Using Maturity Model to Govern Information Technology

Using Maturity Model to Govern Information Technology

Asim El-Sheikh (The Arab Academy for Banking and Financial Services, Jordan) and Husam A. Abu Khadra (The Arab Academy for Banking and Financial Services, Jordan)
DOI: 10.4018/978-1-60566-616-7.ch007
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This chapter introduces the COBiTs’ maturity model as a mean of studying the information technology (IT) governance and its affect on the perceived Security Threats. It argues that IT governance using the maturity model offers a probable influence on the level of security breaches frequency; such evidence would be extracted through a complex quantitative and qualitative approach, offers a better understanding of intricate relationships between different factors. Moreover, the authors hope that understanding the above mentioned influence using the maturity model will not only inform the researchers of a better design for IT governance and defining implementation pitfalls, but also assist in the understanding of IT governance practices trend in the Jordanian environment.

Complete Chapter List

Search this Book:
Reset