Data Handling Stages and Information Security Practice among Non-Academic Staff of State-Owned Polytechnics, Oyo State, Nigeria.

Publication Date: 19/03/2026

DOI: 10.52589/BJCNIT-WMFXRIE4


Author(s): Tolulope Elizabeth Adenekan (Ph.D.), Ibrahim Sunday Oyekola.
Volume/Issue: Volume 9, Issue 1 (2026)
Page No: 123-136
Journal: British Journal of Computer, Networking and Information Technology (BJCNIT)


Abstract:

Information security serves as the strategic effort to shield data from threats. This study investigated the influence of data handling stages and information security practices among Non-Academic staff of State–owned polytechnics, Oyo State, Nigeria. The study was guided by Traid CIA model and Record Continuum Model and used a descriptive survey design, for the population of 1109. The sample size for the study is 285 which was derived using Krejcie and Morgan sample size table and stratified sampling techniques was employed. Tools for data collection was a structured questionnaires which was administered across these three polytechnics (The Polytechnic, Ibadan; Adeseun Ogundoyin Polytechnic, Eruwa; The Oke-Ogun Polytechnic, Saki); after which 272 valid responses were analyzed using SPSS. Descriptive results showed a high level of information security practice, and a high implementation of data handling stages with a smaller significant contribution. The findings indicate that strong role and permission management substantially enhance the confidentiality, integrity, and availability of institutional records. In contrast, gaps in systematic classification, archiving, monitoring of system use, and control of unauthorized software weaken overall resilience. The study concludes that institutionalizing clear data-handling procedures, instituting regular training and periodic user-access reviews will substantially improve information security among registry staff.

Keywords:

Information security practice; data handling stages; non-academic staff, state polytechnics.

No. of Downloads: 0
View: 43



This article is published under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
CC BY-NC-ND 4.0