Skip to main content
Log in

Investigating importance and key factors for information governance implementation in Nigerian Universities

  • Published:
Education and Information Technologies Aims and scope Submit manuscript

Abstract

Information governance (IG) embraces underlying necessities to organize information using consistent method for meeting organizational needs. This demand has proliferated over the past few years to any organization, including universities. However, due to the poor nature of information management systems in Nigerian universities, there is a significant need to explore the possibilities of IG implementation. Even though various factors affect IG success, these have not been investigated yet, particularly in the context of the Nigerian university system. The objective of this study is to identify key factors necessary for IG implementation in universities. A qualitative research using a case study approach was used with a semi-structured interview technique to elicit findings from the domain of information and record management in case universities. Findings were qualitatively analyzed using ATLAS-ti 7.0 software for developing meaningful interpretations. Research findings embraced key factors including user expertise, funding, technology; org. facilities, and security, which are the necessities of leading to successful IG implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Abdurrahman, A. B. (2015). Management of university records for effective administration of universities in north- central Nigeria. International Journal of Library and Information Science, 7(30), 47–54. Retrieved from http://www.academicjournals.org/IJLIS (12 October 2018).

  • Al-Ruithe, M. & Benkhelifa, E. (2017). Analysis and classification of barriers and CSFs for implementing a cloud data governance strategy. Procedia Computer Science, pp.113, pp.223–232. The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks. Available at http://www.sciencedirect.com. Accessed (14 April 2020).

  • Ali, M., & Mujahid, N. (2015). e-Government re-inventing governance: A case study of Pakistan. Public Policy and Administration Research, 5(2), 1–8.

    Google Scholar 

  • Alreemy, Z., et al. (2016). Critical success factors for information technology governance (ITG). International Journal of Information Management, 36, 907–916. Retrieved from http://www.elsevier.com/locate/ijinfomgt. Accessed (27 February 2020).

  • Asogwa, R., & Brenden, F. (2015). The challenges of managing electronic records in developing countries: Implications for records managers in sub- Saharan Africa. Records Management Journal, 22(3), 198–211.

    Article  Google Scholar 

  • Bekkers, V., Edwards, A., & Kool, D. (2013). Social media monitoring: responsive governance in the shadow of surveillance? Government Information Quarterly, 30, 335–342. https://doi.org/10.1016/j.giq.2013.05024. Accessed (14 May 2020).

  • Brooks, J. (2019). Perspectives on the relationship between records management and information governance. Records Management Journal. https://doi.org/10.1108/RMJ-09-2018-0032. Accessed (14 May 2020).

  • Bullen, C., & Rockart, J. (1981). A primer on critical success factors. Working paper 1220-81. Report Alfred P, Massachusetts Institute of Technology (MIT), Sloan School of Management. Retrieved from https://www.researchgate.net/publication/5175561_A_primer_on_critical_success_factors

  • Creswell, J. W. (2009). Research design: Qualitative, quantitative and mixed methods approaches (3rd ed.). Sage Publications.

    Google Scholar 

  • Eastman, C., Teicholz, P., Sacks, R., & Liston, K. (2011). BIM handbook: A guide to building information modeling for owners, managers, designers, engineers and contractors (2nd ed.). Wiley.

    Google Scholar 

  • Faber, B., Budding, T., & Gradus, R. (2020). Assessing social media use in Dutch municipalities: political, institutional, and socio-economic determinants. Government Information Quarterly, 37. 101484. https://doi.org/10.1016/j.giq.2020.101484. Accessed (14 May 2020).

  • Gartner. (2018). Gartner says master data management is critical to achieving effective information governance. Available at: http://www.gartner.com/newsroom/id/1898914. Accessed (13 November 2018).

  • Gesulga, J. M., Berjame, A., Moquiala, K. S., & Galido, A. (2017). Barriers to electronic health record system implementation and information system resources: a structured review. Procedia Computer Science, pp.124, 544–551. 4th Information Systems International Conference, ISICO 2017, 6–8 November, Bali, Indonesia. Available at http://www.sciencedirect.com. Accessed (14 April 2020).

  • Gebrasilase, T., & Lessa, L. F. (2011). Information security culture in public hospitals: The case of Hawassa referral hospital. The African Journal of Information Systems, 3(3), 1.

    Google Scholar 

  • Genemo, H., Miah, SJ., & McAndrew, A. (2016). A design science research methodology for developing a computer-aided assessment approach using method marking concept. Education and Information Technologies, 21, 1769–1784.

  • Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28(2), 203–236.

    Article  Google Scholar 

  • Hafner, H. W. (2001). Pareto’s principle: The 80–20 rule. Retrieved from

  • ISACA. (2012). COBIT 5: a business framework for the governance and management of enterprise IT. Retrieved from http://www.isaca.org/COBITuse. Accessed (12 June 2020).

  • Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. Sage.

    Book  Google Scholar 

  • Lomas, E. (2010). Information governance: Information security and access within a UK context. Records Management Journal, 20(2), 182–198.

    Article  Google Scholar 

  • Maroop, N., et al. (2016). Information security management system implementation success factors: A review. Advanced Science Letters, 22(10), 3023–3026.

    Article  Google Scholar 

  • Miah, SJ., Gammack, J., & McKay, J. (2020). A metadesign theory for tailorable decision support. Journal of Association for Information Systems, 20(5), 570–603.

  • McGregor, W. (2000). The future of workspace management. Facilities, 18(3/4), 138–143.

    Article  Google Scholar 

  • McKeen, J. D., & Smith, H. A. (2007). 'Developments in Practice XXIV: Information Management: The Nexus of Business and IT'. Communications of the Association for Information Systems, vol. 19(3), pp. 34–46.

  • McLeod, J., & Hare, C. (2012). How to manage records in the e-Environment (2nd ed.). Routledge.

    Google Scholar 

  • Mehta, A. L. (2010). Critical success factors for successful enterprise resource planning and implementation at Indian SMEs. International Journal of Business, Management and Social Sciences, 1(1), 65–78.

    Google Scholar 

  • Momoh, M., & Abdulsalam, D. O. (2014). Information management efficiency in universities in northern Nigeria: An analysis. World Journal of Social Sciences, 4(1), 107–116.

    Google Scholar 

  • Mullon, P., & Ngoepe, M. (2019), An integrated framework to elevate information governance to a national level in South Africa. Records Management Journal, 29(1/2), pp.103–116. Available at http://doi-org.ezaccess.library.uitm.edu.my/10.1108/RMJ-09-2018-0030 . Accessed (22 December 2019).

  • Musangi, P. S., Odero, D., & Kwanya, T. (2019). Critical success factors in library reengineering: A case of academic libraries in Kenya. Global Knowledge, Memory and Communication, 68(67), 534–549.

    Article  Google Scholar 

  • Nfuka, E. N., & Rusu, L. (2010). Critical success factors for effective IT governance in the public sector organizations in a developing country: the case of Tanzania in Trish, A., Turpin, M. and van Deventer, J.P. (Eds), Proceedings of the 18th European Conference on Information Systems, University of Pretoria, Pretoria, 1–15.

  • Nfuka, E.,N., & Rusu, L. (2013). Critical success factors for implementing effective IT governance in Tanzania public sector organizations. Journal of Global Information Technology Management, 16(30), 53–76.

  • Ogbonna, A. (2017, March 27). Dino: How the certificate confirmation drama was unfolded. Retrieved from http://www.vanguard.com/2017/03/dino-certificate-confirmation-drama-unfolded/. Accessed (24 June 2019).

  • Oliveira, T., & Martins, M. F. (2011). Literature review of information technology adoption models at firm level. The Electronic Journal Information Systems Evaluation, 14(1), 110–121.

    Google Scholar 

  • Oliveira, G. H. M., & Welch, E. W. (2013). Social media use in local government: Linkage of technology task and organizational context. Government Information Quarterly, 30(4), 397–405. https://doi.org/10.1016/j.giq.2013.05.019

    Article  Google Scholar 

  • Ordemici, F. (2008). Government records and records management: law on the right to information in Turkey. Government Information Quarterly, 25, 303–312. https://doi.org/10.1016/j.giq.2006.07.017. Accessed (14 May 2020).

  • Peterson, R. R. (2004). Crafting information technology governance for today’s turbulent environment. Information Systems Management, 21(4), 7–21.

    Article  Google Scholar 

  • Phiri, M. J. (2016). Managing university records and documents in the world of governance, audit and risk: case studies from South Africa and Malawi. PhD Thesis University of Glasgow. Retrieved from http://www.theses.gla.ac.uk/7506/(19 December 2019).

  • Pickard, A. J. (2013). Research methods in information (2nd ed.). Facet Publishing.

    Google Scholar 

  • Prokofieva, M. & Miah, SJ (2019). Blockchain in healthcare. Australasian Journal of Information Systems 23, 1–20

  • Rantala, S., Swallow, B., Paloniemi, R. & Raitanen, E. (2020). Governance of forest and governance of forest information: interlinkages in the age of open and digital data. Forest Policy and Economics, 113, 1–10. https://doi.org/10.1016/j.forpol.2020.102123. Accessed (14 April 2020).

  • Rezaei Aghdam, A., Watson, J., Cliff, C. & Miah, SJ (2020). Improving theoretical understanding towards patient driven  healthcare innovation: Online value co-creation perspective: A systematic review. Journal of Medical Internet Research, 22(4):e16324. https://doi.org/10.2196/16324.

  • Rockart, J. F. (1979). Chief executives define their own data needs. Harvard Business Review, 57(2), pp. 81–93. Retrieved from http://www.hbr.org/1979/(10 December 2018)

  • Siponen, M. T., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & Management, 46(5), 267–270.

    Article  Google Scholar 

  • Sumner, M. (1999). Critical success factors in enterprise wide information management systems projects. In M. Sumner (Ed.), Proceedings of the 1999 ACM SIGCPR conference on computer personnel research (pp. 297–303). https://doi.org/10.1145/299513.299722.

  • Smallwood, R. F. (2013). Managing electronic records: Methods, best practices and technologies. Wiley.

    Google Scholar 

  • Smith, M. S. (2015). A phenomenological study of critical success factors in implementing information governance. Unpublished PhD Thesis, University of Phoenix, USA: ProQuest LLC.

  • Sprehe, J. T. (2005). The positive benefits of electronic records management in the context of enterprise content management. Government Information Quarterly, 22, 97–303. https://doi.org/10.1016/j.giq.2005.02.003. Accessed (14 May 2020).

  • Strauss, A. L., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage Publications.

    Google Scholar 

  • Tan, W., et al. (2009). Implementing IT service management: A case study focussing on CSFs. Journal of Computer Information Systems, 5(2), 1–12.

    Google Scholar 

  • University Y academic brief. (2004). vol. 1, summited to Nigerian University commission, p. 6–90

  • Upadhyay, P., Jahanyan, S. & Dan, P.K. (2011). Factors influencing ERP implementation in Indian manufacturing organizations: a study of micro, small and medium scale enterprises. Journal of Enterprise Information Management, 24(2), 130–145.

  • Wahyuni, D. (2012). The research design maze: understanding paradigms, cases, methods, and methodologies. Journal of Applied Management Accounting Research, 10(1), 69–80. Available at http://www.researchgate.net/publication/256024036. Accessed (26 March 2020).

  • Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.). Sage Publications.

    Google Scholar 

  • Yudatama, U., Nazief,B., Hidayanto, A.N. & Mishbah, M. (2017). Factors affecting awareness and attitude of IT Governance implementation in the higher education institution: a literature review. Proceedings of the 3rd International Conference on Science in Information Technology, Oct. 25–26, 588–592. Bandung, Indonesia: IEEE Xplore Press. Available at https://doi.org/10.1109/ICSITech.2017.8257181 . Accessed (14 April 2020).

  • Zhiling, C., Yuan, Y., Archer, N., & Connelly, C. E. (2018). Strategic value alignment for information security management: a critical success factor analysis. Information and Computer Security, 26(2), 150–170. https://doi.org/10.1108/ICS-06-2017-0042. Accessed (02 May 2020).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shah J. Miah.

Ethics declarations

Conflict of Interest

None.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammad, J.S., Miah, S.J., Isa, A.M. et al. Investigating importance and key factors for information governance implementation in Nigerian Universities. Educ Inf Technol 27, 5551–5571 (2022). https://doi.org/10.1007/s10639-021-10817-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10639-021-10817-4

Keywords

Navigation