Information Audit As An Important Tool in Organizational Management - A Review of Literature

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Article

Business Information Review


2019, Vol. 36(1) 15–22
Information audit as an important ª The Author(s) 2019
Article reuse guidelines:
sagepub.com/journals-permissions
tool in organizational management: DOI: 10.1177/0266382119831458
journals.sagepub.com/home/bir
A review of literature

Ayinde Lateef
Pan Atlantic University, Nigeria
Funmilola Olubunmi Omotayo
University of Ibadan, Nigeria

Abstract
This article considers information as a strategic asset in the organization just as land, labour and capital. It elaborates how
information assets help organizations to meet its organizational objectives and also examine issues that led to the pro-
liferation of information assets; because of the proliferation of data and information, it becomes difficult for organization
to make effective use of these information assets to meets its objectives. This leads to management of information assets
and management of information risk. These two areas are critical to organization. It was concluded that information audit
is the effective tool that could be used to manage the information asset and information risk. Also that information policy
should be drawn; information professional should be among those handling information-related issues.

Keywords
Information, information asset, information audit, information management

Introduction risk management and safety programmes to mitigate


hazards. Information informs how organizations can
Information is recognized as the vital and most strategic
improve decision-making by systematically building ana-
business asset (Tieto, 2013). Prior to 21st century, informa- lytics and information capabilities to monetize more of
tion is not seen as an essential asset or factors of production their data assets. Information is any piece of text or data,
in an organization such as land, labour and capital. Over the document, report, book collection, knowledge, market
last few decades, it has been shown that the information intelligence, link, association, perception, hunch or simple
revolution has begun to change the very source of wealth idea held in any medium (Corrall, 2008).
for given countries (Bowes, 1995). Wealth is perceived as
information to create value. The quest for wealth is now the
quest for information and its relevance in business. Infor-
Information asset and organization
mation has become a top-3 organizational priority for 80
per cent of the organizations surveys (Capgemini, 2008). An information asset is a body of information that can be
Also in a world survey of 1375 subscribers conducted by used to meet the organization objectives. Examples of
Harvard Business Review Analytic Services (2010), 85 per information assets in organizations are documentation of
cent of respondents agreed that information is a key strate- previous information audit (IA), registers, configuration
gic asset, and only 7 per cent believed they are very well management databases or softwares, emails, spreadsheets,
positioned to exploit it. Information is used to drive busi- images, records, books, journals, dictionary, directory,
ness models. Information in modern economies describes almanacs and year books, handbooks and manuals, seri-
how the paradigm of production, distribution and consump- als/periodicals, Manuscripts, audio tapes or cassettes, pho-
tion of products and services is dramatically altered by big nodiscs, financial data, backup and archive data, system
data and predictive analytics (Blasé and Rao, 2013).
Exploiting information-driven in an organization results Corresponding author:
in good feedback, increases customer’s knowledge with Ayinde Lateef.
better information, assists them learn how to rapidly adjust Email: ayindelateef0606@yahoo.com
16 Business Information Review 36(1)

software, policies and procedures, emails, encrypted data (Henczel, 2001). Organizations having too much data,
and so on. All these can be grouped together and treated as information, these lead to information overload. It is too
an information asset. These information assets can be print easy for people to get a lot of information and too difficult
or electronic format. Information asset could be in the form for them to find the right information at the right time, in
of structured, semi-structured or unstructured data that is the right place in their organizations. Some of the infor-
physically stored not only in computer systems but also in mation assets may not be the most appropriate for their
paper records, drawings, photographs, libraries and so on needs because of super abundance of information. It over-
(Borek et al, 2013). Before we could call information an whelms an organization’s ability to sift through, organize
asset (information asset), National Archives (2017) and act on them. Ptacek (2008) asserted that duplication of
asserted that it must possess the followings: valuable, risk employee efforts, gaps in information wasted on unsuc-
associated with privacy and storage, possess specific con- cessful searches also manifest a lack of information man-
tent, have a manageable life cycle (creation–disposition), agement (IM) and create a lack of knowledge
expandable, compressible, substitutable, transported at management where employees fail to learn from each
ultra-high speed for a low cost, diffusive and sharable. other, share information and collaborate on projects.
Analysing the value of information asset, it is often Henczel and Robertson (2016) asserted that executives
difficult to measure the financial value of information are bypassing the information professionals in search of
assets consistently. Oppenheim et al. (2003) carried out a solutions that have been identified as significant risk and
case–study research in information-intensive companies in compliance challenges. They do not employ the informa-
the UK to investigate current business approaches for the tion professionals that have the skills and do not know
identification and management of information assets and how to navigate these overcrowed information assets, that
their attributes, and it was cleared that linking the business is, to select, process and de-select appropriate information
benefits of managing information assets to commercial which leads to duplication of employee efforts, bridges in
objectives is key to senior managers. Adler et al. (2016) information, time and money waste. In organizations,
also elaborated information asset from the angle of there is need to organize information and monitor its use
accounting, its potential value and price, identifying differ- to meet the organizational objectives, and this is done
ent types of valuation/pricing methods to overcome this through IM. In order for an organization to achieve high
valuation problem and offering a model to select the most performance, it is stated that, effective IM is the key
appropriate valuation/pricing method for a particular situ- (Roglaski, 2006).
ation. They identified highly unique, lack objective price
benchmarks and have a high potential for piracy, has effect
on the value and pricing of information assets.
Information management
Quality information is needed in any organization in IM is a rational approach in managing information in an
order to achieve the organization objectives. Organizations organization. IM can be defined as the management of
have a management structure that determines interrelation- individual information, system development and improve-
ship among the different tasks and the staff, divides and ment. It is a process that aims to manage information for the
authorizes staff to carry-out roles, responsibilities to differ- benefit of the organization as a whole by exploiting, devel-
ent tasks. The ability of employees to locate, use, archive oping and optimizing information resources. There is the
and share information helps in conducting research, devel- need to have a clear and visible alignment of the informa-
oping new products, collaboration and organization effi- tion that is acquired by the information users with the
ciency is made possible through the use of information objectives of the organization to which they belong. It is
professionals. Orna (1999) asserted that in order for the also necessary to identify the information that is needed to
organization to interpret the answers and make decisions, optimize the achievement of organizational objectives.
organizations need to understand the organizational objec- Information managers or professionals in an organization
tives, organization culture and also the information politics should take into consideration the organizational culture,
that flows from it. The key elements of an organization are organizational structure as well as organizational politics in
its people, structure, business processes, politics and cul- order to achieve the organizational goals.
ture (Laudon and Laudon, 2015). IM serves managers, professionals, database administra-
The two major trends that brought us to the Information tors and senior executives of organizations. Information
Age which are massive abundant of information and glo- professionals coordinate and integrate a wide range of
balization of all economies and which put organizations information handling activities within the organization.
under constantly increasing pressure to adapt, innovate These include the formulating corporate information pol-
and speed-up their processes to keep up with their com- icy, design, evaluation and integration of effective infor-
petitors. Because of the proliferation of information prod- mation systems and services, the exploitation of IT for
ucts and delivery methods, information users within competitive advantage and the integration of internal and
organizations are suffering from information overload external information and data. IM describes the means by
Lateef and Omotayo 17

which an organization plans, arranges, uses, controls, dis- is involved, and the level of risk. Risk management
seminates and disposes of its information and ensures that involves the following: risk identification, understanding
the value of that information is identified and exploited the present state of the risk, putting protective measures
effectively and efficiently. Corporate IM is a process of in place, then the business impact. It also involves placing
strategic sense making, planning the supply for future risk into categories (low, middle or high risk) or numerical
information needs, increasing the utility value of available value risk. It is important to know that there will always be
information resources, eliminating redundant information, risk in organization, it is highly effective to reduce the risk
ensuring compliance to legislation, and increasing the or mitigate against the risk.
return on investment in information technologies (ITs) Information risk could be in the followings: risk of dis-
(Pieterse, 2007). seminating sensitive information, risk of wasting time and
The content and scope of IM has been applied in several resources for searching for multitudes of files on the web or
fields such as business and management, information sys- database, network failure, server failure, technical failure,
tem, information communication and technology, public risk of destroying information in order to identify what is
administration, communication, library science, informa- important or not. A research carried out at Harvard Busi-
tion science, knowledge management and so on. IM can ness School (2011) reviewed that despite the high value
be described as the process whereby resources are used that executives place on information from their customers,
with the purpose of optimizing the use and dissemination less than half of the respondents 44 per cent said their
of information within an organization. Many authors organizations are managing information security threats,
defined IM by focusing on IT, IM is not a technology such as customer and company data theft well. This chal-
problem, and rather, it is about organizational, cultural and lenge will be heightened over the next few years as com-
strategic factors that must be considered to improve the panies, trying to get more value from information assets,
management of information within organization (Dandago must balance the competing imperatives of increased open-
and Rufai, 2012). Often the term is used interchangeably ness on the one hand and greater security on the other.
with others, for example, IM is often equated with the Harvard Business School research asserted that security
management of information resources, the management incidents on computer networks and ramifications of some-
of IT or the management of information policies or stan- one or something gaining unauthorized access to sensitive
dards (Choo, 2002). IM is the right decisions and actions at information assets are the elements of information risk.
the right time based on correct information (Tieto, 2013). This can have a damaging impact on the organization,
Thus, IM is the ability of organizations to acquire pro- causing reputational damage, financial loss and business
cess, manage, store, preserve and deliver the right informa- inefficiency.
tion to the right people at the right time in the right format. Klassen et al.’s (2012) anatomy of information risk
An information asset that is of high quality for a particular explains the aftermaths of ineffective IM is poor data/infor-
task might be of low quality for another different task, that mation and poor information quality. They elaborated that
is, information assets quality depends on the content of the the consequence of poor information quality is a lowered
usage and on the users. In order to manage information business process performance which will in turn create
assets, information professionals should analyse the quality operational, strategical and opportunity risk. They went
of the information asset in terms of accessibility, accuracy, further to clarify that poor information will lead to financial
completeness, currency, availability, relevance, reliability, performance risk, customer satisfaction risk, compliance
timeliness, understandability, format and consistency risk, health and safety risk, operational efficiency and cor-
which will in turn influence the objective of the organiza- porate strategy risk in all of the business processes that are
tion. Poor information quality problems, lower business essential to achieve the organizational goals and objectives.
process performance and eventually leads to negative risks It is therefore critical that the organizations put mea-
in organizations (Borek et al., 2013). sures in place to mitigate against these risks. Research has
it that most of the data or information loss from organiza-
tion is as a result of corporate culture and employee beha-
Information risk viour towards information (PWC, 2012). Issues caused by
Information is the lifeblood of the organization, in order to employees’ behaviour attached to information risk are: lack
manage it, there are a lot of risks in information from of awareness of information risk management, lack of
receiving, creating, storing or retaining, using, reusing, training, negligence on confidential files or information
updating, consulting, imparting, sharing and disposing of assets, disgruntled and disengaged employees, malicious
information; all these processes are risky. The International insider attacks. However, the common element linking all
Organization for Standardization (ISO) in the ISO Guide 73 seven high risk factors is employee behaviour. The lack-
defined risk as the effect of uncertainty on objectives (ISO, adaisical attitude of employees towards information is
2009). Risk is the likelihood that a specific threat will alarming. Sixty per cent of businesses were unsure whether
occur, in order to manage risk, we need to understand what their employees had the necessary tools to protect against
18 Business Information Review 36(1)

information risks (PwC/Iron Mountain Information Risk needs effective and efficient management has led to the
Study, 2011/2012). development of interest in the use of an IA. A large number
Information risks are typically placed in one of three of organizations spend a great deal of time, money and
categories: confidentially, integrity and availability. These effort to practice and implement information auditing
are the model for Information security. within their organization. The main purposes of informa-
tion auditing are to establish what information assets are
1. Confidentiality: only authorized persons can access already available within the organization and what the
the information and prevent unauthorized person needs for information might be, what information risk are
from it. involved. IA establishes or improves effective IM pro-
2. Integrity: assuring the authenticity, accuracy and cesses in an organization and necessary to determine the
completeness of data throughout its entire life cycle. value, risk, functions, evaluation and utility of information
3. Availability: assuring the authorized people can assets in organizations.
access the information when they need to, at the
right times in the right ways.
Definitions of IAs
Henczel and Graham (2016) opined that organization
LaRosa (1991) defines IA as systematic method of explor-
should not underestimate IM in terms of managing risk,
ing and analysing where a library’s various publics are
compliance, performance and financial outlay. Information
going strategically, and determining the challenges and
risk management is balancing act between ensuring exploi-
obstacles facing those publics. Underwood (1994) defines
tation of the information at hand effectively and efficiently
IA as a process that enables one to log onto the information
and also high value assets protection. In order to ensure that
resources held by an enterprise, identify their location, use
the information and records that the organizations pro-
and responsibility for maintenance. St. Clair (1997) states
cesses are managed in accordance with best practice pro-
that IA is a process that examines how well the organiza-
cedures and comply with legislation and regulation,
tion’s information needs and deliverables connects with the
governance services, IA should be conducted. The IA is a
organizational missions, needs, goals and objectives.
risk mitigation exercise and quality improvement process.
Buchanan and Gibb (1998) defines IA as discovering, mon-
IA identifies, stores, protects and evaluates information that
itoring and evaluating an organization’s information
organization holds and how this is being processed, assess
resources in order to implement, maintain or improve the
where there are areas of risk and put procedures in place for
organization’s management of information. An analogous
improving the management of our information. Informa-
definition is provided by Orna (1999) which definition
tion risk should be audited and addressed with abundant
states that IA is a systematic evaluation of information use,
resources in terms of personnel as well as funds. Manage-
resources and flows, with verification by reference to both
ment should take a leadership role in the management of
people and existing documents, in order to establish the
information risks. This includes the forming of a govern-
extent to which they are contributing to an organization’s
ance structure, in which an Information Risk Management
objectives.
team, composed of information professionals, business
Henczel (2001) defined IA as a process that will effec-
executives, reports to the management board.
tively determine the current information environment by
identifying what information is required to meet the needs
of the organization. It establishes what information is cur-
Information audit rently supplied and allows matching of the two to identify
An audit is a process for studying, discovering, monitoring gaps, inconsistencies and duplications. Sharma and Singh
and evaluating something. According to Dubois (1995) and (2012) describe IA as a process and an analysis of infor-
Dante (2008), AI is constituted as one of the most important mation for the accuracy, suitability and validity. It is a
tools to the management of information and management systematic process through which organizations understand
of information risk in the organizations. Its importance its knowledge and information needs, what are knowledge,
roots not only on its contribution to an adequate manage- the information flows and gaps. Kilzer (2012) defined an
ment of these assets, risk and services of information but IA as a tool that can be used to discover and identify pat-
also to make the organization aware about what constitutes terns and changes of information in an organization. Frost
these information assets, risks and services to the develop- and Choo (2017) IA encompasses all the methods and tools
ment of work. The IA is central to the effective organiza- needed to catalogue, model, evaluate, quality-control, and
tional management of information (Buchanan and Gibb, analyse an organization’s information assets and IM. Henc-
2008). IAs are not a counting exercise but a platform from zel (2017) asserted that the findings of 1A are used to
which to develop a total knowledge management strategy develop measurement processes to determine market pene-
and a regular IA is the only way to ensure your business is tration, satisfaction, service levels and value or benefit of
really efficient. The idea that information is an asset which the services and products provided. IA involves systematic
Lateef and Omotayo 19

evaluation of the strength, weakness, opportunities and the information used is specific information
threat of information in any given organization. required/needed, that is, it determines whether
Buchanan and Gibb (2008) asserted that A.1 influence information provided is the one needed in the orga-
on IM, technology, systems, and content are well estab- nization in order to perform its task.
lished in much of the foundational literature on IA (Bucha- c. Focus of communication: IA focus attention on the
nan and Gibb, 1998; Burk and Horton, 1988; Henczel, process of communication in an organization and its
2001; Orna, 1999). IA can also be defined as the evaluation improvement.
of an information environment in order to identify if there d. Opportunity to train staff: IA provides opportunity
are gaps, duplication and inefficiencies in organization. to involve the staff in audit processes and progress,
From the above definitions, a majority focus on the orga- which enhances the efficiency and audit skill and
nizations and the management of their information. It is provides better job opportunities of information
only LaRosa who makes reference to the end users (pub- manager in corporate IM.
lics) of this information, and only a few make reference to
the use of IT in their primary definition of IA which can Kilzer (2012) also highlights the importance of IA,
now be seen as an essential part of every organization and which are enhancement of the understanding of communi-
the way information is managed. cation patterns, succession planning, documentation prac-
Thus, IA entails the systematic examination and evalua- tices, strategic planning and service evaluation. However,
tion of the information assets, information use, information despite these numerous benefits, Buchanan and Gibb
flows, information risk and the management of these in an (2008) highlighted three challenges which affect the prac-
organization. It involves information use, information tice of IA which are limited guidance on management of
needs, ITs, information flow, information services, infor- scope, ambiguous linkage to related Information and Com-
mation risk, information assets and also provides solution munication Technology scope and lack of standard meth-
to information processing, information control and secu- odological approach. They further state that ideally the IA
rity, information value, information presentation, circula- should include all the above aspects in order to provide a
tion, information storage, maintenance and destruction, comprehensive and integrated strategic approach. Till date,
information ownership, responsibility and accountability there is no single accepted methodology supported by sta-
and in addition, the monetary and value of the information tute, standard or professional body. Buchanan and Gibb
assets to the organization are calculated and determined. It (1998) continued to state that there are several methodolo-
also evaluates information assets as strategic competitive gies available many of which are characterized by a very
advantages, integrates investments of information and definite purpose and scope, which makes widespread
communication technology with a strategic initiative of the implementation difficult. In order for organization to apply
business, identifies information flow and processes, identi- IA to its objectives, Ayinde and Omotayo (2017) elabo-
fies information risk and security, develops an information rated on various methods that could be applied:
policy, observation and evaluation of the correspondence
a. Cost-benefit approach: A comparative analysis of
with rules, laws and policies.
information products and services based on their
Henczel (2015) identified the three components of IA:
cost and perceived benefit.
process review, information content, capacity and
b. Geographical approach: The identification of the
behaviour.
major components of the information system in
Process review: task analysis – information life cycle:
order to map their relation to one another.
from creation to disposal.
c. Hybrid approaches: Hybrids of the cost-benefit and
Information content: identify important information
geographical methods.
asset, gaps, duplications and evaluate suitability for
d. Management IAs: Confined to the identification of
purpose.
formal information and reports with a strong
Capability and behaviour: identifies skills gaps related
emphasis on management, information systems.
to information life cycle. It identifies behaviours that influ-
ence effective IM. A good IA conducted will lead to formulating informa-
tion policy which will address the issues identified during
the IA and provide workable solutions.
Benefits of IA to organizations

a. Validity and accurate information: IA makes the


International and national standards
accurate information available and ensure its valid-
ity, as corporate source information. related to IA processes
b. Feedback capability: IA is an important element in There are numbers of international and national standards
the process of feedback. It also determines whether that define, describe and prescribe audit processes such as
20 Business Information Review 36(1)

ISO 19011: 2015, Guidelines for Auditing Management professionals are cast aside from operating in their roles as
Systems (ISO), which states that audit processes can be information managers. It becomes difficult to get the right
applied more widely than the Standard might indicate, pro- information assets at the right place in the right format.
vided that consideration is given to context and the specific Organizations need to collect, organize, protect and evaluate
competence needed. ISO 9001:2015 Quality Management information assets in order to meet the organizational goals.
Systems Requirements (ISO, 2015) set out requirements for The article identifies two important aspects which need crit-
documented IM with mention of review for suitability and ical evaluation which are IM and information risk. An effec-
adequacy, availability for use where and when needed, tive tool used to manage these two aspects is IA.
confidentiality, improper use and loss of integrity, access, All previous literatures on IA did not identify IA from
distribution, retrieval and use. the angle of information risk, international and national
AS 5037 2005: Knowledge Management – A guide standards related to IA processes. It was concluded that a
(Standards Australia, 2005), which presents both IA and good information policy should be drawn from the IA,
knowledge audits as ‘enablers’ of knowledge management. which will lead to knowledge audit. It also includes forma-
However, there are no stated process skills or competence tion of governance structure in which information risk
requirements highlighted in the standards. There is currently management team, consisting of information professionals,
no ISO standard, and Standards Australia may take its stan- business executives which will reports to the management
dard to the ISO, as happened with records management and board.
metadata standards (Halbwirth and Sbarcea, 2005). Further literature review on this should be on knowledge
Sarbanes–Oxley Act (SOX Act), the law requires that a audit as an importance tool in organization.
company’s financial records must be complete, true and
accurate, accessible, retained in accordance with the law Declaration of Conflicting Interests
and good faith, and fully usable in support of any audits, The author(s) declared no potential conflicts of interest with
investigations or other regulatory requirements. The Sar- respect to the research, authorship, and/or publication of this
banes–Oxley clearly has the potential to elevate the records article.
management function to a new and higher level in organi-
zation (David, 2005). Section 802 of the Act contains the Funding
three rules that affect record keeping and in turn enhance The author(s) received no financial support for the research,
IA. The first deals with destruction and falsification of authorship, and/or publication of this article.
records. The second strictly defines the retention period for
storing records, On the other hand, retaining information References
assets longer than required can pose the risk of litigation, Adler R, Stringer C, Yap M (2016) The valuation and pricing of
organization could be sued or audited .The third rule out- information assets. Pacific Accounting Review 28(4):
lines the specific types of business records that need to be 419–430.
stored, which includes electronic communications. Ayinde LA (2017) Information Audit of the School of Arts and
Sarbanes–Oxley has impacts corporate electronic Social Science, Adeniran Ogunsanya College of Education,
records management policies concerning the corporation’s Lagos State, Nigeria, Library Philosophy and Practice. Avail-
procedures for retention of records, destruction of records able at: https://digitalcommons.unl.edu/libphilprac/1602/
and response to incidents must be shown to employees and (accessed 25 July 2018).
auditors. Section 802 also prohibits tampering with wit- Barker RM, Cobb AT, Karcher J (2009) The legal implications of
nesses or whistleblowers in the course of an investigation electronic document retention: changing the rules. Business
(Sarbanes–Oxley Act, 2002). A record retention policy Horizons 52(2): 177–186.
determines the length of time before records can be Blasé P, Rao A (2013) Information as an asset. Financial Times.
destroyed (Barker, 2009). It requires that Organizations Available at: https://www.ft.com/content/0919f8b2-6105-
consider the impact of electronic records and their auditing 11e3-b7f1-00144feabdc0 (accessed 24 June 2018).
members in regard to the destruction and retention of elec- Borek A, Parlikad AK, Webb J, et al. (2013) Total Information
tronic record. Risk Management: Maximizing the Value of Data and Infor-
mation Assets. Newnes, Australia: Morgan Kaufmann.
Botha H, Boon JA (2003) The information audit: principles and
Conclusion guidelines. Libri 53(1): 23–38.
Information is ubiquitous in organizations which ought to be Bowes R (1995, May) How best to find and fulfill business infor-
seen as a strategic resource as other factors of production. mation needs. In: Aslib Proceedings 47(5): 119–126. MCB UP
Strategic organizations cannot exist without information Ltd.
assets. Organizations find it difficult to get the right infor- Buchanan S, Gibb F (1998) The information audit: an integrated
mation at the right time in the right quality because of the strategic approach. International Journal of Information Man-
proliferation of information assets and information agement 18(1): 29–47.
Lateef and Omotayo 21

Buchanan S, Gibb F (2008) The information audit: theory versus Henczel S and Graham R (2015) Demystifying the Information
practice. International Journal of Information Management Audit: SLA Master Class (SLA, 2015). Available at: https://
28(3): 150–160. www.sla.org/wp-content/uploads/2015/06/1650_Demystifying-
Buckland MK (1991) Information and Information Systems the-Information-AuditHenczel.pdf (accessed 25 June 2018).
(No. 25). ABC-CLIO. Henczel S (2017) Information audit and impact assessment. In:
Burk CF, Horton FW (1988) Infomap: a complete guide to dis- The Emerald Handbook of Modern Information Management.
covering corporate information resources. In: Infomap: A Emerald Publishing Limited, pp. 271–288.
Complete Guide to Discovering Corporate Information Henczel S, Robertson G (2016) The widening horizons of infor-
Resources. Englewood Cliffs, NJ: Prentice Hall. mation audit. Qualitative & Quantitative Methods in Libraries
Campengi (2008) The information opportunity report: harnessing 5(3): 561–571.
information to enhance business performance. Available at: ISO (2009) ISO Guide 73:2009 – Risk Management – Vocabu-
http://www.eurim.org.uk/activities/ig/voi/The_Information_ lary. Available at: http://www.iso.org/iso/iso_catalogue/catalo
Opportunity.pdf (accessed 25 June 2018). gue_tc/catalogue_detail.htm?csnumber¼44651 (accessed 10
Choo CW (2002) Information Management for the Intelligent July 2018).
Organization: The Art of Scanning the Environment. Medford, ISO 9001 (2015) International Organization for Standardization. Avail-
NJ: Information Today, Inc. able at: https://www.iso.org/files/live/sites/isoorg/files/archive/pdf/
Cohen R (2012) It’s Not the Size of Your Data, It’s How You Use en/documented_information.pdf (accessed 12 June 2018).
It. Available at: https://www.forbes.com/sites/reuvencohen/ Kilzer R (2012) Information audit: keys for understanding the
2012/06/05/its-not-the-size-of-your-data-its-how-you-use-it/ academic library. Technical services quarterly 29(3):
#6ddaa0e63a9b (accessed 12 June 2018). 200–206.
Corrall S (2008) Information literacy strategy development in Klassen V, Borek A, Parlikad AK, et al. (2012) Quantifying the
higher education: an exploratory study. International Journal business impact of information quality – a risk-based
of Information Management 28(1): 26–37. approach. In: European conference on Information Systems,
Dandago KI, Rufai MAS (2012) The effect of information man- p. 239.
agement on the financial performance of banks in Nigeria LaRosa S (1991) The corporate information audit. Library Man-
(2006–2010). International Journal of Arts and Commerce agement 14(2): 7–9.
1(5): 263–278. Laudon KC, Laudon JP (2015) Management Information Systems:
Dante GP (2008) Information and knowledge organizational Managing the Digital Firm Plus MyMISLab with Pearson
audit: genesis of an integration. Brazilian Journal of Informa- eText – Access Card Package. Boston: Prentice Hall Press.
tion Science 2(2): 3-15. Lewis BR, Snyder CA, Rainer RK Jr (1995) An empirical assess-
Dobson C (2002) Beyond the information audit: checking the ment of the information resource management construct. Jour-
health of an organization’s information system. Searcher nal of Management Information Systems 12(1): 199–223.
10(7): 32–37. Manyika J, Chui M, Brown B, et al. (2011) Big data: the next
Dubois CPR (1995) The information audit: its contribution to frontier for innovation, competition, and productivity. Report,
decision making. Library Management 16(7): 20–24. McKinsey Global Institute, McKinsey & Company.
Frost RB, Choo CW (2017) Revisiting the information audit: a Merzuki SE, Latif HA (2009) Information management (IM) for
systematic literature review and synthesis. International Jour- academic staff advancement programme in higher institutions.
nal of Information Management 37(1): 1380–1390. Journal of Technology Management & Innovation 4(1):
Griffiths P (2010) Where next for information audit?. Business 94–104.
Information Review 27(4): 216–224. National Archive (2017) Identifying Information Assets and Busi-
Halbwirth S, Sbarcea K (2005) The spotlight on knowledge man- ness Requirements, pp. 1–24. Available at: http://www.natio
agement. In: Joint presentation by Sue Halbwirth and Kim nalarchives.gov.uk/doc/open-government-licence/open-gov
Sbarcea at the NSW KM Forum, held at Standards Australia, ernmentlicence.htm.
Sydney, 7th September. Oppenheim C, Stenson J, Wilson RM (2003) The attributes of
Harvard Business Review (2010) Unlocking the value of the infor- information as an asset (ed.). In: Advances in Library Admin-
mation economy, Harvard Business Review, Analytic Services istration and Organization. Emerald Group Publishing Lim-
Report, 2011. Available at: http://eval.symantec.com/mktginfo/ ited, vol. 20, pp. 123–147.
enterprise/other_resources/bhbr_unlocking_value_info_econ Orna E (1990) Practical Information Policies: How to Manage
omy_21028773.en-us.pdf (accessed 12 June 2018). Information Flow in Organizations. Aldershot: Gower.
Henczel S (2001) Department of Justice and Attorney-General, Orna E (1999) Practical Information Policies. Aldershot, UK:
Brisbane, Queensland, Australia. In: The Information Audit: A Gower Publishing, Ltd.
Practical Guide. München: KG Saur, pp. 206–212. Pieterse J (2007) The six dimensions of corporate information man-
Henczel S (2000) The information audit as a first step towards agement. Available at: Toolbox.com (accessed 12 June 2018).
effective knowledge management: an opportunity for the spe- Ptacek GM (2008) An Information Audit of a Business Intelli-
cial librarian. Inspel 34(3/4): 210–226. gence Portal. Master’s Paper.
22 Business Information Review 36(1)

PWC report (2012) Beyond cyber threats: Europe’s First Infor- Wurzler J (2013) Information Risk and Risk Management, Inter-
mation Risk Maturity Index; A PwC report in conjunction with net Security Alliance & American National Standards Insti-
Iron Mountain. Available at: http://www.continuitycentral. tute. Available at: https://www.sans.org/reading-room/ . . . /
com/BeyondCyberThreats.pdf (accessed 15 May 2018). information-risks-risk-management-34210 (accessed 12 June
Roglaski S (2006) The rising importance of enterprise content 2018).
management. DM Review 16(11).
Sarbanes–Oxley (2002) Sarbanes–Oxley Act of 2002, Pub. L. No.
107-204, 116 Stat. 745. Available at: http://www.sec.gov/ Author biographies
about/laws/soa2002.pdf (accessed 12 June 2018). Ayinde Lateef is an information professional at Lagos Business
Sharma CK, Singh AK (2012) An evaluative study of information School, Pan Atlantic University. His areas of specialization are
audit and knowledge management audit. Brazilian Journal of information auditor, information society, information and digital
Information Science: Research Trends 5(1). resource management and information policy. He trains MBA
St. Clair G (1997) The information audit: defining the process. Students and researchers on the use of information resources to
Info Manage 4(6): 5–6. meet their information needs such as Bloomberg training, infor-
Stephens DO (2005) The Sarbanes–Oxley Act: records manage- mation literacy and so on. He is a member of Internet society and
also Oracle Certificate Associate.
ment implications. Records Management Journal 15(2):
98–103. Funmilola Olubunmi Omotayo is a lecturer at the Africa
Tieto (2013) White paper on Information Management: Financial Regional Centre for Information Science (ARCIS), University
Times, White paper: Information Management. Available at: of Ibadan, Nigeria. She also obtained her Doctoral degree in
https://www.tieto.com/sites/default/files/files/information- Information Science from the University of Ibadan in 2005.
management-white-paper.pdf (accessed 12 June 2018). Dr Omotayo is an Associate Member Nigerian Institute of Man-
agement (Chartered); Associate Member Institute of Corporate
Underwood PG (1994) Checking the Net: a soft-systems approach
Treasurers and Accountants. Her teaching/research interests
to information auditing. South African Journal of Library and
include Information and Communication Technologies (ICTs),
Information Science 62: 59–59. Information marketing, Social and ethical issues in information
Vo-Tran H (2011) Adding action to the information audit. The technology, Information technology training design and imple-
Electronic Journal Information Systems Evaluation 14(2): mentation, ICT and the Society, Knowledge organization and
167–282. Available at: www.ejise.com/issue/download.html? management, Information Policy, e-banking, e-commerce, and
idArticle¼777 (accessed 12 June 2018). has published articles in local and international journals.

You might also like