Main Article Content
Abstract
The study determined the Information, communication and logical environment security control mechanisms embraced by administrative officers for effective information management in Colleges of Education (CCOEs) in South-South Nigeria. The study embraced descriptive survey research design. The population was 1580 Administrative Officers.. 320 respondents using a proportional sampling technique was used to determine the number of administrative officers for each of the COEs studied. The instrument for data collection was a structured questionnaire developed by the researcher. The questionnaire was face-validated by five experts. The reliability of the instrument was tested using Cronbach Alpha method and yielded an overall coefficient of 0.93. Mean and Analysis of Variance were used to analyze data collected. The findings showed that the administrative officers moderately embraced the identified logical, information and communication control mechanisms for effective information management. The findings further showed that no significant difference existed among the opinions of the respondents on the level at which they embraced the Information, communication and logical environmental security control mechanisms for effective information management of their institutions. it was recommended among others, that the management of COEs in Nigeria should enact and implement effective policies and laws that support the adoption of information control mechanisms.
Keywords
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
- Abanyam, F. E., Ibelegbu, A. N., & Garba, H. J. (2020). Green marketing: The enviropreneur and compliance marketing approaches for predicting sustainable industries in South-South Nigeria. Vocational and Technical Education journal, 4 (2), 265-277
- Abanyamm, F. E. & Abanyam, V. A. (2021). Green Marketing in South-South Nigeria Consumer Sustainability: The Distribution and Physical Practice on Polythene Manufacturing Companies. Journal of Contemporary Issues and Thought, 11(1), 126-140. https://doi.org/10.37134/jcit.vol11.11.2021
- Abanyamm, F. E. & Guma, E. T. (2021). Utilization of Computer Assisted Instruction (CAI) for Effective Teaching and Learning of Financial Accounting in Senior Secondary Schools in Benue State, Nigeria. Asian Journal of Assessment in Teaching and Learning, 11 (1), 42-54. https://doi.org/10.37134/ajatel.vol11.2.5.2021
- Acharya, R., Vityanathan, V. & Pether, R.(2009). Wireless LAN Security – Challages and Solutions. International Journal of Computer and Electrical Engineering, 1 (3). 45-63. https://doi.org/10.7763/IJCEE.2009.V1.39
- Africa Cyber Security(2016). African universities battle hacking, cybercrimes. Retrieved on May 4, 2019 from: https://punchng.com/african-universities-battle-hacking-cyber-crimes/
- Agomuo, E. E. (2014). Modern Office Technology: Issues, Procedures and Practice. Nsukka: Debees Printing Services.
- Chand, S. (2019). Decisions Making: Strategic, Tactical and Operational Decisions and Business Management. Retrieved on October 13, 2019 from: http://www.yourarticlelibrary.com/ informationtechnology/decisions-making-strategic-tactical-and-operational-decisions-business-management/10271
- Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. NSA. Retrieved from http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/ .
- Fabunmi, M. (2006). Perspective in educational planning. Ibadan: Odun Printers and Pack
- François, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness. An Unpublished Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy to School of Business and Technology, Capella University.
- Gauthier, R. (2014). Major event legislation: Lessons from London and looking forward. The International Sports Journal, 14(1-2), 58-71. http://dx.doi.org/10.1007/s40318-013-0034-0
- Ibelegbu, A. N. & Abanyam, F. E. (2022). Human Resource Management: Impact of Employees’ Relations and Training Practices of Listed Deposit Money Banks’ (LDMB) Performance in Adamawa State, Nigeria. Journal of Business Strategy Finance and Management, 4(1). http://dx.doi.org/10.12944/JBSFM.04.01.13
- Janssen, D., & Janssen, C. (2019). Electronic data interchange. Technopedia. Retrieved on September 8, 2019 from: https://www.techopedia.com/definition/1496/electronic-data-interchange-edi
- Johnson, M. (2009). What are business operations? Retrieved on November 11, 2019. From: https://resources.work.com/administrative-officer-job-description .
- Jumper, J. P (2005). Levels of air force leadership. Retrieved on November 16, 2019 from: https://www.doctrine.af.mil/Portals/61/documents/Volume_2/V2-D10-Levels-Leadership.pdf
- Kenneth C. Laudon, K. C., & Laudon, J. P. (2014). Management Information Systems: Managing the Digital Firm, (13th Ed). USA: Pearson. Retrieved on September 8, 2019 from: https://www.pearson.com/us/higher-education/product/Laudon-Management-Information -Systems-Managing-the-Digital-Firm-13th-Edition/9780133050691.html .
- Lucey, T. (2005). Management Information Systems. Singapore: Seng Lee Press.
- Martin, R. (2011). The three levels of leadership. Retrieved on November 16, 2019 from: https://exploitingchange.com/2011/02/28/the-three-levels-of-leadership/ .
- Mattie, J. A., Hanley, P. F., & Cassidy, D. L. (2005). Internal controls: The key to accountability. Retrieved on November 21, 2019 from: http://www.ucop.edu/riskmgt/ erm/documents/ pwc_int_ctrls.pdf.
- McCrindell, J. Q. (2015), Framework for financial management and control. Journal of Finance Management Institute, 16(2) pp, 11-39. http://dx.doi.org/10.20431/2349-0349.0703001
- Mellon, B. (2013). US research universities increasingly targeted by cyberattacks. Retrieved on May 3, 2019 from: http://www.upi.com/Top_News/US/2013/07/17/US-research-universities-increasingly-targeted-bycyberattacks/26641374065244/
- Mendez, R. (2015). General control vs. application control. Prezi. Retrieved on September 8, 2019 from: https://prezi.com/iacknmfi6oxg/general-control-vs-application-control/
- Hester W. J. Meyer (2003) Information use in rural development, The New Review of Information Behaviour Research, 4:1, 109-125. https://doi.org/10.1080/14716310310001631471
- Mikoluk, K. (2013). Planning in management: strategic, tactical, and operational plans. Retrieved on October 13, 2019 from: https://blog.udemy.com/planning-in-management/
- Misra, G. (2019). Office Operations: Meaning, Importance and Classification. Retrieved on May 31, 2019 from: http://www.yourarticlelibrary.com/office-management/office-operations-meaning-importance-and-classification/74657 .
- National Commission for Colleges of Education (2019). Nigeria Certificate in Education Minimum Standards for General Education Courses, TETF project 2012. Garki Abuja: Department of Academic Programmes.
- National Vulnerability Database (2019). Security and privacy controls for federal information systems and organizations. Available at https://nvd.nist.gov/800-53/Rev4/control/SI-4
- Neelameghan, A. (2008). Information systems for national development - the social relevance of information systems. International Forum on Information and Documentation, 5, (4), 3-8
- Osuala, E. C. & Okeke, A. U. (2006). Administrative office management. Enugu: Cheston Agency Ltd.
- Rogers, G. & Ashford, T. (2015). Mitigating higher ed cyber-attacks. ASCUE Proceedings, 5(2), 234-241.
- Rouse, M. (2014). Electronic data interchange. Retrieved on September 8, 2019 from: https://searchdatacenter.techtarget.com/definition/EDI .
- State of New York Comptroller, (2007). Standards for internal control in New York State government. Retrieved on November 21, 2019 from: https://osc.state.ny.us/agencies/ ictf/docs/intcontrol_stds.pdf.
- State of Vermont, (2015). Monitoring, assessment and planning. Retrieved on November 20, 2019 from: https://dec.vermont.gov/watershed/map.
- Techopedia (2019). Information management (IM). Retrieved on June 12, 2019 from: https://www.techopedia.com/definition/20012/information-management-im
- The Institute of Internal Auditors (2008). Practice guide: Auditing the control environment. Retrieved on September 11, 2019 from: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-the-Control-Environment-Practice-Guide.aspx.
- Tunji, O., & Nelson, O. (2011). The effect of e-portal system on corporate image of universities. i-manager’s Journal of Educational Technology, 7 (4), 345-349.
- University of California, (2017). Understanding internal controls. Retrieved on September 3, 2019 from: http://www.universityofcaliforna.com
References
Abanyam, F. E., Ibelegbu, A. N., & Garba, H. J. (2020). Green marketing: The enviropreneur and compliance marketing approaches for predicting sustainable industries in South-South Nigeria. Vocational and Technical Education journal, 4 (2), 265-277
Abanyamm, F. E. & Abanyam, V. A. (2021). Green Marketing in South-South Nigeria Consumer Sustainability: The Distribution and Physical Practice on Polythene Manufacturing Companies. Journal of Contemporary Issues and Thought, 11(1), 126-140. https://doi.org/10.37134/jcit.vol11.11.2021
Abanyamm, F. E. & Guma, E. T. (2021). Utilization of Computer Assisted Instruction (CAI) for Effective Teaching and Learning of Financial Accounting in Senior Secondary Schools in Benue State, Nigeria. Asian Journal of Assessment in Teaching and Learning, 11 (1), 42-54. https://doi.org/10.37134/ajatel.vol11.2.5.2021
Acharya, R., Vityanathan, V. & Pether, R.(2009). Wireless LAN Security – Challages and Solutions. International Journal of Computer and Electrical Engineering, 1 (3). 45-63. https://doi.org/10.7763/IJCEE.2009.V1.39
Africa Cyber Security(2016). African universities battle hacking, cybercrimes. Retrieved on May 4, 2019 from: https://punchng.com/african-universities-battle-hacking-cyber-crimes/
Agomuo, E. E. (2014). Modern Office Technology: Issues, Procedures and Practice. Nsukka: Debees Printing Services.
Chand, S. (2019). Decisions Making: Strategic, Tactical and Operational Decisions and Business Management. Retrieved on October 13, 2019 from: http://www.yourarticlelibrary.com/ informationtechnology/decisions-making-strategic-tactical-and-operational-decisions-business-management/10271
Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. NSA. Retrieved from http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/ .
Fabunmi, M. (2006). Perspective in educational planning. Ibadan: Odun Printers and Pack
François, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness. An Unpublished Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy to School of Business and Technology, Capella University.
Gauthier, R. (2014). Major event legislation: Lessons from London and looking forward. The International Sports Journal, 14(1-2), 58-71. http://dx.doi.org/10.1007/s40318-013-0034-0
Ibelegbu, A. N. & Abanyam, F. E. (2022). Human Resource Management: Impact of Employees’ Relations and Training Practices of Listed Deposit Money Banks’ (LDMB) Performance in Adamawa State, Nigeria. Journal of Business Strategy Finance and Management, 4(1). http://dx.doi.org/10.12944/JBSFM.04.01.13
Janssen, D., & Janssen, C. (2019). Electronic data interchange. Technopedia. Retrieved on September 8, 2019 from: https://www.techopedia.com/definition/1496/electronic-data-interchange-edi
Johnson, M. (2009). What are business operations? Retrieved on November 11, 2019. From: https://resources.work.com/administrative-officer-job-description .
Jumper, J. P (2005). Levels of air force leadership. Retrieved on November 16, 2019 from: https://www.doctrine.af.mil/Portals/61/documents/Volume_2/V2-D10-Levels-Leadership.pdf
Kenneth C. Laudon, K. C., & Laudon, J. P. (2014). Management Information Systems: Managing the Digital Firm, (13th Ed). USA: Pearson. Retrieved on September 8, 2019 from: https://www.pearson.com/us/higher-education/product/Laudon-Management-Information -Systems-Managing-the-Digital-Firm-13th-Edition/9780133050691.html .
Lucey, T. (2005). Management Information Systems. Singapore: Seng Lee Press.
Martin, R. (2011). The three levels of leadership. Retrieved on November 16, 2019 from: https://exploitingchange.com/2011/02/28/the-three-levels-of-leadership/ .
Mattie, J. A., Hanley, P. F., & Cassidy, D. L. (2005). Internal controls: The key to accountability. Retrieved on November 21, 2019 from: http://www.ucop.edu/riskmgt/ erm/documents/ pwc_int_ctrls.pdf.
McCrindell, J. Q. (2015), Framework for financial management and control. Journal of Finance Management Institute, 16(2) pp, 11-39. http://dx.doi.org/10.20431/2349-0349.0703001
Mellon, B. (2013). US research universities increasingly targeted by cyberattacks. Retrieved on May 3, 2019 from: http://www.upi.com/Top_News/US/2013/07/17/US-research-universities-increasingly-targeted-bycyberattacks/26641374065244/
Mendez, R. (2015). General control vs. application control. Prezi. Retrieved on September 8, 2019 from: https://prezi.com/iacknmfi6oxg/general-control-vs-application-control/
Hester W. J. Meyer (2003) Information use in rural development, The New Review of Information Behaviour Research, 4:1, 109-125. https://doi.org/10.1080/14716310310001631471
Mikoluk, K. (2013). Planning in management: strategic, tactical, and operational plans. Retrieved on October 13, 2019 from: https://blog.udemy.com/planning-in-management/
Misra, G. (2019). Office Operations: Meaning, Importance and Classification. Retrieved on May 31, 2019 from: http://www.yourarticlelibrary.com/office-management/office-operations-meaning-importance-and-classification/74657 .
National Commission for Colleges of Education (2019). Nigeria Certificate in Education Minimum Standards for General Education Courses, TETF project 2012. Garki Abuja: Department of Academic Programmes.
National Vulnerability Database (2019). Security and privacy controls for federal information systems and organizations. Available at https://nvd.nist.gov/800-53/Rev4/control/SI-4
Neelameghan, A. (2008). Information systems for national development - the social relevance of information systems. International Forum on Information and Documentation, 5, (4), 3-8
Osuala, E. C. & Okeke, A. U. (2006). Administrative office management. Enugu: Cheston Agency Ltd.
Rogers, G. & Ashford, T. (2015). Mitigating higher ed cyber-attacks. ASCUE Proceedings, 5(2), 234-241.
Rouse, M. (2014). Electronic data interchange. Retrieved on September 8, 2019 from: https://searchdatacenter.techtarget.com/definition/EDI .
State of New York Comptroller, (2007). Standards for internal control in New York State government. Retrieved on November 21, 2019 from: https://osc.state.ny.us/agencies/ ictf/docs/intcontrol_stds.pdf.
State of Vermont, (2015). Monitoring, assessment and planning. Retrieved on November 20, 2019 from: https://dec.vermont.gov/watershed/map.
Techopedia (2019). Information management (IM). Retrieved on June 12, 2019 from: https://www.techopedia.com/definition/20012/information-management-im
The Institute of Internal Auditors (2008). Practice guide: Auditing the control environment. Retrieved on September 11, 2019 from: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-the-Control-Environment-Practice-Guide.aspx.
Tunji, O., & Nelson, O. (2011). The effect of e-portal system on corporate image of universities. i-manager’s Journal of Educational Technology, 7 (4), 345-349.
University of California, (2017). Understanding internal controls. Retrieved on September 3, 2019 from: http://www.universityofcaliforna.com