EXPLORING THE APPROACHES FOR COBIT PROCESS IN MALAYSIAN 100 TOP CORPORATE GOVERNANCE COMPANIES
暂无分享,去创建一个
[1] Miroslaw Malek,et al. Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT , 2009, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing.
[2] Uday S. Murthy,et al. The Importance of the COBIT Framework IT Processes For Effective Internal Control over the Reliability of Financial Reporting: An International Survey , 2007 .
[3] C. H. Ponnu. Corporate Governance Structures and the Performance of Malaysian Public Listed Companies , 2008 .
[4] Ahmad A. Abu-Musa. Evaluating the Security Controls of CAIS in Developing Countries: The Case of Saudi Arabia , 2006 .
[5] Steven De Haes,et al. A Research Journey into Enterprise Governance of IT, Business/IT Alignment and Value Creation , 2010, Int. J. IT Bus. Alignment Gov..
[6] Ahmad Abu-Musa,et al. Exploring the importance and implementation of COBIT processes in Saudi organizations: An empirical study , 2009, Inf. Manag. Comput. Secur..
[7] Brad Tuttle,et al. An empirical examination of CobiT as an internal control framework for information technology , 2007, Int. J. Account. Inf. Syst..
[8] Jeffrey W. Merhout,et al. Information Technology Auditing: A Value-Added IT Governance Partnership between IT Management and Audit , 2008, Commun. Assoc. Inf. Syst..
[9] Ahmad A. Abu-Musa. Evaluating the security controls of CAIS in developing countries: an empirical investigation , 2007, Inf. Manag. Comput. Secur..
[10] Steven De Haes,et al. Concepts of Enterprise Governance of IT , 2009 .
[11] Noor Azizi Ismail,et al. Information Technology Governance, Funding and Structure: A Case Analysis of a Public University in Malaysia. , 2008 .
[12] J. Lainhart. COBIT™: A Methodology for Managing and Controlling Information and Information Technology Risks and Vulnerabilities , 2000 .
[13] Ainin Sulaiman,et al. Information security landscape and maturity level: Case study of Malaysian Public Service (MPS) organizations , 2009, Gov. Inf. Q..
[14] Donald R. Cooper,et al. Business Research Methods , 1980 .
[15] J. Nye,et al. Soft Power: The Means to Success in World Politics , 2004 .
[16] Noor Azizi Ismail,et al. Strategic information systems planning among public institutions of higher learning in Malaysia: With particular reference to Universiti Utara Malaysia , 2007 .
[17] Political utilisation of scholarly ideas: the ‘clash of civilisations’ vs. ‘Soft Power’ in US foreign policy , 2010, Review of International Studies.
[18] Milen Ivanov,et al. IT project management control and the Control Objectives for IT and related Technology (CobiT) framework , 2011 .
[19] Brian J. Corbitt,et al. Determinants of Successful ICT Risk Management in Thai Organisations , 2010, PACIS.
[20] Javier Noya. The symbolic power of nations , 2006 .
[21] Liming Guan,et al. Critical Factors Affecting the Evaluation of Information Control Systems with the COBIT Framework , 2010 .
[22] Gary Hardy,et al. Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges , 2006, Inf. Secur. Tech. Rep..
[23] Gail Ridley,et al. COBIT and its utilization: a framework from the literature , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[24] W. V. Grembergen. IT Governance and Its Mechanisms , 2004 .
[25] Collin S Gray. Hard Power and Soft Power: The Utility of Military Force as an Instrument of Policy in the 21st Century , 2011 .
[26] Petter Gottschalk,et al. A Stages of Growth Model for Knowledge Management Technology in Law Firms , 2002, J. Inf. Law Technol..