SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
A Quest for Theoretical Foundations of COBIT 5 
Jan Devos & Kevin Van de Ginste 
Ghent University, Campus Kortrijk, Belgium 
pag. 1 
J. Devos - ECIME 2014 – Ghent
Outline 
•Problem 
•Research Question 
•Methodology 
•Findings 
•Conclusion 
pag. 2 
J. Devos - ECIME 2014 – Ghent
Problem 
•IT/IS research is slow (and a new) discipline 
•IT/IS has a practical kernel which is fast moving where speed has won against quality (Cross 2011) 
•Practitioners (consultants/large organizations) are developing own methods and frameworks to evaluate IT/IS 
e.g. COBIT, ITIL, CMMi, PMBoK, PRINCE2, … 
•Not (always) theoretically founded (Ridley et al. 2008, Goldschmidt et al. 2009, Choi and Yoo 2009, Chen and Shen 2010) 
pag. 3 
J. Devos - ECIME 2014 – Ghent
Problem (cont) 
•Hard to supplant frameworks and methods to other environments (SMEs, universities, not-for- profit) 
•Still a lot of IT/IS failures (Avison et al. 2006, Conboy 2010, Dwivedi et al. 2013) 
•IT/IS evaluation is under researched 
pag. 4 
J. Devos - ECIME 2014 – Ghent
Example: COBIT 5 
•COBIT 5 (Control Objectives for Information and Information related Technologies) 
•IT governance, management and audit framework well- known in IT/IS practitioners communities (ISACA 2012a) 
pag. 5 
J. Devos - ECIME 2014 – Ghent 
Domain 
Type of Domain 
Number of processes 
Evaluate, Direct and Monitor (EDM) 
Governance 
5 
Align, Plan and Organize (APO) 
Management 
13 
Build, Acquire and Implement (BAI) 
Management 
10 
Deliver, Service and Support (DSS) 
Management 
6 
Monitor, Evaluate and Assess (MEA) 
Management 
3
Research Question 
Does COBIT have visibly theoretical foundations that can support (some of) the claims made in the framework? 
pag. 6 
J. Devos - ECIME 2014 – Ghent
Methodology (cont) 
•Reverse Engineering work 
•Selection of excising IT/IS theories (not grounded theory method) (Larsen et al. 2014) 
•Mapping theoretical propositions to empirical observations (pattern matching) (Yin, 2003, ISO/IEC 15504-2) 
pag. 7 
J. Devos - ECIME 2014 – Ghent
Methodology 
Which IT/IS theories? 
•Truex criteria (Truex et al. 2006) Preparing the theories 
•a classification, an analysis, and a summary of developed components according to Gregor (2006) 
pag. 8 
J. Devos - ECIME 2014 – Ghent
pag. 9 
J. Devos - ECIME 2014 – Ghent 
Theories 
Truex criteria 
Stakeholder Theory 
Principal Agent Theory 
Technology Acceptance Model 
Fit between theory and phenomenon 
SHT fits very well with facts in COBIT. The first key principle of COBIT refers already to the broad phenomenon of stakeholders. 
PAT focussed on a fundamental relation between two actors. An information system is a nexus of principal-agent relations: e.g. owner- manager, user-developer, auditor- CIO, … 
A substantial critic to COBIT is the ‘mechanical’ way the framework is constructed and the ignorance of the user as reflective human actor (Hoogervorst 2008). It makes it challenging to investigate how TAM could fit or not with the propositions of COBIT. 
Historical context of theory 
The concept of stakeholder has gradually grown from shareholder to a general concept of all actors that could have a stake in an artefact or organisation. 
PAT is one of the cornerstone theories of organisations. 
TAM is one of the only successful IS theories designed from within the IS discipline. Although the theory has been criticized by many, current relevant IS research is still using TAM. 
Impact on the research method 
SHT is a process theory which is compliant with the basic perspective of our research method (qualitative and a mixture of positivism and interpretivism). 
PAT has two streams: positivistic agent theory and principal agent theory. We conducted the last stream (Eisenhardt 1989) 
TAM is constructed as a variance theory. However the operationalization of the constructs (acceptance perceived ease of use and usefulness) can be also assessed from a process perspective. 
Contribution to cumulative theory 
SHT has been used in ten previous works in IS research (Larsen et al. 2014) 
PAT has been used in 24 previous works in IS research and has links with other theories used in IS research (Larsen et al. 2014) 
TAM is one of the few genuine IS theories, in the sense that the theory is not borrowed from other disciplines. TAM has been used in 64 previous works in IS research and has a profound link with the DeLone & McLean Success Model (Larsen et al. 2014)
pag. 10 
J. Devos - ECIME 2014 – Ghent 
Overview of Stakeholder Theory (SHT) 
SHT is a management theory that identifies groups and individuals that have a stake in an organisation (Frooman 1999). The theory helps to identify, understand and use in a strategic way stakeholders in an organisation. SHT explains how stakeholders can affect the organization. SHT gives answers to three key questions: 1) Who are the stakeholders (Mitchell et al. 1997), 2) What do the stakeholders want? and 3) How do stakeholders influence? 
Theory Component 
Instantiation 
Means of representation 
Words, lists, tables and diagrams 
Primary constructs 
Questions, groups and individuals 
Statements of relationships 
Relations between the stakeholders and the organization 
Scope 
The relations of an organization 
Causal explanations 
SHT explains the relation between stakeholders and organization by stating how stakeholders will impose their will. 
Testable propositions 
Questions can be composted and tested by interviews 
Prescriptive statements 
Only for the questions 1 and 3
Methodology 
Principles 
1: Meeting Stakeholder Needs 
2. Covering the Enterprise End-to-end 
3. Applying a Single, Integrated Framework 
4. Enabling a Holistic Approach 
5. Separating Governance From Management 
pag. 11 
J. Devos - ECIME 2014 – Ghent 
Processes (security oriented) 
•APO13 Manage Security, 
•BAI06 Manage Change, 
•DSS05 Manage Security Services 
•EDM03 Ensure Risk Optimisation 
•MEA03Monitor, Evaluate and Assess Compliance with external Requirements 
Goals (BSC) 
•02 IT compliance and support for business compliance with external laws and regulations 
•07 Delivery of IT services in line with business requirements 
•10 Security of information, processing infrastructure and applications 
•16 Competent and motivated business and IT personnel
Methodology 
Score N: (Not Present) There are no propositions, keywords or statements in COBIT that can be matched with components of one of the selected theories. 
Score P: (Present) There is a least one proposition, keyword or statement in COBIT that can be matched with one components of one or more of the selected theories. 
Score L: (Largely present) There is more than one proposition, keyword or statement in COBIT that can be matched with one theory. 
Score F: (Fully present) There is a strong match of several (more than two) COBIT propositions, keywords or statements with one theory. 
pag. 12 
J. Devos - ECIME 2014 – Ghent
pag. 13 
J. Devos - ECIME 2014 – Ghent 
FINDINGS 
SHT 
PAT 
TAM 
Meeting Stakeholder Needs 
LP 
LP 
N 
Covering the enterprise End-to-End 
LP 
LP 
N 
Applying a Single Integrated Framework 
P 
P 
N 
Enabling a Holistic Approach 
N 
N 
N 
Separating Governance From Management 
LP 
F 
N 
APO13 Manage Security 
LP 
LP 
P 
BAI06 Manage Change 
P 
LP 
P 
DSS05 Manage Security Services 
LP 
LP 
N 
MEA03 Monitor, Evaluate and Assess Compliance with external Requirements 
LP 
LP 
N 
EDM03 Ensure Risk Optimisation 
LP 
F 
P 
Goal 2 - IT compliance and support for business compliance with external laws and regulations 
P 
LP 
N 
Goal 7 - Delivery of IT services in line with business requirements 
N 
N 
P 
Goal 10 - Security of information, processing infrastructure and applications 
P 
LP 
N 
Goal 16 - Competent and motivated business and IT personnel 
N 
N 
P
Findings 
The strongest theoretical foundations in COBIT are coming for PAT. PAT is a theory that is often used to explains elements of control in a governance versus management setting 
There is also coupling in appearance between PAT and SHT 
TAM is less present in COBIT. This can be due to the fact that TAM is a higher type of theory, with strong causal relations 
IT-related goals can strongly determine the presence of a theory. This is the way around, a framework should be designed with a theoretical stance in the first place 
pag. 14 
J. Devos - ECIME 2014 – Ghent
Findings 
e.g. 
‣IT-related goal 07 (Delivery of IT services in line with business requirements) suggest to be based on TAM and brings the theory into the process BAI06 Manage Change. 
‣IT-related goals 02 (IT compliance and support for business compliance with external laws and regulations) and 10 (Security of information, processing infrastructure and applications) bring in PAT in APO13 Manage Security and DSS05 Manage Security Services. 
pag. 15 
J. Devos - ECIME 2014 – Ghent
Conclusions 
The strong appearance of PAT and SHT in COBIT is probably due to the fact that both theories are lower types of theories Gregor (2006). 
COBIT was originally build as an IT audit guideline, so control (PAT) and stakeholders (SHT) are key elements there. 
Only prescriptive statements from SHT are (limited) present. To fully implement SHT one could use the findings of Mitchell et al. (1997) to assess the influence of each stakeholder. Together with the findings of Frooman (1999) the framework could be enriched with the way how stakeholders try to execute their influence. This could lead to better or more fine-tuned metrics. 
pag. 16 
J. Devos - ECIME 2014 – Ghent
Conclusions 
COBIT did not took off from a clear theoretical starting position 
Derived theoretical propositions from the selected theories are present in the framework, albeit not always complete (e.g. SHT) 
Primary constructs, scope and statements of relationship of the theories are often found, but causal explanations are often absent 
Some theories do not have very clear causal explanations, so type I and type II theories have a higher likelihood to be supportive for COBIT. (e.g. PAT). 
pag. 17 
J. Devos - ECIME 2014 – Ghent
Conclusions 
What other theories are present in COBIT? (e.g;. Resource Based Theory, Transaction Economics, and Structuration Theory) 
The assessment model of scoring the presence of a theory in COBIT can be more ine-tuned. 
pag. 18 
J. Devos - ECIME 2014 – Ghent

Más contenido relacionado

Similar a Ecime 2014 v.1.0

CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docxCHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docxmccormicknadine86
 
Research articleFactors affecting the successful realisati.docx
Research articleFactors affecting the successful realisati.docxResearch articleFactors affecting the successful realisati.docx
Research articleFactors affecting the successful realisati.docxrgladys1
 
IT - Business Alignment
IT - Business AlignmentIT - Business Alignment
IT - Business AlignmentBP Gurus
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...christophefeltus
 
Dr. ITIL Talking about IT/Business Alignment research
Dr. ITIL Talking about IT/Business Alignment researchDr. ITIL Talking about IT/Business Alignment research
Dr. ITIL Talking about IT/Business Alignment researchMauricio Corona
 
Choose a Research TopicHiba Al MehdiSchool of Business, Northc
Choose a Research TopicHiba Al MehdiSchool of Business, NorthcChoose a Research TopicHiba Al MehdiSchool of Business, Northc
Choose a Research TopicHiba Al MehdiSchool of Business, NorthcJinElias52
 
Choose a research topic hiba al mehdischool of business, northc
Choose a research topic hiba al mehdischool of business, northcChoose a research topic hiba al mehdischool of business, northc
Choose a research topic hiba al mehdischool of business, northcnand15
 
A New Framework For Managing IT-Enabled Business Change
A New Framework For Managing IT-Enabled Business ChangeA New Framework For Managing IT-Enabled Business Change
A New Framework For Managing IT-Enabled Business ChangeJulie Davis
 
Enablers of TMT support fr integrated management control systems innovations
Enablers of TMT support fr integrated management control systems innovationsEnablers of TMT support fr integrated management control systems innovations
Enablers of TMT support fr integrated management control systems innovationsJessica Lee
 
Week 6 Post Menopausal and Sexuality Issues in the Maturing and O.docx
Week 6 Post Menopausal and Sexuality Issues in the Maturing and O.docxWeek 6 Post Menopausal and Sexuality Issues in the Maturing and O.docx
Week 6 Post Menopausal and Sexuality Issues in the Maturing and O.docxhelzerpatrina
 
1820-02141300020S.pdf
1820-02141300020S.pdf1820-02141300020S.pdf
1820-02141300020S.pdfTesfish Hailu
 
A Practical Application Of Critical Systems Thinking To Improve A Business In...
A Practical Application Of Critical Systems Thinking To Improve A Business In...A Practical Application Of Critical Systems Thinking To Improve A Business In...
A Practical Application Of Critical Systems Thinking To Improve A Business In...Lisa Garcia
 
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docxAdomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docxdaniahendric
 
A_Framework_for_Understanding_and_Analysing_eBusin.pdf
A_Framework_for_Understanding_and_Analysing_eBusin.pdfA_Framework_for_Understanding_and_Analysing_eBusin.pdf
A_Framework_for_Understanding_and_Analysing_eBusin.pdfArulraj Veerappan
 
Aligning IT and business strategy an Australian university ca.docx
Aligning IT and business strategy an Australian university ca.docxAligning IT and business strategy an Australian university ca.docx
Aligning IT and business strategy an Australian university ca.docxdaniahendric
 
2-Theoretical-Frameworks.pptx
2-Theoretical-Frameworks.pptx2-Theoretical-Frameworks.pptx
2-Theoretical-Frameworks.pptxEmilJohnLatosa
 
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESSA GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESSijseajournal
 
Gastvortrag Mannheim Business-IT Alignment am 17.10.12.pdf
Gastvortrag Mannheim Business-IT Alignment am 17.10.12.pdfGastvortrag Mannheim Business-IT Alignment am 17.10.12.pdf
Gastvortrag Mannheim Business-IT Alignment am 17.10.12.pdfAlexanderBenlian
 

Similar a Ecime 2014 v.1.0 (20)

Tam & toe
Tam & toeTam & toe
Tam & toe
 
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docxCHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
CHAPTER-1 Discussion 11) DiscussionCOLLAPSEIT value Infor.docx
 
Research articleFactors affecting the successful realisati.docx
Research articleFactors affecting the successful realisati.docxResearch articleFactors affecting the successful realisati.docx
Research articleFactors affecting the successful realisati.docx
 
IT - Business Alignment
IT - Business AlignmentIT - Business Alignment
IT - Business Alignment
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...
 
Dr. ITIL Talking about IT/Business Alignment research
Dr. ITIL Talking about IT/Business Alignment researchDr. ITIL Talking about IT/Business Alignment research
Dr. ITIL Talking about IT/Business Alignment research
 
Choose a Research TopicHiba Al MehdiSchool of Business, Northc
Choose a Research TopicHiba Al MehdiSchool of Business, NorthcChoose a Research TopicHiba Al MehdiSchool of Business, Northc
Choose a Research TopicHiba Al MehdiSchool of Business, Northc
 
Choose a research topic hiba al mehdischool of business, northc
Choose a research topic hiba al mehdischool of business, northcChoose a research topic hiba al mehdischool of business, northc
Choose a research topic hiba al mehdischool of business, northc
 
A New Framework For Managing IT-Enabled Business Change
A New Framework For Managing IT-Enabled Business ChangeA New Framework For Managing IT-Enabled Business Change
A New Framework For Managing IT-Enabled Business Change
 
Enablers of TMT support fr integrated management control systems innovations
Enablers of TMT support fr integrated management control systems innovationsEnablers of TMT support fr integrated management control systems innovations
Enablers of TMT support fr integrated management control systems innovations
 
Week 6 Post Menopausal and Sexuality Issues in the Maturing and O.docx
Week 6 Post Menopausal and Sexuality Issues in the Maturing and O.docxWeek 6 Post Menopausal and Sexuality Issues in the Maturing and O.docx
Week 6 Post Menopausal and Sexuality Issues in the Maturing and O.docx
 
1820-02141300020S.pdf
1820-02141300020S.pdf1820-02141300020S.pdf
1820-02141300020S.pdf
 
A Practical Application Of Critical Systems Thinking To Improve A Business In...
A Practical Application Of Critical Systems Thinking To Improve A Business In...A Practical Application Of Critical Systems Thinking To Improve A Business In...
A Practical Application Of Critical Systems Thinking To Improve A Business In...
 
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docxAdomavicius et al.Technology Trends in the IT LandscapeSP.docx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
 
A_Framework_for_Understanding_and_Analysing_eBusin.pdf
A_Framework_for_Understanding_and_Analysing_eBusin.pdfA_Framework_for_Understanding_and_Analysing_eBusin.pdf
A_Framework_for_Understanding_and_Analysing_eBusin.pdf
 
Aligning IT and business strategy an Australian university ca.docx
Aligning IT and business strategy an Australian university ca.docxAligning IT and business strategy an Australian university ca.docx
Aligning IT and business strategy an Australian university ca.docx
 
2-Theoretical-Frameworks.pptx
2-Theoretical-Frameworks.pptx2-Theoretical-Frameworks.pptx
2-Theoretical-Frameworks.pptx
 
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESSA GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
 
Gastvortrag Mannheim Business-IT Alignment am 17.10.12.pdf
Gastvortrag Mannheim Business-IT Alignment am 17.10.12.pdfGastvortrag Mannheim Business-IT Alignment am 17.10.12.pdf
Gastvortrag Mannheim Business-IT Alignment am 17.10.12.pdf
 

Más de Ghent University

Stappenplan voor een 'succesvol' project
Stappenplan voor een 'succesvol' project Stappenplan voor een 'succesvol' project
Stappenplan voor een 'succesvol' project Ghent University
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project ManagementGhent University
 
Digitaal forensis onderzoek v.2.2
Digitaal forensis onderzoek v.2.2Digitaal forensis onderzoek v.2.2
Digitaal forensis onderzoek v.2.2Ghent University
 
A New Perspective on IT Governance in SMEs
A New Perspective on IT Governance in SMEsA New Perspective on IT Governance in SMEs
A New Perspective on IT Governance in SMEsGhent University
 
IT for Small and Medium-sized Enterprises (SMEs)
IT for Small and Medium-sized  Enterprises (SMEs)IT for Small and Medium-sized  Enterprises (SMEs)
IT for Small and Medium-sized Enterprises (SMEs)Ghent University
 
Een duurzame relatie tussen KMO IT-manager en IT-leverancier
Een duurzame relatie tussen KMO IT-manager en IT-leverancierEen duurzame relatie tussen KMO IT-manager en IT-leverancier
Een duurzame relatie tussen KMO IT-manager en IT-leverancierGhent University
 
Vertrouwen: sleutel tot geslaagde IT projecten
Vertrouwen: sleutel tot geslaagde IT projectenVertrouwen: sleutel tot geslaagde IT projecten
Vertrouwen: sleutel tot geslaagde IT projectenGhent University
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project ManagementGhent University
 
Juridische ICT tools for the Website developer
Juridische ICT tools for the Website developerJuridische ICT tools for the Website developer
Juridische ICT tools for the Website developerGhent University
 

Más de Ghent University (20)

Stappenplan voor een 'succesvol' project
Stappenplan voor een 'succesvol' project Stappenplan voor een 'succesvol' project
Stappenplan voor een 'succesvol' project
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
E competences 21 10-2013
E competences 21 10-2013E competences 21 10-2013
E competences 21 10-2013
 
Digitaal forensis onderzoek v.2.2
Digitaal forensis onderzoek v.2.2Digitaal forensis onderzoek v.2.2
Digitaal forensis onderzoek v.2.2
 
Eccf 2012 jdv v.3.0
Eccf 2012   jdv v.3.0Eccf 2012   jdv v.3.0
Eccf 2012 jdv v.3.0
 
ICT Trends
ICT Trends ICT Trends
ICT Trends
 
A New Perspective on IT Governance in SMEs
A New Perspective on IT Governance in SMEsA New Perspective on IT Governance in SMEs
A New Perspective on IT Governance in SMEs
 
Engineer or Bricoleur ?
Engineer or Bricoleur ?Engineer or Bricoleur ?
Engineer or Bricoleur ?
 
ECIME 2012 Cork - Ireland
ECIME 2012 Cork - IrelandECIME 2012 Cork - Ireland
ECIME 2012 Cork - Ireland
 
IT for Small and Medium-sized Enterprises (SMEs)
IT for Small and Medium-sized  Enterprises (SMEs)IT for Small and Medium-sized  Enterprises (SMEs)
IT for Small and Medium-sized Enterprises (SMEs)
 
Een duurzame relatie tussen KMO IT-manager en IT-leverancier
Een duurzame relatie tussen KMO IT-manager en IT-leverancierEen duurzame relatie tussen KMO IT-manager en IT-leverancier
Een duurzame relatie tussen KMO IT-manager en IT-leverancier
 
Engineer or Bricoleur ?
Engineer or Bricoleur ? Engineer or Bricoleur ?
Engineer or Bricoleur ?
 
Edushock 17 04-2012
Edushock 17 04-2012Edushock 17 04-2012
Edushock 17 04-2012
 
Vertrouwen: sleutel tot geslaagde IT projecten
Vertrouwen: sleutel tot geslaagde IT projectenVertrouwen: sleutel tot geslaagde IT projecten
Vertrouwen: sleutel tot geslaagde IT projecten
 
Aog feb 06-03-2012 v.2.0
Aog feb   06-03-2012 v.2.0Aog feb   06-03-2012 v.2.0
Aog feb 06-03-2012 v.2.0
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
Comoaeco
ComoaecoComoaeco
Comoaeco
 
TEDxUHowest presentatie
TEDxUHowest presentatie TEDxUHowest presentatie
TEDxUHowest presentatie
 
Trust or Control ?
Trust or Control ? Trust or Control ?
Trust or Control ?
 
Juridische ICT tools for the Website developer
Juridische ICT tools for the Website developerJuridische ICT tools for the Website developer
Juridische ICT tools for the Website developer
 

Último

SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxRizalinePalanog2
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Joonhun Lee
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformationAreesha Ahmad
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Monika Rani
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Servicemonikaservice1
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑Damini Dixit
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flyPRADYUMMAURYA1
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...ssuser79fe74
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONrouseeyyy
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Silpa
 

Último (20)

SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 

Ecime 2014 v.1.0

  • 1. A Quest for Theoretical Foundations of COBIT 5 Jan Devos & Kevin Van de Ginste Ghent University, Campus Kortrijk, Belgium pag. 1 J. Devos - ECIME 2014 – Ghent
  • 2. Outline •Problem •Research Question •Methodology •Findings •Conclusion pag. 2 J. Devos - ECIME 2014 – Ghent
  • 3. Problem •IT/IS research is slow (and a new) discipline •IT/IS has a practical kernel which is fast moving where speed has won against quality (Cross 2011) •Practitioners (consultants/large organizations) are developing own methods and frameworks to evaluate IT/IS e.g. COBIT, ITIL, CMMi, PMBoK, PRINCE2, … •Not (always) theoretically founded (Ridley et al. 2008, Goldschmidt et al. 2009, Choi and Yoo 2009, Chen and Shen 2010) pag. 3 J. Devos - ECIME 2014 – Ghent
  • 4. Problem (cont) •Hard to supplant frameworks and methods to other environments (SMEs, universities, not-for- profit) •Still a lot of IT/IS failures (Avison et al. 2006, Conboy 2010, Dwivedi et al. 2013) •IT/IS evaluation is under researched pag. 4 J. Devos - ECIME 2014 – Ghent
  • 5. Example: COBIT 5 •COBIT 5 (Control Objectives for Information and Information related Technologies) •IT governance, management and audit framework well- known in IT/IS practitioners communities (ISACA 2012a) pag. 5 J. Devos - ECIME 2014 – Ghent Domain Type of Domain Number of processes Evaluate, Direct and Monitor (EDM) Governance 5 Align, Plan and Organize (APO) Management 13 Build, Acquire and Implement (BAI) Management 10 Deliver, Service and Support (DSS) Management 6 Monitor, Evaluate and Assess (MEA) Management 3
  • 6. Research Question Does COBIT have visibly theoretical foundations that can support (some of) the claims made in the framework? pag. 6 J. Devos - ECIME 2014 – Ghent
  • 7. Methodology (cont) •Reverse Engineering work •Selection of excising IT/IS theories (not grounded theory method) (Larsen et al. 2014) •Mapping theoretical propositions to empirical observations (pattern matching) (Yin, 2003, ISO/IEC 15504-2) pag. 7 J. Devos - ECIME 2014 – Ghent
  • 8. Methodology Which IT/IS theories? •Truex criteria (Truex et al. 2006) Preparing the theories •a classification, an analysis, and a summary of developed components according to Gregor (2006) pag. 8 J. Devos - ECIME 2014 – Ghent
  • 9. pag. 9 J. Devos - ECIME 2014 – Ghent Theories Truex criteria Stakeholder Theory Principal Agent Theory Technology Acceptance Model Fit between theory and phenomenon SHT fits very well with facts in COBIT. The first key principle of COBIT refers already to the broad phenomenon of stakeholders. PAT focussed on a fundamental relation between two actors. An information system is a nexus of principal-agent relations: e.g. owner- manager, user-developer, auditor- CIO, … A substantial critic to COBIT is the ‘mechanical’ way the framework is constructed and the ignorance of the user as reflective human actor (Hoogervorst 2008). It makes it challenging to investigate how TAM could fit or not with the propositions of COBIT. Historical context of theory The concept of stakeholder has gradually grown from shareholder to a general concept of all actors that could have a stake in an artefact or organisation. PAT is one of the cornerstone theories of organisations. TAM is one of the only successful IS theories designed from within the IS discipline. Although the theory has been criticized by many, current relevant IS research is still using TAM. Impact on the research method SHT is a process theory which is compliant with the basic perspective of our research method (qualitative and a mixture of positivism and interpretivism). PAT has two streams: positivistic agent theory and principal agent theory. We conducted the last stream (Eisenhardt 1989) TAM is constructed as a variance theory. However the operationalization of the constructs (acceptance perceived ease of use and usefulness) can be also assessed from a process perspective. Contribution to cumulative theory SHT has been used in ten previous works in IS research (Larsen et al. 2014) PAT has been used in 24 previous works in IS research and has links with other theories used in IS research (Larsen et al. 2014) TAM is one of the few genuine IS theories, in the sense that the theory is not borrowed from other disciplines. TAM has been used in 64 previous works in IS research and has a profound link with the DeLone & McLean Success Model (Larsen et al. 2014)
  • 10. pag. 10 J. Devos - ECIME 2014 – Ghent Overview of Stakeholder Theory (SHT) SHT is a management theory that identifies groups and individuals that have a stake in an organisation (Frooman 1999). The theory helps to identify, understand and use in a strategic way stakeholders in an organisation. SHT explains how stakeholders can affect the organization. SHT gives answers to three key questions: 1) Who are the stakeholders (Mitchell et al. 1997), 2) What do the stakeholders want? and 3) How do stakeholders influence? Theory Component Instantiation Means of representation Words, lists, tables and diagrams Primary constructs Questions, groups and individuals Statements of relationships Relations between the stakeholders and the organization Scope The relations of an organization Causal explanations SHT explains the relation between stakeholders and organization by stating how stakeholders will impose their will. Testable propositions Questions can be composted and tested by interviews Prescriptive statements Only for the questions 1 and 3
  • 11. Methodology Principles 1: Meeting Stakeholder Needs 2. Covering the Enterprise End-to-end 3. Applying a Single, Integrated Framework 4. Enabling a Holistic Approach 5. Separating Governance From Management pag. 11 J. Devos - ECIME 2014 – Ghent Processes (security oriented) •APO13 Manage Security, •BAI06 Manage Change, •DSS05 Manage Security Services •EDM03 Ensure Risk Optimisation •MEA03Monitor, Evaluate and Assess Compliance with external Requirements Goals (BSC) •02 IT compliance and support for business compliance with external laws and regulations •07 Delivery of IT services in line with business requirements •10 Security of information, processing infrastructure and applications •16 Competent and motivated business and IT personnel
  • 12. Methodology Score N: (Not Present) There are no propositions, keywords or statements in COBIT that can be matched with components of one of the selected theories. Score P: (Present) There is a least one proposition, keyword or statement in COBIT that can be matched with one components of one or more of the selected theories. Score L: (Largely present) There is more than one proposition, keyword or statement in COBIT that can be matched with one theory. Score F: (Fully present) There is a strong match of several (more than two) COBIT propositions, keywords or statements with one theory. pag. 12 J. Devos - ECIME 2014 – Ghent
  • 13. pag. 13 J. Devos - ECIME 2014 – Ghent FINDINGS SHT PAT TAM Meeting Stakeholder Needs LP LP N Covering the enterprise End-to-End LP LP N Applying a Single Integrated Framework P P N Enabling a Holistic Approach N N N Separating Governance From Management LP F N APO13 Manage Security LP LP P BAI06 Manage Change P LP P DSS05 Manage Security Services LP LP N MEA03 Monitor, Evaluate and Assess Compliance with external Requirements LP LP N EDM03 Ensure Risk Optimisation LP F P Goal 2 - IT compliance and support for business compliance with external laws and regulations P LP N Goal 7 - Delivery of IT services in line with business requirements N N P Goal 10 - Security of information, processing infrastructure and applications P LP N Goal 16 - Competent and motivated business and IT personnel N N P
  • 14. Findings The strongest theoretical foundations in COBIT are coming for PAT. PAT is a theory that is often used to explains elements of control in a governance versus management setting There is also coupling in appearance between PAT and SHT TAM is less present in COBIT. This can be due to the fact that TAM is a higher type of theory, with strong causal relations IT-related goals can strongly determine the presence of a theory. This is the way around, a framework should be designed with a theoretical stance in the first place pag. 14 J. Devos - ECIME 2014 – Ghent
  • 15. Findings e.g. ‣IT-related goal 07 (Delivery of IT services in line with business requirements) suggest to be based on TAM and brings the theory into the process BAI06 Manage Change. ‣IT-related goals 02 (IT compliance and support for business compliance with external laws and regulations) and 10 (Security of information, processing infrastructure and applications) bring in PAT in APO13 Manage Security and DSS05 Manage Security Services. pag. 15 J. Devos - ECIME 2014 – Ghent
  • 16. Conclusions The strong appearance of PAT and SHT in COBIT is probably due to the fact that both theories are lower types of theories Gregor (2006). COBIT was originally build as an IT audit guideline, so control (PAT) and stakeholders (SHT) are key elements there. Only prescriptive statements from SHT are (limited) present. To fully implement SHT one could use the findings of Mitchell et al. (1997) to assess the influence of each stakeholder. Together with the findings of Frooman (1999) the framework could be enriched with the way how stakeholders try to execute their influence. This could lead to better or more fine-tuned metrics. pag. 16 J. Devos - ECIME 2014 – Ghent
  • 17. Conclusions COBIT did not took off from a clear theoretical starting position Derived theoretical propositions from the selected theories are present in the framework, albeit not always complete (e.g. SHT) Primary constructs, scope and statements of relationship of the theories are often found, but causal explanations are often absent Some theories do not have very clear causal explanations, so type I and type II theories have a higher likelihood to be supportive for COBIT. (e.g. PAT). pag. 17 J. Devos - ECIME 2014 – Ghent
  • 18. Conclusions What other theories are present in COBIT? (e.g;. Resource Based Theory, Transaction Economics, and Structuration Theory) The assessment model of scoring the presence of a theory in COBIT can be more ine-tuned. pag. 18 J. Devos - ECIME 2014 – Ghent