Submitted:
27 June 2025
Posted:
30 June 2025
You are already at the latest version
Abstract
Keywords:
UNDERSTANDING THE SECURITY LANDSCAPE IN BENUE STATE
THE ROLE OF RENEWABLE ENERGY IN STABILIZING CONFLICT ZONES
HOW BLOCKCHAIN CAN IMPROVE TRUST AND TRANSPARENCY
RISKS, BARRIERS, AND POLITICAL RESISTANCE
A POLICY ROADMAP FOR DECENTRALIZED ELECTORAL AND ENERGY SYSTEMS
- Update Electoral and Energy Legislation:
- 2.
- Create a Multi-Stakeholder Taskforce
- 3.
- Prioritize Community-First Design
- 4.
- Strengthen Data Protection and Cybersecurity
- 5.
- Learn from Global Pilots
References
- Ajayi, A. A. (2020). Bridging the digital divide in Nigeria: An assessment of rural internet access and literacy. Nigerian Journal of Communication, 17(2), 55–70.
- Afolabi, M. O., & Akinola, A. O. (2022). Biometric voter registration and electoral accountability in Nigeria. African Journal of Democracy and Governance, 9(1), 88–104.
- Ayenigbara, G. O., & Ajayi, A. F. (2021). Community-led governance and renewable energy deployment in Nigeria. Journal of Sustainable Development, 14(5), 112–123.
- Ayoade, O. M. (2022). Digital literacy as a tool for inclusive development in Nigeria. International Journal of Digital Learning, 5(1), 44–61.
- Benaloh, J. (2006). Simple verifiable elections. In Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop, 1–5.
- Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015). SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy, 104–121.
- Cheeseman, N., & Klaas, B. (2018). How to rig an election. Yale University Press. [CrossRef]
- Conti, M., Kumar, S., Lal, C., & Ruj, S. (2018). A survey on security and privacy issues of blockchain technology. IEEE Communications Surveys & Tutorials, 21(2), 1–25.
- De Araujo, J. C., Gonçalves, L. L., & Silva, F. T. (2022). Blockchain and solar energy in Brazil: Lessons from pilot programs. Journal of Energy Systems, 6(1), 49–62.
- Deininger, K., & Byerlee, D. (2012). The role of land policies in agricultural transformation: Lessons from Sub-Saharan Africa. World Bank Policy Research Working Paper No. 6309.
- Gibson, J., Krimmer, R., & Teague, V. (2019). A review of end-to-end verifiable voting systems. ACM Computing Surveys, 52(1), 1–37.
- GSMA. (2023). The Mobile Economy Sub-Saharan Africa 2023. https://www.gsma.com.
- Hajnal, Z., Lajevardi, N., & Nielson, D. (2017). Voter identification laws and the suppression of minority votes. The Journal of Politics, 79(2), 363–379. [CrossRef]
- International Renewable Energy Agency (IRENA). (2021). Policy frameworks for renewable energy mini-grids in Sub-Saharan Africa. https://www.irena.org.
- Kshetri, N., & Voas, J. (2018). Blockchain-enabled e-voting. IEEE Software, 35(4), 95–99. [CrossRef]
- Krimmer, R., Volkamer, M., & Grimm, R. (2016). Developing systems that support end-to-end verifiability in elections. In Lecture Notes in Computer Science, 9990, 1–14.
- Lemieux, V. L. (2016). Trusting records: Is blockchain technology the answer? Records Management Journal, 26(2), 110–139.
- Madise, Ü., & Martens, T. (2006). E-voting in Estonia 2005: The first practice of country-wide binding internet voting in the world. Electronic Voting, 86(1), 15–26.
- Makarychev, A., & Yatsishina, E. (2021). Blockchain technologies in US and EU elections: Comparative perspective. Journal of Political Technology, 8(3), 45–59.
- Miers, I., Garman, C., Green, M., & Rubin, A. D. (2013). Zerocoin: Anonymous distributed e-cash from Bitcoin. In 2013 IEEE Symposium on Security and Privacy, 397–411. [CrossRef]
- National Institute of Standards and Technology (NIST). (2022). Blockchain and related technologies risk management framework. U.S. Department of Commerce.
- Nguyen, Q. K., Tran, D. H., & Huynh, D. T. (2018). Blockchain for secure e-voting: A review and roadmap. In 2018 3rd International Conference on System Reliability and Science (ICSRS), 254–258.
- Noizat, P. (2015). Blockchain electronic vote. In Handbook of Digital Currency (pp. 453–461). Elsevier.
- Obiora, K. A., Eze, R. N., & Udo, I. I. (2023). Energy access and rural security in Nigeria’s Middle Belt: Linking solar electrification to peacebuilding. African Journal of Energy Policy, 5(2), 85–102.
- OECD. (2020). The role of blockchain in strengthening trust in government. OECD Working Paper No. 12.
- Ojodomo, D., & Atelhe, G. A. (2022). Rural electrification and conflict recovery in Benue State. Benue Social Science Review, 10(1), 42–59.
- Okonkwo, R. I. (2020). Blockchain and property law in Nigeria: Prospects and legal challenges. African Journal of Legal Studies, 13(1), 77–94.
- Onapajo, H. (2014). Violence and votes in Nigeria: Exploring the electoral process in the 2011 general elections. Journal of African Elections, 13(1), 96–115.
- Sun, Y., Hahn, C., & Liu, H. (2020). Security and privacy in the blockchain paradigm. IEEE Network, 34(4), 68–74.
- Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.
- Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind Bitcoin is changing money, business, and the world. Penguin.
- UNDP. (2021). Digital democracy: Blockchain for electoral integrity in West Africa. United Nations Development Programme.
- UNDP Nigeria. (2020). Sustainable energy for IDP resilience: A pilot study in North-Central Nigeria. https://www.ng.undp.org.
- World Bank. (2021). Bridging Nigeria’s digital infrastructure gap: A pathway to inclusive growth. https://www.worldbank.org.
- World Bank. (2023). Digital identity and governance in South Asia and Africa: Progress and challenges. https://www.worldbank.org.
- World Food Programme. (2019). Building Blocks: Blockchain for humanitarian aid. https://innovation.wfp.org/project/building-blocks.
- Xu, X., Weber, I., & Staples, M. (2019). Architecture for blockchain applications. Springer.
- Yavuz, E. A., & Koç, C. K. (2018). A survey on blockchain-based e-voting systems. Electronics, 7(8), 146.
- Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. IEEE Security and Privacy Workshops, 180–184. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).