In many organizations, information technology (IT) has become crucial in the support, sustainability, and growth of the business. This pervasive use of technology has created a critical dependency on IT that calls for a specific focus on IT governance. Implementing Information Technology Governance
Implementing Information Technology Governance: Models, Practices and Cases
โ Scribed by Wim Van Grembergen, Steven Dehaes
- Publisher
- IGI Publishing
- Year
- 2007
- Tongue
- English
- Leaves
- 271
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
In many organizations, information technology (IT) has become crucial in the support, sustainability, and growth of the business. This pervasive use of technology has created a critical dependency on IT that calls for a specific focus on IT governance. Implementing Information Technology Governance: Models, Practices and Cases presents insight gained through literature reviews and case studies to provide practical guidance for organizations who want to start implementing IT governance or improving existing governance models, and provides a detailed set of IT governance structures, processes, and relational mechanisms that can be leveraged to implement IT governance in practice.
๐ SIMILAR VOLUMES
xiii, 255 p. : 27 cm
<em>Cases on Information Technology Planning, Design and Implementation</em> brings together a variety of real-life experiences showing how other companies and organizations have successfully, or not so successfully, planned, designed, and implemented different applications using information technol
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the n
The Growing Imperative Need for Effective Information Security Governance<p>With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the ne