Full Length Research Paper
Abstract
Realizing the need for improvement in Nigeria by 2020 requires the introduction of reforms in all sectors. This reform can be achieved with good and efficient policies as well as strengthening and enforcing the existing policies. The urge to evaluate the Information Technology (IT) Policy of Nigeria which is believed to be the ‘bedrock for national survival and development’ raises the question on: the process of formulating the policy and how the implementation of the IT policy in Nigeria has fared since 2001? This paper presents issues bothering on the awareness, acceptance and adoption of the IT policy gotten from the result of the analysis of the process of formulating the IT policy in Nigeria. This report is a segment of an on-going policy implementation evaluation study by the researcher. The study utilized instruments that are applied across selected sectors and sub-sectors in Nigeria in organizations and institutions. Analysis was performed using a uniform methodology called “result-based management policy evaluation method” and descriptive statistics. The study identified some general factors which are characteristic of the process of design and formulation of the policy. This includes among others: (1) Existence of clear goals / objectives and a mandate for the implementing agency; (2) In-active involvement of stakeholders through lack of adequate awareness of policy; (3) Ability of government to balance and synchronize visions, flexibility and continuity of implementing institutions; (4) Ability of organizations to adapt to and integrate adjacent policies or develop consistent policy packages; and (5) Lack of adequate support for policy implementation and take-offs. Recommendations were made to enhance the process of policy design and formulation in the country especially towards achieving economic development.
Key words: Awareness, acceptance, adoption, analysis, economic sectors, information technology, Nigeria, policy process, implementation.
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0