Advanced search
1 file | 270.79 KB Add to list

Towards a theoretical foundation of IT governance: the COBIT 5 case

Author
Organization
Abstract
Abstract: COBIT, (Control Objectives for Information and Information related Technologies) as an IT governance framework is well-known in IS practitioners communities. It would impair the virtues of COBIT to present it only as an IT governance framework. COBIT analyses the complete IS function and offers descriptive and normative support to manage, govern and audit IT in organizations. Although the framework is well accepted in a broad range of IS communities, it is created by practitioners and therefore it holds only a minor amount of theoretical supported claims. Thus critic rises from the academic community. This work contains research focusing on the theoretical fundamentals of the ISACA framework, COBIT 5 released in 2012. We implemented a reverse engineering work and tried to elucidate as much as possible propositions from COBIT 5 as an empiricism. We followed a qualitative research method to develop inductively derived theoretical statements. However our approach differs from the original work on grounded theory by Glaser and Strauss (1967) since we started from a general idea where to begin and we made conceptual descriptions of the empirical statements. So our data was only restructured to reveal theoretical findings. We looked at three candidate theories: 1) Stakeholder Theory (SHT), 2) Principal Agent Theory (PAT), and 3) Technology Acceptance Model (TAM). These three theories are categorized and from each theory, several testable propositions were deduced. We considered the five COBIT 5 principles, five processes (APO13, BAI06, DSS05, MEA03 and EDM03) mainly situated in the area of IS security and four IT-related goals (IT01, IT07, IT10 and IT16). The choice of the processes and IT-related goals are based on an experienced knowledge of COBIT as well of the theories. We constructed a mapping table to find matching patterns. The mapping was done separately by several individuals to increase the internal validity. Our findings indicate that COBIT 5 holds theoretical supported claims. The lower theory types such as PAT and SHT contribute the most. The presence and contribution of a theory is significantly constituted by IT-related goals as compared to the processes. We also make some suggestions for further research. First of all, the work has to be extended to all COBIT 5 processes and IT-related goals. This effort is currently going on. Next we ponder the question what other theories could be considered as candidates for this theoretical reverse engineering labour? During our work we listed already some theories with good potential. Our used pattern matching process can also be refined by bringing in other assessment models. Finally an alternative and more theoretic framework could be designed by using design science research methods and starting with the most relevant IS theories. That could lead to a new IT artefact that eventually could be reconciled with COBIT 5.
Keywords
IT governance, COBIT 5, principal agent theory, stakeholder theory, TAM

Downloads

  • ejise-volume18-issue2-article979.pdf
    • full text
    • |
    • open access
    • |
    • PDF
    • |
    • 270.79 KB

Citation

Please use this url to cite or link to this publication:

MLA
Devos, Jan, and Kevin Van De Ginste. “Towards a Theoretical Foundation of IT Governance: The COBIT 5 Case.” Electronic Journal of Information System Evaluation. Vol. 18. Academic Publishing Limited, 2015. 95–103. Print.
APA
Devos, J., & Van De Ginste, K. (2015). Towards a theoretical foundation of IT governance: the COBIT 5 case. ELECTRONIC JOURNAL OF INFORMATION SYSTEM EVALUATION (Vol. 18, pp. 95–103). Presented at the ECIME, Academic Publishing Limited.
Chicago author-date
Devos, Jan, and Kevin Van De Ginste. 2015. “Towards a Theoretical Foundation of IT Governance: The COBIT 5 Case.” In Electronic Journal of Information System Evaluation, 18:95–103. Academic Publishing Limited.
Chicago author-date (all authors)
Devos, Jan, and Kevin Van De Ginste. 2015. “Towards a Theoretical Foundation of IT Governance: The COBIT 5 Case.” In Electronic Journal of Information System Evaluation, 18:95–103. Academic Publishing Limited.
Vancouver
1.
Devos J, Van De Ginste K. Towards a theoretical foundation of IT governance: the COBIT 5 case. ELECTRONIC JOURNAL OF INFORMATION SYSTEM EVALUATION. Academic Publishing Limited; 2015. p. 95–103.
IEEE
[1]
J. Devos and K. Van De Ginste, “Towards a theoretical foundation of IT governance: the COBIT 5 case,” in ELECTRONIC JOURNAL OF INFORMATION SYSTEM EVALUATION, Ghent, Belgium, 2015, vol. 18, no. 2, pp. 95–103.
@inproceedings{6966348,
  abstract     = {Abstract: COBIT, (Control Objectives for Information and Information related Technologies) as an IT governance framework is well-known in IS practitioners communities. It would impair the virtues of COBIT to present it only as an IT governance framework. COBIT analyses the complete IS function and offers descriptive and normative support to manage, govern and audit IT in organizations. Although the framework is well accepted in a broad range of IS communities, it is created by practitioners and therefore it holds only a minor amount of theoretical supported claims. Thus critic rises from the academic community. This work contains research focusing on the theoretical fundamentals of the ISACA framework, COBIT 5 released in 2012. We implemented a reverse engineering work and tried to elucidate as much as possible propositions from COBIT 5 as an empiricism. We followed a qualitative research method to develop inductively derived theoretical statements. However our approach differs from the original work on grounded theory by Glaser and Strauss (1967) since we started from a general idea where to begin and we made conceptual descriptions of the empirical statements. So our data was only restructured to reveal theoretical findings. We looked at three candidate theories: 1) Stakeholder Theory (SHT), 2) Principal Agent Theory (PAT), and 3) Technology Acceptance Model (TAM).  These three theories are categorized and from each theory, several testable propositions were deduced. We considered the five COBIT 5 principles,  five processes (APO13, BAI06, DSS05, MEA03 and EDM03) mainly situated in the area of IS security and four IT-related goals (IT01, IT07, IT10 and IT16). The choice of the processes and IT-related goals are based on an experienced knowledge of COBIT as well of the theories. We constructed a mapping table to find matching patterns. The mapping was done separately by several individuals to increase the internal validity. Our findings indicate that COBIT 5 holds theoretical supported claims. The lower theory types such as PAT and SHT contribute the most. The presence and contribution of a theory is significantly constituted by IT-related goals as compared to the processes. We also make some suggestions for further research. First of all, the work has to be extended to all COBIT 5 processes and IT-related goals. This effort is currently going on. Next we ponder the question what other theories could be considered as candidates for this theoretical reverse engineering labour? During our work we listed already some theories with good potential. Our used pattern matching process can also be refined by bringing in other assessment models. Finally an alternative and more theoretic framework could be designed by using design science research methods and starting with the most relevant IS theories. That could lead to a new IT artefact that eventually could be reconciled with COBIT 5.},
  author       = {Devos, Jan and Van De Ginste, Kevin},
  booktitle    = {ELECTRONIC JOURNAL OF INFORMATION SYSTEM EVALUATION},
  issn         = {1566-6379},
  keywords     = {IT governance,COBIT 5,principal agent theory,stakeholder theory,TAM},
  language     = {eng},
  location     = {Ghent, Belgium},
  number       = {2},
  pages        = {95--103},
  publisher    = {Academic Publishing Limited},
  title        = {Towards a theoretical foundation of IT governance: the COBIT 5 case},
  url          = {http://www.ejise.com/},
  volume       = {18},
  year         = {2015},
}