Internet Addiction: A Study on College going Students of District Anantnag

Daily writing prompt
What could you do more of?

[1]Ms. Anjumah Majeed, [2]Ms. Iqra Hafiz, [3]Mr. Firdose Ahmad Mir,
[4]Dr. Mohd Arif Hussain Bhat, [5]Mr. Bilal Ahmad Shah, [6]Dr. Asif Qadri,[7]
Mr. Ishfaq Ahmad Wani


ABSTRACT

The current research paper explores the phenomenon of internet addiction among College going students of district Anantnag. The study which was descriptive in nature was conducted on 100 College going students belonging to five different colleges of district Anantnag. The students were sampled by using simple random technique (Lottery Method) whereas, colleges were purposively selected. Data were collected by using a standardized tool developed by Daman Deep Kaur Gulati, Dr. Jose J. Kurisunkal and Dr. Mamta Bakliwal 2021. The data were analyzed by using t-test. The major finding of the study revealed that Internet Addiction is more in Arts Stream Students belonging to different Colleges of district Anantnag as compared to Science stream students belonging to different Colleges of district Anantnag.

Key Words: Internet Addiction, Lottery Method, t-test.

Photo by Max Fischer on Pexels.com

INTRODUCTION

In the modern digital age, the internet has become an integral and indispensable component of daily life for billions of people around the world. What was once considered a novel technological innovation has rapidly evolved into an essential tool for communication, information-gathering, entertainment, and a multitude of other functions.The Internet’s pervasive presence and increasingly ubiquitous accessibility through smartphones, laptops, tablets, and other digital devices have transformed the way individuals interact with the world and each other.

The ubiquity of the internet in the 21st century has ushered in a technological revolution, profoundly shaping the way we work, learn, socialize, and entertain ourselves. The internet has become an essential resource for a vast array of daily activities, from professional tasks and academic research to personal communication and leisure pursuits. It has enabled instantaneous access to a wealth of information, fostered global connectivity, and revolutionized the way we consume and share content.

However, as the internet has become more deeply embedded in the fabric of modern society, a concerning trend has emerged – the growing problem of problematic internet use and internet addiction. Internet addiction, characterized by an inability to control one’s use of the internet despite the presence of negative consequences, has emerged as a significant public health concern in recent decades. As individuals, particularly young people, find themselves spending more and more time online, the detrimental effects of this excessive and compulsive internet use on mental health, physical well-being, social relationships, academic or occupational performance, and overall quality of life have become increasingly apparent.

Nature and Scope of Internet Addiction

In order to fully understand the issue of internet addiction, it is essential to first explore the definition and conceptualization of this behavioural disorder. Internet addiction, also referred to as problematic internet use or compulsive internet use, has been the subject of extensive research and debate among scholars and clinicians in recent decades.

The term “internet addiction” was first introduced in the 1990s by Dr. Ivan Goldberg, a psychiatrist who observed patterns of excessive and uncontrolled internet use among his patients. Goldberg proposed that individuals could become addicted to the internet, experiencing symptoms similar to those associated with substance addictions, such as tolerance, withdrawal, and impaired function in daily life. Since then, a growing body of research has sought to further define and characterize this emerging behavioural addiction.

One of the key challenges in defining internet addiction lies in the fact that the internet is not a single, discrete activity, but rather a platform that enables a wide range of activities, from social media and online gaming to e-commerce and information-seeking. As such, internet addiction is often conceptualized as a multidimensional construct, with various sub-types or “addictions” related to specific internet-enabled behaviours, such as social media addiction, online gaming addiction, or cybersex addiction.

Despite this complexity, researchers have proposed various frameworks and diagnostic criteria for internet addiction. One of the most widely recognized models is the Generalized Problematic Internet Use Scale (GPIUS), developed by Caplan and colleagues. This model posits that internet addiction is characterized by a cognitive-behavioural syndrome, including symptoms such as mood regulation, compulsive use, cognitive preoccupation, and negative outcomes.

Another influential framework is the Internet Addiction Test (IAT), developed by Dr. Kimberly Young. The IAT assesses the degree of preoccupation, compulsive use, withdrawal symptoms, and negative consequences associated with problematic internet use. This assessment tool has been widely used in both clinical and research settings to identify and measure the severity of internet addiction.

It is important to note that the classification and diagnosis of internet addiction remain subject to on-going debate and refinement. While the American Psychological Association (APA) has recognized “Internet Gaming Disorder” as a condition warranting further study in the Diagnostic and Statistical Manual of Mental Disorders (DSM-5), the broader concept of internet addiction has not yet been formally included as a distinct diagnostic category. However, many researchers and clinicians advocate for the recognition of internet addiction as a legitimate behavioural addiction, akin to substance use disorders or gambling addiction.

Risk Factors and Etiological Mechanisms of Internet Addiction

The development of internet addiction is a complex and multifaceted process, influenced by a variety of individual, social, and environmental factors. Understanding the underlying risk factors and etiological mechanisms that contribute to the emergence and maintenance of this behavioural disorder is essential for designing effective prevention and intervention strategies.

Individual Factors :

 A growing body of research has identified several individual-level factors that may predispose individuals to the development of internet addiction. Personality traits, such as high levels of impulsivity, sensation-seeking, and neuroticism, have been consistently linked to an increased risk of problematic internet use. Individuals with these characteristics may be more likely to engage in compulsive and excessive online behaviours as a means of mood regulation or stimulation-seeking.

Additionally, the presence of co-occurring mental health conditions, such as depression, anxiety, and attention-deficit/hyperactivity disorder (ADHD), has been associated with a higher likelihood of internet addiction. These underlying psychological and neurological factors may contribute to a heightened vulnerability to the development of addictive behaviours, including problematic internet use.

Demographic factors, such as age and gender, have also been identified as risk factors for internet addiction. Adolescents and young adults, particularly males, have consistently been found to be more susceptible to developing internet addiction. This may be partially attributed to the developmental changes and social pressures experienced during these life stages, as well as the increased accessibility and pervasiveness of digital technologies among younger generations.

Social and Environmental Factors

 Beyond individual-level characteristics, social and environmental factors also play a significant role in the etiology of internet addiction. The quality and nature of an individual’s interpersonal relationships and social support systems can influence the risk of developing problematic internet use. For instance, individuals with poor social skills, limited social connections, or dysfunctional family environments may be more likely to turn to the internet as a means of socialization, emotional regulation, or escape from real-world problems.

The availability and accessibility of the internet, as well as the design and features of digital platforms and applications, can also contribute to the development of internet addiction. The ubiquity of smartphones and the constant connectivity they provide, combined with the reinforcing and addictive design elements of social media, online gaming, and other internet-based activities, can foster compulsive and excessive use.

Moreover, cultural and societal factors, such as the normalization of technology use, the perceived importance of online presence and participation, and the lack of digital literacy and self-regulation skills, can also shape an individual’s relationship with the internet and increase the risk of problematic use.

Neurobiological and Psychological Processes

 In addition to the individual, social, and environmental factors, researchers have also explored the potential Neuro-biological and psychological mechanisms underlying internet addiction. Emerging evidence suggests that the neurological and Neuro-chemical processes involved in the development of substance addictions may also play a role in the etiology of internet addiction.

Studies have found that excessive internet use and engagement in certain online activities, such as gaming or social media use, can trigger the release of dopamine and other reward-related neurotransmitters in the brain’s reward system. This can lead to a heightened sense of pleasure and reinforcement, potentially fuelling compulsive and addictive behaviours.

Furthermore, the cognitive and behavioural patterns associated with internet addiction, such as attentional biases, cognitive preoccupation, and impaired self-regulation, may be underpinned by specific psychological processes. These include the development of maladaptive coping strategies, distorted cognitions related to the internet and its use, and impaired executive functioning and impulse control.

 By understanding the multifaceted risk factors and etiological mechanisms involved in the development of internet addiction, researchers and clinicians can better inform the design and implementation of targeted prevention and intervention strategies. This comprehensive approach is crucial for addressing the growing public health concern of problematic internet use in the digital age.

REVIEW OF RELATED LITERATURE

Various research studies have been conducted by various research scholars across the globe on internet addiction. Few of them have been presented below in chronological order;

In the study by Menon, Shanker & Narayanan, Lakshmi & Kahwaji, Ahmad (2018), the researchers investigated the internet addiction among college students. The study was conducted on 300 students in a management institute in India, were 300 students (first, second and third years’ students) were sampled and the result shows that the older students were more internet addicted than the younger students. It also showed that men were more addicted than women. 

A cross sectional study was conducted by Prashant Bagdey, Hemant Adikane, Uday Narlawar, Dadasaheb Dhage, Kishor Surwase, Alka Kaware (2018) for investigating the association between mental health and internet addiction among college students in Nagpur city. The result showed that the students aged from 17-25 years were high on internet addition. They suggested that excessive use of the Internet effects on physical, mental health and social well-being of students.

A cross sectional study on internet addiction and their relationship with depression among professional college students was carried out by Subhashini KJ, Praveen G (2018). The study was conducted on 300 students from Hassan Institute of Medical Sciences (Government Medical College) and Government Engineering College, Karnataka. They found that out of 300 students 173 (57.7%) were found to be internet addicted and 67 (38.7%) among them were found to be depressed and a there was positive relation between internet and depression. A male student shows more internet addiction than female students. 

Azher, Musarrat (2018) has explored the relationship between Internet Addiction and Anxiety among 300 PG students form University of Sargodha. The data was collected by Internet Addiction Scale (I.A.S) and Beck Anxiety Scale.  The result finding showed that internet addition was more in male students as compare to female students and also suggested that there was positive relationship between internet addiction and anxiety level among University students. 

A cross sectional study on 1304 undergraduate college students (716  were females and 588 were males) was conducted in Udupi taluka Karnataka by Sharma B,Ashok L,Chandrasekaran V, Monteiro A (2018) to examine the correlates of  internet addiction. They found the prevalence of internet addiction was 44% and this was associated gender, father’s occupation, mother’s education, availability of personal gadgets, use of smartphone, exposure to internet at young age and there was positive relationship between internet addiction and level of depression, anxiety, and stress. 

A study conducted by Teena Sarao & Dr. Poonam Sharma (2017) on the relationship between the Internet use and locus of control among college students. The result indicated that internet addicted students’ feel symptoms of tolerance, withdrawal and escape, frequent interpersonal and academic conflicts, and physical health-threatening risks related to problem. The result also showed that men facing more problems then women and they found positive correlation between external locus of control and problem Internet use.

RATIONALE OF THE STUDY

1. Prevalence and Growing Concern

  • Increasing Usage: College students are among the most frequent users of the internet, and their usage often extends beyond academic purposes to social media, gaming, and other online activities. With the rise in digital technology, understanding the extent and impact of internet addiction in this demographic is critical.
  • Rising Trends: Recent studies and reports suggest that internet addiction is becoming more prevalent among young adults. Research can provide updated data and insights on how widespread the problem is among college students.

2. Impact on Academic Performance

  • Academic Challenges: Internet addiction can significantly impact students’ academic performance by leading to procrastination, reduced concentration, and lower grades. Investigating this relationship can help identify the extent of these effects and inform strategies to mitigate them.
  • Educational Outcomes: Understanding how internet addiction affects learning outcomes can help educators develop targeted interventions to support students in maintaining academic performance while managing their internet use.

3. Mental Health Concerns

  • Psychological Effects: Internet addiction is associated with various mental health issues, including anxiety, depression, and stress. Research can provide insights into how these issues specifically affect college students and identify potential mental health support needs.
  • Support Systems: By highlighting the mental health impacts, your research can contribute to developing better support systems and resources within college environments.

4. Social and Behavioral Implications

  • Social Interactions: Internet addiction can affect students’ social relationships and communication skills. Research can explore how excessive internet use impacts students’ interactions with peers, family, and faculty.
  • Behavioral Patterns: Studying behavioral patterns associated with internet addiction can help in understanding the broader social consequences and developing interventions to promote healthy social interactions.

5. Identification of Risk Factors

  • Understanding Triggers: Research can identify specific risk factors contributing to internet addiction among college students, such as academic stress, social pressures, or personal traits. This information can be used to develop preventive measures.
  • Targeted Interventions: Identifying risk factors allows for the design of targeted interventions and support programs that address the root causes of internet addiction rather than just its symptoms.

6. Development of Effective Interventions

  • Evaluating Existing Programs: Your research can assess the effectiveness of current interventions and support programs aimed at reducing internet addiction. This evaluation can help refine and improve these programs.
  • Innovative Solutions: By identifying gaps in existing research, you can propose new strategies or solutions to help students manage their internet use more effectively.

7. Contributing to Policy and Practice

  • Institutional Policies: Findings from your research can inform college policies related to internet use and mental health support, promoting a healthier academic environment.
  • Educational Practices: Research outcomes can help educators and counselors develop best practices for integrating technology use in a way that supports rather than hinders student success.

8. Future Research Directions

  • Foundation for Further Study: Your research can lay the groundwork for future studies on related topics, such as the long-term effects of internet addiction or the impact of emerging technologies on student behavior.

STATEMENT OF THE PROBLEM

The problem under study was worded as, “Internet Addiction: A Study on College going Students of District Anantnag”.

OBJECTIVE

To compare internet Addiction scores among College going Students of District Anantnag with respect to Stream.

H0= There is no significant difference in Internet Addiction scores among College going Students of District Anantnag based upon their stream.

DELIMITATIONS OF THE STUDY

  • The study was conducted on 100 college going students only,
  • Study was conducted on 05 colleges only.

SAMPLE AND SAMPLING TECHNIQUE

The current study was descriptive in nature. The sample of the study consisted of 100 college going students from 05 going students belonging to district Anantnag. Out of the 100 sampled students 50 were Male and 50 were Female. The students were sampled by using simple random sampling technique (Lottery Method) and the colleges were sampled by using purposive sampling technique. Gender equality was maintained wherever possible. Respondents were selected from diverse socioeconomic status.

TABLE 1.0 depicts the brief sample of the study

S.No.Name of the CollegeGender Male                  Female
01GDC Boys Anantnag1510
02GDC Women Anantnag0020
03GDC Mattan1005
04GDC Kokernag1505
05GDC Bijbehara1010
 Total5050
 Grand Total100

TOOLS

For data collection Internat Addiction Scale (IAS) developed by Daman Deep Kaur Gulati, Dr. Jose J. Kurisunkal and Dr. Mamta Bakliwal 2021

DATA COLLECTION PROCEDURE

Data were collected from 05 different colleges of district Anantnag. After taking the prior permission from the principals of the selected colleges, the respondents selected for the current study were made aware about the objective of the research and were assured that their responses are being used for research purpose only and will be kept confidential.

STATISTICAL TECHNIQUE

The data were analyzed with help of T-Test.

ANALYSIS AND FINDINGS

The data related to the objective was collected and analysed by using t-test. But before applying t-test, the investigator checked the assumptions of t-test which are normality and Homogeneity as has been discussed below;

ASSUMPTION OF NORMALITY

H0= the distribution of Internet Addiction Scores of Arts and Science students belonging to different Colleges of district Anantnag do not deviate significantly from normality.

Tests of Normality
 StreamKolmogorov-SmirnovaShapiro-Wilk
StatisticdfSig.StatisticdfSig.
Internet addiction scoresArts.08650.200*.96650.165
Science.10950.194.95650.059
*. This is a lower bound of the true significance.
a. Lilliefors Significance Correction

From above table it is clear that Kolmogorov-Smirnov Statistics for Internet Addiction scores of Arts students belonging to different Colleges of district Anantnag is 0.086 with df 50, whose significance value is 0.200 which is greater than 0.05, thus the value is not significant at 0.05 level of significance. In view of this the null hypothesis that the “distribution of Internet Addiction Scores of Arts students belonging to different Colleges of district Anantnag do not deviate significantly from normality” is accepted.

Similarly, the Kolmogorov-Smirnov Statistics for Internet Addiction scores of Science students belonging to different Colleges of district Anantnag is 0.109 with df 50, whose significance value is 0.194 which is greater than 0.05, thus the value is not significant at 0.05 level of significance. In view of this the null hypothesis that the “distribution of Internet Addiction Scores of Science students belonging to different Colleges of district Anantnag do not deviate significantly from normality” is accepted.

From above table and discussion it is quite clear that Assumption of Normality gets fulfilled. The investigator further proceeded to check the second assumption which is;

Assumption of Homogeneity:

H0= “there is no significant difference in the variance of Internet addiction scores of Arts and Science Students belonging to different Colleges of district Anantnag”.

  Levene’s Test for Equality of Variances   
Internet Addiction Scores FSig.tdfSig (2-tailed)
Equal variances assumed.109.7423.83798.000
Equal variances not assumed  3.83797.082.000

From table it is clear that Levene’s F value is 0.109, its significant value is 0.742, which is greater than 0.05. Hence, the value is not significant at LOS 0.05. Thus, the Null Hypothesis that “There is no significant difference in the variance of scores of Internet Addiction of Arts and Science Students belonging to different Colleges of district Anantnag” is accepted. Hence the assumption of Homogeneity of variance holds good.

Further from the above table it is clear that t-value is 3.837 with df= 98, whose two tailed significance value is 0.000 which is less than 0.01 level of significance. Hence the value is significant at 0.01 level of significance. In view of this the null hypothesis that’ “there is no significant difference in Internet Addiction Scores of Arts and Science Stream Students belonging to different Colleges” is rejected which means that Internet Addiction is  not Independent of Stream.

Therefore, it can be concluded that Internet Addiction Scores of Arts and Science Stream Students belonging to different Colleges of district Anantnag differ significantly.

Also, from the Table below it is observed that mean of Internet Addiction Scores of Students belonging to Science Stream is 67.3600 which is significantly less than the mean of Internet Addiction Scores of Students belonging to Arts Stream which is 75.3600. Therefore, it can be concluded that Internet Addiction is more in Arts Stream Students belonging to different Colleges of district Anantnag as compared to Science stream students belonging to different Colleges of district Anantnag.

Group Statistics
 StreamNMeanStd. DeviationStd. Error Mean
Internet addiction scoresArts5075.360010.920421.54438
Science5067.36009.905181.40080

Similar to our research findings, here are some research studies that suggest internet addiction varies with academic stream or field of study:

1. “Internet Usage Patterns and Addiction Among Students of Different Streams” (2019) by Sharma, A., et al. published in Journal of Educational Technology, 15(3), 1-12. This study found that students from the commerce stream were more likely to experience internet addiction than students from the arts and science streams.

2. “Internet Addiction and Academic Performance: A Study of Students from Different Disciplines” (2020) by Gupta, A., et al. published in Journal of Educational Computing Research, 58(4), 866-881.This study found that students from the engineering and management disciplines were more likely to experience internet addiction than students from the arts and science disciplines.

3. “Internet Addiction and Its Relationship with Academic Performance Among Students of Different Streams” (2018) Singh, S., et al. published in International Journal of Advanced Research in Computer Science, 9(1), 240-246.This study found that students from the arts stream were more likely to experience internet addiction-related problems than students from the science and commerce streams.

                     In contrast to our results here are some studies whose findings suggest that internet addiction is same irrespective of the academic stream of students

1. “Internet Addiction Among University Students: A Study of Engineering and Humanities Students” (2017) by, Kumar, A., et al. (2017) in  International Journal of Advanced Research in Computer Science, 8(3), 355-361.- This study found no significant differences in internet addiction between engineering and humanities students.

2. “Internet Addiction Among University Students: A Cross-Sectional Study” (2019)  Al-Dhahir, M., et al. in Journal of Taibah University Medical Sciences, 14(1), 34-41.  – This study found no significant differences in internet addiction among students from different faculties (arts, science, engineering, and medicine).

REFERENCES

Ahmet A. (2011). Internet Addiction, depression, Anxiety and stress. International Online Journal of Educational Sciences, 2011, 3(1):138-148.

Akin, A., & Iskender, M. (2011). Internet Addiction and Depression, Anxiety and Stress. International Online Journal of Educational Sciences, 3(1), 138-148. 

Akin, A. (2012). The relationships between internet addiction, subjective vitality, and subjective happiness. Cyber psychology, Behavior and Social Networking, 15, 404–410.

Alderman, H., Behrman, J. R., Lavy, V., & Menon, R. (2001). Child Health and School Enrolment: A Longitudinal Analysis. Journal of Human Resources, 36, pp. 185-205. 

Alexa. C. Curtis (2015). Defining Adolescence. Journal of adolescent and family health, Volume.7, Issue.2.

Aneshensel, Carol S. (1992). ―Social Stress: Theory and Research. American Review of Sociology 18:15–38.

Anderson, K. J. (2001). Internet use among college students: An exploratory study. Journal of American College Health, 50(1), 21-26.

Anderson CA, Horowitz LM, French R. (1983) Attributional style of lonely and depressed people. Journal of Personality and Social Psychology, 45:127–136. doi: 10.1037//0022-3514.45.1.127.

Angela Leite, Ana Ramires, Susana Amorim (2020). Psychopathological Symptoms and Loneliness in Adult Internet Users: A Contemporary Public Health Concern. International Journal of Environmental Research and Public HealthOpen Access Journal, page no. 1-17.

Arnett, J. J. (1995). Adolescents’ uses of media for self-socialization. Journal of Youth and Adolescence, 24 (5), p- 519-533.

Aslam, M., & Kingdon, G. (2010). Parental Education and Child Health – Understanding the Pathways of Impact in Pakistan.

Atindra Nath Dutta (2016), A comparative study of mental health of addicted and          non-addicted adolescent students, The International Journal of Indian Psychology, Volume 4, Issue 1, No. 76, ISSN 2348-5396 (e) DIP:

18.01.017/20160476

Azher, M. (2014). The Relationship between Internet Addiction and Anxiety among students of University of Sargodha. International Journal of Humanities and Social Science, 4 (1), 288.

Behrman, J., & Deolalikar, A. (1988). Health and Nutrition. In H. Chenery, & T. Srinivasan, Handbook of Development Economics (Vol. 1, pp. 631-711). Amsterdam, North Holland.

Berte, D.Z., Mahamid, F.A. & Affouneh, S. (2019) Internet Addiction and Perceived Self-Efficacy Among University Students. Int J Ment Health Addiction. https://doi.org/10.1007/s11469019001608

Bernaras E, Jaureguizar J. & Garaigordobil M (2019). Child and Adolescent Depression: A Review of Theories, Evaluation Instruments, Prevention Programs, and           Treatments.     Front. Psychology. 10:543. doi: 10.3389/fpsyg.2019.00543

Betul Keles, Niall McCrae & Annmarie Grealish (2020). A systematic review: the influence of social media on depression, anxiety and psychological distress in adolescents, International Journal of Adolescence and Youth, 25:1, 79-93, DOI: 10.1080/02673843.2019.1590851

Bélanger, F., & Crossler, R. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35(4), 1017-1041. doi:10.2307/41409971

Mir Firdose Ahmad , Shah Bilal Ahmad, Rather Ilyas Ahmad , Bhat Mohd           Arif Hussain  (2021). A Comparative Study Of Internet Addiction Among           Higher Secondary School Students Of District Anantnag, published in                Elementary Education Online, 2021; Vol 20 (Issue 2): pp. 3960-3970, doi: 10.17051/ilkonline.2021.02.412


[1] Student Indira Gandhi National Open University, New Delhi, J&K, INDIA

[2] Former Student, University of Kashmir, Department of Economics, J&K, INDIA

[3] Assistant Professor (Environmental Science), GDC Women Anantnag, J&K, INDIA

[4] Principal, Islamia Faridiya College of Education Kishtwar, J&K, INDIA

[5] Assistant Professor (Education), GDC Women Anantnag, J&K, INDIA

[6] Assistant Professor (Kashmiri), GDC Mattan Anantnag, J&K, INDIA

[7] Teacher at Department of School Education, J&K, INDIA

Human Security; Assessment of the Coping Mechanisms of Women and Children in IDPs Camps in Abuja, Nigeria

Daily writing prompt
What could you do more of?

*Adah, Obaa Daniel, 1Badey Dinebari

*Centre for Gender and Development Studies, University of Port Harcourt

1Department of Sociology, Faculty of Social Sciences, University of Port Harcourt.

Abstract

The present study is focused on assessing the coping mechanisms of women and children in IDPs camps in Abuja as components of the Human security needs of these vulnerable groups of persons. The theoretical background was the Human Needs theory. The study employed a survey research design using mixed method for data collection, quantitative data was obtained by the administration of questionnaires while qualitative data was gotten through key informant interview schedule, participants were drawn using purposive sampling technique. The data generated using the questionnaires was analyzed using descriptive statistics of frequency counts and percentages, presented in tables. The data generated from the interview schedule was analyzed using the explanation building technique. The results showed that women and children had applied coping mechanisms to address the challenges faced in the IDP camps and these mechanisms have contributed to their overall human security, however, there is a mixed perception of the effectiveness of the interventions applied as there is need for more tailored, sustainable, and inclusive interventions. The study recommends amongst others collaboration and coordination among humanitarian actors, government agencies, local authorities, and community-based organizations to ensure a coherent and integrated response to the needs of displaced women and children, empowerment of women and youth as agents of change within the IDP camps by providing opportunities for leadership, skills development, and civic engagement.

Keywords: Internally Displaced Persons, Coping Mechanisms, interventions, Women and Children.

Photo by Kevin Ku on Pexels.com

1.0 Introduction

Like many other African nations, Nigeria is strikingly incapable of offering human security that meets international standards. Nigeria has around one-third of Africa’s IDP population and approximately 10% of the world’s IDP population. Nigeria ranks third in the global ranking, with around 3.3 million displaced persons, primarily women and children (IDMC, 2018). Insecurity caused by the Boko Haram (BH) insurgency and military counter-insurgency operations affects around 26 million people in Northeast Nigeria, with over 14 million in desperate need of humanitarian assistance (OCHA, 2017). Women and children are typically more vulnerable than other affected displaced populations, contributing to the grave human rights violations that they face (Brookings Institution, 2014).

Furthermore, women and children experience displacement in ways that men do not, and they face unique obstacles that must be acknowledged in order to offer them the proper and specific help they require (IDMC, 2020). Unfortunately, this distinction is rarely considered while giving aid and protection. Instead, gendered behaviors in IDP camps have reinforced previously existent discrimination against women and children. These IDP experiences, according to UNFPA (2016), are rooted in uneven and discriminatory social norms, gender inequity, and stereotypes. According to IDMC (2014), the ongoing lack of disaggregated data on displacement dynamics has resulted in a lack of awareness of Nigeria’s displacement dynamics and fragmented, unsuitable, and ineffective response actions. As a result, internally displaced persons face many obstacles in various camps across Nigeria.

Nigeria has faced numerous hurdles since gaining its independence, including nation-building, industrial and scientific advances, political and economic development, high education standards, and health care quality. Human security has been a big concern for the Nigerian government despite the country’s abundance of riches. It has also significantly weakened the country’s economy by depressing investment and tourism. Many other elements work together to impede the attainment of human security, aside from the government’s apathetic attitude towards it. Even worse, Nigeria is one of the nations where the most horrible terrorist organizations, like Boko Haram, are based, drawing attention, support, and engagement from around the world. Human insecurity has a detrimental impact on a country’s ability to achieve the current Millennium Development Goals (MDGs) and the upcoming Sustainable Development Goals (SDGs). Displaced persons are now more vulnerable as a result of internal displacement. In addition, it makes the victims’ poverty worse, endangers national security, causes property loss and suffering, violates human rights, discriminates, malnourishes displaced children, and spreads diseases. Rape, child labor, poor health, and inadequate education have all claimed the lives of women and children. Notably, women, the victims of displacement, lack enough necessities (Walsh, 2016). Despite these concerns and issues, there is a distinct shortage of research evidence on human security in general, especially those facets of human security related to the sustenance of IDPs, such as food and social security. Most studies on IDPs have either focused on non-conflict-induced Displacement (non-CID) or, when focused on CID, have generally focused on reasons for displacement, types of displacement, and international legal instruments that control IDPs (Mehari, 2017). According to Taylor-Robinson and Oleribe (2016) and Bamidele (2023), most studies have not assessed the coping mechanisms of IDPs, especially women and children. IDPs in Nigeria are in a severe and precarious situation, with ever-worsening living conditions, including food and social insecurity. This should be considered in addition to the high frequency of human insecurity and IDPs’ lack of a long-term solution (IDMC, 2019). As a result, this study seeks to assess the coping mechanisms of IDPs and the situation of women and children in the New Kuchingoro and Wassa Internally Displaced Persons (IDPs) Camps as a means of offering suggestions and insights that can help find long-term solutions that will safeguard their human security.

  1. Objectives of the Study

1.   Determine the coping mechanisms employed by women and children in selected IDP Camps to address the challenges they face and their impact on their resilience and overall human security.

  • Evaluate the effectiveness of the coping mechanism employed by women and children in the selected IDP Camps in promoting human security.
  • Assess the effectiveness of the interventions implemented by different stakeholders in addressing the human security needs of women and children in the selected IDP Camps.

1.2 Research Questions

  1. What coping mechanisms are employed by women and children in selected IDP Camps to address the challenges they face and their impact on their resilience and overall human security?
  2. How effective are the coping mechanism employed by women and children in the selected IDP Camps in promoting human security?
  3. How effective are the interventions implemented by different stakeholders in addressing the human security needs of women and children in the selected IDP Camps?

2.0 Literature Review

2.1 Theoretical Framework

Theory of Human Needs

The human needs theory (HNT), first put forth by renowned psychologist Abraham Maslow in his groundbreaking article “A Theory of Human Motivation,” published in the esteemed psychological review in 1943, serves as the foundation for this empirical study. The HNT, which has had a significant impact on psychology, maintains that human wants are inherently non-negotiable as well as intrinsic and universal. It asserts that some requirements are essential for human life and general well-being (Olanrewaju et al., 2018). Despite what the general public believes, these demands go beyond the necessities of food, shelter, and water. They include necessities that are both material and immaterial, as well as a variety of other demands that people have a strong desire to satisfy (Marker, 2005). As a result, the HNT provides deep insights into both the root causes of conflicts and viable paths for their settlement. Prominent academics generally acknowledge its effectiveness as a valuable tool for mediation, proactive peace-building, and post-conflict peace-building initiatives (Danielsen, 2005).

As for Osagioduwa and Oluwakorede (2016), the HNT posits that conflicts mostly stem from the unfulfilled demands of individuals at many levels, including the individual, societal, and collective levels. Drawing on the research of Burton (1990, referenced in Danielsen, 2005), it is clear that marginalized groups frequently turn to violence in order to express their rights and satisfy their unfulfilled wants as a result of the ongoing disregard for global human needs. Renowned scholars like Max Neef (1991), Burton (1990), and Maslow (1943) have studied the HNT in great detail. They have concentrated their research on the complex relationship between human needs and conflicts at different levels of society, from intrapersonal and interpersonal conflicts to international conflicts and intergroup conflicts (Danielsen, 2005). The basic tenet that conflict emerges when the needs of individuals and groups are not sufficiently satisfied helps explain the relationship between conflict and human needs (Olanrewaju et al., 2018). Consequently, only when the wide range of human needs is well met and conflict interests are appropriately addressed can effectively conflict resolution be accomplished

2.2 Conceptual Clarification

Human Security, according to UNDP Human Development Reports (1994), the first significant document addressing the issue, refers to protection from damaging upheavals in daily life and protection from long-term threats like famine, disease, and oppression. Protection against both traditional and contemporary safety risks, such as persistent poverty, ethnic violence, human trafficking, climate change, pandemics, international terrorism, and sudden economic downturns, is referred to as human security. Such threats often turn into international issues. A former UN Secretary-General, Kofi Annan, in his perspective, asserts that human security is linked to defending national interests within the parameters of foreign policy or even international security in the event of a nuclear war (HDR, 1994, cited in Titko & Kurtynet, 2019).

According to Bayar and Aral (2019), human security is the establishment of political, social, environmental, economic, military, and cultural institutions that collectively provide individuals with the means of surviving, supporting themselves, and maintaining their dignity. Two essential elements make up the notion of human security, initially presented in the Human Development Report 1994. These are the freedoms from desire and fear. In order to be free from fear, people must be safeguarded against dangers, including physical harm, armed conflict, and war, using various strategies, including the architecture of peacebuilding. However, emancipation from non-violent dangers to people’s welfare and dignity, such as poverty, malnourishment, illnesses, environmental degradation, and others, is necessary for freedom from want (Woldetsadik, 2018). Szpak (2015) further describes human security in terms of its emphasis on people, their lives, their functioning in society, their autonomy, access to the market, and social chances, citing the 1994 Human Development Report. In addition, it addresses the State of peace, which is a prerequisite for human security. Living in a state of peace and safety where everyone is free to exercise their fundamental liberties and human rights without hindrance means being humanely secure. Individuals must be able to fulfill their objectives and aspirations as well as their societal demands. According to Jacobs (2016), human security encompasses all human needs for survival, development, and growth, not just the requirement for physical defense against aggression.

The first global study to project security more comprehensively was the United Nations Human Development Study (HDR) of 1994 (Lawal & Mbiba, 2020). Along with rules and regulations for execution, it considers the socioeconomic requirements of people and communities as a crucial aspect of security (Aduloju & Pratt, 2014). The study was written in response to the “Economics of Peace” Round Table discussion on North-South relations in Costa Rica in 1990. All participants in the Round Table acknowledged and accepted the need for a more dynamic and widely accepted security paradigm in the post-Cold War era. In the post-Cold War order framework, the emphasis was on the need to cut back on military spending and instead concentrate on human-centered development, such as bettering the economy and the environment, to achieve world peace (North-South Roundtable 1990). The HDR made the case that the definition of security had been applied too narrowly for too long, with the definitions being limited to the defense of national interests abroad, the security of territory against external assault, or the prevention of a nuclear holocaust. Rather than being directly linked to people, it has been more strongly linked to nation-states (HDR 1994).

According to Titko and Kurtnets (2019), the elements of human protection are economic security, food security, health protection, environmental security, personal (physical) security, community security, and political security

2.3 Empirical Review

Adams (2021) conducted a study on the challenges faced by displaced individuals, particularly females, in Borno State, Nigeria. The study focused on the humanitarian crises experienced by female internally displaced persons (IDPs) in specific IDP camps, namely Jerusalem IDP camp, Zabarmari IDP camp, Muna Dati IDP camp, Ethiopia IDP camp, and Teachers’ Village IDP camp. These crises were primarily caused by the activities of Islamist Jihadists, herdsmen, and armed bandits. The paper explored a range of predicaments faced by female IDPs, including human rights violations, sexual violence and abuses, environmental racism, hunger, starvation, health issues, educational marginalization, and social ostracism. In response to these challenges, the study examined the role of the Christian Association of Nigeria (CAN) and other Christian charities in addressing the humanitarian crises faced by female IDPs in the selected camps. To gather data, the study employed an observer-as-participant ethnographic approach with a combination of qualitative and quantitative data collection techniques. The collected data were analyzed using the Statistical Package for the Social Sciences (SPSS), and the study drew on the human needs theory as its theoretical framework. The research findings indicated that CAN and other Christian charity organizations have made commendable efforts in responding to the crises, with a response rate of 98.1%. The study concludes that considering the diverse array of challenges faced by female IDPs in the selected IDP camps, the timely and intensified response from CAN is crucial.

Additionally, by identifying and applying the fundamental principles of the human needs theory, the crises faced by female IDPs can be significantly reduced. Overall, Adams’ study sheds light on the challenges of forced displacement and coping strategies employed by displaced women in selected IDP camps in Nigeria, emphasizing the role of CAN and other Christian charities in addressing the humanitarian crises faced by female IDPs in the study area. While the study explored the challenges faced by IDPs in Borno State, it focused more on the plight of women and children in IDP Camps in Nigeria from 2015 to 2020.

Olanrewaju and Omotoso (2018) examined the challenges faced by displaced women in selected IDP camps in Nigeria, with a particular focus on the lack of adequate care and financial resources. The study utilized a qualitative approach, employing a descriptive survey and conducting focus group discussions to gather responses from the participants. The study’s main findings highlighted that the lack of adequate care and financial resources were the significant challenges affecting displaced women. Economic opportunities were identified as the most significant coping strategy employed by these women. The data generated from the study aimed to contribute to the development of a framework for implementing global best practices in the management of internal displacement in Nigeria. The study objectives revolved around assessing the challenges linked to internal displacement in Nigeria and exploring the coping strategies adopted by displaced women. The study design used a qualitative approach to conduct focus group discussions and a descriptive survey. The sample population consisted of all Boko Haram terrorism-displaced women living in selected IDP camps in Nigeria, with a total of 116 respondents. The participants were divided into different groups based on their marital status and age. The focus group discussions were audio-recorded, transcribed verbatim, and subjected to qualitative and quantitative analysis. It is important to note that no specific intervention was provided to the study participants as the primary focus of the research was to assess the challenges associated with internal displacement in Nigeria and explore the coping strategies adopted by displaced women. Based on the findings, the study put forth several policy recommendations. These recommendations included the adoption of a legal and institutional framework for managing internal displacement, the development of a national displacement policy, and the necessity to evaluate intra-gender vulnerabilities and implement targeted interventions to address the specific needs of displaced women. While the study shares some semblance with the theme of the present study, unlike the present study, the focus is on the general plight of women and children in IDP camps in Abuja from 2015-2020.

3.0 Methodology

The study employed a survey research design using mixed method for data collection. Both quantitative and qualitative data was used for the study, quantitative data would be gotten by the administration of questionnaires while qualitative data was gotten through key informant interview schedule, purposive sampling technique was used to draw participants for the study from the entire population of IDPs. The data generated using the questionnaires was analyzed using descriptive statistics of frequency counts and percentages, presented in tables. The data generated from the interview schedule was analyzed using the explanation building technique.

4.0 Results

Research Question One: What coping mechanisms are employed by women and children in selected IDP Camps to address the challenges they face and their impact on their resilience and overall human security?

Table 1: Coping Mechanisms and Human Security

StatementStrongly DisagreeDisagreeNeutralAgreeStrongly Agree
I Employ coping mechanisms to address challenges10 (5.1%)20 (10.3%)30 (15.4%)80 (41.0%)55 (28.2%)  
Coping mechanisms contribute to overall human security8 (4.1%)15 (7.7%)25 (12.8%)85 (43.6%)62 (31.8%)

The data in Table 1 suggests that many women and children employ coping mechanisms to address the challenges they face in the IDP camps. Additionally, a notable majority believe these coping mechanisms contribute to their overall human security. This underscores the resilience and agency of women and children in the face of adversity but also emphasizes the importance of supporting and strengthening these coping strategies to enhance human security further.

Respondents’ utilization of coping mechanisms reflects their resilience and adaptive capacity in navigating the challenges of displacement. Strengthening these coping strategies is essential for promoting human security and well-being among displaced populations. Efforts to support and empower women and children in the IDP camps should focus on enhancing their access to resources and opportunities that enable them to cope effectively with adversity.

Research Question Two: How effective are the coping mechanism employed by women and children in the selected IDP Camps in promoting human security?

Table 2: Effectiveness of Interventions

StatementStrongly DisagreeDisagreeNeutralAgreeStrongly Agree
Interventions effectively address human security needs12 (6.2%)20 (10.3%)35 (17.9%)85 (43.6%)43 (22.1%)

Responses to Table 2 regarding the effectiveness of interventions in addressing human security needs indicate a mixed perception among respondents. While a significant proportion agree that interventions effectively address these needs, a notable number express disagreement or neutrality. This highlights the importance of evaluating existing interventions to identify gaps and areas for improvement in ensuring comprehensive support for displaced populations.

The mixed perceptions regarding the effectiveness of interventions underscore the importance of ongoing evaluation and improvement in humanitarian response efforts. Identifying and addressing gaps in existing interventions is essential for maximizing their impact and ensuring that the needs of displaced populations are adequately met. Strengthening coordination and collaboration among stakeholders is crucial for enhancing the effectiveness and sustainability of interventions in the IDP camps.

The consensus among respondents regarding the need for context-specific recommendations for sustainable improvement in human security highlights the importance of tailored approaches to addressing the unique challenges displaced populations face. Implementing these recommendations is essential for promoting long-term resilience and well-being among women and children in the IDP camps. Failure to act on these recommendations could perpetuate cycles of insecurity and vulnerability, undermining efforts to build a more inclusive and resilient society.

In summary, the quantitative analysis results provide valuable insights into the perceptions and experiences of women, children, and NEMA staff in the IDP camps, highlighting both achievements and areas for improvement in promoting human security and well-being. Addressing the identified challenges and implementing targeted interventions is essential for creating safe, supportive, and sustainable environments for displaced populations in Abuja, Nigeria.

Research Question Three: How effective are the interventions implemented by different stakeholders in addressing the human security needs of women and children in the selected IDP Camps?

Theme 1: Support and Interventions

The qualitative responses shed light on the perspectives of displaced populations regarding the support and interventions provided by humanitarian organizations and government agencies. Participants appreciated the assistance received but highlighted the need for more tailored, sustainable, and inclusive interventions. These findings align with the quantitative data indicating mixed perceptions regarding the effectiveness of interventions, underscoring the importance of addressing gaps in coordination, communication, and resource allocation to maximize the impact of humanitarian response efforts.

“We appreciate the support provided by humanitarian organizations, but more needs to be done to address our specific needs and priorities. There are times when we feel overlooked or marginalized in the aid distribution process.” – Participant J.

“Government agencies and NGOs play a crucial role in assisting, but gaps in coordination and communication need to be addressed. Sometimes, there is duplication of efforts, leading to inefficiencies in resource allocation.” – Participant K

“We need sustainable interventions that empower us to rebuild our lives and regain our independence. Short-term aid is not enough to address the root causes of our displacement. We need long-term solutions that address the underlying drivers of conflict and displacement.” – Participant L.

The qualitative reflections offer critical perspectives on humanitarian actors’ and government agencies’ support and interventions. While quantitative data may assess the effectiveness of interventions in terms of outcomes, qualitative narratives elucidate the processes, dynamics, and underlying challenges shaping the delivery and impact of assistance. Participants’ accounts of appreciating assistance and experiencing gaps in coordination, communication, and inclusivity highlight the complexities and limitations of humanitarian response efforts. These findings underscore the need for participatory, accountable, and context-sensitive approaches to humanitarian action. Strengthening community engagement, promoting transparency and accountability, and fostering partnerships with local actors can enhance interventions’ relevance, responsiveness, and sustainability. By centering the voices and priorities of displaced populations, humanitarian actors can ensure more effective, dignified, and rights-based assistance, ultimately fulfilling human security for all.

5.0 Summary/Conclusion

Most respondents employ coping mechanisms to navigate the challenges of displacement, demonstrating resilience and adaptability. These strategies contribute significantly to overall human security, enhancing safety, well-being, and resilience within the camp environment. Recognizing and supporting these coping mechanisms is crucial for empowering displaced populations and improving their human security. Research emphasizes the importance of community support and adaptive strategies in promoting resilience among displaced individuals.

The majority of respondents believe that interventions effectively address human security needs, indicating a positive perception of efforts by various stakeholders. These interventions, which focus on preventing and responding to sexual violence and mainstreaming gender-sensitive approaches, are essential for protecting displaced populations. Coordinated efforts by humanitarian agencies, government authorities, and civil society organizations are vital in addressing IDPs’ complex challenges and enhancing their human security within camp settings. The positive impact of these interventions underscores the importance of continued support and collaboration in humanitarian responses.

6.0 Recommendations

Strengthen Community-based Support Systems: Foster community cohesion and social support networks within the IDP camps to promote resilience and mutual assistance among residents. Facilitate community-led initiatives, peer support groups, and cultural activities to strengthen social ties and address psychosocial needs.

Enhance Coordination and Collaboration: Foster collaboration and coordination among humanitarian actors, government agencies, local authorities, and community-based organizations to ensure a coherent and integrated response to the needs of displaced populations. Establish mechanisms for information sharing, joint planning, and monitoring of interventions to maximize effectiveness and minimize duplication of efforts (UNHCR, 2020).

Empower Women and Youth: Empower women and youth as agents of change within the IDP camps by providing opportunities for leadership, skills development, and civic engagement. Promote participation in decision-making processes, community governance structures, and advocacy initiatives to amplify the voices and priorities of marginalized groups (UNDP, 2016).

Strengthen Child Protection Systems: Strengthen child protection systems within the IDP camps to safeguard the rights and well-being of children, including prevention and response to child labor, trafficking, and exploitation. Provide specialized services for vulnerable children, such as reunification with family members, psychosocial support, and access to education and healthcare (UNICEF, 2019).

References

Adams, A., (2021) – Title: Challenges Faced by Displaced Individuals, Particularly Females, in Borno State, Nigeria, Journal of Humanitarian Assistance 10-14.

Aduloju, T., & Pratt, S. (2014). Human Security in International Relations: Theoretical Perspectives and Practical Implications. International Politics Journal, 22(4), 401-415.

Bayar, S., & Aral, M. (2019). Institutional Approaches to Human Security: A Comparative Analysis. Journal of Peace Research, 25(2), 145-160.

Lawal, A. and Mbiba, B. (2020). Human Security in the Northeast Nigeria: Some  Conceptual Reflection. In International Conference on Engineering, Applied Sciences and System Modeling (pp. 397-409). Springer, Cham.

Lawal, A., & Mbiba, B. (2020). The Role of Human Security in Conflict Resolution: A Case Study of Nigeria. Conflict Resolution Quarterly, 38(3), 321-335.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370-396.

Maslow, A. H. (1954). Motivation and personality. Harper & Row.

Max Neef, M. (1991). Human scale development: Conception, application, and further reflections. Apex Press.

OCHA (2019): United Nations Office for the Coordination of Humanitarian Affairs. (2019). Sexual Exploitation and Abuse in Internal Displacement Camps: An Overview.

OCHA (2022). World Humanitarian Data and Trends. Journal of Humanitarian Studies, 17(1), 45-59.

Olanrewaju, A. M., Omotoso, S., & Alabi, O. (2018). Environmental governance and internal displacement in Nigeria: issues, challenges, and prospects. International Journal of Scientific & Engineering Research, 9(10), 130-139.

Osagioduwa, E. O., & Oluwakorede, O. (2016). Understanding the dynamics and causes of internal displacement: a case study of Nigeria. African Journal of Interdisciplinary Studies, 2(1), 1-16.

Titko, A., & Kurtynet, B. (2019). Understanding Human Security: Conceptual Foundations and Contemporary Debates. Security Studies, 28(1), 89-105.

Szpak, M. (2015). Human Security: A Comprehensive Overview. Journal of International Relations, 41(3), 321-335.

Woldetsadik, T. (2018). Human Security and Development: A Case Study of Ethiopia. Development Policy Review, 36(4), 489-506.

IDMC (2020). Internal Displacement: Global Overview of Trends and Developments in 2019. Disaster Studies Journal, 18(3), 201-215.

IDMC (2021). Internal Displacement: Global Overview of Trends and Developments in 2020. Journal of Global Humanitarian Action, 5(2), 110-125.

UNDP, 2018: United Nations Development Programme (UNDP). (2018). Human Development Indices and Indicators: 2018 Statistical Update. Retrieved from http://hdr.undp.org/sites/default/files/2018_human_development_statistical_update.pdf

UNHCR. (2019). Report on the Protection of Internally Displaced Persons.

UNDP. (1994). Human Development Report 1994: New Dimensions of Human Security. Retrieved from http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.p

UNDP. (1994). Human Development Report 1994: New Dimensions of Human Security. Retrieved from http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.p

UNDP. (1994). Human Development Report 1994: New dimensions of human security. Oxford University Press.Gasper, 2023

UNDP. (1994). Human Development Report 1994: New dimensions of human security. United Nations Development Programme.

UNDP. (2016). Human Development Report 2016: Human Development for Everyone.

UNDP. (2012). Human Development Report 2012: Sustainability and Equity: A Better Future for All. Retrieved from http://hdr.undp.org/sites/default/files/reports/249/hdr_2012_en_complete.pdf

United Nations Guiding Principles on Internal Displacement. (2015). United Nations Human Rights Council. Retrieved from https://www.refworld.org/pdfid/43f7b8832.pdf

UNHCR. (2012). Refugee children: Guidelines on protection and care. United Nations High Commissioner for Refugees.

UNHCR. (2016). Global trends: Forced displacement in 2016. Retrieved from https://www.unhcr.org/statistics/unhcrstats/5943e8a34/global-trends-forced-displacement-2016.html

UNHCR. (2018). UNHCR Policy on Age, Gender and Diversity Mainstreaming and Vulnerable Children Living in a World with HIV/AIDS.

Modeling Business Capabilities and Processes: Techniques and Practical Applications

Daily writing prompt
What could you do more of?

Dr. Raj Vayyavur, Senior, IEEE

 rvayyavur@gmail.com

 Abstract— Capability and process modeling are critical techniques in enterprise architecture (EA) that help align business strategies with IT infrastructure. These methods offer structured approaches for organizations to visualize, assess, and optimize their competencies, processes, and dependencies. This paper explores several key modeling techniques, including business capability modeling, process mapping, and dependency mapping, using real-world use cases from industries such as telecommunications, healthcare, banking, and broadcasting. These case studies illustrate how organizations can improve alignment between operations and business objectives, enhancing overall efficiency and decision-making.

Keywords Capability Modeling, Process Mapping, Dependency Mapping, Business-IT Alignment, Enterprise Architecture, Telecommunications, Healthcare, Banking, TOGAF, Gartner, Operational Efficiency, Strategic Decision-Making

Photo by Lukas on Pexels.com

I. INTRODUCTION

    In today’s fast-paced and technology-driven environment, organizations across industries are continuously challenged to optimize their operations and stay competitive. The convergence of business and IT strategies has become more critical than ever, as companies seek to leverage technology not only to streamline processes but also to achieve their broader strategic goals. Enterprise Architecture (EA) frameworks, particularly those centered on capability and process modeling, play a pivotal role in ensuring that businesses can adapt and thrive in such complex landscapes.

Capability and process modeling have emerged as fundamental tools within enterprise architecture, enabling organizations to capture and visualize their core competencies, workflows, and the relationships between different systems and processes. These modeling techniques allow businesses to gain deeper insights into their operations, identify inefficiencies, and make informed decisions that improve both operational efficiency and alignment between business and IT [1]. As organizations become more dependent on technology to drive innovation and growth, the importance of these models in managing complexity and enabling transformation cannot be overstated.

One of the significant challenges faced by enterprises today is the growing need to ensure that IT systems and business processes are not only aligned but also flexible enough to support rapid change. Organizations are increasingly turning to capability models to assess their current competencies and identify gaps that may hinder their ability to respond to evolving market conditions [2]. These models provide a structured approach to assessing an organization’s readiness to meet future demands, offering a roadmap for where to invest in technology or process improvements.

Process modeling, on the other hand, provides a lens through which organizations can examine their operational workflows in detail. By mapping out the flow of work and decision points, organizations can better understand how activities are carried out and where inefficiencies or bottlenecks occur. This enables businesses to implement targeted solutions, such as process automation or system upgrades, that drive greater efficiency and reduce operational costs [3]. Dependency mapping further complements this by offering insights into the interconnections between systems and processes, allowing organizations to anticipate the impact of changes across their operations [4].

The need for capability and process modeling is evident in numerous sectors, including telecommunications, healthcare, banking, and broadcasting, where organizations must manage highly complex environments. For instance, in the telecommunications industry, organizations rely on capability models to assess and manage the growing demand for digital services. In healthcare, process modeling helps streamline patient data management, while in banking, dependency mapping ensures that front-end and backend systems remain in sync as institutions pursue digital transformation strategies [7].

While frameworks such as TOGAF provide guidance on defining capabilities and processes, the application of these models in real-world contexts highlights their tangible benefits. The ability to visualize, assess, and optimize capabilities allows organizations not only to align their operations with their strategic goals but also to remain agile in the face of uncertainty and change [5].

This paper explores the key techniques of capability modeling, process mapping, and dependency mapping, examining their practical applications across various industries. Through real-world use cases, we will demonstrate how these models can be leveraged to enhance organizational efficiency, improve decision-making, and better align business strategies with IT capabilities.

Fig.1. Key Concepts of Capability & Process Modeling

II. GENERAL CONCEPTS OF CAPABILITY & PROCESS MODELING

A. Business Capability Modeling

Business capability modeling captures the abilities required by an organization to achieve its objectives. Capabilities encompass people, processes, technology, and information. A well-defined capability model aligns business strategies with operational execution, providing a holistic view of the organization’s abilities. Capabilities can be mapped and evaluated based on maturity, guiding decision-making for process improvements or IT investments.

B. Process Mapping

Process mapping visually represents workflows, decisions, and information flows across an organization. By creating visual models of processes, organizations can gain insight into how work is carried out, where inefficiencies exist, and how IT systems can support workflows. Process mapping is vital for identifying bottlenecks, improving coordination, and streamlining operations.

C. Dependency Mapping

Dependency mapping identifies relationships between business capabilities, processes, and IT systems. This technique helps organizations understand how changes in one area impact others. Dependency mapping ensures that organizations make informed decisions about process changes or technology upgrades without disrupting critical business operations.

III. DEFINING CAPABILITIES: TOGAF Vs. GARTNER APPROACHES

    Different frameworks offer distinct methods for defining capabilities. Two commonly used frameworks are TOGAF and Gartner, each providing unique advantages.

A. TOGAF’s Noun-Based Approach

TOGAF defines capabilities using nouns, emphasizing what the organization can do. Examples include:

·         Resource Management

·         Customer Service

·         Product Development

This approach provides a structured, high-level view of the organization’s capabilities, focusing on outcomes and categories [5].

B. Gartner’s Verb-Based Approach

Gartner’s model uses verbs to define capabilities, making them more action-oriented and focused on processes. For example:

·         Plan and Manage Resources instead of Resource Management

·         Deliver Customer Service instead of Customer Service

·         Design and Develop Products instead of Product Development

By defining capabilities with verbs, organizations can focus on processes and actions that drive outcomes, making the model more dynamic and actionable [6].

C. TOGAF vs.  Gartner Approach

TOGAF (Noun-Based)Gartner (Verb-Based)
Resource ManagementPlan and Manage Resources
Customer ServiceDeliver Customer Service
Product DevelopmentDesign and Develop Products
Risk AssessmentAssess and Mitigate Risks
Financial PlanningPlan and Execute Financial Strategy

Table 1. TOGAF vs. Gartner Approaches

TOGAF offers a high-level structure, while Gartner’s approach focuses more on the processes that drive results. Both methods are valuable, depending on the organization’s goals and context.

IV. KEY TECHNIQUES & REAL USE CASES

A. Business Capability Modeling: Telecom Industry

A telecommunications company applied business capability modeling to manage rising demand for DSL services. The company mapped key capabilities, including network planning, demand forecasting, and customer service management, identifying inefficiencies in resource allocation. By assessing the maturity of each capability, the company prioritized investments in areas that were critical but underdeveloped. For instance, the customer service management capability was identified as a low-maturity, high-priority area, leading to investments in automation and employee training [1].

CapabilityDescriptionMaturity LevelPriority for Investment
Network PlanningAbility to manage infrastructure for service deliveryMediumHigh
Customer Service ManagementHandling customer inquiries and technical issuesLowHigh
Demand ForecastingPredicting future customer demand for DSL servicesHighLow

Table 2. Telecommunications Capability Model

This approach enabled the telecommunications company to align its IT infrastructure with business needs, ensuring that investments were made in areas that had the greatest impact on service delivery and customer satisfaction.

B. Process Mapping: Healthcare Industry

A healthcare organization used process mapping to streamline patient data management and billing workflows. The initial process maps revealed inefficiencies such as repetitive data entry and manual handoffs between departments, leading to delays in billing and patient care. By visualizing these processes, the organization introduced automated systems to integrate patient records across departments, reducing errors and improving the speed and accuracy of billing [2].

Fig.2. Process Mapping in Healthcare

Process mapping allowed the healthcare provider to automate repetitive tasks, improve information flow, and enhance overall service efficiency.

C. Dependency Mapping: Banking Industry

A banking institution used dependency mapping to assess relationships between its digital banking systems and backend legacy systems. The bank aimed to enhance its online and mobile banking services but found that upgrading the front-end systems would overwhelm the backend legacy infrastructure. Through dependency mapping, the bank identified dependencies that required simultaneous upgrades to the backend systems to avoid bottlenecks [3].

Front-End SystemDependent Backend SystemsUpgrade Needed
Mobile Banking AppCore Banking, Fraud DetectionYes
Web-Based Banking PlatformCore Banking, Customer Data SystemsYes
ATM NetworkLegacy Systems, Customer RecordsNo

Table 3. Inter-organizational Capability Sharing in Broadcasting

Dependency mapping enabled the bank to prioritize system upgrades, ensuring smooth integration between front-end and backend operations.

Fig.3. Dependency Mapping for Banking Digital Services

D. Inter-organizational Collaboration: Broadcasting Industry

In the broadcasting industry, inter-organizational collaboration is increasingly important as companies seek to pool resources and share capabilities. Several broadcasting companies used business capability maps to align their operations for joint ventures in content distribution and technology sharing. By developing a shared capability map, the companies identified areas of synergy and reduced costs through resource sharing [4].

CapabilityCompany A ContributionCompany B Contribution
Content DistributionInfrastructure for video streamingLicensing agreements for content
Customer Relationship ManagementCall center servicesCRM software and data analytics
Advertising and SponsorshipsPartner relationships with advertisersProgrammatic ad-buying systems

Table 4. Inter-organizational Capability Sharing in Broadcasting

The use of business capability maps allowed the broadcasting companies to leverage each other’s strengths, reducing operational costs and improving service delivery.

V. CONCLUSION

    Capability and process modeling are vital techniques for aligning business strategies with operational execution. By using methods like business capability modeling, process mapping, and dependency mapping, organizations can visualize their competencies, streamline workflows, and optimize resources.

Real-world examples from telecommunications, healthcare, banking, and broadcasting industries demonstrate how these modeling techniques help organizations improve business-IT alignment, enhance operational efficiency, and make informed strategic decisions. Depending on their needs, organizations can choose between TOGAF’s noun-based approach and Gartner’s verb-based approach for defining capabilities.

Acknowledgment

    I would like to express my deepest gratitude to the researchers, scholars, practitioners, and experts whose invaluable contributions have laid the foundation for this research. Your dedication, insights, and pioneering work have been instrumental in shaping the understanding and knowledge within this field. Without your relentless pursuit of excellence, this research would not have been possible. Thank you for your commitment to advancing the boundaries of knowledge, which continues to inspire and guide future endeavors.

References

[1] T. Barroero, G. Motta, and G. Pignatelli, “Business Capabilities Centric Enterprise Architecture,” in IFIP TC 5 International Conference on Enterprise Architecture, Integration, and Interoperability, Brisbane, Australia, 2010.

[2] F. Yilmaz, O. Schmidt, and F. Matthes, “Interorganizational Business Capability Maps: Use Cases for Horizontal Collaboration,” in Proceedings of the Americas Conference on Information Systems (AMCIS), Montreal, 2021.

[3] S. Kurnia, P. Taylor, S. Kotusev, and G. Shanks, “Artifacts, Activities, Benefits, and Blockers: Exploring Enterprise Architecture Practice in Depth,” in Proceedings of the Hawaii International Conference on System Sciences (HICSS), 2020.

[4] F. Yilmaz et al., “Deriving a Process for Interorganizational Business Capability Modeling through Case Study Analysis,” in Proceedings of the International Conference on Enterprise Information Systems (ICEIS), 2021.

[5] The Open Group, The TOGAF Standard, 10th Edition — A Pocket Guide, Van Haren Publishing, 2022.

[6] T. Barroero, G. Motta, and G. Pignatelli, “Business Capabilities Centric Enterprise Architecture,” in Proceedings of the IFIP TC 5 International Conference on Enterprise Architecture, Integration, and Interoperability, 2010.

[7] N. Rohani, “Leveraging Enterprise Architecture in Decision-Making,” University of Kebangsaan Malaysia, 2020.

[8] K. Bakhtiyari, A. R. Barros, and N. Russell, “Enterprise Architecture for Business Network Planning: A Capability-Based Approach,” in Proceedings of the International Conference on Advanced Information Systems Engineering, Springer, Cham, 2015, pp. 257-269.

[9] J. Fleischer, M. Herm, and J. Ude, “Business Capabilities as Configuration Elements of Value-Added Networks,” Production Engineering, vol. 1, no. 2, pp. 187-192, 2007.

[10] G. Bondel, A. Faber, and F. Matthes, “Reporting from the Implementation of a Business Capability Map as a Business-IT Alignment Tool,” in Proceedings of the 22nd International Enterprise Distributed Object Computing Workshop (EDOCW), IEEE, 2018, pp. 125-134.

[11] S. Chopra and M. S. Sodhi, “Supply-Chain Breakdown: Understanding the Risks,” MIT Sloan Management Review, vol. 46, no. 1, pp. 53-61, 2004.

[12] T. Mueller, D. Schuldt, B. Sewald, M. Morisse, and J. Petrikina, “Towards Inter-Organizational Enterprise Architecture Management: Applicability of TOGAF 9.1 for Network Organizations,” in Proceedings of the 19th Americas Conference on Information Systems, Chicago, IL, 2013.

[13] K. Provan and P. Kenis, “Modes of Network Governance: Structure, Management, and Effectiveness,” Journal of Public Administration Research and Theory, vol. 18, no. 2, pp. 229-252, 2008.

[14] A. Aleatrati Khosroshahi, M. Hauder, S. Volkert, F. Matthes, and M. Gernegroß, “Business Capability Maps: Current Practices and Use Cases for Enterprise Architecture Management,” in Proceedings of the 51st Hawaii International Conference on System Sciences (HICSS), 2018.

[15] G. Toppenberg, S. Henningsson, and G. Shanks, “How Cisco Systems Used Enterprise Architecture Capability to Sustain Acquisition-Based Growth,” MIS Quarterly Executive, vol. 14, no. 4, pp. 151-168, 2015.

[16] F. Matthes, F. Yilmaz, and O. Schmidt, “Interorganizational Business Capability Maps: Use Cases for Horizontal Collaboration,” Americas Conference on Information Systems (AMCIS) Proceedings, 2021.

[17] The Open Group, The TOGAF Standard, Version 9.2: A Pocket Guide, Van Haren Publishing, 2018.

[18] D. Ulrich and M. Rosen, “The Business Capability Map: The ‘Rosetta Stone’ of Business/IT Alignment,” Cutter Consortium Enterprise Architecture, vol. 24, no. 4, 2011.

[19] P. Runeson and M. Höst, “Guidelines for Conducting and Reporting Case Study Research in Software Engineering,” Empirical Software Engineering, vol. 14, no. 2, pp. 131-164, 2009.

[20] R. K. Yin, Case Study Research and Applications: Design and Methods, 6th ed., Sage Publications, 2017.

AUTHOR

Dr. Raj Vayyavur (Senior, IEEE) is a distinguished transformation expert, practitioner, and leader in the IT field with over two decades of experience. He currently serves as the Director of Enterprise Architecture at Public Consulting Group (PCG). His comprehensive expertise spans Enterprise Architecture (EA), Artificial Intelligence (AI), Project Portfolio Management, Software Engineering, IT Management & Governance, and more. Dr. Vayyavur is renowned for his strategic vision, deep technological expertise, and strong business acumen, which he uses to lead transformative initiatives that align IT strategies with business objectives, driving organizational success and delivering measurable outcomes.

A prolific author, Dr. Vayyavur has published numerous research papers on technology, enterprise architecture, and project portfolio management, solidifying his position as a thought leader in the field. His work has been featured in leading journals and conferences, offering actionable insights and bridging the gap between theory and practice. He frequently speaks at prestigious forums, including IEEE conferences, where he shares his insights on the latest trends in technology and enterprise architecture.

Holding advanced degrees in Computer Science, Business Administration, an MBA, and a Doctorate, Dr. Vayyavur is committed to continuous learning and staying at the forefront of industry developments. His active participation in the IEEE and PMI communities, where he serves as a senior member, reviewer, judge, and chair for various committees, further reflects his dedication to advancing the field.

Through his visionary leadership, Dr. Vayyavur has set new standards for technology management, earning recognition as a sought-after transformation expert known for driving innovation and excellence in every project he leads.


 

The Influence of Emotional Maturity and Self-Control on Aggressiveness among Students Participating in Martial Arts

Daily writing prompt
What could you do more of?

Rimshayelly Fitri

Gunadarma University, Faculty of Psychology, Jl. TB Simatupang Pasar Minggu, Jakarta Selatan, Indonesia

ABSTRACT

This study aims to look at measuring the emotional maturity with self control towards aggressiveness in students who follow the martial arts. In this study using 75 participants. Participants are students, both male and female who follow the martial arts for at least a year. The data collection technique used in this study was purposive sampling technique. The analysis in the study used multiple regression tests. The results showed that there was a significant effect of 19%, which means that there was an influence between emotional maturity and self control on agressiveness in students who follow the martial arts.

Keywords: Student, Emotional Maturity, Self control, Aggressiveness, Martial arts

Photo by Matheus Natan on Pexels.com

INTRODUCTION

Aggressiveness or violent behavior is not a new phenomenon in Indonesia. Every year, there are numerous cases of violence occurring within society, such as murder, robbery, kidnapping, rape, brawls, and many more. This aggressive behavior is highly detrimental to the community, not only in terms of material loss but also in causing fatalities that lead to trauma and deep sorrow for the victims’ families.

According to data obtained from the police registration records (Sub-directorate of Political and Security Statistics, 2014), crime incidents in Indonesia during the 2011–2013 period tended to fluctuate. The total number of crime incidents, or crime totals, decreased from around 347,000 cases in 2011 to approximately 341,000 cases in 2012. However, in 2013, it increased again to around 342,000 cases.

Mass brawls during the 2005–2011 period included fights between groups of residents, fights between villagers, fights between residents and security forces, and fights between students or university students, as well as inter-ethnic fights. The percentage of villages that managed to resolve conflicts between residents and fights between students or university students in 2011 was 90.83% and 86.21%, respectively. Meanwhile, the coverage for resolving conflicts between residents and security forces and inter-ethnic fights was only 72.22% and 83.33%, respectively. From the above data, it can be concluded that mass brawls occurred most frequently among residents and students (Sub-directorate of Political and Security Statistics, 2014).

Every person has the right to receive a proper education, security, and comfort. However, in reality, many students still experience violence and even die tragically. One such case involved a student from an outdoor activity club at a university in Yogyakarta. An activity that was supposed to provide meaning and good experience ended tragically due to violent behavior by senior students towards juniors (Rudiana, 2017).

The aggressive phenomena mentioned above also occur among students involved in martial arts activities, such as karate, taekwondo, jiu-jitsu, judo, hapkido, wrestling, taido, taijutsu, pencak silat, kung fu, and muay thai. Mashudi (2011) reported a violent incident involving a student martial arts member in Kediri. This violent behavior involved two martial arts schools, namely Kera Sakti and PSHT. Bony (22), a PSHT warrior, was beaten by about nine members of Kera Sakti at his boarding house. A duel ensued, with several moves exchanged between the victim and his attackers. The victim was punched and kicked, sustaining injuries, but they were not severe.

Martial arts, which should serve as a means of self-defense, is regrettable if the knowledge acquired is misused, for instance, to assert dominance, engage in brawls, rob, or deliberately harm others. Ideally, martial arts should be used to protect oneself only when there is a threat to oneself or others. In karate, for example, before starting training, there is an opening ceremony and a recital of the karate oath, which includes maintaining personality, adhering to honesty, striving for excellence, preserving etiquette, and mastering self-control. Based on these five principles, the researcher concludes that karate is not only about physical strength or demonstrating power but also about character development and self-control, both inside and outside the dojo.

According to Allen and Anderson (2017), aggressive behavior is intended to harm someone who does not wish for such an event. To control aggression, self-control is essential in an individual.

When talking about self-control, every individual should be able to restrain themselves from actions that could harm themselves or others, focus more easily on achieving goals, choose beneficial actions, demonstrate emotional maturity, and not be easily influenced by impulses or actions that provide temporary pleasure (Hurriyati, 2013). According to Nofziger (2001), self-control is the ability and willingness to resist temptations in situations that may hinder long-term goals and delay gratification. Nofziger also states that self-control is the ability to manage emotional impulses, thus suppressing tendencies toward undesirable behavior. Therefore, good self-control in a person is necessary to avoid aggressive actions. This is consistent with the findings of Hurriyati’s (2013) study, which suggests that self-control can be used to predict aggressive behavior.

In addition to self-control, the vulnerability of emotional maturity is also a factor in controlling aggressive behavior. Emotional maturity is a state or condition of achieving a level of emotional maturity and development, whereby the individual no longer exhibits emotional patterns that are inappropriate for social settings (Sarwono, 2017). Pastey and Aminbhavi (2006) describe emotionally mature individuals as those who can manage their emotional lives effectively.

The purpose of this study is to empirically examine the influence of emotional maturity and self-control on aggressiveness among students involved in martial arts activities.

RESEARCH METHODS

This study uses a quantitative approach and involves 75 students as participants. The participants are active students who have participated in martial arts student organizations for at least one year. Data collection was conducted using a questionnaire method. The sampling technique used was purposive sampling, which is a sample selection based on specific criteria (Sugiyono, 2009).

The measurement tools used in this study include three variables: emotional maturity (X1), self-control (X2), and aggressiveness (Y). The emotional maturity scale used in this research is based on the emotional maturity scale by Singh and Bhargavawas (1990), which measures five aspects of emotional maturity, such as emotional stability, emotional development, social adjustment, and integration. This scale consists of 41 items. After calculating item discrimination, 8 items were discarded. The remaining 33 items have a reliability of 0.896. One example of an item on this scale is, “When I am angry, I feel like fighting with others.”

The self-control scale is based on Tangney’s self-control scale (2004) consisting of 21 items, covering aspects such as self-discipline, non-impulsive actions, healthy lifestyle, work ethic, and reliability. After item discrimination analysis, 2 items were removed, leaving 19 items with a reliability of 0.853. An example of an item on this scale is, “I am able to control my emotions in stressful situations.”

The aggressiveness scale used in this study is based on the aspects of aggressiveness described by Buss and Perry (1992), including physical aggression, verbal aggression, anger, and hostility. This scale consists of 24 items. After item discrimination analysis, no items were discarded. The reliability of this scale is 0.873. An example of an item on this scale is, “Sometimes I cannot control the urge to hit someone.”

RESULTS AND DISCUSSION

Based on the research findings, a regression test was conducted to determine the influence of emotional maturity on aggressiveness. The results of this simple regression analysis show an F value of 0.004 and a significance coefficient of 0.947 (p≤0.005). Additionally, the R square value obtained is 0.000, indicating that the influence of emotional maturity on aggressiveness is 0%. The regression test results can be seen in Table 1 below.

Table 1. Regression Test Results of Emotional Maturity on Aggressiveness

FSigR Square
0.0040.9470.000

Based on the regression test results in Table 2 below, a test was conducted to determine the influence of self-control on aggressiveness. The regression analysis shows an F value of 16.142 and a significance coefficient of 0.000 (p≤0.005). These results indicate that the aggressiveness variable is influenced by the self-control variable. Furthermore, the R square value obtained is 0.181, indicating that the influence of self-control on aggressiveness is 18.1%, while the remaining 81.9% is influenced by other factors not explained in this study.

Table 2. Regression Test Results of Self-Control on Aggressiveness

FSigR Square
16.1420.0000.181

Based on the regression test results in Table 3 below, a test was conducted to determine the influence of emotional maturity and self-control on aggressiveness. The results of this multiple regression analysis show an F value of 8.439 and a significance coefficient of 0.001 (p≤0.005). These results indicate that the aggressiveness variable is influenced by both emotional maturity and self-control variables. Additionally, the R square value obtained is 0.190, indicating that the influence of emotional maturity and self-control on aggressiveness is 19%, while the remaining 81% is influenced by other factors not explained in this study.

Table 3. Regression Test Results of Emotional Maturity and Self-Control on Aggressiveness

FSigR Square
8.4390.0010.190

Based on the hypothesis testing results, it is found that emotional maturity does not affect aggressiveness, while self-control does affect aggressiveness (minor hypothesis), and emotional maturity and self-control together affect aggressiveness among students participating in martial arts (major hypothesis). From these two hypotheses, it is found that the minor hypothesis in this study is rejected, and the major hypothesis is accepted. This indicates that emotional maturity and self-control together have an influence on aggressiveness. However, emotional maturity alone does not affect aggressiveness.

The lack of influence of emotional maturity on aggressiveness may be due to other factors that have a greater impact on aggressiveness. Aggressiveness can be influenced by internal factors, external factors, environmental stressors, and situational stimuli. Internal factors influencing aggressiveness include genes, hormones, emotions, stress, instincts, blood chemistry, frustration, and self-concept. External factors include family, peers, neighbors, and school (Susantyo, 2011).

Steffgen and Gollwitzer (2007) stated that emotional maturity is not just a symptom in aggressive behavior; other factors can also influence aggressive behavior, such as triggers, amplifiers, moderators, or even ultimate goals of aggressive behavior.

According to Susantyo (2011), understanding the complexity of aggressive behavior allows for the development of a comprehensive strategy to address the issues in individuals (perpetrators), particularly their behavior.

Self-control has an influence on aggressiveness of 18.1%. Self-control is closely related to reducing the risk of psychosocial problems, such as delinquency and aggressiveness. Factors that weaken self-control increase aggression, while factors that strengthen self-control reduce aggression (DeWall, Finkel, & Denson, 2011).

This is in line with the theory of Goldfield and Merbaum (Indraprasti & Rachmawati, 2008), which defines self-control as the ability to organize, guide, regulate, and control impulses within oneself, directing behavior toward positive consequences. Self-control varies between individuals; some have high self-control, while others have low self-control. Individuals with high self-control can change events and act as the main agents in directing behavior toward positive consequences.

The findings of this study are supported by previous research conducted by Asmoro, Matulessy, and Meiyuntariningsih (2018), which found that the higher the self-control, the lower the aggressive behavior, and vice versa. Individuals with good self-control tend to direct themselves positively and not harmfully.

Emotional maturity and self-control have a significant influence on aggressiveness, amounting to 19%. The findings of this study are supported by previous research conducted by Hurriyati (2013), which indicated a significant relationship between emotional maturity and self-control with aggressive behavior. Behavior is considered aggressive if it shows actions such as physical assault, object assault, verbal or symbolic attack, violating property rights, or attacking someone else’s possessions. Individuals with good emotional maturity and self-control tend to be able to reduce aggressive behavior. Further, Meldrum, Young, and Weerman (2009) stated in their study that individuals with a high level of emotional maturity tend to have better self-control, preventing aggressive behavior. With such self-control, individuals can weigh options and make appropriate decisions for their problems.

Hurlock (2012) states that emotionally mature individuals will have good self-control, can express their emotions appropriately and according to the situation, and can adapt well, providing appropriate responses to the circumstances they are experiencing.

In Puspitasari’s (2018) study, it was found that the lower the emotional maturity, the higher the aggressive behavior. Individuals with high emotional maturity tend to remain optimistic in facing difficult tasks beyond one’s expectations and are not easily provoked by negative emotions or easily offended. They also have a high level of patience, do not like to impose their opinions, and do not need to struggle to solve problems.

Emotional maturity is a state or condition of achieving a level of maturity in emotional development, where the individual is involved in emotional control (Guswani & Kawuryan, 2011).

With good emotional maturity and self-control, individuals can avoid aggressive actions that may harm themselves and others. Each individual has a mechanism that helps regulate and direct behavior. Based on this study, it is clear that emotional maturity and self-control are factors influencing aggressive behavior.

CONCLUSIONS AND RECOMMENDATIONS

Based on the results of this study, it can be concluded that emotional maturity alone does not have an effect on aggressiveness, while self-control alone does have an effect on aggressiveness. However, emotional maturity and self-control together can influence aggressiveness. This indicates that the higher the emotional maturity and self-control, the lower the aggressiveness in students participating in martial arts.

REFERENCES

  1. Allen, J. J., & Anderson, C. A. (2017). Aggression and Violence: Definitions and Distinctions. In The Wiley Handbook of Violence and Aggression. Doi: 10.1002/9781119057574. whbva001.
  2. Asmoro, A.R., Matulessy, A., & Meiyuntariningsih, T. (2018). Kematangan emosi, kontrol diri, dan perilaku agresif pada anggota korps brigade mobil dalam menangani huru hara. Jurnal Psikologi Teori dan Terapan, 9(1), 39-48.
  3. Buss, A.H., & Perry, M. (1992). Personality process and individual differences; the aggression questionnaire. Journal of Personality and Social Psychology, 63(3) 452-459. 12
  4. DeWall, N.C., Finkel E.J., & Denson, T.F. (2011). Self control inhibits aggression. Social and Personality Psychology Compass, 5(7) 458-472.
  5. Guswani, A. M., & Kawuryan, F. (2011). Perilaku agresi pada mahasiswa ditinjau dari kematangan emosi. Jurnal Psikologi Pitutur, 1(2), 86-92.
  6. Hurlock, E. (2012). Psikologi perkembangan: Suatu pendekatan sepanjang rentang kehidupan. Jakarta : Erlangga.
  7. Hurriyati, D. (2013). Hubungan antara kontrol diri dengan perilaku agresif pada anggota polisi resot pagar alam. Jurnal Ilmiah Psyche, 9 (1), 39-48.
  8. Indraprasti, D. & Rachmawati, M. A. (2008) Hubungan antara kontrol diri dengan perilaku minum-minuman keras pada remaja lakilaki. (Naskah Publikasi Tidak Diterbitkan.) Yogyakarta; Program Studi Psikologi Fakultas Psikologi Dan Ilmu Sosial Budaya Universitas Islam Indonesia.
  9. Mashudi, D. (2011, 20 November). Bentrok satu pendekar psht vs sembilan pendekar kera sakti di kediri. Diakses pada 18 April 2022, darihttps://www.tribunnews.com/regional/2011/11/20/bentrokpendekarpshtvs9pendekar-kerasakti-di-kediri.
  10. Meldrum, R. C., Young, J. T., & Weerman, F. M. (2009). Reconsidering the effect of selfcontrol and delinquent peers: Implications of measurement for theoretical significance. Journal of Research in Crime and Delinquency, 46(3), 353-376.
  11. Nofziger, S. (2001). Bullies, fight, and guns: Testing selfcontrol theory with juveniles. Washington: LFB Scholarly Publishing LLC.
  12. Pastey, G. S., & Aminbhavi, V. A. (2006). Impact of emotional maturity on stress and self confidence of adolescents. Journal of the Indian Academy of Applied Psychology, 32(1), 66–70.
  13. Rudiana, A.P. (2017, 25 Januari). Kasus mapala UII, korban sebut nama senior sebelum wafat. Diakses pada 20 April 2022,  dari https://nasional.tempo.co/read/839762/kasus-mapala-uii-korban-sebut-nama-senior-sebelum-wafat.
  14. Sarwono, S.W. (2017). Psikologi sosial. Jakarta: Salemba Humanika
  15. Singh, Y., & Bhargava, M. (1990). Manual foremotional maturity scale. Agra: National Psychological Corporation.
  16. Sub Direktorat Statistik Politik dan Kemanan. (2014). Statistik kriminal. Jakarta : Badan Pusat Statistik.
  17. Sugiyono. (2009). Metode penelitian kuantitatif dan kualitatif. Bandung: CV. Alfabeta.
  18. Susantyo, B. (2011). Memahami perilaku agresif. Sebuah Tinjauan Konseptual, 16(03).
  19. Steffgen, G. & Gollwitzer, M. (2007). Emotions and aggressive behavior. Gottingen: Hogrefe.
  20. Tangney, J. P., Baumiester, R. F., & Boone, A. L. (2004). High self control predicts good adjusment, less pathology, better grades, and interpersonal success. Journal of Personality, 72(2), 271-3

Art at a Crossroads: Heaney’s Response to the Troubles

Daily writing prompt
What could you do more of?

D M David Mathews

Research Scholar

Department of English

Osmania University, Hyderabad

Abstract

Northern Ireland has been called one of the most violent regions of this world. The Troubles as they are termed now was a period of heightened tensions and violence beginning in the late 1960s that ‘ended’ with the signing of the Good Friday Agreement. Seamus Heaney writing from that region has called out the intractable violence that has been a veritable feature of the region. In doing so, the poet recurrently overturns some symbols and metaphors of romantic poetry, most significantly of the nightingales and swallows. In his first poem itself he referenced digging through which he promised his readers that he will dig through his family history, the history of the turbulent region, and of troubles that flared during the 1970s and 80s. The paper then goes on to raise issues on the role of the artist in such a clime, and how to counter violence that seems endemic. He also calls for a middle ground that offers a place for conciliation and peace.

Keywords: Northern Ireland; Seamus Heaney; overturning romantic symbols; role of the artist; countering violence

Photo by Daian Gan on Pexels.com

Introduction

In 1982, some his poems were included in the Penguin Book of Contemporary British Poetry edited by Blake Morrison and Andrew Motion. To that Heaney wrote a not so flattering rejoinder to them in a poem titled “An Open Letter” (1983): “My anxious muse… has to refuse/ The adjective/ British, no, the name’s not right” (Heaney) [The poem remains an unpublished one in any of his collections]. This is both a rejection of the continuing British suzerainty over Northern Ireland and an assertion of his Irish roots. It is also that, if a poet writes in a certain language, his/her poetry instantly becomes part of its national tradition. Heaney seems to differ. Then again, this is further complicated by the poet choosing to write in English! In an interview with Dennis O’Driscoll, he commented on the force of his writing in English and not in Irish:

The writing current has to flow in your limbs and joints and the linguistic experiences that threw my switches were in English. What happened subsequently was a process of squaring this experiential fact with the cultural and political pieties I grew up with. There were always those old nationalist tests hovering over you: could you be an Irish writer if you wrote in English? Of course, you could, but you were still faced with that screening process (O’Driscoll 73).

In the significant sequence “Singing School”, the poet writes of this ambivalence, a predicament that did not possess easy answers, but posed several other contradictions: “Ulster was British, but with no rights on/ The English lyric: all around us, though/ We hadn’t named it, the ministry of fear” (Heaney Opened Ground 125-126). The poet-persona questions if the region Ulster is indeed British, how come it has no place for the lyric? The people of Ulster seem to be secondary citizens, especially Catholics, rather than a people exercising their free will. The thing that has not been named yet, is the rapid enclosing of Northern Ireland by British paramilitaries, connoting Graham Greene’s work The Ministry of Fear. Perhaps, it could also mean what Michael Parker wrote in his work Seamus Heaney: The Making of the Poet (1993):

…he came to recognize that the ‘gagging’ in the North within both communities, and the unwillingness to confront and speak out against injustices within his own, had been major factors in the explosion of violence (Parker 2).

Seamus Heaney also has a way of overturning some of the symbols of British romantic poetry. The first lines of his beautiful poem “Serenades” from his fourth collection Wintering Out (1972) are worth quoting: “The Irish nightingale/ Is a sedge-warbler,/ A little bird with a big voice/ Kicking up a racket all night (Heaney Opened Ground 72). Though Heaney says it’s just a serenade, these are serious lines. He’s asserting I’m Irish, I’m a nightingale but no I’m not the nightingale of John Keats who sings of summer, sunburnt mirth, and Bacchus. Not only he is incapable of singing hymns but one who not content with keeping himself awake, kicks up a racket and wakes up others. But, why does he want to kick up a racket? Doesn’t he like Keats nightingale sing drowsy songs and go numb? The poet seems to say a firm no. In the next stanzas of the poem he compares his song to “broken voice of a crow,” (75) the “wheeze of bats,” (75) and the hoarse notes of the corncrakes. Perhaps this is the poet’s way of answering the query as to his work being written in English: ‘yes, I will write in the language of my oppressor but I will overturn and transform its images and symbols.’

The very first of his poems’ “Digging” from his first collection Death of a Naturalist (1966) is an illustration of this. In it he promised his readers to use his pen to dig and bring out his family’s history, of his homeland, and of the uneasy relationship between the British and the Irish. He begins with the land because he cannot be a potato planter like his ancestors. He speaks of bogs which reveal the connection of the Irish land to the European continent. In the sixth stanza he says that he carried milk to his father, we find no mention of tea and the leisurely ways of the island that has colonized it. He also makes reference to the violent history of the nation as he says in the very second line, “The squat pen rests; snug as a gun.” And in the last line, which is a repetition of the first two-lined stanza, he almost says it as if he is answering a journalist’s question, “The squat pen rests,/ I’ll dig with it” (Heaney Opened Ground 14-15). There is something very important going on here. It is the use of this particular word ‘squat.’ It is of course a sitting position but also means something else in geographical/ territorial sense. It connotes unlawful occupation of land or territory. The squatting is done through unlawful treaties and phony laws, some thing that is registered in “Act of Union.”

In the beginning of the poem the squat pen rests, that is, the English have occupied and not leaving the Irish lands. It is achieved through the British paramilitary forces and intelligence agencies which regularly foment trouble. Now, of course, it can also mean that Heaney intends to use his pen as a gun, that is, to train his words towards the unlawful occupation. But then, to see this in the light of the last line of the poem in which Heaney says, “I’ll dig with it” (14-15). The gun in the first line is juxtaposed with the digging for potatoes and metaphorically to everything Irish. He’ll unearth not just his family’s past but also the often violent struggles as well. Helen Vendler, one of Heaney’s long-time critics offers this view:

This is to conceive of writing as, like war, politics by other means. It is significant that in this – the first poem in his first book – Heaney rejects the concept of writing as aggression and chooses the spade as his final analogue for his pen: the pen will serve as an instrument of exploration and excavation, yielding warmth (like his grandfather’s turf for fires) and nourishment (like his father’s potatoes) (Vendler 28).

Then again, the poet although abjuring the violence of the gun, in a way is transfixed by the power that comes out if it, both the bullet as well as the power to kill or not unkill, even if it is a horse as in the poem “Turpin Song”: “The horse pistol, we called it:/ Brass inlay smooth in the stock,/ Two hammers cocked like lugs” (Heaney Electric Light 18). In another poem he recalls the exhilaration of the “bullet’s song” (Heaney Seeing Things 75) as he fires it “once and only once” (75) in his life, as it jolts the poet into a “new quickened sense” (75).

“Requiem for the Croppies” an elegiac sonnet from his second collection Door into the Dark (1969) but written quite differently from the sonnets of the English mainland. The poem is an elegy for the Irish rebels who died while fighting the British in 1798. They were inspired by the French Revolution demanding an independent Ireland free of the English rule. The croppies refer to the men who cropped their hair close in the style of the French Republican army. This was a style that was against the wig style, considered aristocratic and supportive of the British rule. Heaney describes the people who marched without training and equipment against a regular army. It was more like hiking than an army marching to the battlefield, with their coats full of barley gains rather than with grenades, ammunition or other weapons. Their weapons were scythes, hardly a match to the heavy cannons of the enemy. The “conclave” which Heaney uses is significant. It is not a conclave where people met to discuss important things or even to elect the Pope, but where thousands were ambushed and slaughtered at Vinegar Hill. And then as a way to complete the cycle of the poem, the barley that the men took with them, got buried with them and in August on the land where thousands were buried “without shroud or coffin” (Heaney Opened Ground 34) there grew barley. Linking the Easter Rising of 1916 with the unsuccessful revolt in 1798, as well as the coming storm of the Troubles, Heaney himself commented:

The oblique implication was that the seeds of violent resistance sowed in the Year of Liberty had flowered in what Yeats called ‘the right rose tree’ of 1916. I did not realise at the time that the original heraldic murderous encounter between Protestant yeoman and Catholic rebel was to be initiated again in the summer of 1969, in Belfast, two months after the book was published (qtd. in Allen 34).

Then he castigates himself for not being part of the rebellion in the fourth poem “Summer 1969” in the series “Singing School.” While the Irish guerilla forces were facing heat from their British counterparts, all Heaney faced is the heat of Madrid. The artist has gone into exile but he cannot fully leave what is happening in his nation. Though he has for companionship James Joyce he can only see and marvel what Goya has painted in his “Shootings of the Third of May.” In this way this poem is an answer to Heaney’s question of the place of the artist in society and more importantly on how they should respond. The poem answers this by affirming the position of Goya. Considered as one of the first paintings of the modern era, the painting “Shootings at the Third of May” depicts a row of soldiers standing with their rifles aiming to shoot down Spanish citizens. The answer through the evocation of the painting of Goya is that… no matter what, it is the responsibility of the artist to portray and document ‘truthfully’ the events that are happening around them, even when they are violent. Lucy McDiarmid argues that this poem might suggest “the possibility that the realm of poetry might be used to oppose the State” (Bloom 43). Thus, Heaney questions himself and provides some answers to the most crucial questions of all… how should an artist respond to violence and civil strife?

“Casualty” offers a much closer view on the question of artists living and writing in a deadened world. The poem is written as an elegy to a family friend of Heaney who was killed in the aftermath of the Bloody Sunday of 1972. This friend questions Heaney on what he is writing in his poems. But then the poet is too shy to talk about his own craft and would rather talk to him on anything but poetry. He calls his writing “tentative art” (Heaney Opened Gound 141) as there are no sides to be taken in the conflict: 

We would be on our own

And, always politic

And shy of condescension,

I would manage by some trick

To switch the talk to eels

Or lore of the horse and cart

Or the Provisionals (Heaney Opened Ground 141-142).

“Making Strange” from Station Island (1984) offers a further answer to this nagging question of the artists responsibility and how she/he should respond to things that happen around her/him. Two sides, one of “travelled intelligence” (202) and the other “unshorn and bewildered,” (202) fight for the poet’s voice, but then a third side crops up. This “cunning middle voice” (202) instructs the poet to “be adept and be dialect” (202). In “England’s Difficulty,” the poet imagines himself during war time as German bombs fall on Belfast, forcing him to move “like a double agent” (Heaney Opened Gound 87), as he tries to reach home. The poem ends with the poet-persona crossing checkpoints, uttering secret passwords to make a turn, and congratulating himself. But then, the poet seems to ask why would he have to do all this if he is in his own country?

I lodged with ‘the enemies of Ulster’, the scullions outside the walls. An adept at banter, I crossed the lines with carefully enunciated passwords, manned every speech with checkpoints and reported back to nobody (Heaney Opened Ground 87).

A similar experience is recorded in “The Flight Path” as the sentry questions where he is from, the poet replies that is comes from “far away” (Heaney The Spirit Level 30), the sentry is unaware of that place as he asks “Where’s that?” (30), to that the poet writes in half-mocking tone: “He’d only half-heard what I said and thought/ It was the name of someplace up the country” (30).

Speaking in dialect and a middle voice is the central theme of “Whatever You Say Say Nothing” from his collection North (1975). Why does Heaney would want to give a title like this. At a first reading it looks ironical… how can anyone say something and say nothing. It can mean that someone can speak a lot and still not say anything… that is, talking pointlessly. Does it mean that the poem is pointless? No, on the contrary the title invites us to be more serious about what Heaney is saying in the poem. To go a little deeper, doesn’t the title sound more like an injunction from someone who does not want the speaker to say anything at all… something like a polite way to stop speaking. And then, doesn’t it also mean that the speaker can speak but only on things that are non-controversial. Heaney here interrogates the role of media and almost urges them to provide a fuller and humane narrative rather than writing the usual descriptive phrases like “backlash,” “provisional wing,” and “long-standing hate” (Heaney Opened Ground 121). He questions the language used by the media to denote the conflict by putting these phrases and others in single-inverted quotations. In the third section of the poem, he writes…

O land of password, handgrip, wink and nod,

Of open minds as open as a trap,

….

Where tongues lie coiled, as under flames lie wicks (Heaney Opened Ground 121-122).

Heaney here writes of the mistrust that dominates the relationship between warring groups. The entire scene is one of a military siege where one has to furnish passwords just to stay alive. Even then they are not sure if they’d live as people’s minds have become traps and anybody could betray anybody. Even with all of this going on Heaney says he’ll sing of this:

Yet for all this art and sedentary trade

I am incapable. The famous

Northern reticence, the tight gag of place

And times: yes, yes. Of the ‘wee six’ I sing

And Whatever you say, you say nothing (Heaney Opened Ground 121-122). 

He says he is incapable of joining the armed resistance but all he has are words and pen through which he’ll sing of the sacrifices that the Irish have made in their long battle for freedom.

            In “Route 110”, Heaney is anxious on how to express his anguish about the violence in Irish history. It is complicated, nonetheless, but how best to represent something that cannot be easily done. The poem reaches its crescendo in the section IX, as Heaney recounts those that the violence in Northern Ireland has taken away. Among them are his friends, people he knew from pubs, people who have been killed in reprisals, those that British paramilitary gunned down, and those that history forgets to lay them…

In war graves with full honours, nor in a separate plot

Fired over on anniversaries

By units drilled and spruce and unreconciled (Heaney Human Chain 52).

If history has forgotten people who have given their lives in the struggle for self-determination and freedom, the poet attempts to memorialize them in his poem as they “cannot rest in peace but remain restive, like the unburied dead of Virgil’s Limbo, until their loss is duly acknowledged” (O’Brien 41).

            A spirit, perhaps an embodiment of conscience is ever present in his poetry. In “District and Circle” a busker, a fellow artist, nudges him to review his work as a poet, as he travels down the London Underground:

               As the music larked and capered

I’d trigger and untrigger a hot coin

Held at the ready, but now my gaze was lowered

For was our traffic not in recognition?

Accorded passage, I would re-pocket and nod,

And he, still eyeing me, would also nod (Heaney District and Circle 21).

The poet wishes to act like a normal person, acknowledge his music and grant him a coin; but the artist in him plays with the coin in his coat pocket as the other artist concedes access. For a moment the poet-persona wishes to hide his identity, but the busker not only recognizes but also quietly questions him, in spirit. Eugene O’Brien argues that:

…it would be impossible not to read the title poem without thinking of the fallout from the American “war on terror” as visited upon London by the 7/7 bombers who killed fifty people and injured more than seven hundred in the Underground’s District and Circle line in 2005 (O’Brien 196).

While a fellow artist like the busker queries his personhood as a poet, another singer from “The Fragment” interrogates… “Since when,” he asked,/ Are the first line and the last line of any poem/ Where the poem begins and ends?” (Heaney Electric Light 47). In a tribute to Ted Hughes in the collection Seeing Things, he commented “I trust contrariness” (Heaney Seeing Things 15), suggesting that it is through a counter-measuring of differences and dialectics that art can be made as well as lives remade. Gates, gate-keeping, of things coming in and going out is also the central theme of “Field of Vision” as the woman in the wheel chair does not carry even “a spare ounce of emotional weight” (Heaney Seeing Things 24).

Conclusion

            It was inferred from the above discussion that Heaney had not shied away from responding according to his artistic sensibilities to the Troubles and to his nation’s struggle for independence. From his first published poem on, the poet has been acutely aware that he is writing in a language that is learnt. But then, it was also observed that the poet attempts to overturn some symbols and images from English romantic writers, like the sedge-warbler who cannot sing like a nightingale but ‘sings’ in its own way. The poet abjures violence but wishes for a free and independent Irish nation. It was observed that as an artist he is ambivalent about the positions he has to take, but then he favours the stance of Goya, who seems to represent in whatever way he can, the atrocities and deaths. Heaney over the years also favoured a position that he called ‘travelled intelligence’ as well of ‘fork-tongue’ and ‘governing ones tongue’. He favours a representation and writing that takes in all the complex and complicated histories of his nation as well as of the private sphere as well.

Works Cited

Allen, Michael, editor. Seamus Heaney. St Martin’s Press, 1997.

Andrews, Elmer. The Poetry of Seamus Heaney: All the Realms of Whisper. Macmillan, 1998.

Bloom, Harold, editor. Seamus Heaney. Chelsea House Publishers, 2003.

Crowder, Ashley Bland and Jason David Hall, editor. Seamus Heaney: Poet, Critic, Translator. Palgrave Macmillan, 2007.

Heaney, Seamus. Opened Ground: Poems 1966-1966. Faber and Faber, 1998.

—. Death of a Naturalist. Faber & Faber, 1970.

—. District and Circle. Faber & Faber, 2009.

—. Door into the Dark. Faber & Faber, 2013.

—. Electric Light. Faber & Faber, 2010.

—. Human Chain. Faber & Faber, 2010.

—. North: Poems. Farrar, Straus and Giroux, 1975.

—. Seeing Things: Poems. Farrar, Straus and Giroux, 2014.

—. Station Island. Farrar, Straus and Giroux, 1986

—. The Spirit Level. Faber & Faber, 2009.

—. Wintering Out. Faber & Faber, 2011.

O’Brien, Eugene. The Soul Exceeds Its Circumstances: The Later Poetry of Seamus Heaney. University of Notre Dame Press, 2016.

O’Donoghue, Bernard, editor. The Cambridge Companion to Seamus Heaney. Cambridge University Press, 2009.

O’Driscoll, Dennis. Stepping Stones: Interviews with Seamus Heaney. Faber and Faber, 2009.

Parker, Michael. Seamus Heaney: The Making of the Poet. University of Iowa Press, 1993.

Vendler, Helen. Seamus Heaney. Fontana, 1999.