Main Article Content

Abstract

The study determined the Information, communication and logical environment security control mechanisms embraced by administrative officers for effective information management in Colleges of Education (CCOEs) in South-South Nigeria.  The study embraced descriptive survey research design. The population was 1580 Administrative Officers.. 320 respondents using a proportional sampling technique was used to determine the number of administrative officers for each of the COEs studied. The instrument for data collection was a structured questionnaire developed by the researcher. The questionnaire was face-validated by five experts. The reliability of the instrument was tested using Cronbach Alpha method and yielded an overall coefficient of 0.93. Mean and Analysis of Variance were used to analyze data collected. The findings showed that the administrative officers moderately embraced the identified logical, information and communication control mechanisms for effective information management. The findings further showed that no significant difference existed among the opinions of the respondents on the level at which they embraced the Information, communication and logical environmental security control mechanisms for effective information management of their institutions. it was recommended among others, that the management of COEs in Nigeria should enact and implement effective policies and laws that support the adoption of information control mechanisms.

Keywords

Communication Logical Environment Security Control Mechanisms Information Management Education

Article Details

How to Cite
Naboth-Odums, A., Abanyam, F. E., Abdulkadir, A., & Attah Abanyam, V. (2022). Information and Security Control Mechanisms Embraced for Effective Information Management in Colleges of Education in Nigeria. Golden Ratio of Social Science and Education, 2(2), 98–111. https://doi.org/10.52970/grsse.v2i2.183

References

  1. Abanyam, F. E., Ibelegbu, A. N., & Garba, H. J. (2020). Green marketing: The enviropreneur and compliance marketing approaches for predicting sustainable industries in South-South Nigeria. Vocational and Technical Education journal, 4 (2), 265-277
  2. Abanyamm, F. E. & Abanyam, V. A. (2021). Green Marketing in South-South Nigeria Consumer Sustainability: The Distribution and Physical Practice on Polythene Manufacturing Companies. Journal of Contemporary Issues and Thought, 11(1), 126-140. https://doi.org/10.37134/jcit.vol11.11.2021
  3. Abanyamm, F. E. & Guma, E. T. (2021). Utilization of Computer Assisted Instruction (CAI) for Effective Teaching and Learning of Financial Accounting in Senior Secondary Schools in Benue State, Nigeria. Asian Journal of Assessment in Teaching and Learning, 11 (1), 42-54. https://doi.org/10.37134/ajatel.vol11.2.5.2021
  4. Acharya, R., Vityanathan, V. & Pether, R.(2009). Wireless LAN Security – Challages and Solutions. International Journal of Computer and Electrical Engineering, 1 (3). 45-63. https://doi.org/10.7763/IJCEE.2009.V1.39
  5. Africa Cyber Security(2016). African universities battle hacking, cybercrimes. Retrieved on May 4, 2019 from: https://punchng.com/african-universities-battle-hacking-cyber-crimes/
  6. Agomuo, E. E. (2014). Modern Office Technology: Issues, Procedures and Practice. Nsukka: Debees Printing Services.
  7. Chand, S. (2019). Decisions Making: Strategic, Tactical and Operational Decisions and Business Management. Retrieved on October 13, 2019 from: http://www.yourarticlelibrary.com/ informationtechnology/decisions-making-strategic-tactical-and-operational-decisions-business-management/10271
  8. Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. NSA. Retrieved from http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/ .
  9. Fabunmi, M. (2006). Perspective in educational planning. Ibadan: Odun Printers and Pack
  10. François, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness. An Unpublished Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy to School of Business and Technology, Capella University.
  11. Gauthier, R. (2014). Major event legislation: Lessons from London and looking forward. The International Sports Journal, 14(1-2), 58-71. http://dx.doi.org/10.1007/s40318-013-0034-0
  12. Ibelegbu, A. N. & Abanyam, F. E. (2022). Human Resource Management: Impact of Employees’ Relations and Training Practices of Listed Deposit Money Banks’ (LDMB) Performance in Adamawa State, Nigeria. Journal of Business Strategy Finance and Management, 4(1). http://dx.doi.org/10.12944/JBSFM.04.01.13
  13. Janssen, D., & Janssen, C. (2019). Electronic data interchange. Technopedia. Retrieved on September 8, 2019 from: https://www.techopedia.com/definition/1496/electronic-data-interchange-edi
  14. Johnson, M. (2009). What are business operations? Retrieved on November 11, 2019. From: https://resources.work.com/administrative-officer-job-description .
  15. Jumper, J. P (2005). Levels of air force leadership. Retrieved on November 16, 2019 from: https://www.doctrine.af.mil/Portals/61/documents/Volume_2/V2-D10-Levels-Leadership.pdf
  16. Kenneth C. Laudon, K. C., & Laudon, J. P. (2014). Management Information Systems: Managing the Digital Firm, (13th Ed). USA: Pearson. Retrieved on September 8, 2019 from: https://www.pearson.com/us/higher-education/product/Laudon-Management-Information -Systems-Managing-the-Digital-Firm-13th-Edition/9780133050691.html .
  17. Lucey, T. (2005). Management Information Systems. Singapore: Seng Lee Press.
  18. Martin, R. (2011). The three levels of leadership. Retrieved on November 16, 2019 from: https://exploitingchange.com/2011/02/28/the-three-levels-of-leadership/ .
  19. Mattie, J. A., Hanley, P. F., & Cassidy, D. L. (2005). Internal controls: The key to accountability. Retrieved on November 21, 2019 from: http://www.ucop.edu/riskmgt/ erm/documents/ pwc_int_ctrls.pdf.
  20. McCrindell, J. Q. (2015), Framework for financial management and control. Journal of Finance Management Institute, 16(2) pp, 11-39. http://dx.doi.org/10.20431/2349-0349.0703001
  21. Mellon, B. (2013). US research universities increasingly targeted by cyberattacks. Retrieved on May 3, 2019 from: http://www.upi.com/Top_News/US/2013/07/17/US-research-universities-increasingly-targeted-bycyberattacks/26641374065244/
  22. Mendez, R. (2015). General control vs. application control. Prezi. Retrieved on September 8, 2019 from: https://prezi.com/iacknmfi6oxg/general-control-vs-application-control/
  23. Hester W. J. Meyer (2003) Information use in rural development, The New Review of Information Behaviour Research, 4:1, 109-125. https://doi.org/10.1080/14716310310001631471
  24. Mikoluk, K. (2013). Planning in management: strategic, tactical, and operational plans. Retrieved on October 13, 2019 from: https://blog.udemy.com/planning-in-management/
  25. Misra, G. (2019). Office Operations: Meaning, Importance and Classification. Retrieved on May 31, 2019 from: http://www.yourarticlelibrary.com/office-management/office-operations-meaning-importance-and-classification/74657 .
  26. National Commission for Colleges of Education (2019). Nigeria Certificate in Education Minimum Standards for General Education Courses, TETF project 2012. Garki Abuja: Department of Academic Programmes.
  27. National Vulnerability Database (2019). Security and privacy controls for federal information systems and organizations. Available at https://nvd.nist.gov/800-53/Rev4/control/SI-4
  28. Neelameghan, A. (2008). Information systems for national development - the social relevance of information systems. International Forum on Information and Documentation, 5, (4), 3-8
  29. Osuala, E. C. & Okeke, A. U. (2006). Administrative office management. Enugu: Cheston Agency Ltd.
  30. Rogers, G. & Ashford, T. (2015). Mitigating higher ed cyber-attacks. ASCUE Proceedings, 5(2), 234-241.
  31. Rouse, M. (2014). Electronic data interchange. Retrieved on September 8, 2019 from: https://searchdatacenter.techtarget.com/definition/EDI .
  32. State of New York Comptroller, (2007). Standards for internal control in New York State government. Retrieved on November 21, 2019 from: https://osc.state.ny.us/agencies/ ictf/docs/intcontrol_stds.pdf.
  33. State of Vermont, (2015). Monitoring, assessment and planning. Retrieved on November 20, 2019 from: https://dec.vermont.gov/watershed/map.
  34. Techopedia (2019). Information management (IM). Retrieved on June 12, 2019 from: https://www.techopedia.com/definition/20012/information-management-im
  35. The Institute of Internal Auditors (2008). Practice guide: Auditing the control environment. Retrieved on September 11, 2019 from: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-the-Control-Environment-Practice-Guide.aspx.
  36. Tunji, O., & Nelson, O. (2011). The effect of e-portal system on corporate image of universities. i-manager’s Journal of Educational Technology, 7 (4), 345-349.
  37. University of California, (2017). Understanding internal controls. Retrieved on September 3, 2019 from: http://www.universityofcaliforna.com