2017
DOI: 10.4301/s1807-17752017000300004
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Internal Control Frameworks for Effective Corporate Information Technology Governance

Abstract: This paper analyzes and proposes how several internal control frameworks can be integrated to achieve effective corporate information technology governance. The fundamental tenet of the current literature in this area is that neither a single framework nor non-integrated multiple frameworks would suffice in achieving effective information technology security and governance. Using the extant literature, a deductive approach, and focusing on three popularized internal control frameworks ERM, COSO, and COBIT5, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 11 publications
(10 reference statements)
0
15
0
Order By: Relevance
“…Information security is not just an implementation of technology; there are other elements involved. Information security consists of technology, processes, and people [9]. Technical measures such as passwords, firewalls, network monitoring, and the likes are not enough to counter threats to information; therefore, organizations must consider a combination of measures to protect their information against theft and harm whether intentional or unintentional [9].…”
Section: Background Of the Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Information security is not just an implementation of technology; there are other elements involved. Information security consists of technology, processes, and people [9]. Technical measures such as passwords, firewalls, network monitoring, and the likes are not enough to counter threats to information; therefore, organizations must consider a combination of measures to protect their information against theft and harm whether intentional or unintentional [9].…”
Section: Background Of the Studymentioning
confidence: 99%
“…Information security consists of technology, processes, and people [9]. Technical measures such as passwords, firewalls, network monitoring, and the likes are not enough to counter threats to information; therefore, organizations must consider a combination of measures to protect their information against theft and harm whether intentional or unintentional [9]. Processes include things like user registration, deregistration, and organizations must consider people aspects such as compliance, training, and leadership by example instead of just deploying a solution that protects information from theft, loss, or misuse.…”
Section: Background Of the Studymentioning
confidence: 99%
“…An information security framework should include comprehensive security for an organization's information. Moreover, researchers have identified components that make up the comprehensive security of information, and how should the organizations go about implementing them [9].…”
Section: Information Security Governancementioning
confidence: 99%
“…Information security needs executive sponsorship. Executive sponsor can help obtain a commitment from an organization's board and its management team [9]. With an active commitment, responsibility, and accountability of the board and the management team, information security becomes an active discussion in meetings of the board and the management team; therefore, this brings greater involvement of the board of directors, management team, and business process owners [61].…”
Section: Information Security Components For It Governancementioning
confidence: 99%
“…Other recent examples of research into the use of IT and corporate governance controls have explored the use of industry frameworks, particularly security and audit frameworks (De Haes & Van Grembergen, 2016;Ettish, El-Gazzar, & Jacob, 2017;Wilkin & Chenhall, 2019).…”
Section: Table Six: Governance Form Characteristicsmentioning
confidence: 99%