Return to Issue Details Data sovereignty and the leaky pipe: charting a course for data governance and information security in Nigeria and Africa Download Download PDF