نتایج جستجو برای: cobit

تعداد نتایج: 706  

Journal: :Revista Gestão Inovação e Tecnologias 2017

Journal: :International Journal of Advanced Engineering Research and Science 2017

Journal: :Jurnal Teknologi Informasi dan Pendidikan 2020

Journal: :JEPIN (Jurnal Edukasi dan Penelitian Informatika) 2022

Perkembangan teknologi di segala bidang kehidupan dirasakan semakin terus berkembang, salah satunya informasi (TI) dimana dalam menjalan suatu organisasi perlu adanya sistem TI yang baik, diperlukan evaluasi atas penggunaan agar pengelolaan dapat berjalan secara efektif dan efisien. Yayasan Baitul Maal PLN Unit Induk Pembangunan Kalimantan Bagian Barat (YBM PLN) didirikan dengan tujuan untuk me...

2012
Simona Jeners Horst Lichter Ana Dragomir

A variety of process improvement reference models (IRM) like CMMI, COBIT or ITIL support IT organizations. These reference models cover different domains such as IT development, IT Services or IT Governance but also share some similarities. There are organizations that address multiple domains and want to use different IRMs. As IRMs are described in different structures and are using different ...

2011
Tariq Rahim Soomro Mihyar Hesson

Problem statement: There are several IT best practices and IT standards, which are independently supporting enterprises. Some of them have similarities and other differ from each other. This study discusses these best practices and standards in contrast with ITIL. Approach: CMMI, CobiT, eTOM, ISO 9000, ISO/IEC 17799, Malcolm Baldrige and Six Sigma will be introduces along with ITIL. Results: Th...

2015
Samir BAHSANI Noura SELLAM

There are various IT frameworks and best practices supporting Information Systems. Each has its own strenghts but none of them satisfies all of the IS requirements independently. In this paper we are studying the possibilities of pooling of the most used frameworks: ITIL, Cobit, PMbok, CMMI, ISO 27001, Val IT and eTOM. The result of this paper is meant to present a Unified Maturity Model combin...

2012
Francis Akowuah Xiaohong Yuan Jinsheng Xu

In the complex technological world that healthcare organizations and their business associates operate, there exist security threats and attacks which render individually identifiable health information vulnerable. Laws exist to ensure that healthcare providers take practical measures to address the security and privacy needs of health information. There are also standards that assist healthcar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید