IT Security Governance for e-business
|
|
|
- Lewis Flynn
- 10 years ago
- Views:
Transcription
1 Vol. 2, No. 3, July, 2008 IT Security Governance for e-business Rosslin John Robles, Na-Yun Kim, Tai-hoon Kim School of Multimedia, Hannam University, Daejeon, Korea Abstract Information Security is very important in e-business. Previous IT governance frameworks have not given the connection between IT governance and e-business security sufficient attention. This paper identifies various levels of governance followed by a focus in the roles of information technology (IT) governance with reference to information security for today s electronic business (e-business) environment. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technologyoriginated threats and have created new requirements for security management and governance. We proposed a model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced. Keyword : Information Security, IT Governance, e-business Management, Secure System 1. Background Information Security Governance gained attention due to failures of big companies. The concept of corporate governance is much quoted as "the system by which companies are directed and controlled". Corporate governance includes concerns for information technology governance because without effective information management, those charged with corporate responsibilities would not be able to perform effectively. Corporate governance includes concerns for information technology governance because without effective information management, those charged with corporate responsibilities would not be able to perform effectively. eweek (2004) make the case for IT professionals to take a leading role in corporate governance since they have control over the processes underpinning governance activities. They mention the example of the human resource database providing information about employees compensation which, if the information is properly monitored, could provide an early indication of malpractice. This means that IT functions need to be secure so that business data is not altered by unscrupulous hands. With business increasingly utilising modern digital technology in a variety of ways, effective information security governance has, therefore, become a key part of corporate governance. 99
2 Vol. 2, No. 3, July IT Governance Information Technology Governance is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management. The rising interest in IT governance is partly due to compliance initiatives, for instance Sarbanes-Oxley in the USA and Basel II in Europe, as well as the acknowledgment that IT projects can easily get out of control and profoundly affect the performance of an organization. A characteristic theme of IT governance discussions is that the IT capability can no longer be a black box. The traditional involvement of board-level executives in IT issues was to defer all key decisions to the company's IT professionals. IT governance implies a system in which all stakeholders, including the board, internal customers, and in particular departments such as finance, have the necessary input into the decision making process. This prevents IT from independently making and later being held solely responsible for poor decisions. It also prevents critical users from later complaining that the system does not behave or perform as expected IT governance describes the distribution of IT decision-making responsibilities within the firm and focuses on the procedures and practices necessary to create and support strategic IT decisions. The IT Governance Institute (ITGI ) ( has established the Control Objectives for Information and related Technology (COBIT) to facilitate in conducting all audits. This methodology is especially helpful in establishing thescope and plan for IT audits, and can guide managers in identifying appropriate controls and selecting effective infrastructure processes. 2.1 IT Governance Background The discipline of information technology governance derives from corporate governance and deals primarily with the connection between business focus and IT management of an organization. It highlights the importance of IT related matters in contemporary organizations and states that strategic IT decisions should be owned by the corporate board, rather than by the chief information officer or other IT managers. The primary goals for information technology governance are to (1) assure that the investments in IT generate business value, and (2) mitigate the risks that are associated with IT. This can be done by implementing an organizational structure with welldefined roles for the responsibility of information, business processes, applications, infrastructure, etc. Decision rights are a key concern of IT governance, being the primary topic of the book by that name by Weill and Ross. According to Weill and Ross, depending on the size, business scope, and IT maturity of an organization, either centralized, decentralized or federated models of responsibility for dealing with strategic IT matters are suggested. In this view, the well defined control of IT is the key to success. 100
3 Vol. 2, No. 3, July, 2008 After the widely reported collapse of Enron in 2000, and the alleged problems within Arthur Andersen and WorldCom, the duties and responsibilities of the boards of directors for public and privately held corporations were questioned. As a response to this, and to attempt to prevent similar problems from happening again, the US Sarbanes-Oxley Act was written to stress the importance of business control and auditing. Sarbanes-Oxley and Basel-II in Europe have been catalysts for the development of the discipline of information technology governance since the early 2000s. However, the concerns of Sarbanes Oxley (in particular Section 404) have less to do with IT decision rights as discussed by Weill and Ross, and more to do with operational control processes such as Change management. 2.2 Relationship to other IT disciplines Business Service Management A strategy and an approach for linking key IT components to the goals of the business. It enables you to understand and predict how technology impacts the business and how business impacts the IT infrastructure Business Technology Optimization An enterprise software product category focused on helping businesses ensure that every dollar invested in information technology, every resource allocated, and every application in development or production meets business goals. BTO is part of an emerging business philosophy to manage IT resources as a business rather than as a service bureau Enterprise architecture Enterprise architecture is the practice of documenting the elements of business strategy, business case, business model and supporting technologies, policies and infrastructures that make up an enterprise. There are multiple architecture frameworks that describe Enterprise Architecture. Enterprise Architecture can be described as 1: documentation describing the structure and behaviour of an enterprise and its information systems, usually in a number of architecture domains. Or 2: a process for describing an enterprise and its information systems and planning changes to improve the integrity and flexibility of the enterprise IT asset management IT asset management (ITAM) is the set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment. Assets include all elements of software and hardware that are found in the business environment. 101
4 Vol. 2, No. 3, July IT portfolio management IT portfolio management is the application of systematic management to large classes of items managed by enterprise Information Technology (IT) capabilities. Examples of IT portfolios would be planned initiatives, projects, and ongoing IT services (such as application support). The promise of IT portfolio management is the quantification of previously mysterious IT efforts, enabling measurement and objective evaluation of investment scenarios IT security assessment Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks IT service management IT Service Management (ITSM) is a discipline for managing information technology (IT) systems, philosophically centered on the customer's perspective of IT's contribution to the business. ITSM stands in deliberate contrast to technology-centered approaches to IT management and business interaction Project governance The term Project governance is used in industry, especially in the information technology (IT) sector (see Information technology governance), to describe the processes that need to exist for a successful project. Project Governance is an active rather than just a controlling role. While lack of senior management commitment is a consistent cause of project failure, this still occurs when governance structures are in place and operating. This is because Project Governance is not well understood and even less well executed Project management and Program management in the enterprise IT context (including software engineering where appropriate) Project Management is the discipline of planning, organizing, and managing resources to bring about the successful completion of specific project goals and objectives. Program Management is the process of managing multiple ongoing interdependent projects. 2.3 Professional certification Certified in the Governance of Enterprise Information Technology (CGEIT) is an advanced certification created in 2007 by the Information Systems Audit and Control Association (ISACA). It is designed for experienced professionals, who can demonstrate 5 or more years experience, serving in a managing or advisory role focused on the governance and control of IT at an enterprise level. It also requires passing a 4- hour test, designed to evaluate an applicant's understanding of enterprise IT management. 102
5 Vol. 2, No. 3, July, Architecture and design of secure systems 3.1 IT Governance Model Fig. 1 IT governance and enterprise governance Perspectives on IT governance from three significant institutions in this field are examined below: they are the IT Governance Institute, Standards Australia (SA), and National Cyber Security Partnership. The analysis focuses on the activities of IT governance and the integration of IT security in the respective frameworks in order to synthesis these views later into a model of information security governance. 3.2 e-business Security Management E-business has been defined as "a business that creatively and intelligently utilizes and exploits the capabilities of IT and Internet technologies to create efficiencies, to achieve effectiveness gains such as flexibility and responsiveness, and to create strategic opportunities through competitive uses of IT to alter markets and industry structures." 3.3 Risk Management As observed in the preceding discussions, effective risk management is a key objective of IT governance (ITGI, 2004; Standards Australia, 2004) and is required to minimize the IT risks associated with operating an e-business. In the proposed model, it can furthermore be seen as an integrating force, linking IT governance processes with e- business security management. The elements of the traditional risk management life cycle are important for e- business, but due to e-business inherent needs for flexibility and responsiveness (e.g., to react to emerging customer demands), an ongoing and more dynamic risk management approach is required (Mann, 2004). Fink (2004) reviewed existing risk management methodologies as to their suitability for the Internet environment and found significant shortcomings among some wellknown products. He recommended that an effective methodology should be able to meet the following criteria: Comprehensive, Inclusive, Flexible and Relevant. 103
6 Vol. 2, No. 3, July Implementation Guide Here are some guidelines for the organization on how such a model can best be implemented. A clear understanding needs to exist within the organizationon the responsibilities of governance at the enterprise level and how IT governance integrates into this. For an e-business, information security has become an important consideration. The organizationhas to understand the nature and significance of current and possible future threats and risks as well as the counter measures that are available to an e-business. Risk management plays the key role in balancing what appears to be conflicting objectives when applying ICT, namely, value realization and security. A program of education to raise competence and awareness should be implemented across all levels of management to ensure that the requirements for effective information security governance are well understood. It is recommended that an adaptable and flexible attitude be adopted during implementation in that the model needs to integrate into the existing ICT, and organizationaland management structures. Lastly, implementation progress should be reviewed and monitored on a regular basis applying the well accepted feedback loop. 5. Conclusion This paper has shown the need for governance and suggested a concept for the integration of IT governance withenterprise governance. It then identified three major approaches to IT governance and their management of IT security. The latter was shown to be critical for the operation of an e-business. Hence, a framework was developed in which IT governance and e-business security operate together in an integrated, structured, yet holistic manner. The proposed model recognizesthat IT governance aims to optimize the value delivery of ICT while e-business security ensures that identified risks are controlled in an efficient manner. This model emphasizes the importance of risk management as the method that links IT governance 104
7 Vol. 2, No. 3, July, 2008 and e-business security and thereby resolves the often conflicting objectives of security and value delivery. References [1] Fink, D.,Huegle, T.,Dortschy, M. (2006) A Model of Information Security Governance for E-Business [2] Braithwaite, T. (2002). Securing e-business systems: A guide for managers and executives. New York: John Wiley & Sons. [3] Brand, K., & Boonen, H. (2004). IT governance - A pocket guide based on COBIT. The Netherlands: Van Haren Publishing. [4] Cadbury, A. (1992). Report of the committee on the financial aspects of corporate governance. London: The Committee on the Financial Aspects of Corporate Governance. [5] CIMA/ IFAC. (2004). Enterprise governance: Getting the balance right. Retrieved January 3, 2005, from [6] Eloff, J. H. P., Labuschagne, L., & Badenhorst, K. P. (1993). A comparative framework for risk analysis methods. Computers & Security, 12(6), eweek (2004). The governance edge. 21(42), 40. [7] Fink, D. (2004). Identifying and managing new forms of commerce risk and security. In M. Khosrow-Pour (Ed.), E-commerce security advice from experts (pp ). Hershey, PA: CyberTech Publishing. [8] Forrester Research. (2004). How much security is enough. Retrieved September 6, 2004, from [9] Greenstein, M., & Vasarhelyi, M. A. (2002). Electronic commerce: Security, risk management, and control (2nd ed.). Boston: McGraw-Hill. [10] Halliday, S., Badenhorst, K., & v. Solms, R. (1996). A business approach to effective information technology risk analysis and management. Information Management & Computer Security, 4(1), Acknowledgement This work was supported by a grant from Security Engineering Research Center of Ministry of Knowledge Economy, Korea 105
8 Vol. 2, No. 3, July 2008 Authors Rosslin John Robles He received his B.S. in Information Technology from Western Visayas College of Science and Technology, Philippines. He is currently a Multimedia integrate Masters-Ph.D. Student at Hannam University, Korea. His research interests are Software Engineering and IT Security. Na-yun Kim She is currently a Multimedia Student at Hannam University, Korea. Her research interests are Network Security and Software Security. Tai-hoon Kim He received B.E., M.E., and Ph.D. degrees from Sungkyunkwan University. Now he is a professor, School of Information & Multimedia, Hannam University, Korea. His main research areas are security engineering for IT products, IT systems, development processes, and operational environments. 106
Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com
Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia MARIO SPREMIĆ, Ph.D., CGEIT, Full Professor Faculty of Economics and Business Zagreb, University of Zagreb
IT Governance Issues in Korean Government Integrated Data Center 1
IT Governance Issues in Korean Government Integrated Data Center 1 Mokpo National University, [email protected] Abstract Korean government established the GIDC (Government Integrated Data Center) as a
ISO 31000 and Risk Management
ISO 31000 and Risk Management August 19, 2010 What is risk? All management is risk management! Risk Management Boot camp Threat + Vulnerability = Risk Risk Controls = Residual Risk Residual Risk Probability
COBIT 5 and the Process Capability Model. Improvements Provided for IT Governance Process
Proceedings of FIKUSZ 13 Symposium for Young Researchers, 2013, 67-76 pp The Author(s). Conference Proceedings compilation Obuda University Keleti Faculty of Business and Management 2013. Published by
IT governance and business organization: some trends about the management of application portfolio
IT governance and business organization: some trends about the management of application portfolio Roberto Candiotto, Silvia Gandini 1 1 Dipartimento di Studi per l Economia e l Impresa (Università del
A FRAMEWORK FOR INTEGRATING SARBANES-OXLEY COMPLIANCE INTO THE SOFTWARE DEVELOPMENT PROCESS
A FRAMEWORK FOR INTEGRATING SARBANES-OXLEY COMPLIANCE INTO THE SOFTWARE DEVELOPMENT PROCESS Sushma Mishra Virginia Commonwealth University [email protected] Heinz Roland Weistroffer Virginia Commonwealth
Domenico Raguseo. IT Governance e Business Technology (approfondimenti su ITIL)
IT Governance e Business Technology (approfondimenti su ITIL) Domenico Raguseo Italy Client Technical Professional Manager SW Europe Service Management Solution Architect Leader http://www.linkedin.com/in/dragus
What Should IS Majors Know About Regulatory Compliance?
What Should IS Majors Know About Regulatory Compliance? Working Paper Series 08-12 August 2008 Craig A. VanLengen Professor of Computer Information Systems/Accounting Northern Arizona University The W.
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT 1, Narges Zeinolabedin *, 2, Soroush Afiati Mehrvarz 3, Neda Rahbar 1 Department of ITM, Islamic Azad University, Electronic Branch, Tehran, Iran 2 Department
Information Technology Auditing for Non-IT Specialist
Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating
AHMED BIN MOHAMED MILITARY COLLEGE DESCRIPTION OF THE COURSES OFFERED IN THE BACHELOR DEGREE IN THE BUSINESS ADMINISTRATION CURRICULUM
AHMED BIN MOHAMED MILITARY COLLEGE DESCRIPTION OF THE COURSES OFFERED IN THE BACHELOR DEGREE IN THE BUSINESS ADMINISTRATION CURRICULUM Course Code 2503101 Course Name Principles of Management Prerequisite
Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.
: Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
RMBC s Governance Framework for Significant Partnerships
RMBC s Governance Framework for Significant Partnerships 1.0 Introduction 1.1 Corporate governance describes how organisations direct and control what they do. For a council, this includes how it relates
ICTEC. IT Services Issues 3.4.2008. HELSINKI UNIVERSITY OF TECHNOLOGY 2007 Kari Hiekkanen
ICTEC IT Services Issues 3.4.2008 IT Services? IT Services include (for example) Consulting, IT Strategy, IT Architecture, Process, Software Software development, deployment, maintenance, operation, Custom
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
Measuring IT Governance Performance: a Research Study on CobiT- Based Regulation Framework Usage
Measuring IT Governance Performance: a Research Study on CobiT- Based Regulation Framework Usage Mario Spremic, Ph.D., CGEIT, Full Professor Abstract After explaining the Information Technology (IT) governance
IT and Business Process Performance Management: Case Study of ITIL Implementation in Finance Service Industry
IT and Business Process Performance Management: Case Study of Implementation in Finance Service Industry M S Faculty of Economics and Business Zagreb, University of Zagreb Kennedy s sq 6, 10000 Zagreb,
A Provance White Paper
The Benefits of Combined IT Service Management and IT Asset Management A Provance White Paper Contents Introduction... 3 IT Service Management... 3 IT Asset Management... 4 People... 4 Processes... 5 Shared
Risk Management in IT Governance Framework
Risk Management in IT Governance Framework Mirela GHEORGHE 1 ABSTRACT The concept of governance has an already old contour: the system by which business corporations are directed and controlled. The most
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
Insurance Guidance Note No. 14 System of Governance - Insurance Transition to Governance Requirements established under the Solvency II Directive
Insurance Guidance Note No. 14 Transition to Governance Requirements established under the Solvency II Directive Date of Paper : 31 December 2013 Version Number : V1.00 Table of Contents General governance
A Governance Framework for Building Secure IT Systems *
A Governance Framework for Building Secure IT Systems * Abdelwahab Hamou-Lhadj 1 and AbdelKrim Hamou-Lhadj 2 1 Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Project Management. [Student s Name] [Name of Institution]
1 Paper: Assignment Style: Harvard Pages: 10 Sources: 7 Level: Master Project Management [Student s Name] [Name of Institution] 2 Project Management Introduction The project management also known as management
CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.
TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT Governance Stuart Macgregor The Open Group s EA Forum Johannesburg and Cape Town November 2013 www.realirm.com LEADING ENTERPRISE Copyright Real ARCHITECTURE
ISO 27001 Gap Analysis - Case Study
ISO 27001 Gap Analysis - Case Study Ibrahim Al-Mayahi, Sa ad P. Mansoor School of Computer Science, Bangor University, Bangor, Gwynedd, UK Abstract This work describes the initial steps taken toward the
Integrated Information Management Systems
Integrated Information Management Systems Ludk Novák [email protected] ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS
MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS Ivana Dvorski Lacković PBZ stambena štedionica d.d., Croatia [email protected] Abstract: Nowadays banks
ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT
Accounting and Management Information Systems Vol. 11, No. 1, pp. 44 55, 2012 ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT Pavel NĂSTASE 1 and Simona Felicia UNCHIAŞU
ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT Approved by the Audit Committee on 14 February 2003 and adopted by resolution of the Board on 28 March 2003 Revisions approved by the Audit and Risk Committee on 14 February
ITIL V3 and ASL Sound Guidance for Application Management and Application Development
For IT V3 and Sound Guidance for Application and Application Development Machteld Meijer, Mark Smalley & Sharon Taylor Alignment White Paper January 2008 V3 & : A Comparison Abstract In May 2007, the Office
Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.
Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 2 Contents 2 Overview: Why traditional risk mitigation
Internal Auditing Guidelines
Internal Auditing Guidelines Recommendations on Internal Auditing for Lottery Operators Issued by the WLA Security and Risk Management Committee V1.0, March 2007 The WLA Internal Auditing Guidelines may
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
IT Governance: framework and case study. 22 September 2010
IT Governance: framework and case study Presenter Yaowaluk Chadbunchachai Advisory Services Ernst & Young Corporate Services Limited Presentation topics ERM and IT governance IT governance framework IT
An IT Governance Case Study: Distribution Management System
An IT Governance Case Study: Distribution Management System Olivier Glassey a a Swiss Public Administration Network (SPAN) and Swiss Graduate School of Public Management (IDHEAP), #22, Route de la Maladiere,
UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE
UC4 Software: HELPING IT ACHEIVE SARBANES-OXLEY COMPLIANCE Introduction...2 SOX and COBIT: A Brief Review...2 The COBIT Structure...2 Structure of this Document...3 Planning & Organisation...3 Acquisition
COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT A THEORETICAL APPROACH
COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT A THEORETICAL APPROACH Cican Simona-Iulia Management, Faculty of Economics and Business Administration, West University of Timisoara,
Integrated Approach Model of Risk, Control and Auditing of Accounting Information Systems
Informatica Economică vol. 17, no. 4/2013 87 Integrated Approach Model of Risk, Control and Auditing of Accounting Information Systems Claudiu BRANDAS, Dan STIRBU, Otniel DIDRAGA West University of Timisoara,
Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000
Preparation Guide Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published,
Enterprise risk management: A pragmatic, four-phase implementation plan
Enterprise risk management: A pragmatic, four-phase implementation plan Prepared by: John Brackett, Managing Director, Risk Advisory Services, RSM McGladrey, Inc. 704.442.3820, [email protected]
Department of Management
Department of Management Course Student Learning Outcomes (ITM and MGMT) ITM 1270: Fundamentals of Information Systems and Applications Upon successful completion of the course, a student will be able
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com
COBIT 5 All together now! Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com 1 Copyright Notice COBIT is 1996, 1998, 2000, 2005 2012 ISACA and IT Governance Institute.
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Ae Chan Kim 1, Su Mi Lee 2 and Dong Hoon Lee 3 1, 3 Graduate School of Information Security, Korea University
IT Service Management ITIL, COBIT
IT Service Management ITIL, COBIT Bülent Ekuklu Business Development Executive IBM Global Services Global Conditions are Changing 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% Agriculture Manufacturing Service
Information Technology Governance in the Malaysian Electronics Manufacturing Industry
138 Information Technology Governance in the Malaysian Electronics Manufacturing Industry Khong Sin Tan, Multimedia University, Melaka, Malaysia, [email protected] Uchenna Cyril Eze, Multimedia University,
Increasing IT Value and Reducing Risk. More for Less with COBIT5. IT Governance and Strategy
Increasing IT Value and Reducing Risk More for Less with COBIT5 Copyright 2012 ITpreneurs. All rights reserved. 1 COBIT 5 the Next Evolution 2 COBIT 5 Released in April 2012 COBIT5 is the eagerly awaited
STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER
STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected
Professional Diploma in Marketing Syllabus
Professional Diploma in Marketing Syllabus 05/06 www.cim.co.uk/learningzone 1: Marketing Research & Information Aim The Marketing Research and Information subject covers the management of customer information
BADM 590 IT Governance, Information Trust, and Risk Management
BADM 590 IT Governance, Information Trust, and Risk Management Information Technology Infrastructure Library (ITIL) Spring 2007 By Po-Kun (Dennis), Tseng Abstract: This report is focusing on ITIL framework,
Common Threats and Vulnerabilities of Critical Infrastructures
International Journal of Control and Automation 17 Common Threats and Vulnerabilities of Critical Infrastructures Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim 1, Gil-cheol Park 1,
ITGovA: Proposition of an IT governance Approach
Position Papers of the Federated Conference on Computer Science and Information Systems pp. 211 216 DOI: 10.15439/2015F21 ACSIS, Vol. 6 ITGovA: Proposition of an IT governance Approach Adam CHEKLI Hassan
Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control
보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Design of Multi-camera Based Acts Monitoring System for Effective Remote Monitoring Control Ji-Hoon Lim 1), Seoksoo Kim 2) Abstract With
The Study of Copper Resource Management System and Process for Effectively Operation
The Study of Copper Resource Management System and Process for Effectively Operation Sungmo Jung, Yangsok Kim, Seoksoo Kim Department of multimedia, Hannam University, Korea School of Computing, University
Based on 2008 Survey of 255 Non-IT CEOs/Executives
Based on 2008 Survey of 255 Non-IT CEOs/Executives > 50% Ranked ITG as very important > 75% of businesses consider ITG to be an integral part of enterprise governance, but the overall maturity level is
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities
P3M3 Portfolio Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction
University of St. Gallen Law School Law and Economics Research Paper Series. Working Paper No. 2008-19 June 2007
University of St. Gallen Law School Law and Economics Research Paper Series Working Paper No. 2008-19 June 2007 Enterprise Risk Management A View from the Insurance Industry Wolfgang Errath and Andreas
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
White Paper. Business Analysis meets Business Information Management
White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute
ROLE OF HRM & OB IN TODAY S EDUCATIONAL INSTITUTION/UNIVERSITY ADMINISTRATION
ROLE OF HRM & OB IN TODAY S EDUCATIONAL INSTITUTION/UNIVERSITY ADMINISTRATION Dr. M.L. Vasitha Associate Professor, Department of Business Administration Jai Narain Vyas University, Jodhpur Mr. B.S. Chauhan
ERP Controls Integration
ERP Controls Integration Sustaining Compliance While Implementing Change ADVISORY Contents Introduction 1 The Current Environment 3 The Opportunity: ERP Controls Integration 5 An Approach: Integrating
Business Continuity Management Planning Methodology
, pp.9-16 http://dx.doi.org/10.14257/ijdrbc.2015.6.02 Business Continuity Management Planning Methodology Dr. Goh Moh Heng, Ph.D., BCCLA, BCCE, CMCE, CCCE, DRCE President, BCM Institute [email protected]
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
STAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE
STAGE 1 STANDARD FOR ENGINEERING ASSOCIATE ROLE DESCRIPTION THE MATURE ENGINEERING ASSOCIATE The following characterises the senior practice role that the mature, Engineering Associate may be expected
INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.
INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
CRM Adoption Framework and Its Success Measurement
CRM Adoption Framework and Its Success Measurement Leo Willyanto Santoso Faculty of Industrial Technology, Petra Christian University Jl. Siwalankerto 121-131, Surabaya 60236 Tel. 031-2983455, Fax. 031-8417658,
Issues in Information Systems
TAXONOMY OF MULTIPLE LEVELS OF SWOT ANALYSIS IN PROJECT MANAGEMENT Ganesh Vaidyanathan, Indiana University South Bend, [email protected] Asghar Sabbaghi, Indiana University South Bend, [email protected]
658 Cedar Street Saint Paul, MN 55155 www.oet.state.mn.us
Legislative Report Consolidation of Information Technology Systems and Services January 19, 2012 658 Cedar Street Saint Paul, MN 55155 www.oet.state.mn.us PROVIDING THE LEADERSHIP AND SERVICES THAT IMPROVE
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Risk Management Framework for IT-Centric Micro and Small Companies
Risk Management Framework for IT-Centric Micro and Small Companies Jasmina Trajkovski 1, Ljupcho Antovski 2 1 Trajkovski & Partners Management Consulting Sveti Kliment Ohridski 24/2/1, 1000 Skopje, Macedonia
