and inconsistencies open to undue exploitation by interest groups. Threats emanating from the 1999 Constitution provisions include;
a.     the over concentration of power at the centre;
b.     fiscal federalism which limits diversification of resource control by the federating tiers of government and stakeholders; (sections 44 (1) 46, and 56, 162 of the 1999 Constitution).
c.      the immunity clause, particularly on alleged criminal offences by governors and presidents; (section 308 of 1999 Constitution)
d.     lack of clear local government council autonomy; (section 7 of the 1999 Constitution)
e.      indigenship/citizenship; (section 147 of the 1999 Constitution) and
f.       National Assembly/State Assembly and oversight functions among others.
It is arguable that the overall security scenario in Nigeria, particularly on democratic process arises from perceived levels of paradox in the 1999 Constitution. Public expectations of Constitutional amendments since 1999 have no confidence posture yet. What makes it difficult is not in public interest, but self-serving interests. Getting the political economy, organisation of government and security sector governance aligned must necessarily challenge Constitutional provisions and convocation of national conference (as the case may be).
Organisation of Government – Pattern of Politics
          The organisation of government, or pattern of politics is key to security sector governance. Since 1999, arms of government, institutions and agencies in Nigeria are not synergised and synchronised towards a predictable policy direction. Part of the problem is that there are individuals stronger than institutions, who preside over the affairs of government and governance. It further explains political hiccups in civilian-to-civilian transition, leadership character at all levels, war-like and commercialised politics; elections which turn out to be selections and where defeats are not accepted; and where court orders rule more than ballot boxes. Evidently, there are a weak opposition. Invariable, there is hardly any tolerance of opposition, which is perceived and treated as enemity. Of course, no less should be expected when both the state and political parties lack clear ideological and theoretical clarity (Mbachu: 19).
          Justice system in Nigeria is yet to be very supportive. Justice is delayed. Justice appears for sale and politicised, which tends more to push the affected or victims to crime and unpatriotic attitudes for fear of justice never (Jega 2007).
          On high cost of governance, Professor Sylvester Monye, the Special Adviser to the President on Performance, monitoring and evaluation, noted that up to 11,800 Federal government projects alone are either abandoned or uncompleted nationwide. Why? Many past governments in Nigeria have routinely shunned projects and policies initiated by their predecessors. (Leadership Daily 2012, May 2:3). In addition, Federal Government maintains no less than 600 parastatals across the country. It is no plus for security sector governance. Noteworthy is the war-like politics where politicians arm the youths against parties and political opponents. In the post-election periods, demobilisation of the armed youths becomes difficult as technological they view arms under their control as means of livelihood. So, politicians should preserve the youths as precious and play politics of credentials.
Security Communications and Management
          In both military and non-military images, Nigeria is not in deficit of security bodies, and security institutions and agencies. For example, there are National Security Council (NDC), National Defence Council (NDC, State Security Council. Others include Nigerian Armed Forces, Nigerian Police force and several para-military agencies like Department of State Service, National Intelligence Agency (CIA), Defence Intelligence Agency (DIA), Immigration Service, Prison Service, Customs and Excise Service, Nigeria Security and Civil Defence Corps (NSCDC).
          To facilitate coordination and operational effectiveness, there are also office of National Security Adviser (NSA), Special Service Office (for DIA. SSS, and NIA), Nigeria Police Council (NPC), Police Service Commission (PSC), Ministry of Police Affairs (NPA), and even Ministry of Internal Affairs, National Emergency Management Agency (NEMA).
          At the apex is the office of the Presidency-Commander-in Chief of the Armed Forces, and at the bottom include the Traditional Monarchs, faith-Based organisation and private sector security out-fits.
          The above notwithstanding, insecurity dimension in Nigeria is alarming. Terror breads fear, which is legitimate. Uncontrolled fear fuels violence and insecurity. Ethno-religious crisis, kidnapping and hostage taking, armed robbery, cultism, rape and a new decade of terrorism have become phenomenal. Talking more directly, security relations, coordination and management are ill-understood and defined. Security Communication is less than adequate and makes for undue rivalry between security and intelligence agencies that have exactly the same security responsibility.
          At times, there exists a gap between the intelligence community and the policy makers on one hand, and the intelligence community and the public on the other hand. Politicisation of intelligence fuels insecurity. As previously implied, the bottom-top approach to security is ignored. For example, community based organisations,  faith- based organisations, civil society and the public at large are not factored as security duty relevant. For sure, no security body or agency can make for security sector governance without acknowledging and synergizing with other stakeholders in security sector governance. Security process is about networking. It is wholly a collective knowledge and duty.
          The other security communications and management problems relate to orientation of security and intelligence operations in favour of military and related threats on one hand, and in the protection of the state and very important personalities on the other hand. It is an irony. It is a disconnect from other non-military related threats and the people proper. Rather than making sense of security sector governance, nonsense is made out of it. As previously noted, addressing the manifestations of poverty and rising unemployment rate is not by tanks versus anti-tanks, or training more army recruits of 500 experts for counter-terrorism. There must be determined efforts to address the non-military dimensions of security sector of governance through cutting down or controlling high cost of governance and corruption. The virtual takeover of the primary duty of the Nigeria Police Force by the armed forces needs to be managed better.
          Worse, lack of trust by the public for Police Force makes the containment of crime waves difficult. In contrast, low crime rate in United Kingdom and Norway could be attributed to increasing relations between the people and police. Trust is deficit dangerous for police managers and administrators and controlled against further degeneration to zero-level (Onwubuiko 2012:14). Change in police uniform may be good, but the more helpful in security sector governance is disciplined attitudinal change and public-support mode of operations.
          Responses or reactions to early warning system (EWS) is more reactive than pro-active, partly due to extreme politicisation of security issues and developments, and lack of coordination and sharing of intelligence by security agencies or bodies. The more disturbing is the allegations by some of intelligence operatives about policy failures to use timely and accurate intelligence against unnerving internal threats.
          Of equally threating are unconstitutional private security outfits such as Movement for Actualisation of Sovereign State of Biafra (MASSOB), Movement for the Survival of Ogoni People (MOSOP), Odua  Peoples Congress (OPC), Movement for the Emancipation of  Niger Delta (MEND) fuelled by proliferation of small arms and light weapons (SMLWs). There is also the misperception that youth militancy and terrorism could be contained by gun fire rather than public driven intelligence and justice of terrorism.
          Where these dimensions of internal threats abound, the political economy is under threat; trade and investment is threatened; human security is endangered, and security sector governance is an illusion of reality.
Data Bank on Security Administration
          Data bank on security administration is very helpful in security sector governance. It is about data bank on individuals from birth-to-death on health records, age, sex, educational status, crime records, positions and privileges. It is constantly up dated, including deletion of the dead. It is very useful in population studies, determination of nationality and elections; recruitment policy in private – public sectors; development of social security policy to support the aged, widows, orphans, unemployed, physically and mentally challenged. Moreso, data base is wholly useful in tax regime: tax compliance and tax yield as a dependable source of internally generated revenue to help general security administration, and social security policy.
          The US, European countries and even South Africa are pacesetters in data bank on security administration, which makes planning effective. Without data, planning is ineffective, and determination of those with track records of criminality or excellence will be lost in security sector governance. Incidentally, for Nigeria, data on security administration in both military and non-military sectors is far-fetched. Nigeria’s air ports, sea ports, symbolic assets and locations are vulnerable and need more security consciousness and urgent attention. Borders are also too porous.
Civil Society and Faith – Based Organization
          Civil society, including faith-based organization, plays a very critical role in the sustainability of democracy in Nigeria. Civil society groups are independent of public authorities and private units of production such as firms and families. Though they are into policy advocacy in defence or promotion of their interests, including the constitution and rule of law, they do not seek to replace or to accept responsibility for governing the polity as a whole (Jega 2007: 246-7). Hence, they enhance the integrity and efficacy of the democratic institutions and processes toward the consolidation of democratic political culture.
          However, for civil society groups to sustain democratization process in Nigeria, members must have to purge themselves of attitudes, behaviours and mind-sets of partisanship, religion, ethnicity, class and gender. This is central to promotion of civility in mobilizing popular participation through understanding of the electoral process; in partial monitoring and observation of the conduct of elections, and to document and disseminate observed lapses and irregularities. Moreso, Community and Faith-Based Organizations play peace-building roles in conflict or crisis situations by assisting victims with confidence building relief materials and business prospects (Gaya-Best and Katherine 2011: 121-186). Together, these are very useful roles in support of security sector governance, which should not be overlooked, but encouraged by governments, the private sector and the public.
Media Security
          Media can make or mar any security sector governance. In the Nigerian democratic processes and strategic environment, the media has played both positive, and negative (inflammatory) roles. Much of what citizens and political actors know and do are shaped by the media. Both print and electronic media promote mobilization and popular participation, transparency of electoral process and justice administration. They raise security alarms (whistle blows) in politics, finance, economics and even ethno-religious relations. They provide a broad spectrum for policy advocacy on democratization, national security and development.
          However, from their track records, unregulated media roles impact too negatively on democratization and national security. Extreme sensationalism on conflict and crisis situations across the country creates fears, which are legitimate, and unfortunately make reprisal violent tendencies inviting and worse. At times, publications based on sentiments rather than confirmed facts constitute insecurity. As a corollary, when media houses adopt “regional” or ‘partisan’ domain roles, security sector governance runs into trouble waters, especially in politics, and ethno-religious matters. This underscores the need to integrate the media into national security sector governance. It is not to cage them against objective – constructive reports but control security reports which tend more to make crisis situations and post – conflict transformation worse.
External Influences
          Invariably, when all stake holders in security sector governance play their objective and subjective roles within the bounds of rule of law and social justice, it becomes easy to contain the too many-sided external influences against democratization and national security in Nigeria. No external influences can breakdown any democratic process or system unaided by how the citizens and political actors play their roles in conceptualizing and addressing national issues.
Conclusion
          From the foregoing, making sense of security sector governance in Nigeria is very key to the sustainability of democratization processes and democratic political culture in Nigeria. It depends more on the collective mind to conceptualize and address national issues from its many-sidedness rather than military and related images. For Nigerian democracy to thrive; for national security to endure and for sustainable development, security sector governance must not be seen from the lens of what barrels of gun can do, but what good governance can do to create job, food, good health, good education, sustainable environment, free and fair elections and improved social harmony in the polity (and many more). This is the human security-centred domain of security sector governance. Stress levels arising from constitutional provisions, patterns of politics, leadership characters, media security and constitutional issue need no further trivialization. Rigid constitutional and more legislative technicalities would not much in heading of the rising anxieties. Political solution approach is all the more useful through attitudinal change by leaders and citizens to view Nigeria as a collective project in the 21st Century.
          Doctrine of political necessity should include democratisation of concentrated powers, functions and appointments at the centre to allow complimentary roles by other tiers of security sector governance.
          There is every need to balance security and defence budget to strike a healthier balance between “gun” and “bread”. Extreme militarization of a democratic society remains a sign of insecurity against objective security sector governance. Once the human survival receives the highest premium in governance, security sector governance will be more self-regulating and allows the military and para-military bodies to play professional duties. Security imposed by militarization of society is insecurity and should be re-conceptualized and addressed, if democracy must thrive in Nigeria.
          Furthermore, there is an urgent need to develop a new national security policy framework to ensure that undue superiority-inferiority complex and rivalry between security-intelligences are controlled as they have need for greater collaboration, coordination and sharing of intelligence presently than ever. When security agencies that have common security duties work at cross purposes, they invariably constitute a threat to human and national security. High premium should be placed on human security over and above the territorial, regime, state and personality cult. Security community must work to win public confidence and operate better and safer through the people.
          The traditional monarchs and religious leaders, CBOs, FBOs and Civil Society should have more recognitions and respects as role players in security sector governance.
Finally, security sector governance is best projected, protected and preserved, if leadership and followership at levels nurse and cherish value respect for human dignity and wholesome fear of God. At 52, Nigerians should be preoccupied more with unity variables and possibility actions rather than divisive and disintegrative tendencies. The cause of Nigeria is not lost. With rich resource potentials as strengths and opportunities, Nigerians can overcome their weaknesses and threats, if they come together, think together and rise together towards a better society.
Thank you.
REFERENCES

Aduwo, O. (2012), “There is Need to Rethink States, LGAs Relationship”, Leadership Sunday, April  29:17.
Agekameh, D. (2012), “New Frontiers of Boko Haram’s War, The Nation, May 2.
Ake, C. (1981), Political Economy of Africa, London, Longman.
Akpuru-Aja, A. (1997), Theory and Practice of Maxism in a World in Transition, Abakaliki; WillyRose & Apple Seed Publishers Nigeria.
Akpuru-Aja, A. (1998), Fundamental of Political Economy and International Economic Relations – Changing With the Times, Owerri, Data Globe Nigeria.
Akpuru-Aja, A. (2009), Policy and Strategic Studies, Abakaliki, WillyRose & Appleseed Publishers, Nigeria.
Akpuru-Aja, A. (2012), “Strategic Thinking and Nigeria’s National Security”, Kuru-NIPSS lecture to SEC.34 2012.
Aligwara, P.O. (2010), “National Security and the Challenges of the 21st Century” in Mbachu, O. and Chukwudi, M.E. (2009), Democracy and National Security: Issues, Challenges and Prospects, Kaduna, Medusa Academic Publishers.
Awoyemi, F. (2012), “Paradox of Nigeria’s Economic Growth and Poverty Levels”, Leadership Daily, April 30.
Buzan, B. (1983), People, State and Fear: The National Security Problem in International Relations, Brighton, Wheatsheaf.
Gaya Best S. and Katherine N.H. (2011), Faith-Based Organizations and Post-Conflict Transformation in Nigeria, Ibadan, John Archers Ltd.
Igbuzor, O. (2005), Perspectives on Democracy and Development, Lagos, Joe – Tolalu & Associates.
Imobighe, T.A. (1979), “Analysis of Threat”, in Indian Journal of Political Science, Vol. 40, No.4, December.

Sunday 20 May 2012

Library Marketing



Relevance of Ranganathan's Laws of Library Science in Library Marketing

Dr. R.K. Bhatt
Associate Professor & Head,
Department Of Library And Information Science
University Of Delhi,
Delhi – 110007, India
Introduction

Libraries and information centers arean indispensable part of any academic or research institution in India. Information transfer and dissemination of information have long been recognized as essential elements for research and development activities. Libraries and information centers put lot of effort and energy into designing information services and products and distributingthem to satisfy their users. Despite their best efforts, users sometimes feel that they are not being adequately and appropriately served. The best way to overcome this problem is by designing and developing an appropriate marketing strategy for LIS products and services.
Marketing

The Chartered Institute of Marketing, UK ("Marketing," n.d.), defines marketing as the management process which is responsible for identifying, anticipating, and satisfying customer requirements profitably. Kotler (1985) says that marketing is "an act of analysis, planning, implementation, and control of carefully-formulated programmes designed to bring about voluntary exchanges of values with target markets for the purpose of achieving organizational objectives." These two definitions draw our attention to the following:

    marketing is a managerial process involving analysis, planning, implementation and control
    marketing is concerned with carefully formulated programmes – not random actions – designed to achieve desired responses
    marketing seeks to bring about voluntary exchange
    marketing selects target markets and does not seek to be all things to all people
    marketing is directly correlated to the achievement of organizational objectives
    marketing places emphasis on the target market's (consumer's) needs and desire rather than on the producer's preferences.

Since customers are given the top priority, service providers should remember that customers are the most important people to be served in library and information centers. They are not dependent on the library; rather, the library depends on them. They are part of the library. They are the people who bring their wants and needs and we are there to meet their needs. Marketing is a management process that includes: marketing plan, marketing research, market segmentation, marketing mix (Graves and Wulff, 1990). In creating a marketing plan, a library must concentrate on mission analysis, resource analysis, strategic planning and monitoring, and evaluation of the tasks performed. Market research is done to assess market information needs by stating research objectives, developing a research strategy, knowing target market characteristics, etc. Market segmentation is defined as a group of customers with similar or related characteristics who have common needs and wants. Market segmentation is usually divided into:

    Demographic Segmentation
    Socio-Economic Segmentation
    Geographic Segmentation

Marketing mix includes products (such as books, periodicals, literal programmes, bibliographies, annual reports, statistical surveys, and compilations and services such as electronic resources); price (in the form of credit, discount, cash, etc.); Place (including coverage, distribution channels, inventory, locations, and transport), and Promotion (which is done through advertising, personal selling, and public relations).
Ranganathan's Five Laws of Library Science

During his eighty-year lifespan, Dr. S.R. Ranganathan made contributed many new ideas to library and information science. He wrote 60 books and about 2,000 research articles in his life. Really, Dr. Ranganathan was a multifaceted personality. He devoted his life to the cause of development of library science in India. Dr. Ranganathan enunciated various laws, principles, canons, theories, etc., in LIS. His theories are based on scientific principles. They are accepted universally and are relevant even today. We can say that his ideas are like a lighthouse for libraries, and LIS students and teachers. His ideas are still exciting and, even today when computers and other developments in the field of telecommunication have changed the whole scenario of LIS. Even now, when libraries and information centres face the problem of underused information resources as well as the challenges of implementing Information Communication Technology (ICT), Dr. Ranganathan's philosophy is relevant and accepted as a way to overcome both these problems. The answer comes in the application of his Five Laws of Library Science.

Ranganathan's Five Laws of Library Science

1. Books are for use

2. Every reader his/her book

3. Every book its reader

4. Save the time of the reader

5. The library is a growing organism

The father of library science in India propounded the five laws of library science in 1931. The first law is that books are for use. It is imperative to ensure library patrons use the materials we select and purchase for them. Libraries are not just about storing books, they are about people having access to books. This is something Ranganathan made clear in his own discussion of the first law (Ranganathan 1988). His talks and writings emphasize the preservation of information and knowledge to be as important as access to information and knowledge. Undoubtedly, both preservation and access are important, and the availability of digital technologies that Dr. Ranganathan could only have dreamt of have a vital role to play in preservation and access. Librarianship is now blessed to have the opportunity of making knowledge available through digitization, but digitization can best be justified by focusing on the priorities laid down in the first law. The first law is also forward-thinking in its emphasis on the library's location. Increasingly we are seeing libraries sited, or even relocated, in more accessible locations in order to increase custom.There is debate among library professionals on the issue of merging of public libraries with other services, such as sports centres, or moving the library to main thoroughfares rather than outlying parts of the community. The implication of first law of library science in marketing library is the emphasis on the optimum use of resources, facilities, and services.Convenient location, effective signage, and longer opening hours; helping hands for using resources and services are all important.

The second law, "every reader his or her book," means that we all have diverse interests and that there is a book out there to satisfy each of us. The core need is to fight for the right of users to information of all kinds, the consistent battle against censorship and inequality of access that has governed civilisation since its inception. Our duty is to help users find the information they require and ensure any blocks in the way are not blocks we have created. Barring access to knowledge is totally against the philosophy of Dr. Ranganathan's law. In fact, the second law provides roots to the freedom to access information and knowledge in the forms of writings of all kinds, and to be informed on topics that others may wish to suppress. The second law reminds us to be impartial in our dealings with users. The implication of the second law in marketing the library is to meet user needs satisfactorily by collecting and interpreting information, understanding the needs of users, and matching the needs with its resources. The library should develop its collection keeping in mind the present and future requirements of its users. The library collection should be a mix of old and rare material as well as of the latest material reflecting advances in various fields.

The third law: every book its reader (Ranganathan, 1988) advocates easy access to materials, and one way to do so is by putting people together with what they require. Putting books into the hands of people who do not necessarily know what they need is also at the heart of the third law. We could interpret reader development as being part of the third law, since we promote books to users that may not be known to them and that may offer opportunities for enrichment that other titles do not. Historically, reference work has been identified within the third law, and this continues to be the case in the virtual library. Virtual reference services continue to grow in popularity in both academic and public libraries. Libraries and information centres are launching virtual enquiry services through their websites. They are accepting models created for this purpose by world-renowned libraries, especially university libraries. These are exciting developments, focused on expanding services to where and when users may need them. They allow librarians to continue to use their skills in tracking down quality information for users and will become a staple feature of library services. The implication of the third law in marketing the library is performing activities that take library products and services to the users: publicizing the value and benefits, promotional campaigns, adovacy, public relations, personal communication, etc. The library should use promotional tools to publicize its resources, facilities, and services. It should direct its efforts to attracting new users to the library and reach out to its existing users by providing library services at their doorstep. It should give its users tje personal touch and develop a feeling of belonging in the library.

The fourth law is "save the time of the reader" (Ranganathan, 1988). Time is important to every person. Time management is a key to success in life. Libraries must have the objective of saving the time of the reader. The entire journey of librarianship is about devising, designing, and developing methods, systems of organization and dissemination of information to provide the best service to their readers in the most efficient, accurate, and effective manner and thus saving the reader's time. For example, we create catalogues, bibliographies, indexes, and abstracts to save the time of readers. Saving the time of the reader also relates to how we actually organise information. Acceptance and adoption of ICT has used to save thousands of hours of the reader's time when compared to manual systems. Noruzi very rightly opines that considering the time of the user as a vital notion, and that all five laws of library science are transferable and applicable to the Web. Increasingly, saving the time of the user becomes navigating with them through the Web and creating high-quality and accurate guides to information in this challenging domain. The implication of the fourth law in marketing library is its focus on the user benefits and preferences. Consolidation and repackaging information into an appropriate form, making information available when it is needed, ensuring the quality of services and offerings, are tasks that take user benefits and preferences into account.The main objective of the library should be that the user who enters in a library for a specific purpose should not leave emptyhanded. At the same time, it must also be ensure that the users' valuable time is not wasted in searching for material.

The fifth law, that the library is a growing organism (Ranganathan, 1988) states that libraries will continue to grow in the future. Perhaps we can look at digital information and conclude that the growth is not as pressing from the point of view of physical space, although this remains something that libraries struggle with. Even in the digital world, the analogue continues to be important. Book publishing remains healthy, and indeed a much less expensive endeavor than it was in 1931. Libraries will continue to struggle with space problems. This is reflected in the statistics of information generation and the acquisition of information resources of libraries of any type. Even the presence of e-resources does not stop the acquisition of new print material, and the pace at which they grow has not changed. Lancaster's dream of a paperless society is not likely to come true in the near future. The sacrifices librarians have to make between space for books shelves and space for computer terminals to deliver this ever- expanding need will continue to be an issue. One can also see the library as a growing organism in terms of staff and skills. As the library grows in services, the skills necessary to deliver these new services will also grow. Perhaps we could argue that both libraries and the profession of librarianship are growing organisms. The fifth law's implication for marketing is adapting the library to future user needs, including mobilizing resources, dealing with uncertainty about future user needs, new services, new customer groups, new environment, etc. The library should also transform its services to keep up with other changes in the world. The library must not lag behind in adapting to new technologies. The library staff must be technology-literate.

In order to make use of these laws more effective, libraries and information centres must adopt marketing tools. Important promotion tools include:

1. Communication

Rowley (1998) divides communication channels into personal and non-personal. Personal communication channels are those in which two or more people communicate, and word of mouth is the primary means of communication, although other media such as e-mail are significant. Non-personal communication channels include TV, radio, posters, newspapers, etc.

2. Atmospherics

This term is coined by Philip Kotler (1975) who defines atmospherics as "the designing of buying and consuming environments in a manner calculated to produce specific cognitive and/or emotional effects on the target market." In other words, the working environment, library ambience, appearance of employees, the physical setting, lighting, work environment, noise levels, etc. These must be healthy and suitable to make a positive impact on users. Atmospheric considerations are often neglected in may libraries and information centers. It is not always a matter of extra cost but simply a matter of thoughtfully designing space in the library, placing of relevant guides to use, etc. This may help in attracting and maintaining users.

3. Advertising

Advertising is important for promoting library services. A library can advertise its products and services in newspapers, scholarly journals, magazines, newsletters, radio, television, Web, etc. Advertisements help in image-building. They can be in a short message, or staff can write longer articles on new and existing library services. Librarians can appear on local radio and TV, highlighting the new role the libraries plays in the present era (Jaafar, 1998). There are a variety of ways of advertising online. Traditional print advertisements include brochures, pamphlets, newspaper advertisements, etc.

4. Brochure

The design and presentation of brochures and leaflets should be aesthetic and attractive to users. The language should be simple and should hold the interest of the user.

5. Leaflets

Leaflets include guides to the library and its special collections, Web guides, Reading list on IT, and so on. Other brochures can be kept in the library at a location which is placed so that anyone who enters the library is attracted to that corner.

6. Posters

Posters offer good visual communication. They can draw attention when displayed at prominent locations and provide brief information about an event, service, etc. Old and defaced posters should be replaced on a regular basis.

7. Newsletters

The library can convey information about new acquisitions, new services, events and activities, fee changes, etc. Information regarding library can be included to conveys a message to readers about the alertness of the library in updating and communicating small but important pieces of information. In fact, they are an excellent marketing tool because they list all the activities of a library. With ICT facilities in the library, an e-newsletter can be produced. The text of the newsletter can also be included on the library website.

8. Extension activities

Activities such as book displays, lectures, quiz, debates, seminars, competitions, exhibitions, etc., can have a positive impact on the image of the library and can motivate people to come to the library and promote the use of its products and services.

9. Library Tour

Library tour for new and existing members can be used to promote the library services. While on a library tour, users can be prompted to ask questions and find out more about new activities, products, and services.

10. Library Month/Day

Organizing national library day/month can be an effective way to promote the library. A library can create awareness of its importance in society.

11. Promoting in Electronic Environment

Libraries, especially in large cities like Delhi, and Bombay use ICT tools in designing, developing, and disseminating services to satisfy their users. They also use ICT to promote their products and services. ICT-based channels include library websites and email.

12. Websites

Libraries websites can be accessed by users at any time.The websites contain details about the library, including the collection, subscriptions, service policy, terms and conditions, etc. It may also have graphics and multimedia advertising that can have an impact on visitors. The library webite should be contiuously updated to avoid an adverse effect the image of the library. The website can also be interactive so users can communicate with staff. For this purpose, a directory of staff members should be posted on the website (Mahajan and Chakravarty, 2007).

13. Electronic Mail/Mailshots

According to Natarajan (2002), e-mail is the most universal application on the Internet and it can be used for direct communication with potential users. There are many benefits to using email as a promotional tool. Mailshots are an effective medium that create personalized services, with information about library activities and events, membership renewal (Singh and Krishan Kumar, 2005).

14. Bulletin Board

This is an offshoot of email and is a many-to-many email system. It is medium for messages of interest to a community of online users (Moorthy and Karisiddappa, 2000). This service can be used by libraries for disseminating information to online users.

15. Newsgroups

Libraries can use newsgroups or discussion groups to build awareness among its clientele. According to Moorthy and Karisiddappa, (2000) a message (an article) is posted to the entire newsgroup. Other interested persons can reply/comment on the message. The topic can range widely, but each group is confined to one subject.

16. E-commerce

A library can also sell its products online through online charging and credit facilities. E-commerce has redefined the way business is conducted. Well-known bookstores around the world are offering their holdings over the Internet. For example, Blackwell maintains a database of more than 1.5 lakh active titles (Moorthy and Karisiddappa, 2000). Benefits of e-commerce include:

    A very large customer base and that reaches many different countries.
    Maintaining a website is relatively cheap, and results in reduced prices, more competition, current information, quick access and sales
    Caters to the customers' wide and varied interests, saving travel time

17. Blogs

Blogs are continuously-updated websites, created by individuals or organizations. They are generally free. A library can use blogs to promote its products and services by making it appealing and informative (Mahajan and Chakravarty, 2007). Special alerts about new resources special services can be included in the blog entries. To get feedback, comments and suggestions can be invited from visitors.
References

Chartered Institute of Marketing (UK) (n.d.). "Marketing." CIM Resource Glossary, Available. http://www.cim.co.uk/resources/glossary/home.aspx

Graves, Diana J., and Yvonne L. Wulff (1990), "The economics behind resource sharing: implications for collection development and the future of libraries", in Advances in Library Resource Sharing, Makler, London, pp. 52-3.

Jaafar, Shahar Benum (1998), "Marketing information technology (IT) products and services through libraries: Malaysian experiences", Proceedings of sixty fourth IFLA general conference, 16-21 August, Amsterdam, available at: http://www.ifla.org/IV/ifla64/126-86e.htm (accessed 14 July 2008).

Kotler, Philip (1975), Marketing for non-profit organizations, Prentice Hall, New Jersey.

Kotler, Philip (1985), Marketing for non-profit organizations,2nd ed., Prentice-Hall of India, New Delhi.

Mahajan, Preeti and Chakravarty, Rupak (2007), "How to promote library services: academic libraries in India," in Mullins, Jame L. (Ed.), Library Management and Marketing in a Multicultural World, Proceedings of the 2006 IFLA Management & Marketing Section, 16-17 August, Walter de Gruyter, Berlin, pp. 138-55, available at: http://www.reference-global.com/doi/abs/10.1515/9783598440267.3. 138 (accessed 15 April 2010).

Moorthy, A Lakshmana and Karisiddappa, C. R. (2000), "Internet for Libraries", in Ashok Babu, T. et al. (Eds.), Vision of the future library and information systems, Viva Publications, New Delhi, pp. 67-81, available at: http://drtc.isibang. ac.in:8080/jspui/bitstream/1849/354/1/SSMfect.pdf (accessed 15 April 2010).

Natarajan, M. (2002), "E-Mail as a marketing tool for information products and services", DESIDOC Bulletin of Information Technology, Vol. 22 No. 3, pp. 27-34.

Ranganathan, S. R. (1988), Five laws of library science, 2nd ed., Sarada Ranganathan Endowment for Library Science, Bangalore.

Rowley, Jennifer (1998), "Promotion and marketing communications in the information marketplace", Library Review, Vol. 47 No. 8, pp. 383-7, available at: http://www.emeraldinsight.com/Insight/ViewPDF.jsp?Filename=html/Outpur/Pub lishe3d/EmeraldFullTextArticle/pdf/03580470802.pdf (accessed 12 September 2008).

Singh, S. P. and Krishan Kumar (2005), Special libraries in electronic environment, Bookwell, Delhi.