Abstract
This paper1 covers the following questions: — what is IT governance and why is it important; — whom does it concern; — what can they do about it; — what does it cover; — what questions should be asked; — how is it accomplished; — how does your organisation compare. After an introduction to CobiT, the CobiT Framework is explained and specific attention is given to the CobiT management guidelines.
Chapter PDF
Similar content being viewed by others
Key words
Endnotes and References
In this document, “stakeholder” is used to indicate anyone who has either a responsibility for or an expectation from the enterprise’s IT, e.g., shareholders, directors, executives, business and technology management, users, employees, governments, suppliers, customers and the public.
In this document, “board of directors” and “board” are used to indicate the body that is ultimately accountable to the stakeholders of the enterprise.
The CobiT control framework refers to key goal indicators (KGIs) and key performance indicators (KPIs) for the balanced business scorecard concepts of outcome measures and performance drivers.
The Balanced Business Scorecard — Measurements that Drive Performance,” Robert S. Kaplan and David P. Norton, Harvard Business Review, January-February 1992
Capability Maturity Model SM for Software,” Version 1.1. Technical Report CMU/SEI-93-TR-024, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, February 1993
Control Objectives for Information and related Technology (CobiT) 3`d Edition, IT Governance Institute, 1998, www.isaca.org/cobit.htm(All sections of Cowl’, except the Audit Guidelines, can be downloaded on a complimentary basis. Print copies of all components, including the Audit Guidelines, may be purchased from the ISACA Bookstore; contact bookstore@isaca.orgfor availability.)
Board Briefing on IT Governance,IT Governance Institute, 2001, www.ITgovernance.org/resources.htm(May be downloaded on a complimentary basis. Print copies may be purchased from the ISACA Bookstore; contact bookstore@isaca.orgfor availability.)
Information Security Governance: Guidance for Boards of Directors and Executive Management, IT Governance Institute, 2001, www.ITgovernance.org/resources.htm(May be downloaded on a complimentary basis. Print copies may be purchased from the ISACA Bookstore; contact bookstore@isaca.orgfor availability.)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Guldentops, E. (2002). Governing Information Technology Through CobiT. In: Gertz, M., Guldentops, E., Strous, L. (eds) Integrity, Internal Control and Security in Information Systems. IICIS 2001. IFIP — The International Federation for Information Processing, vol 83. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35583-2_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-35583-2_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5537-4
Online ISBN: 978-0-387-35583-2
eBook Packages: Springer Book Archive