Main Article Content

Abstract

The study determined the logical environment and supervisory regulatory frameworks for effective information management of public universities in Nigeria.  The study adopted descriptive survey research design. The population was 1580 Management staff. 432 respondents were proportionally sampled from each of the Public universities studied. The instrument for data collection was a structured questionnaire developed by the researcher. The questionnaire was face-validated by five experts. The reliability of the instrument was tested using Cronbach Alpha method and yielded an overall coefficient of 0.93. Mean and Analysis of Variance were used to analyze data collected. The findings showed that the management staff agreed to the 42 items measuring the logical environment and Supervisory regulatory actions for effective information management. The findings further showed that no significant difference existed among the opinions of the respondents on the level at which they adopted the logical environment security and supervisory regulatory actions for effective information management of their institutions. It was recommended among others, that the management of Public universities in Nigeria should enact and implement effective policies and laws that support the adoption of information regulatory actions.

Keywords

logical environment, supervisory control, regulatory framework, information management Public universities

Article Details

Author Biographies

Friday Ekahe Abanyam, Ambross Alli University, Nigeria

 

 

Janet Achikere Onimawo, Ambrose Alli University, Nigeria.

 

 

Fabian Ugbe Udida, University of Calabar, Nigeria.

 

 

Anthonia Ngozi Ibelegbu, Taraba State University, Nigeria.

 

 

Judith Kanu, Nigeria Educational Research and Development Commission (NERDC), Nigeria.

 

 

How to Cite
Abanyam, F. E., Achikere Onimawo, . J. ., Ugbe Udida, F., Ngozi Ibelegbu, A. ., & Kanu, J. (2023). Logical Environment and Supervisory Regulatory Frameworks for Effective Information Management of Public Universities in Nigeria. Golden Ratio of Data in Summary, 3(1), 07–20. https://doi.org/10.52970/grdis.v3i1.275

References

  1. Abanyam, F. E., Ibelegbu, A. N., & Garba, H. J. (2020). Green marketing: The enviropreneur and compliance marketing approaches for predicting sustainable industries in Nigeria. Vocational and Technical Education journal, 4 (2), 265-277 www.acjol.org
  2. Abanyamm, F. E. & Abanyam, V. A. (2021). Green Marketing in Nigeria Consumer Sustainability: The Distribution and Physical Practice on Polythene Manufacturing Companies. Journal of Contemporary Issues and Thought, 11(1), 126-140. https://doi.org/10.37134/jcit.vol11.11.2021
  3. Abanyamm, F. E. & Guma, E. T. (2021). Utilization of Computer Assisted Instruction (CAI) for Effective Teaching and Learning of Financial Accounting in Senior Secondary Schools in Benue State, Nigeria. Asian Journal of Assessment in Teaching and Learning, 11 (1), 42-54. https://doi.org/10.37134/ajatel.vol11.2.5.2021
  4. AbdulAzeez, A. T. (2016). Analysis of Management Practices in Lagos State Tertiary Institutions through Total Quality Management Structural Framework. Journal of Education and Practice, 7(8). Retrieved on June 7, 2019 from: www.iiste.org
  5. Africa Cyber Security. (2016). African universities battle hacking, cybercrimes. Retrieved on May 4, 2019 from: https://punchng.com/african-universities-battle-hacking-cyber-crimes/
  6. Chand, S. (2019). Decisions Making: Strategic, Tactical and Operational Decisions and Business Management. Retrieved on October 13, 2019 from: http://www.yourarticlelibrary.com/informationtechnology/decisions-making-strategic-tactical-and-operational-decisions-business-management/10271
  7. Chierotti, J. (2014). Want to Keep Your Personal Information Private? Monitor Your Online Reputation! Retrieved on September 12, 2019 from: https://www.socialmediatoday.com/content/want-keep-your-personal-information-private-monitor-your-online-reputation
  8. Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. NSA. Retrieved from http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/
  9. Fabunmi, M. (2006). Perspective in educational planning. Ibadan: Odun Printers and Pack
  10. François, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness. An Unpublished Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy to School of Business and Technology, Capella University.
  11. Gauthier, R. (2014). Major event legislation: Lessons from London and looking forward. The International Sports Journal, 14(1-2), 58-71. http://dx.doi.org/10.1007/s40318-013-0034-0
  12. Ibelegbu, A. N. & Abanyam, F. E. (2022). Human Resource Management: Impact of Employees’ Relations and Training Practices of Listed Deposit Money Banks’ (LDMB) Performance in Adamawa State, Nigeria. Journal of Business Strategy Finance and Management, 4(1). Available From: https://bit.ly/3qDq0ow
  13. Janssen, D., & Janssen, C. (2019). Electronic data interchange. Technopedia. Retrieved on September 8, 2019 from: https://www.techopedia.com/definition/1496/electronic-data-interchange-edi
  14. Johnson, M. (2009) What are business operations? Retrieved on November 11, 2019. From: https://resources.work.com/management-officer-job-description
  15. Jumper, J. P (2005). Levels of air force leadership. Retrieved on November 16, 2019 from: https://www.doctrine.af.mil/Portals/61/documents/Volume_2/V2-D10-Levels-Leadership.pdf
  16. Kenneth C. Laudon, K. C., & Laudon, J. P. (2014). Management Information Systems: Managing the Digital Firm, (13th Ed). USA: Pearson. Retrieved on September 8, 2019 from: https://www.pearson.com/us/higher-education/product/Laudon-Management-Information -Systems-Managing-the-Digital-Firm-13th-Edition/9780133050691.html
  17. Martin, R. (2011). The three levels of leadership. Retrieved on November 16, 2019 from: https://exploitingchange.com/2011/02/28/the-three-levels-of-leadership/
  18. Mattie, J. A., Hanley, P. F., & Cassidy, D. L. (2005). Internal regulations: The key to accountability. Retrieved on November 21, 2019 from: www.ucop.edu/riskmgt/erm/documents/pwc_int_ctrls.pdf
  19. McCrindell, J. Q. (2015), Framework for financial management and regulatory. Journal of Finance Management Institute, 16(2) pp, 11-39
  20. Mellon, B. (2013). US research universities increasingly targeted by cyberattacks. Retrieved on May 3, 2019 from: http://www.upi.com/Top_News/US/2013/07/17/US-research-universities-increasingly-targeted-bycyberattacks/26641374065244/
  21. Mendez, R. (2015). General regulatory vs. application regulatory. Prezi. Retrieved on September 8, 2019 from: https://prezi.com/iacknmfi6oxg/general-regulatory-vs-application-regulatory/
  22. Mikoluk, K. (2013). Planning in management: strategic, tactical, and operational plans. Retrieved on October 13, 2019 from: https://blog.udemy.com/planning-in-management/
  23. Misra, G. (2019). Office Operations: Meaning, Importance and Classification. Retrieved on May 31, 2019 from: http://www.yourarticlelibrary.com/office-management/office-operations-meaning-importance-and-classification/74657 .
  24. Naboth-Odum, A., Abanyam, F. E., Abdulkadir, A., & Abanyam, V. A. (2022). Information and Security Control Mechanisms Embraced for Effective Information Management in Colleges of Education in Nigeria. Golden Ratio of Social Science and Education, 2 (2), 98-111. https://doi.org/10.52970/grsse.v2i2.183
  25. National Vulnerability Database (2019). Security and privacy regulations for federal information systems and organizations. Available at https://nvd.nist.gov/800-53/Rev4/regulatory/SI-4
  26. Neelameghan, A.. (2008). Information systems for national development - the social relevance of information systems. International Forum on Information and Documentation, 5 (4), 3-8.
  27. Okolo, N. B. (2015). Evaluating factors of security policy on information security effectiveness in developing nations: A case study of Nigeria. An Unpublished Dissertation. Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of School of Business and Technology Management, Prescott Valley, Arizona.
  28. Osuala, E. C. & Okeke, A. U. (2006). Management office management. Enugu: Cheston Agency Ltd.
  29. Rogers, G. & Ashford, T. (2015). Mitigating higher ed cyber-attacks. ASCUE Proceedings, 5(2), 234-241.
  30. Rouse, M. (2014). Electronic data interchange. Retrieved on September 8, 2019 from: https://searchdatacenter.techtarget.com/definition/EDI
  31. State of New York Comptroller, (2007). Standards for internal regulatory in New York State government. Retrieved on November 21, 2019 from: https://osc.state.ny.us/agencies/ ictf/docs/intregulatory_stds.pdf.
  32. State of Vermont, (2015). Supervisory, assessment and planning. Retrieved on November 20, 2019 from: https://dec.vermont.gov/watershed/map
  33. The Institute of Internal Auditors, (2008). Practice guide: Auditing the regulatory environment. Retrieved on September 11, 2019 from: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-the-Regulatory-Environment-Practice-Guide.aspx
  34. Tunji, O., & Nelson, O. (2011). The effect of e-portal system on corporate image of universities. i-manager’s Journal of Educational Technology, 7 (4), 345-349.
  35. Wynn, C. L. (2017). Examining the relationship of business operations and the information security culture in the united states. An Unpublished Dissertation. Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Computer Science to Colorado Technical University.

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.