EXPLORING THE APPROACHES FOR COBIT PROCESS IN MALAYSIAN 100 TOP CORPORATE GOVERNANCE COMPANIES

As IT plays important role in sustaining and extending the organization’s strategies and objectives, it is part of management responsibility to ensure that expectation for IT are met and IT risk are mitigated. Developed by ISACA, Control Objectives for information and related technology (COBIT) serve as an assistance to organization in aligning IT strategy with business strategy as it laid down the framework for excellence IT control framework. Through questionnaires to top 100 Public Listed companies with good corporate governance practice, the study is expected to discover the approaches of implementing COBIT framework in Malaysia and try to explore whether there is variation among the industries. The empirical evidence may enable organizations to evaluate the implementation of IT Governance, and begin to properly pursue effective strategies to improve the quality of IT control activities.

[1]  Miroslaw Malek,et al.  Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT , 2009, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing.

[2]  Uday S. Murthy,et al.  The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International Survey , 2007 .

[3]  C. H. Ponnu Corporate Governance Structures and the Performance of Malaysian Public Listed Companies , 2008 .

[4]  Ahmad A. Abu-Musa Evaluating the Security Controls of CAIS in Developing Countries: The Case of Saudi Arabia , 2006 .

[5]  Steven De Haes,et al.  A Research Journey into Enterprise Governance of IT, Business/IT Alignment and Value Creation , 2010, Int. J. IT Bus. Alignment Gov..

[6]  Ahmad Abu-Musa,et al.  Exploring the importance and implementation of COBIT processes in Saudi organizations: An empirical study , 2009, Inf. Manag. Comput. Secur..

[7]  Brad Tuttle,et al.  An empirical examination of CobiT as an internal control framework for information technology , 2007, Int. J. Account. Inf. Syst..

[8]  Jeffrey W. Merhout,et al.  Information Technology Auditing: A Value-Added IT Governance Partnership between IT Management and Audit , 2008, Commun. Assoc. Inf. Syst..

[9]  Ahmad A. Abu-Musa Evaluating the security controls of CAIS in developing countries: an empirical investigation , 2007, Inf. Manag. Comput. Secur..

[10]  Steven De Haes,et al.  Concepts of Enterprise Governance of IT , 2009 .

[11]  Noor Azizi Ismail,et al.  Information Technology Governance, Funding and Structure: A Case Analysis of a Public University in Malaysia. , 2008 .

[12]  J. Lainhart COBIT™: A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities , 2000 .

[13]  Ainin Sulaiman,et al.  Information security landscape and maturity level: Case study of Malaysian Public Service (MPS) organizations , 2009, Gov. Inf. Q..

[14]  Donald R. Cooper,et al.  Business Research Methods , 1980 .

[15]  J. Nye,et al.  Soft Power: The Means to Success in World Politics , 2004 .

[16]  Noor Azizi Ismail,et al.  Strategic information systems planning among public institutions of higher learning in Malaysia: With particular reference to Universiti Utara Malaysia , 2007 .

[17]  Political utilisation of scholarly ideas: the ‘clash of civilisations’ vs. ‘Soft Power’ in US foreign policy , 2010, Review of International Studies.

[18]  Milen Ivanov,et al.  IT project management control and the Control Objectives for IT and related Technology (CobiT) framework , 2011 .

[19]  Brian J. Corbitt,et al.  Determinants of Successful ICT Risk Management in Thai Organisations , 2010, PACIS.

[20]  Javier Noya The symbolic power of nations , 2006 .

[21]  Liming Guan,et al.  Critical Factors Affecting the Evaluation of Information Control Systems with the COBIT Framework , 2010 .

[22]  Gary Hardy,et al.  Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges , 2006, Inf. Secur. Tech. Rep..

[23]  Gail Ridley,et al.  COBIT and its utilization: a framework from the literature , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[24]  W. V. Grembergen IT Governance and Its Mechanisms , 2004 .

[25]  Collin S Gray Hard Power and Soft Power: The Utility of Military Force as an Instrument of Policy in the 21st Century , 2011 .

[26]  Petter Gottschalk,et al.  A Stages of Growth Model for Knowledge Management Technology in Law Firms , 2002, J. Inf. Law Technol..