Main Article Content
Abstract
The study determined the logical environment and supervisory regulatory frameworks for effective information management of public universities in Nigeria. The study adopted descriptive survey research design. The population was 1580 Management staff. 432 respondents were proportionally sampled from each of the Public universities studied. The instrument for data collection was a structured questionnaire developed by the researcher. The questionnaire was face-validated by five experts. The reliability of the instrument was tested using Cronbach Alpha method and yielded an overall coefficient of 0.93. Mean and Analysis of Variance were used to analyze data collected. The findings showed that the management staff agreed to the 42 items measuring the logical environment and Supervisory regulatory actions for effective information management. The findings further showed that no significant difference existed among the opinions of the respondents on the level at which they adopted the logical environment security and supervisory regulatory actions for effective information management of their institutions. It was recommended among others, that the management of Public universities in Nigeria should enact and implement effective policies and laws that support the adoption of information regulatory actions.
Keywords
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
- Abanyam, F. E., Ibelegbu, A. N., & Garba, H. J. (2020). Green marketing: The enviropreneur and compliance marketing approaches for predicting sustainable industries in Nigeria. Vocational and Technical Education journal, 4 (2), 265-277 www.acjol.org
- Abanyamm, F. E. & Abanyam, V. A. (2021). Green Marketing in Nigeria Consumer Sustainability: The Distribution and Physical Practice on Polythene Manufacturing Companies. Journal of Contemporary Issues and Thought, 11(1), 126-140. https://doi.org/10.37134/jcit.vol11.11.2021
- Abanyamm, F. E. & Guma, E. T. (2021). Utilization of Computer Assisted Instruction (CAI) for Effective Teaching and Learning of Financial Accounting in Senior Secondary Schools in Benue State, Nigeria. Asian Journal of Assessment in Teaching and Learning, 11 (1), 42-54. https://doi.org/10.37134/ajatel.vol11.2.5.2021
- AbdulAzeez, A. T. (2016). Analysis of Management Practices in Lagos State Tertiary Institutions through Total Quality Management Structural Framework. Journal of Education and Practice, 7(8). Retrieved on June 7, 2019 from: www.iiste.org
- Africa Cyber Security. (2016). African universities battle hacking, cybercrimes. Retrieved on May 4, 2019 from: https://punchng.com/african-universities-battle-hacking-cyber-crimes/
- Chand, S. (2019). Decisions Making: Strategic, Tactical and Operational Decisions and Business Management. Retrieved on October 13, 2019 from: http://www.yourarticlelibrary.com/informationtechnology/decisions-making-strategic-tactical-and-operational-decisions-business-management/10271
- Chierotti, J. (2014). Want to Keep Your Personal Information Private? Monitor Your Online Reputation! Retrieved on September 12, 2019 from: https://www.socialmediatoday.com/content/want-keep-your-personal-information-private-monitor-your-online-reputation
- Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. NSA. Retrieved from http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/
- Fabunmi, M. (2006). Perspective in educational planning. Ibadan: Odun Printers and Pack
- François, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness. An Unpublished Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy to School of Business and Technology, Capella University.
- Gauthier, R. (2014). Major event legislation: Lessons from London and looking forward. The International Sports Journal, 14(1-2), 58-71. http://dx.doi.org/10.1007/s40318-013-0034-0
- Ibelegbu, A. N. & Abanyam, F. E. (2022). Human Resource Management: Impact of Employees’ Relations and Training Practices of Listed Deposit Money Banks’ (LDMB) Performance in Adamawa State, Nigeria. Journal of Business Strategy Finance and Management, 4(1). Available From: https://bit.ly/3qDq0ow
- Janssen, D., & Janssen, C. (2019). Electronic data interchange. Technopedia. Retrieved on September 8, 2019 from: https://www.techopedia.com/definition/1496/electronic-data-interchange-edi
- Johnson, M. (2009) What are business operations? Retrieved on November 11, 2019. From: https://resources.work.com/management-officer-job-description
- Jumper, J. P (2005). Levels of air force leadership. Retrieved on November 16, 2019 from: https://www.doctrine.af.mil/Portals/61/documents/Volume_2/V2-D10-Levels-Leadership.pdf
- Kenneth C. Laudon, K. C., & Laudon, J. P. (2014). Management Information Systems: Managing the Digital Firm, (13th Ed). USA: Pearson. Retrieved on September 8, 2019 from: https://www.pearson.com/us/higher-education/product/Laudon-Management-Information -Systems-Managing-the-Digital-Firm-13th-Edition/9780133050691.html
- Martin, R. (2011). The three levels of leadership. Retrieved on November 16, 2019 from: https://exploitingchange.com/2011/02/28/the-three-levels-of-leadership/
- Mattie, J. A., Hanley, P. F., & Cassidy, D. L. (2005). Internal regulations: The key to accountability. Retrieved on November 21, 2019 from: www.ucop.edu/riskmgt/erm/documents/pwc_int_ctrls.pdf
- McCrindell, J. Q. (2015), Framework for financial management and regulatory. Journal of Finance Management Institute, 16(2) pp, 11-39
- Mellon, B. (2013). US research universities increasingly targeted by cyberattacks. Retrieved on May 3, 2019 from: http://www.upi.com/Top_News/US/2013/07/17/US-research-universities-increasingly-targeted-bycyberattacks/26641374065244/
- Mendez, R. (2015). General regulatory vs. application regulatory. Prezi. Retrieved on September 8, 2019 from: https://prezi.com/iacknmfi6oxg/general-regulatory-vs-application-regulatory/
- Mikoluk, K. (2013). Planning in management: strategic, tactical, and operational plans. Retrieved on October 13, 2019 from: https://blog.udemy.com/planning-in-management/
- Misra, G. (2019). Office Operations: Meaning, Importance and Classification. Retrieved on May 31, 2019 from: http://www.yourarticlelibrary.com/office-management/office-operations-meaning-importance-and-classification/74657 .
- Naboth-Odum, A., Abanyam, F. E., Abdulkadir, A., & Abanyam, V. A. (2022). Information and Security Control Mechanisms Embraced for Effective Information Management in Colleges of Education in Nigeria. Golden Ratio of Social Science and Education, 2 (2), 98-111. https://doi.org/10.52970/grsse.v2i2.183
- National Vulnerability Database (2019). Security and privacy regulations for federal information systems and organizations. Available at https://nvd.nist.gov/800-53/Rev4/regulatory/SI-4
- Neelameghan, A.. (2008). Information systems for national development - the social relevance of information systems. International Forum on Information and Documentation, 5 (4), 3-8.
- Okolo, N. B. (2015). Evaluating factors of security policy on information security effectiveness in developing nations: A case study of Nigeria. An Unpublished Dissertation. Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of School of Business and Technology Management, Prescott Valley, Arizona.
- Osuala, E. C. & Okeke, A. U. (2006). Management office management. Enugu: Cheston Agency Ltd.
- Rogers, G. & Ashford, T. (2015). Mitigating higher ed cyber-attacks. ASCUE Proceedings, 5(2), 234-241.
- Rouse, M. (2014). Electronic data interchange. Retrieved on September 8, 2019 from: https://searchdatacenter.techtarget.com/definition/EDI
- State of New York Comptroller, (2007). Standards for internal regulatory in New York State government. Retrieved on November 21, 2019 from: https://osc.state.ny.us/agencies/ ictf/docs/intregulatory_stds.pdf.
- State of Vermont, (2015). Supervisory, assessment and planning. Retrieved on November 20, 2019 from: https://dec.vermont.gov/watershed/map
- The Institute of Internal Auditors, (2008). Practice guide: Auditing the regulatory environment. Retrieved on September 11, 2019 from: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-the-Regulatory-Environment-Practice-Guide.aspx
- Tunji, O., & Nelson, O. (2011). The effect of e-portal system on corporate image of universities. i-manager’s Journal of Educational Technology, 7 (4), 345-349.
- Wynn, C. L. (2017). Examining the relationship of business operations and the information security culture in the united states. An Unpublished Dissertation. Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Computer Science to Colorado Technical University.
References
Abanyam, F. E., Ibelegbu, A. N., & Garba, H. J. (2020). Green marketing: The enviropreneur and compliance marketing approaches for predicting sustainable industries in Nigeria. Vocational and Technical Education journal, 4 (2), 265-277 www.acjol.org
Abanyamm, F. E. & Abanyam, V. A. (2021). Green Marketing in Nigeria Consumer Sustainability: The Distribution and Physical Practice on Polythene Manufacturing Companies. Journal of Contemporary Issues and Thought, 11(1), 126-140. https://doi.org/10.37134/jcit.vol11.11.2021
Abanyamm, F. E. & Guma, E. T. (2021). Utilization of Computer Assisted Instruction (CAI) for Effective Teaching and Learning of Financial Accounting in Senior Secondary Schools in Benue State, Nigeria. Asian Journal of Assessment in Teaching and Learning, 11 (1), 42-54. https://doi.org/10.37134/ajatel.vol11.2.5.2021
AbdulAzeez, A. T. (2016). Analysis of Management Practices in Lagos State Tertiary Institutions through Total Quality Management Structural Framework. Journal of Education and Practice, 7(8). Retrieved on June 7, 2019 from: www.iiste.org
Africa Cyber Security. (2016). African universities battle hacking, cybercrimes. Retrieved on May 4, 2019 from: https://punchng.com/african-universities-battle-hacking-cyber-crimes/
Chand, S. (2019). Decisions Making: Strategic, Tactical and Operational Decisions and Business Management. Retrieved on October 13, 2019 from: http://www.yourarticlelibrary.com/informationtechnology/decisions-making-strategic-tactical-and-operational-decisions-business-management/10271
Chierotti, J. (2014). Want to Keep Your Personal Information Private? Monitor Your Online Reputation! Retrieved on September 12, 2019 from: https://www.socialmediatoday.com/content/want-keep-your-personal-information-private-monitor-your-online-reputation
Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. NSA. Retrieved from http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/
Fabunmi, M. (2006). Perspective in educational planning. Ibadan: Odun Printers and Pack
François, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness. An Unpublished Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy to School of Business and Technology, Capella University.
Gauthier, R. (2014). Major event legislation: Lessons from London and looking forward. The International Sports Journal, 14(1-2), 58-71. http://dx.doi.org/10.1007/s40318-013-0034-0
Ibelegbu, A. N. & Abanyam, F. E. (2022). Human Resource Management: Impact of Employees’ Relations and Training Practices of Listed Deposit Money Banks’ (LDMB) Performance in Adamawa State, Nigeria. Journal of Business Strategy Finance and Management, 4(1). Available From: https://bit.ly/3qDq0ow
Janssen, D., & Janssen, C. (2019). Electronic data interchange. Technopedia. Retrieved on September 8, 2019 from: https://www.techopedia.com/definition/1496/electronic-data-interchange-edi
Johnson, M. (2009) What are business operations? Retrieved on November 11, 2019. From: https://resources.work.com/management-officer-job-description
Jumper, J. P (2005). Levels of air force leadership. Retrieved on November 16, 2019 from: https://www.doctrine.af.mil/Portals/61/documents/Volume_2/V2-D10-Levels-Leadership.pdf
Kenneth C. Laudon, K. C., & Laudon, J. P. (2014). Management Information Systems: Managing the Digital Firm, (13th Ed). USA: Pearson. Retrieved on September 8, 2019 from: https://www.pearson.com/us/higher-education/product/Laudon-Management-Information -Systems-Managing-the-Digital-Firm-13th-Edition/9780133050691.html
Martin, R. (2011). The three levels of leadership. Retrieved on November 16, 2019 from: https://exploitingchange.com/2011/02/28/the-three-levels-of-leadership/
Mattie, J. A., Hanley, P. F., & Cassidy, D. L. (2005). Internal regulations: The key to accountability. Retrieved on November 21, 2019 from: www.ucop.edu/riskmgt/erm/documents/pwc_int_ctrls.pdf
McCrindell, J. Q. (2015), Framework for financial management and regulatory. Journal of Finance Management Institute, 16(2) pp, 11-39
Mellon, B. (2013). US research universities increasingly targeted by cyberattacks. Retrieved on May 3, 2019 from: http://www.upi.com/Top_News/US/2013/07/17/US-research-universities-increasingly-targeted-bycyberattacks/26641374065244/
Mendez, R. (2015). General regulatory vs. application regulatory. Prezi. Retrieved on September 8, 2019 from: https://prezi.com/iacknmfi6oxg/general-regulatory-vs-application-regulatory/
Mikoluk, K. (2013). Planning in management: strategic, tactical, and operational plans. Retrieved on October 13, 2019 from: https://blog.udemy.com/planning-in-management/
Misra, G. (2019). Office Operations: Meaning, Importance and Classification. Retrieved on May 31, 2019 from: http://www.yourarticlelibrary.com/office-management/office-operations-meaning-importance-and-classification/74657 .
Naboth-Odum, A., Abanyam, F. E., Abdulkadir, A., & Abanyam, V. A. (2022). Information and Security Control Mechanisms Embraced for Effective Information Management in Colleges of Education in Nigeria. Golden Ratio of Social Science and Education, 2 (2), 98-111. https://doi.org/10.52970/grsse.v2i2.183
National Vulnerability Database (2019). Security and privacy regulations for federal information systems and organizations. Available at https://nvd.nist.gov/800-53/Rev4/regulatory/SI-4
Neelameghan, A.. (2008). Information systems for national development - the social relevance of information systems. International Forum on Information and Documentation, 5 (4), 3-8.
Okolo, N. B. (2015). Evaluating factors of security policy on information security effectiveness in developing nations: A case study of Nigeria. An Unpublished Dissertation. Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of School of Business and Technology Management, Prescott Valley, Arizona.
Osuala, E. C. & Okeke, A. U. (2006). Management office management. Enugu: Cheston Agency Ltd.
Rogers, G. & Ashford, T. (2015). Mitigating higher ed cyber-attacks. ASCUE Proceedings, 5(2), 234-241.
Rouse, M. (2014). Electronic data interchange. Retrieved on September 8, 2019 from: https://searchdatacenter.techtarget.com/definition/EDI
State of New York Comptroller, (2007). Standards for internal regulatory in New York State government. Retrieved on November 21, 2019 from: https://osc.state.ny.us/agencies/ ictf/docs/intregulatory_stds.pdf.
State of Vermont, (2015). Supervisory, assessment and planning. Retrieved on November 20, 2019 from: https://dec.vermont.gov/watershed/map
The Institute of Internal Auditors, (2008). Practice guide: Auditing the regulatory environment. Retrieved on September 11, 2019 from: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-the-Regulatory-Environment-Practice-Guide.aspx
Tunji, O., & Nelson, O. (2011). The effect of e-portal system on corporate image of universities. i-manager’s Journal of Educational Technology, 7 (4), 345-349.
Wynn, C. L. (2017). Examining the relationship of business operations and the information security culture in the united states. An Unpublished Dissertation. Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Computer Science to Colorado Technical University.