Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

CONCEALMENT IN SECURITY REPORTS IN SOUTH EAST NIGERIA

Authors: Okafor, Ngozi Josephine;

CONCEALMENT IN SECURITY REPORTS IN SOUTH EAST NIGERIA

Abstract

This study examines the phenomenon of concealment in security reporting in South-East Nigeria, focusing on how both state and non-state actors manipulate language, framing, and selective disclosure in media and official reports. Employing a qualitative research design, the study analyzed 50 purposively sampled security reports, news articles, and official statements published between 2014 and 2024, using qualitative content analysis and critical discourse analysis (CDA) guided by Discoursive Framing Theory. Textual analysis of reports, including Punch and PREMIUM TIMES coverage of violent incidents, reveals that linguistic strategies, such as omission of casualty figures, ambiguous labeling of actors, and selective emphasis shape public perception, often balancing the need for operational secrecy with moral and political accountability. Empirical findings indicate that concealment occurs across all forms of insecurity, from separatist activities and militia attacks to highway abductions, with both security agencies and vigilante groups implicated in selective reporting and extrajudicial practices. Comparative review of prior studies shows that concealment is a recurring strategy employed for operational, political, and strategic purposes, affecting public trust and policy effectiveness. The study concludes that concealment in security reporting is a complex, multi-layered practice that influences public understanding and highlights institutional limitations. Recommendations include enhancing transparency and accountability in reporting and building capacity and collaboration among security actors to improve both information accuracy and public trust.

Keywords

Concealment, Security Reporting, South-East Nigeria, Discursive Framing, Critical Discourse Analysis

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!