Research Data Management and Information Security: Role of Library and Information Technology Service (Its) Units in Federal Universities of Technology In Nigeria

Fatimah Jibril Abduldayan*, Fasola Petunola Abifarin**, Georgina Uchey Oyedum***, Jibril Attahiru Alhassan****
*Lecturer, Department of Library and Information Technology, Federal University of Technology, Minna, Nigeria.
**,****Associate Professor, Department of Library and Information Technology, Federal University of Technology, Minna, Nigeria.
***Professor, Department of Library and Information Technology, Federal University of Technology, Minna, Nigeria.
Periodicity:December - February'2019
DOI : https://doi.org/10.26634/jit.8.1.15712

Abstract

This exploratory study presents how information security affects research data management in all the Federal Universities of Technology (FUTs) in Nigeria. These FUTs in Nigeria are: The Federal University of Technology, Minna; Federal University of Technology, Akure; Federal University of Technology, Owerri; Modibbo Adama University of Technology, Yola; and Abubakar Tafawa Balewa University, Bauchi. Lack of trust in the available security systems and safety procedures guiding the Institutional Repositories (IR) have been identified as perceived impediment to depositing intellectual outputs and the underlying research data by researchers. The consequence of this is poor patronage of the IR and low content of repositories of FUTs in Nigeria. The objective of this study was therefore to identify the available support systems in the Libraries and Information Technology Service (ITS) Units of FUTs in Nigeria. The study used oral face-to-face semistructured interview method conducted on five university librarians and five heads of ITS Units of FUTs in Nigeria, who are responsible for the development and management of institutional repositories and are also stakeholders in effective research data management. For the data transcription and analysis, this study adopted the Braun and Clarke (2006) thematic analysis approach, which involve a six-phase of qualitative data analysis. Findings of the study confirmed that hacking, as a cyber threat, still pose a great threat to intellectual output and research data deposited in the IR of FUTs in Nigeria. The study recommended the need for continued capacity building to improve the cyber security skills and data management skills of ITS staff and librarians, respectively.

Keywords

Research Data, Research Data Management, Federal Universities of Technology, Information Technology Service, Library, Information Security, Cyber Security, Hacking, Nigeria.

How to Cite this Article?

Abduldayan, F. J., Abifarin, F. P., Oyedum, G. U., Alhassan, J. A(2019). Research Data Management And Information Security: Role Of Library And Information Technology Service (Its) Units In Federal Universities Of Technology In Nigeria, i-manager's Journal on Information Technology, 8(1), 20-28. https://doi.org/10.26634/jit.8.1.15712

References

[1]. Braun, V., & Clarke, V. (2006). Using Thematic Analysis in Psychology. Qualitative Research in Psychology, 3(2), 77-101.
[2]. Chiware, E., & Mathe, Z. (2015). Academic libraries' role in research Data Management Services: A South African perspective. South African Journal of Libraries and Information Science, 81(2), 1-10.
[3]. Deventer, M. V., & Pienaar, H. (2015). Research Data Management in a developing country: A personal journey. IJDC, 10(2), 33-47. http://dx.doi.org/10.2218/ ijdc.v10i2.380
[4]. Heidorn, P. B. (2011). The emerging role of libraries in data curation and e-science. Journal of Library Administration, 51(7-8), 662-672.
[5]. Holdren, J. P. (2013). Memorandum for the heads of executive departments and agencies: Increasing access to the results of federally funded scientific research. Office of Science and Technology Policy, Washington DC.
[6]. Jones, S., Guy, M., & Pickton, M. (2013). Research Data Management for Librarians. Digital Curation Centre, University of Northampton. Retrieved from http://www.dcc.ac.uk/sites/default/files/documents/even ts/RDM-for-librarians/RDM-for-librarians-booklet.pdf
[7]. Madu, E. C., & Dike, V. W. (2012). An assessment of the relationship between information literacy competencies and academic productivity amongst staff in Nigerian Universities in North Central Geographical Zone. Journal of Emerging Trends in Computing and Information Sciences, 3(2), 179-185. Retrieved from www.cisjournal.org/ journalofcomputing/archive/ vol3no2_8.pdf
[8]. Milena, Z. R., Dainora, G., & Alin, S. (2008). Qualitative research methods: A comparison between focus-group and in-depth interview. Annals of the University of Oradea, Economic Science Series, 17(4), 1279-1283.
[9]. NUC. (2016). NUC Approved Nigerian Universities. Retrieved from www.nuc.edu.ng
[10]. Oyedum, G. U. (2006). Types of Libraries and Children's Literature in Nigeria (pp. 42- 49). Minna: Mairo Press and Computer Center.
[11]. Oyedum, G.U., Abduldayan, F.J., & Chuks-Ibe, O. (2014). Use of library resources by undergraduate students' in the Nigerian Federal Universities, Information Trends, Journal of National Library Association, Kaduna State Chapter, 11, 77-79
[12]. Provalis Research. (2018). Provalis QDA Miner. Retrieved from www.provalisresearch.com
[13]. Rouse, M. (2018). Repository 2018. Retrieved from https://searchoracle.techtarget.com/definition/repository
[14]. Schubert, C., Shorish, Y., Frankel, P., & Giles, K. (2013). The evolution of research data: Strategies for curation and data management. Library HiTech News, 30(6), 1-6.
[15]. Smith, P. L. (2014). Exploring the Data Management and Curation (DMC) practices of Scientists in research labs within a Research University (Doctoral Dissertation, Florida State University.
[16]. Techopedia. (2018). Information Security. Retrieved from https://www.techopedia.com/definition/10282/ information-security-is
[17]. Thoegersen, J. L. (2015). Examination of Federal Data Management plan guidelines. Journal of eScience Librarianship, 4(1), 1-10.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.