1.0 INTRODUCTION
The introduction of the computer and advent of the Internet has changed the way we live in the modern world. This spans across every aspect of human life. Modern innovations have led to the description of the age in which we live as “the Information age”. Information technology and management therefore plays a vital role to the extent that timely access to Information could save a life while improper management of Information could lead to huge problems and losses of opportunities. In terms of Corporate governance and financial reporting, the financial implications of these losses could be great on corporate entities when quantified in monetary terms and this has led several companies to invest in finding better ways of improving on Information systems.
Corporate scandals and failures across the globe including Enron, Worldcom, Daewoo Group (in Korea) and HIH (a major insurance group) in Australia, has raised serious questions about the way public corporations are governed around the world. This is usually characterized by managers who have been trusted with company control but due to conflicting/self interest, sometimes engage in actions that are profoundly detrimental to the interests of shareholders and other stakeholders. When managerial self-dealings are excessive and left unchecked, they often have serious negative effects on corporate values and the proper functions of capital markets. Around the world there is growing consensus that it is vitally important to strenghten corporate governance to protect the rights of shareholders, curb managerial excesses, and restore confidence in capital markets.
Last year Nigeria witnessed the sacking of Managing Directors of five of Nigeria’s top banks namely Intercontinental Bank Plc, Union Bank, AfriBank, Oceanic Bank and FinBank. This was largely due to issues relating to Corporate governance and ethical code of conduct
References: Arnum, P.V. (2004). Information technology insights: Cyber security ushers IT into corporate governance practices. Chemical Market Reporter, 265(17), 17-18. Aytes, K., &Connolly, T. (2004). Computer security and risky computing practices: A rational choice perspective. Journal of Organizational and End User Computing, 16(3), 22. Bridging the gap between IT and corporate governance (2006) [Electronic version]. Sarbanes-Oxley Compliance Journal. Retrieved October 30, 2006, from http://www.s-ox.com/news/detai l.cfm articleID=1949. Canback, S. (1998). The logic of management consulting. Journal of Management Consulting, 10(2), 3-11. Carlson, L. W. (September October 2004). Using technology foresight to create business value. Research Technology Management. Carlson, S. (2004). A hard eye on what IT buys [Electronic version]. Chronicle of Higher Education, 50(36), A35-A36. Carr, N.G. (2004). Does IT matter? : Information technology and the corrosion of competitive advantage. Boston: Harvard Business School Press. Clevenson, A., Guimaraes, T., & Yoon, Y. (1998). Exploring expert system success factors for business process reengineering. Journal of Engineering and Technology Management, 15, 179-199. Colwill, C., Todd, M., Fielder, G., & Natanson, C. (2001). Information assurance. BT Technology Journal, 19(3), 107. Connor, D. (2003). Report: Data warehouse failures commonplace. Network World, 20(3), 24. Corey, D., Trimmer K., (2004). Information assurance and security. Journal of Organizational and End User Computing, 16(3), 1. CSI/FBI. (2005). Computer crime and security survey. Retrieved October 20, 2006, from http://www.cpppe.umd.edu/Books tore/Documents/2005CSISurvey.p df. Ezingeard, J., McFaden, E., & Birchall, D. (2005). A model of information assurance benefits. EDPACS, 32(11), 1. Freedman, R. (2003). Helping clients value IT investments. Harvard Business Review, 14(3), 33-39. Hall, D. (2004). Requirements and policy challenges in highly secure environments. Association for Computing Machinery Special Interest Group on Management of Data. Retrieved November 14, 2006, from http://acm.org/sigmod/. Harkness, Michael, D. (2005). Electronic banking and information assurance. Internal Auditing, 20(2), 4. Henry, R.M. (2004). The role of knowledge in information technology project governance. Unpublished doctoral dissertation, University of Pittsburg School of Business, PA. Hoffman, T. (2006, May 22). Weighting the risks. Computerworld. Retrieved October 31, 2006, from www.computerworld.com. Kabay, M. (2005). Improving information assurance education key to improving security management. Journal of Network and Systems Management, 13(3), 247. Kaplan, R., & Norton, D. (January-February 1996). Putting the balanced scorecard to work. Harvard Business Review, 74(1), 75-85. Kappelman, L., McKeeman, R., & Zhang, L. (2006). Early warning signs of IT project failure: The dominant dozen. Information Systems Management, 23(4), 3138. Klein, K., & Sorra, J. (1996). The challenge of innovation implementation. Academy of Management Review, 21(4), 1055-1080. Korotka, M., Yin, R., & Basu, S. (2005). Information assurance technical framework and end user information ownership. Journal of Information Privacy & Security, 1(1), 10. Lindsey, K., & Frolick, M. N. (2003). Critical factors for data warehouse failure. Business Intelligence Journal, 8(1). MacMillan, I.C., & McGrath, R. G., (2004). Nine new roles for technology managers. Research Technology Management, 47(3), 1626. Marsan, C. D. (2006). Q&A: Security expert recommends net diversity. Network World, 23(20), 19. Mukherjee, D., & D 'Souza, D. (2003). Think phased implementation for successful data warehousing. Information Systems Management, 20(2), 89-92. Peebles E. M. (2006). The world 's newest profession: Management consulting in the twentieth century. Harvard Business Review, 84(10), 34. Pfeffer, J, & Sutton, R. I. (January 2006). Evidence-based management. Harvard Business Review, 84(1), 63-74. Pinto, C., Arora, A., Hall, D., & Schnitz, D. (2006). Challenges to sustainable risk management: Case example in information network security. Engineering Management Journal, 18(1), 17. Price, J.L. (1997). Handbook of organizational measurement. International Journal of Manpower, 18(4-6), 303-333. Remenyi, D., & Money, A.H. (2000). The effective measurement and management of IT costs and benefits. Oxford, England: Boston, Butterworth-Heinemann. Scott, W. (2003). Organizations: Rational, natural, and open systems (5th ed). Upper Saddle River, NJ: Prentice Hall. Smith, E.W. (2001, January 8). Finding your niche in IT consulting. TechRepublic. Retrieved November 11, 2006, from http://techrepublic.com.com/51 00-6331-1028870.html. Stahl, B. (2004). Responsibility for information assurance and privacy: A problem of individual ethics. Journal of Organizational and End User Computing, 16(3), 59. Weill P., & Ross, J. (2004). IT governance: How top performers manage IT for superior results. Boston: Harvard Business School Press. Whiting, R. (2003, January 13). Warehouse worries. Information Week [Electronic version]. Retrieved October 31, 2006, from http://www.informationweek.com Williams, M.P Williams, R. (2004). Management fashions and fads: Understanding the role of consultants and managers in the evolution of ideas. Management Decision, 42(5-6), 769. Winters, F. (2002). The top 10 reasons projects fail. Retrieved November 20, 2006, from http://www.gantthead.com/ article.cfmID=l47229. Wright, S. & Wright, A. (2002). Information systems assurance for enterprise resources planning systems: Unique risk considerations. Journal of Information Systems, 16(1), 99-113.