COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities
COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities
COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities
net/publication/247778781
CITATIONS READS
91 7,747
3 authors, including:
All content following this page was uploaded by Steven De Haes on 31 May 2014.
ABSTRACT: COBIT, currently in its fifth edition, is a good-practice framework for the
enterprise governance of IT. There is limited academic research that either analyzes
COBIT or leverages COBIT as an instrument in executing research programs. Through
linking core elements and principles of COBIT to insights from IT-related and general
management literature, this paper explores the use of COBIT in future research
activities. This paper positions COBIT as a framework for enterprise governance of IT.
The major directions and core principles of the framework are described. Connections
are made of these directions and principles to the relevant literature. Research questions
for future research around enterprise governance of IT and COBIT 5 are proposed and
discussed.
I. INTRODUCTION
I
nformation technology (IT) has become crucial in the support, sustainability, and growth of
enterprises. Previously, governing boards and senior management executives could minimize
their involvement in the direction of IT, leaving most decisions to functional management. In
most sectors and industries, such attitudes are now impossible, as enterprises are increasingly
completely dependent on IT for survival and growth. These organizations also face a wide spectrum
of external threats arising from IT including abuse, cybercrime, fraud, errors, and omissions. IT has
the potential to support both existing business strategies, as well as shaping new strategies. IT
increasingly becomes not only a success factor for day-to-day operations, but also as a critical
facilitator for enhancement of competitive advantage (Van Grembergen and De Haes 2009; Weill
We thank Miklos Vasarhelyi (editor) and two anonymous referees for their guidance on an earlier version of this
commentary.
Editor’s note: Accepted by Miklos A. Vasarhelyi.
307
308 De Haes, Van Grembergen, and Debreceny
and Ross 2009). Given the centrality of IT for enterprise risk management and value generation, a
specific focus on enterprise governance of IT (EGIT) has arisen over the last two decades (De Haes
and Van Grembergen 2008b; Thorp 2003; Wilkin and Chenhall 2010). Enterprise governance of IT
is an integral part of enterprise governance. EGIT addresses the definition and implementation of
processes, structures, and relational mechanisms in the organization that enable the board and senior
business and IT management to execute their responsibilities in support of risk and value
management (Van Grembergen and De Haes 2009).
Enterprises are increasingly making tangible and intangible investments in improving
enterprise governance of IT. In support of this, enterprises are drawing upon the practical
relevance of generally accepted good-practice frameworks such as COBIT (ISACA 2009a).
COBIT, now in its fifth edition, describes a set of good practices for the board and senior
operational and IT management (ISACA 2012b).1 It sets out a set of controls over information
technology and organizes them around a logical framework of IT-related processes.2 COBIT is
part of a suite of products including: implementation; service management and assurance
guides; low-level practices; and mapping to cognate frameworks and standards. Research
indicates that organizations are adopting COBIT in practice (Debreceny and Gray 2013; ISACA
2011c; Van Grembergen and De Haes 2009). Given COBIT’s historical origins in the audit
community, there is a particular connection between the COBIT framework and the conduct of
IT assurance. However, there has been limited academic research that leverages or explores
COBIT. Many of the core principles of COBIT build on models, concepts, and theories from
the IT and general management literatures. There are, as a result, opportunities for research that
references and leverages COBIT. In this paper, we discuss how the COBIT 5 framework
embraces concepts from the professional and academic literatures and builds upon earlier
iterations of COBIT. The main contribution of this paper is that it seeks to provide directions
and challenges for undertaking research that draws upon COBIT 5. As such, a principal
objective of the paper is to narrow the gap between academic research and practice.
The paper provides an overview of the directions COBIT is taking and offers suggestions on
research that takes COBIT as its unit of analysis or as a source of models, practices, and knowledge
for the design of research. The paper proceeds as follows. In Section II, the concept of Enterprise
Governance of IT is defined in more detail. COBIT is then positioned as a framework for enterprise
governance of IT. Next, in Section III, the manner by which COBIT 5 embraces insights from the
IT and general management literature is explored. Some directions for future research around
enterprise governance of IT and COBIT are set out in Section IV. Finally, Section V brings some
concluding remarks together.
II. BACKGROUND
This section of the paper provides background on the shape of EGIT, places COBIT within the
historical development of EGIT, and describes some of the core dimensions of the COBIT approach
to IT governance.
1
The authors of this paper have been actively engaged in COBIT development over the past decade, including
membership of the COBIT Steering Committee and development teams at various times over the period.
2
A framework is a set of guiding principles and good practices that are explicitly designed to be adapted by
adopting organizations. Frameworks are distinguished from standards that are designed for monolithic adoption.
Standards are also more typically associated with certification of adopting organizations. Confusingly, some of
the ‘‘standards’’ promulgated by the International Standards Organization are essentially frameworks (e.g., ISO/
IEC 2008).
Enterprise Governance of IT
The concept of IT governance has been in existence for less than two decades. In the early
1990s key strands of IT governance could be discerned in the academic literature. The first strand
studied alternative forms of organization of the IT function and the impact of those forms on
business outcomes (ITGI 2005; Ives and Jarvenpaa 1993). A second strand explored the nature and
effect of alignment between enterprise consumers of IT services (‘‘the business’’) and the IT
function (Henderson and Venkatraman 1993; Luftman 1996; Venkatraman et al. 1993). A third
strand, inspired by Porter’s research on strategy and competitive advantage (Porter 1979, 1985),
addressed links between enterprise strategy, investment in IT, and enterprise performance (Andreu
and Ciborra 1996; Chan et al. 1997; Weill 1990, 1992). This strand received considerable impetus
as researchers reacted to research by Brynjolfsson (1993) that pointed to a seeming paradox
between high levels of investment in IT and an absence of evidence on returns on that investment. It
was only in the late 1990s that articles first mentioned IT governance in the title or abstract (e.g.,
Brown 1997; Sambamurthy and Zmud 1999), although these papers mostly focused on debates
about the most effective form of IT organization. In the practitioner arena, ISACA created the IT
Governance Institute (ITGI) (www.itgi.org) in 1998 to promote the IT governance concept. As
explored in more detail shortly, the various publications of ISACA and ITGI explicitly incorporated
IT governance notions in COBIT 3 (ITGI 2000) and the board briefing on IT governance (ITGI
2001).
Current perspectives on enterprise governance of IT see EGIT as an integral part of corporate
governance. The recent ISO/IEC Standard 38500 ‘‘Corporate Governance of IT’’ defines IT
governance as ‘‘The system by which the current and future use of IT is directed and controlled.
Corporate governance of IT involves evaluating and directing the use of IT to support the
organization and monitoring this use to achieve plans. It includes the strategy and policies for using
IT within an organization’’ (ISO/IEC 2008). Van Grembergen and De Haes (2009) define EGIT as
the ‘‘Board overseeing the definition and implementation of processes, structures, and relational
mechanisms in the organization that enable both business and IT to execute their responsibilities in
support of business/IT alignment and the creation of business value from IT enabled investments.’’
Both definitions indicate clearly that IT governance is the responsibility of governing boards and
that execution lies with senior management.
The IT governance concept has received considerable attention in the academic literature over
the last decade. Wilkin and Chenhall (2010), in a recent survey of IT governance, establish a
taxonomy of IT governance. They see concepts of strategic alignment, performance measurement,
risk management, and value delivery as the most significant enablers of IT governance. Wilkin
and Chenhall (2010) note that broader organizational structures, business processes and
technology, and resource capabilities influence the enablers and by extension IT governance.
Wilkin and Chenhall (2010) see corporate governance as being a primary influence on the shape
of IT governance. This focus on corporate governance was in response to two directions in the
academic and professional communities. First, the increasing importance of corporate governance
in general management and the academic literature influenced research in IT governance, as did
professional guidance in the U.S. (COSO 1992) and its counterparts in other parts of the world.
The Sarbanes-Oxley Act in the U.S. in 2002 provided significant impetus to widespread adoption
of corporate governance methods in the field and a dramatic expansion in the academic literature,
along with specialist journals. Second, the increasing importance of IT in meeting enterprise goals
coupled with the inherent tension in aligning business and IT management has led to a recognition
of the importance of setting IT goals and decision rights at the governance level (i.e., governing
boards) (De Haes and Van Grembergen 2008a; Thorp 2003; Weill and Ross 2009). These forces
initiated a shift in the naming of the concept from ‘‘IT governance’’ toward ‘‘enterprise
governance of IT,’’ that focuses on board and senior business management involvement in
strategic and tactical directions for IT.
FIGURE 1
Timeline of COBIT Developments
governance, and IT management frameworks are illustrated in Figure 2, along two dimensions: the
level of abstraction of the framework or standard and the extent to which the framework covers the
lifecycle of IT from design of governance systems through tactical IT management.
General-purpose corporate governance frameworks such as COSO are at a high degree of
abstraction and cover only issues of governance and organization. At the other end of the
continuum, standards such as TickIT (a standard for quality software development), are related only
to a particular aspect of IT. TickIT and other IT standards relate are relevant at the tactical level
within the IT function. Other well-known standards such as ITIL and CMMI relate primarily to
management rather than governance and to tactics rather than strategy (Ahern et al. 2008; Cabinet
Office 2011). In recent releases, both ITIL and CMMI have moved more toward strategy and at
least some aspects of governance.
FIGURE 2
IT-Related Frameworks-Level of Abstraction and Lifecycle of IT
theory of management, organizational theory (Cyert and March 1963; March and Simon 1958), and
the cybernetics of Stafford Beer (Beer 1959, 1972). Earlier views of management control were
strongly influenced by the scientific management approaches of Anthony and others (Anthony
1965) and related primarily to the acquisition and use of resources in pursuit of organizational
objectives. Later, however, management control theory gravitated more toward seeing control as a
suite of tools for achieving the strategic goals of the firm (Simons 1990, 2000). For example,
Simons sees management control as a suite of informal norms and formal processes designed to
bind organizational outcomes to organizational strategic goals.
Simons (1990, 2000) defines four types of formal systems: beliefs systems (‘‘formal systems
used by top managers to define, communicate, and reinforce the basic values, purpose, and
direction for the organization’’), boundary systems (‘‘formal systems used by top managers to
establish explicit limits and rules that must be respected), diagnostic control systems (‘‘formal
feedback systems used to monitor organizational outcomes and correct deviations from preset
standards of performance’’), and interactive control systems (‘‘formal systems used by top managers
to regularly and personally involve themselves in the decision activities of subordinates’’).
The view of control within COBIT is broadly in line with Simons’ perspective. For example,
the definition of control in COBIT 3 is ‘‘the policies, procedures, practices, and organizational
structures designed to provide reasonable assurance that business objectives will be achieved and
that undesired events will be prevented or detected and corrected’’ (ITGI 2000, 12). The concept of
a control objective is unique to COBIT. It sees the institution of control as leading to a necessary
outcome or end state. As will be discussed in next sections, the word ‘‘control’’ is not in use in
COBIT 5 and is replaced by ‘‘good practices.’’ These are in highly active and prescriptive language,
and their debt to the former COBIT control objectives assumptions is clear. These new good
practices are defined as ‘‘a proven activity or process that has been successfully used by multiple
enterprises and has been shown to produce reliable results’’ (ISACA 2012b).
those processes be introduced and developed? How deep should the investment be in implementing
the suite of processes? The COBIT 5 development team undertook research to understand how
enterprise goals drive IT-related goals and vice versa. These research projects used in-depth
interviews in different sectors together with Delphi surveys of subject matter experts. This research
established a generic list of enterprise goals, IT-related goals, and their inter-relationship or
‘‘cascade.’’ This cascade now constitutes the core entry point for COBIT 5. In COBIT 5, there is an
explicit assumption that organizations should commence by analyzing their business/IT alignment
state through definition of enterprise goals, linking those goals to IT-related goals and subsequently
to the IT processes within COBIT (De Haes and Van Grembergen 2010; Van Grembergen et al.
2008).
In the goals cascade, enterprise and IT-related goals are categorized into financial, customer,
internal, and learning and growth perspectives (Figure 3). This follows the commonly accepted
dimensions of balanced scorecard analysis. Each perspective holds a number of commonly
referenced goals in organizations in that area based on earlier executed exploratory research (Van
Grembergen et al. 2008). Next, primary (P) and secondary (S) relationships between enterprise and
IT-related goals are provided, based on experts’ opinions. These relationships indicate how
enterprise goals drive IT-related goals and/or how IT-related goals support enterprise goals. As an
illustration of this cascade, Figure 4 shows that the enterprise goal of ‘‘External compliance with
laws and regulation’’ requires a primary focus (P) on the IT-related goals of ‘‘IT compliance and
support for business compliance with external laws and regulations’’ and ‘‘security of information
and processing infrastructure.’’ When adopting COBIT 5, organizations will take the weighted
importance of IT-related goals to guide them in deciding which subset of the framework’s 37 IT
processes are the most important for early adoption.
FIGURE 3
Cascade of Enterprise Goals and IT-Related Goalsa
Source: COBIT 5.
a
P: Primary goal; S: Secondary goal.
FIGURE 4
Primary and Secondary IT Goals for Enterprise Goal ‘‘External Compliance with Laws and
Regulation’’
Source: COBIT 5.
a
P: Primary goal; S: Secondary goal.
scorecard concepts as developed by Kaplan and Norton (1996), and as adapted for the IT domain
(Hu and Huang 2006; Van Grembergen et al. 2003).
COBIT 5 provides outcome measures at the IT process level. Figure 5 shows an example for
the process of ‘‘Managing Security,’’ providing specific process goals and related metrics.
Consolidation of these metrics at the enterprise, IT-related, and COBIT process levels, enables
organizations to build a comprehensive scorecard for the entire IT environment. This allows
organizations to develop a measurement instrument to verify meeting of stakeholder needs.
FIGURE 5
Balanced Scorecard Metrics for the Security Process
Source: COBIT 5.
of ‘‘IT Savviness’’ and the resource-based view and capabilities literatures (Andreu and Ciborra
1996; Feeny and Willcocks 1998; Law and Ngai 2007; Tarafdar and Gordon 2007). Weill and Ross
clarify the need for general business management to take ownership of, and accountability for,
governing the use of IT in creating value from IT-enabled business investments. In many
organizations, this implies a crucial shift in attitudes and behavior of general business and IT
management as well as the governing board. As Weill and Ross (2009) note: ‘‘If senior managers do
not accept accountability for IT, the company will inevitably throw its IT money to multiple tactical
initiatives with no clear impact on organizational capabilities. IT becomes a liability instead of a
strategic asset.’’
Related to this discussion, COBIT 5 encompasses both IT processes and IT-related business
processes. Collaboration and reciprocal relationships and task dependencies between business
management, IT management, and external parties is an important element of IT governance (Cragg
et al. 2011; Zarvic et al. 2012). COBIT 5 provides RACI charts (Responsible, Accountable,
Consulted, Informed) in which both business and IT roles are included. To illustrate this, Figure 6
provides an example RACI chart for the process ‘‘Manage Service Agreements.’’ This RACI chart
indicates that for the SLA process, both business and IT functions have primary (P) and secondary
(S) accountabilities and responsibilities.
FIGURE 6
End-to-End Responsibility in Managing Service Agreements
Source: COBIT 5.
governance materials in COBIT 4, Val IT, and Risk IT (ISACA 2007, 2009c, 2010). In this
overarching approach, COBIT identifies 37 IT processes spread over governance and management
domains. The five governance processes are the board’s responsibilities in IT covering the setting of
the governance framework, responsibilities in terms of value (e.g., investment criteria), risks (e.g.,
risk appetite), resources (e.g., resource optimization), and providing transparency regarding IT to
the stakeholders. We return to governance later in this section. In the management domain, there are
four subdomains: ‘‘Align, Plan, and Organize’’ (APO); ‘‘Build, Acquire and Implement’’ (BAI);
‘‘Deliver, Service, and Support’’ (DSS); and ‘‘Monitor, Evaluate and Assess’’ (MEA). The domain
APO concerns the identification of how IT can best contribute to the achievement of business
objectives. A management framework is required and specific processes related to the IT strategy
and tactics, enterprise architecture, innovation, and portfolio management. Other important
processes in this domain address the management of budgets and costs, human resources,
relationships, service agreements, suppliers, quality, risk, and security.
The domain BAI makes the IT strategy concrete through identifying, in detail, the requirements
for IT and managing the investment program and projects. This domain further considers managing
capacity, organizational change, IT changes, acceptance and transitioning, knowledge, assets, and
configurations. The domain Delivery, Service and Support (DSS) refers to the actual delivery of
required IT services. It contains processes on managing operations, service requests and incidents,
problems, continuity, security services, and business process controls. The fourth management
domain, MEA, includes those processes that are responsible for the quality assessment in
compliance with the control requirements for all previously mentioned processes. It addresses
performance management, monitoring of internal control, and regulatory compliance (ISACA
2012b).
COBIT 5 emphasizes the requirement of general business management being accountable for
managing IT. Processes that address specific business roles are APO3: Manage Enterprise
Architecture, APO4: Manage Innovation, and BAI05: Manage Organizational Change. A specific
process on business process controls (application controls) is included (‘‘DSS06: Manage Business
Process Controls’’).
of, and collaborative relationship among the board, senior corporate executives, IT management,
and business management.
COBIT 5 builds on these insights and incorporates formal discussion on so-called ‘‘Enablers’’
in its framework. These are factors that, individually and collectively, influence whether something
will work—in this case, governance and management over enterprise IT. The framework describes
seven categories of enablers, of which the ‘‘processes,’’ ‘‘organizational structures,’’ and ‘‘culture,
behavior, and ethics’’ closely relate to the organizational systems concept.
‘‘implemented process achieves its process purpose’’ and at level two, the process is ‘‘implemented
in a managed fashion (planned, monitored, and adjusted), and its work products are appropriately
established, controlled, and maintained.’’ These can be challenging for organizations to demonstrate
and, as a result, process maturity levels under the new assessment model will be considerably lower
than under the earlier CMM-based process maturity model in COBIT 4. This may present some
implementation challenges.
COBIT as a Framework
COBIT is a framework rather than a standard and, as a result, is designed to be adapted by
adopting organizations. Yet, little is known as to which components of the framework are necessary
to be retained in order for adoption to still be effective. This applies both horizontally (choice of
processes) and vertically (components including process capability, RACI charts, etc.). For example:
Could it be feasible to adopt COBIT with only the five processes at the governance layer,
shorn of RACI charts, process capability modeling, and other core COBIT attributes?
Could COBIT be used only by the board and audit committee and still be functional?
The Relationship between COBIT, COSO, ISO/IEC 38500, and Other Governance Frameworks
ISACA has made a major investment over the years in mapping COBIT to other frameworks,
with detailed mappings of COBIT 4 to ten other frameworks including COSO, ITIL, PMBOK, and
TOGAF (ISACA 2011a). There is no academic research about the inter-operation of these
relationships. Questions include:
How does an enterprise manage multiple frameworks and standards?
How do enterprises measure and manage performance across multiple frameworks and
standards?
of COBIT for IT control objectives under the Sarbanes-Oxley act was promulgated by ISACA
(ITGI 2006). Research questions include:
What role does COBIT play in support of internal and external audit programs?
COSO makes explicit mention of application controls. Business application controls are now
more central in COBIT 5. To what extent does the guidance on business application controls
in both COBIT and COSO correlate? What are the practical applications and use of this
guidance?
What are enablers and inhibitors for business managers to take up the responsibilities as
assigned in the COBIT 5 RACI charts?
some particular aspect of EGIT or cognate areas of inquiry such as IT audit and assurance. These
research questions can be a source of inspiration for researchers in this field. There are many
research opportunities on EGIT and aligned research domains. Finally and probably most
importantly, these opportunities have implications for both theory and practice.
REFERENCES
Ahern, D. M., A. Clouse, and R. Turner. 2008. CMMI Distilled: A Practical Introduction to Integrated
Process Improvement. 3rd edition. Boston, MA: Addison-Wesley.
Andreu, R., and C. Ciborra. 1996. Organizational learning and core capabilities development: The role of
IT. Journal of Strategic Information Systems 5 (2): 111–127.
Anthony, R. N. 1965. Planning and Control Systems: A Framework for Analysis. Boston, MA: Division of
Research, Graduate School of Business Administration, Harvard University.
Beer, S. 1959. Cybernetics and Management. London, U.K.: English Universities Press.
Beer, S. 1972. Brain of the Firm. London, U.K.: The Penguin Press.
Berle, A. A., and G. C. Means. 1932. The Modern Corporation and Private Property. New York, NY: The
Macmillan Company.
Boritz, J. E. 2005. IS practitioners’ views on core concepts of information integrity. International Journal of
Accounting Information Systems 6 (4): 260–279.
Brown, C. 1997. Examining the emergence of hybrid IS governance solutions: Evidence from a single case
site. Information Systems Research 8 (1): 69–94.
Brynjolfsson, E. 1993. The productivity paradox of information technology. Communications of the ACM
36 (12): 66–77.
Cabinet Office. 2011. ITIL Lifecycle Suite. London, U.K.: The Stationery Office.
Chan, Y. E., S. L. Huff, D. W. Barclay, and D. G. Copeland. 1997. Business strategic orientation,
information systems strategic orientation, and strategic alignment. Information Systems Research:
ISR: A Journal of the Institute of Management Sciences 8 (2): 125–150.
Committee of Sponsoring Organizations of the Treadway Commission (COSO). 1992. Internal Control—
Integrated Framework. New York, NY: Committee of Sponsoring Organizations of the Treadway
Commission.
Cragg, P., M. Caldeira, and J. Ward. 2011. Organizational information systems competences in small and
medium-sized enterprises. Information and Management 48 (8): 353–363.
Cyert, R. M., and J. G. March. 1963. A Behavioral Theory of the Firm. Englewood Cliffs, NJ: Prentice Hall,
Inc.
Davern, M. J., and C. L. Wilkin. 2010. Towards an integrated view of IT value measurement. International
Journal of Accounting Information Systems 11 (1): 42–60.
De Haes, S., and W. Van Grembergen. 2008a. Analyzing the Relationship between IT Governance and
Business/IT Alignment Maturity. Proceedings of the 41st Hawaii International Conference on System
Sciences, Kailua-Kona, HI, Shidler College of Business, University of Hawai’i at Manoa.
De Haes, S., and W. Van Grembergen. 2008b. An exploratory study into the design of an IT governance
minimum baseline through Delphi research. Communications of AIS 22: 443–458.
De Haes, S., and W. Van Grembergen. 2009. An exploratory study into IT governance implementations and
its impact on business/IT alignment. Information Systems Management 26 (2): 123–137.
De Haes, S., and W. Van Grembergen. 2010. Analyzing the impact of enterprise governance of IT practices
on business performance. International Journal on IT/Business Alignment and Governance 1 (1): 14–
38.
De Wit, B., and R. Meyer. 2005. Strategy Synthesis: Revolving Strategy Paradoxes to Create Competitive
Advantage. London, U.K.: Cengage Learning EMEA.
Debreceny, R. S., and G. L. Gray. 2013. IT governance and process maturity: A multinational field study.
Journal of Information Systems 27 (1).
Elbashir, M. Z., P. A. Collier, and M. J. Davern. 2008. Measuring the effects of business intelligence
systems: The relationship between business process and organizational performance. International
Journal of Accounting Information Systems 9 (3): 135–153.
Feeny, D., and L. Willcocks. 1998. Core IS capabilities for exploiting information technology. Sloan
Management Review 39 (3): 9–21.
Henderson, J. C., and N. Venkatraman. 1993. Strategic alignment: Leveraging information technology for
transforming organizations. IBM Systems Journal 32 (1): 4–16.
Hu, Q., and C. D. Huang. 2006. Using the balanced scorecard to achieve sustained IT-business alignment:
A case study. Communications of AIS 17: 2–45.
Hyvönen, J. 2007. Strategy, performance measurement techniques, and information technology of the firm
and their links to organizational performance. Management Accounting Research 18 (3): 343–366.
ISACA. 2007. COBITt 4.1. Rolling Meadows, IL: ISACA.
ISACA. 2009a. Building the Business Case for COBITt and Val ITe: Executive Briefing. Rolling
Meadows, IL: ISACA.
ISACA. 2009b. Implementing and Continually Improving IT Governance. Rolling Meadows, IL: ISACA.
ISACA. 2009c. The Risk IT Framework: Risk IT Based on COBIT. Rolling Meadows, IL: ISACA.
ISACA. 2010. Enterprise Value: Governance of IT Investments. The Val IT Framework 2.0. Rolling
Meadows, IL: ISACA.
ISACA. 2011a. COBIT Mapping: Overview of International IT Guidance. Rolling Meadows, IL: ISACA.
ISACA. 2011b. COBITt Process Assessment Model (PAM): Using COBITt 4.1. Rolling Meadows, IL:
ISACA.
ISACA. 2011c. Global Status Report on the Governance of Enterprise IT (GEIT)—2011. Rolling Meadows,
IL: ISACA.
ISACA. 2012a. COBIT 5 Implementation. Rolling Meadows, IL: ISACA.
ISACA. 2012b. COBIT 5: A Business Framework for the Governance and Management of Enterprise IT.
Rolling Meadows, IL: ISACA.
Information Systems Audit and Control Foundation (IASCF). 1994. Control Objectives for Information and
Related Technology: COBIT. Rolling Meadows, IL: Information Systems Audit and Control
Foundation.
International Organization for Standardization/International Electrotechnical Commission (ISO/IEC). 2008.
ISO/IEC 38500 Corporate Governance of Information Technology. Geneva, Switzerland:
International Organization for Standardization/International Electrotechnical Commission.
IT Governance Institute (ITGI). 2000. COBIT. Rolling Meadows, IL: IT Governance Institute.
IT Governance Institute (ITGI). 2001. Board Briefing on IT Governance. Rolling Meadows, IL: IT
Governance Institute.
IT Governance Institute (ITGI). 2005. COBITt 4. Rolling Meadows, IL: IT Governance Institute.
IT Governance Institute (ITGI). 2006. IT Control Objectives for Sarbanes-Oxley: The Role of IT in the
Design and Implementation of Internal Control over Financial Reporting. 2nd Ed. Rolling Meadows,
IL: IT Governance Institute.
Ives, B., and S. L. Jarvenpaa. 1993. Organizing for global competition: The fit of information technology.
Decision Sciences 24 (3): 547–580.
Janvrin, D. J., E. A. Payne, P. Byrnes, G. P. Schneider, and M. B. Curtis. 2012. The updated COSO Internal
Control—Integrated Framework: Recommendations and opportunities for future research. Journal of
Information Systems 26 (2): 189–213.
Kaplan, R. S., and D. P. Norton. 1996. The Balanced Scorecard: Translating Strategy into Action. Boston,
MA: Harvard Business School Press.
Law, C. C. H., and E. W. T. Ngai. 2007. IT infrastructure capabilities and business process improvements:
Association with IT governance characteristics. Information Resources Management Journal 20 (4):
25–47.
Luftman, J. N. 1996. Competing in the Information Age: Strategic Alignment in Practice. Oxford, U.K.:
Oxford University Press.
March, J., and H. Simon. 1958. Organizations. New York, NY: John Wiley.
O’Connor, N. G., and M. G. Martinsons. 2006. Management of information systems: Insights from
accounting research. Information and Management 43 (8): 1014–1024.
Open Group. 2009. The Open Group Architecture Framework (TOGAF), Version 9. Zaltbommel, The
Netherlands: Van Haren Publishing.
Peterson, R. 2004. Crafting information technology governance. Information Systems Management 21 (4):
7–22.
Porter, M. E. 1979. How competitive forces shape strategy. Harvard Business Review (March-April): 137–
145.
Porter, M. E. 1985. Competitive Advantage: Creating and Sustaining Superior Performance. New York,
NY: Free Press.
Sambamurthy, V., and R. W. Zmud. 1999. Arrangements for information technology governance: A theory
of multiple contingencies. MIS Quarterly 23 (2): 261–290.
Simons, R. 1990. The role of management control systems in creating competitive advantage: New
perspectives. Accounting, Organizations and Society 15 (1/2): 127–143.
Simons, R. 2000. Performance Measurement and Control Systems for Implementing Strategy. Upper
Saddle River, NJ: Prentice Hall.
Tarafdar, M., and S. Gordon. 2007. Understanding the influence of information systems competencies on
process innovation: A resource-based view. The Journal of Strategic Information Systems 16 (4):
353–392.
Thorp, J. 2003. The Information Paradox. New York, NY: McGraw-Hill Ryerson.
Tuttle, B., and S. D. Vandervelde. 2007. An empirical examination of CobiT as an internal control
framework for information technology. International Journal of Accounting Information Systems 8
(4): 240–263.
Van Grembergen, W., and S. De Haes. 2009. Enterprise Governance of Information Technology: Achieving
Strategic Alignment and Value. New York, NY: Springer.
Van Grembergen, W., R. Saull, and S. J. De Haes. 2003. Linking the IT balanced scorecard to the business
objectives at a major Canadian financial group. Journal for Information Technology Cases and
Applications 5 (1): 23–45.
Van Grembergen, W., S. De Haes, and H. Van Brempt. 2008. Understanding How Business Goals Drive IT
Goals. Rolling Meadows, IL: ISACA.
Venkatraman, N., J. C. Henderson, and S. Oldach. 1993. Continuous strategic alignment: Exploiting
information technology capabilities for competitive success. European Management Journal 11 (2):
139–149.
Weill, P. 1990. Strategic investment in information technology: An empirical study. Information Age 12 (3):
141–147.
Weill, P. 1992. The relationship between investment in information technology and firm performance: A
study of the value-manufacturing sector. Information Systems Research 3 (4): 307–333.
Weill, P., and J. W. Ross. 2009. IT Savvy: What Top Executives Must Know to Go From Pain to Gain.
Boston, MA: Harvard Business School Press.
Wilkin, C. L., and R. H. Chenhall. 2010. A review of IT governance: A taxonomy to inform accounting
information systems. Journal of Information Systems 24 (2): 107–146.
Zarvic, N., C. Stolze, M. Boehm, and O. Thomas. 2012. Dependency-based IT governance practices in
inter-organizational collaborations: A graph-driven elaboration. International Journal of Information
Management 32 (6): 541–549.