The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Using Maturity Model to Govern Information Technology
Abstract
This chapter introduces the COBiTs’ maturity model as a mean of studying the information technology (IT) governance and its affect on the perceived Security Threats. It argues that IT governance using the maturity model offers a probable influence on the level of security breaches frequency; such evidence would be extracted through a complex quantitative and qualitative approach, offers a better understanding of intricate relationships between different factors. Moreover, the authors hope that understanding the above mentioned influence using the maturity model will not only inform the researchers of a better design for IT governance and defining implementation pitfalls, but also assist in the understanding of IT governance practices trend in the Jordanian environment.
Related Content
Yair Wiseman.
© 2021.
11 pages.
|
Mário Pereira Véstias.
© 2021.
15 pages.
|
Mahfuzulhoq Chowdhury, Martin Maier.
© 2021.
15 pages.
|
Gen'ichi Yasuda.
© 2021.
12 pages.
|
Alba J. Jerónimo, María P. Barrera, Manuel F. Caro, Adán A. Gómez.
© 2021.
19 pages.
|
Gregor Donaj, Mirjam Sepesy Maučec.
© 2021.
14 pages.
|
Udit Singhania, B. K. Tripathy.
© 2021.
11 pages.
|
|
|