Using Maturity Model to Govern Information Technology

Using Maturity Model to Govern Information Technology

Asim El-Sheikh, Husam A. Abu Khadra
DOI: 10.4018/978-1-60566-616-7.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter introduces the COBiTs’ maturity model as a mean of studying the information technology (IT) governance and its affect on the perceived Security Threats. It argues that IT governance using the maturity model offers a probable influence on the level of security breaches frequency; such evidence would be extracted through a complex quantitative and qualitative approach, offers a better understanding of intricate relationships between different factors. Moreover, the authors hope that understanding the above mentioned influence using the maturity model will not only inform the researchers of a better design for IT governance and defining implementation pitfalls, but also assist in the understanding of IT governance practices trend in the Jordanian environment.

Complete Chapter List

Search this Book:
Reset