نتایج جستجو برای: cobit

تعداد نتایج: 706  

2007
James L. Parrish

As organizations become more complex the business units that comprise them have differing requirements for electronic records. Recent focus on regulatory compliance brought about by such issues as accounting scandals and identity theft have brought newfound pressure for IT managers to make sure that their electronic records and the IT processes that create them are in compliance with these stan...

Journal: :IJITBAG 2010
Steven De Haes Wim Van Grembergen

Enterprise governance of IT (EGIT) is about the definition and implementation of processes, structures and relational mechanisms that enable both business and IT people to execute their responsibilities in support of business/IT alignment and the creation of business value from IT-enabled business investments. In this field, practice-oriented guidance like COBIT and Val IT are often promoted as...

2005
Qiang Liu Gail Ridley

Despite widespread adoption of IT control frameworks, little academic empirical research has been undertaken to investigate their use. This paper reports upon research to benchmark the maturity levels of 15 key IT control processes from the Control Objectives for Information and Related Technology (COBIT) in public sector organisations across Australia. It also makes a comparison against a simi...

2009
JORGE RIBEIRO RUI GOMES

The organizations to be competitive have to provide services and delineate strategies to maintain high levels of profitability and efficiency to cope with changes in markets. Increasingly, organizations based their operational services through its Information Systems (IS) and Information Technology (IT) that need to be managed, controlled and monitored constantly. Although there are several gui...

2016
Heru Nugroho Tutut Herawan

The existence of the enterprise architecture is an attempt of managing and planning over the evolution of information systems in the sphere of an enterprise with model-based. In developing the enterprise architecture, there are several tools definition of components in the system. This tool is known as enterprises architecture (EA) framework. In this paper, we present a method to build a model ...

2014
Mojtaba Rees Safari Liu Zhen Yu

The aim of the current study is to evaluate and compare the IT governance maturity of Iran’s banking Industry and inform managers, who possess business knowledge and who may also be knowledgeable on the main aspects of COBIT, about the significant incremental risks this new technological advancement may expose the enterprise to if the proposals of possible controls are implemented by the prospe...

2015
Adolfo Alberto Vanti Angel Cobo Rocío Rocha

This work seeks to provide a new multi-criteria approach to assess IT Governance (ITG) in the area of Strategic Alignment. The complete methodological development process is described. The evaluation model uses Fuzzy Analytic Hierarchy Process (FAHP) and it is targeted to IT processes, more specifically to the COBIT © IT maturity levels, domains and processes, thus providing a differentiated an...

2017
M. Bruzza M. Tupia F. Rodríguez

As part of the regulatory compliance process and the streamlining of public administration, the Peruvian government has implemented the National E-Government Plan in all state institutions with the aim of providing citizens with solid services based on the use of Information and Communications Technologies (ICT). As part of the regulations, the requisites to be met by public institutions have b...

ژورنال: مدیریت بحران 2019

طبق بررسی ادبیات مربوط به توسعه فناوری اطلاعات، تا سال 2040، تعداد 65 فناوری اطلاعات سلامت  (HIT[1]) وجود خواهد داشت. سوابق پیشین نشان می دهد که پیاده سازی این فناوری ها با ریسک و محدودیت هایی از نقطه نظر زمان، هزینه و تخصیص منابع مواجه است که منجر به انحراف از اهداف می شود. در این مقاله، یک استراتژی برای کمک به سازمان ها برای اجرای فناوری اطلاعات آینده (IT) با استفاده از کارت امتیازی متوازن (B...

2008
Gail Ridley Jacky Hartnett Wilumpa Jarern-Imakul

Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید