154 research outputs found

    IT Governance: a framework proposal, and an empirical study

    Get PDF
    Why does IT governance need to be reconceptualized? Corporate governance: theoretical lens and models. IT governance: theoretical lens and models. IT governance reconceptualization and framework. The antecedents factors' of the IT involvement into TMT: a research model.Why does IT governance need to be reconceptualized? Corporate governance: theoretical lens and models. IT governance: theoretical lens and models. IT governance reconceptualization and framework. The antecedents factors' of the IT involvement into TMT: a research model.LUISS PhD Thesi

    IT Governance: a framework proposal, and an empirical study

    Get PDF
    1Dottorato di ricerca in Sistemi informativi aziendali (XX ciclo), Luiss Guido Carli, Roma, 2008. Relatore: Prof. Domenico Bodega.openWhy does IT governance need to be reconceptualized? Corporate governance: theoretical lens and models. IT governance: theoretical lens and models. IT governance reconceptualization and framework. The antecedents factors' of the IT involvement into TMT: a research model.openDottorato di ricerca in Sistemi informativi aziendaliCaporarello, LeonardoCaporarello, Leonard

    IS Success Model and Perceived IT Value

    Get PDF

    Understanding the Structure of Post-Implementation ERP Teams

    Get PDF

    Organizing to Exploit the Information Domain: A Content Analysis of the Transformation Literature

    Get PDF
    The US Department of Defense (DoD) has embarked on an ambitious plan to transform itself. A driving force behind this transformation is a realization that society has moved into an information age and that information age warfare will be significantly different from anything that has gone before it. At the heart of the transformation effort is a concept known as Network Centric Warfare (NCW). Transformation, information age warfare, and NCW all depend heavily on how the DoD handles the information domain. Although there are many organization structure/design issues that will derive from the transformation imperatives, one of central concerns is the need to alter the Information Technology (IT) functions/organizations that are the vanguard of this effort. Given this background, this research attempted to answer the question “What does the military transformation literature say about how the DoD should organize to exploit the information domain?” Specifically, this research focused on ideas regarding organizing the IT organizations/functions of the DoD. Overall, the results showed that a majority of the transformation literature supports organizing the IT function to act as a service provider. The IT function would therefore act as a separate entity within the enterprise and would provide domain expertise to other parts of the enterprise. Further research is required to determine if this type of organizational structure is applicable across the entire spectrum of the information domain

    Investigation of How IT Leadership Impacts IT-Business Alignment through Shared Domain Knowledge and Knowledge Integration

    Get PDF
    Using full range leadership model and the knowledge-based view of organizations, we develop and test a model linking Information Technology (IT) leadership to IT-business alignment. Specifically, we examine how transformational IT leadership behaviors influence IT-business alignment through mechanisms that develop shared domain knowledge between IT and business personnel and mechanisms that integrate specialized IT and business knowledge. We also examine how the former mechanisms influence the efficiency of the latter. This study contributes to the existing literature by suggesting transformational leadership and mechanisms related to knowledge integration as key factors in IT-business alignment

    Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector

    Get PDF
    The main purpose of this paper is to identify the current state of the art on digital supply chain cybersecurity risks in critical infrastructure and how the term resilience is used in this context. To achieve this objective, the authors applied a systematic literature review method that summarises and analyses the studies relevant for the research topic. In total 33 papers were identified. The results show that limited research is done on supply chain risks in critical infrastructure. Relevant frameworks and methods for resilience of supply chains have also been identified. These frameworks and methods could be very beneficial for a more holistic management of cybersecurity risks in the increasingly complex supply chains within critical infrastructure.publishedVersionPaid open acces

    Selecting IT Control Objectives and Measuring IT Control Capital

    Get PDF
    COBIT is a well-known framework for IT governance, and provides an extensive list of control objectives for IT managers. However, anecdotal evidence shows that many organizations that use COBIT do not implement the entire framework. Instead, they focus their efforts on only some of COBIT’ s control objectives. We argue that this could be due to the bounded rationality of IT managers, which affects their ability to assess the outcomes of control, and the diminishing returns from implementing controls, because of enforcement costs incurred to control shirking. Managers would thus find it useful if the various control objectives could be ranked, so that they could prioritize their efforts. We use network analysis to identify the most central control objectives in COBIT. We also discuss the development of a measure of “control capital” to capture the level of control an organization achieves after implementing a particular set of controls. Future research will test the empirical validity of this measure
    • …
    corecore