Academic literature on the topic 'COBIT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COBIT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "COBIT"
Syuhada, Aldy Maulana. "Kajian Perbandingan Cobit 5 dengan Cobit 2019 sebagai Framework Audit Tata Kelola Teknologi Informasi." Syntax Literate ; Jurnal Ilmiah Indonesia 6, no. 1 (January 20, 2021): 30. http://dx.doi.org/10.36418/syntax-literate.v6i1.2082.
Full textFajrin, Rati Amanda, Murahartawaty Murahartawaty, and Soni Fajar S. Gumilang. "Perancangan Tata Kelola Teknologi Informasi di BAPAPSI Pemkab Bandung Menggunakan framework COBIT 5 Pada Domain EDM dan DSS." Journal of Information Systems Engineering and Business Intelligence 2, no. 2 (October 29, 2016): 74. http://dx.doi.org/10.20473/jisebi.2.2.74-80.
Full textAB, Mutiara, Prihandoko, Prasetyo E, and Widya C. "Analyzing COBIT 5 IT Audit Framework Implementation using AHP Methodology." JOIV : International Journal on Informatics Visualization 1, no. 2 (April 17, 2017): 33. http://dx.doi.org/10.30630/joiv.1.2.18.
Full textBoy, Radja, Jay Idoan Sihotang, and Jimmy Moedjahedy. "Analisa Efektivitas Pembelajaran Daring Melalui Zoom Meeting Menggunakan Framework COBIT 5 Domain Deliver, Service, and Support (DSS)." CogITo Smart Journal 8, no. 1 (June 19, 2022): 35–46. http://dx.doi.org/10.31154/cogito.v8i1.389.35-46.
Full textGrembergen, Wim Van. "Millennium conversion & COBIT." Computer Audit Update 1997, no. 7 (July 1997): 17–24. http://dx.doi.org/10.1016/s0960-2593(97)84494-1.
Full textNurtrisha, Widyatasya Agustika. "IDENTIFICATION OF THE DOMAIN PROCESS INTERSECTIONS BETWEEN COBIT 4.1 AND COBIT 5 IN THE DETERMINATION OF IT GOVERNANCE ASSESSMENT." Jurnal Pilar Nusa Mandiri 17, no. 1 (March 5, 2021): 85–92. http://dx.doi.org/10.33480/pilar.v17i1.2229.
Full textZen Munawar, S.T, S.Kom., M.Kom. "AUDIT TATA KELOLA TEKNOLOGI INFORMASI DENGAN FRAMEWORK COBIT 5 DI PT. BEST STAMP INDONESIA." TEMATIK 1, no. 2 (December 30, 2014): 35–43. http://dx.doi.org/10.38204/tematik.v1i2.47.
Full textRuslam, Reza Zulfikar, Nur Indrawati, and Yan Andriariza Ambhita Sukma. "PENILAIAN TATA KELOLA TEKNOLOGI INFORMASI PADA SISTEM LOGISTIK PT XYZ BERDASARKAN COBIT (INFORMATION TECHNOLOGY GOVERNANCE ASSESSMENT AT LOGISTIC SYSTEM OF PT XYZ BASED ON COBIT)." Masyarakat Telematika Dan Informasi : Jurnal Penelitian Teknologi Informasi dan Komunikasi 9, no. 2 (December 31, 2018): 125. http://dx.doi.org/10.17933/mti.v9i2.124.
Full textChen, Jie, and Le Ping Shen. "Assessment Model of Corporate Governance with COBIT-Based IT Governance." Advanced Materials Research 121-122 (June 2010): 550–57. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.550.
Full textSantacruz Espinoza, Julio Jhovany, Cesar Remigio Vega Abad, Luis Fernando Pinos Castillo, and Oscar Efrén Cárdenas Villavicencio. "Sistema cobit en los procesos de auditorías de los de sistemas informáticos." Journal of Science and Research: Revista Ciencia e Investigación 2, no. 8 (December 29, 2017): 65. http://dx.doi.org/10.26910/issn.2528-8083vol2iss8.2017pp65-68.
Full textDissertations / Theses on the topic "COBIT"
Steiner, Štefan. "COBIT v malom podnikaní." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74146.
Full textSmažil, Petr. "Informační management podle Cobit 5." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-192379.
Full textTarbajovský, Maroš. "Nasadzovanie a hodnotenie IT Governance v organizáciách." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-11772.
Full textŠkoviera, Martin. "Implementace ITIL a COBIT pomocí nastrojů ARIS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234919.
Full textŠtolbová, Milena. "Řízení informační bezpečnosti v metodikách ITIL a Cobit." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-12065.
Full textSherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.
Full textThe purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
Eremiáš, Karel. "Audit informačního systému společnosti Terms a.s." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-165170.
Full textKieviet, Frèda. "Applying COBIT in an ERP environment, with specific reference to Qmuzik /." Link to the online version, 2006. http://hdl.handle.net/10019/1066.
Full textEnslin, Zacharias. "Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprises." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20116.
Full textENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to. The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented.
AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word. Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
Kieviet, Freda. "Applying COBIT in an ERP environment, with specific reference to Qmuzik." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/3390.
Full textERP applications have evolved into enterprise-wide applications, which are generally acknowledged today as a critical component in an organisation’s information strategy. When implementing an ERP application, the control and governance of all IT processes are critical to ensure that value is delivered, risks are managed and that the investment in IT (ERP) delivers a reasonable return. It should, therefore, be important to focus on mitigating IT process risks that have an impact on the ERP environment, so that the level of residual risk is acceptable and aligned with the business objectives. This assignment focuses on using the generally accepted IT framework, COBIT (Control Objectives for Information and related Technology), as governance and control model. The criticality of each COBIT control objective (IT process) is evaluated by applying the COBIT control objectives in an ERP environment. Specific reference is also made to Qmuzik as an ERP application. By applying COBIT in an ERP environment, the most critical IT processes applicable to ERP are identified, in order to ensure that the minimum process controls for these IT processes are designed and implemented.
Books on the topic "COBIT"
Goltsche, Wolfgang. COBIT kompakt und versta ndlich: Der Standard zur IT Governance - so gewinnen Sie Kontrolle u ber Ihre IT - so steuern Sie Ihre IT und erreichen Ihr Ziel. Wiesbaden: Vieweg, 2006.
Find full textCOBIT 5 for information security. Rolling Meadows, IL: ISACA, 2012.
Find full textInstitute, IT Governance. CobiT security baseline: An information security survival kit. Rolling Meadows, Ill: IT Governance Institute, 2004.
Find full textMoisand, Dominique. CobiT: Pour une meilleure gouvernance des systèmes d'information. Paris: Eyrolles, 2009.
Find full textHarry, Boonen, ed. IT governance based on COBIT 4.1: A management guide. 3rd ed. Zaltbommel: Van Haren Pub., 2007.
Find full textInformation Systems Audit and Control Foundation (Rolling Meadows). COBIT: Governance, control and audit for information and related technology. 3rd ed. Rolling Meadows (Ill.): Information Systems Audit and Control Foundation, 2000.
Find full textMoeller, Robert R. Sarbanes-Oxley internal controls: Effective auditing with AS5, CobiT and ITIL. Hoboken, N.J: John Wiley & Sons, 2008.
Find full texthlich, Martin Fro. IT-Governance: Leitfaden fu r eine praxisgerechte Implementierung. Wiesbaden: Gabler, 2007.
Find full textInstitute, IT Governance. IT governance implementation guide: How do I use CobiT to implement IT governance? Rolling Meadows, Ill: IT Governance Institute, 2003.
Find full textOtter, Martine. Guide des certifications SI: Comparatif, analyse et tendances : ITIL, CobiT, ISO 27001, eSCM... 2nd ed. Paris: Dunod, 2009.
Find full textBook chapters on the topic "COBIT"
Marti, Richard. "COBIT." In Governance, Risk, and Compliance Handbook, 181–89. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118269213.ch13.
Full textPilorget, Lionel. "Evaluation des Reifegrads (COBIT)." In MIIP: Modell zur Implementierung der IT-Prozesse, 215–32. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9769-5_14.
Full textGuldentops, Erik. "Governing Information Technology Through CobiT." In Integrity, Internal Control and Security in Information Systems, 115–59. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2_8.
Full textBlanco, Miguel Ángel, and Mario Piattini. "Adapting COBIT for Quantum Computing Governance." In Communications in Computer and Information Science, 274–83. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58793-2_22.
Full textLepofsky, Ron. "COBIT® 5 for Information Security." In The Manager’s Guide to Web Application Security:, 133–45. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0148-0_10.
Full textSheppey, Terence, and Ross McGill. "Frameworks for Compliance: COSO and COBIT." In Sarbanes-Oxley, 299–341. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_23.
Full textDe Haes, Steven, and Wim Van Grembergen. "COBIT as a Framework for IT Assurance." In Management for Professionals, 129–49. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14547-1_6.
Full textChoi, WoongChul, and DaeHun Yoo. "Assessment of IT Governance of COBIT Framework." In U- and E-Service, Science and Technology, 82–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10580-7_13.
Full textvan Grembergen, Wim, and Steven de Haes. "COBIT as a Framework for IT Assurance." In Enterprise Governance of Information Technology, 165–82. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-84882-2_6.
Full textPretorius, Elmari, and Basie von Solms. "Information Security Governance using ISO 17799 and COBIT." In Integrity and Internal Control in Information Systems VI, 107–13. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-7901-x_7.
Full textConference papers on the topic "COBIT"
Svata, Vlasta. "COBIT 2019: Should We Care?" In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2019. http://dx.doi.org/10.1109/acitt.2019.8779995.
Full textMiranda, Noreen B., Maria Rosario D. Rodavia, and Mir-mel I. Miranda. "IT Infrastructure Auditing using COBIT Framework." In 2019 6th International Conference on Technical Education (ICTechEd6). IEEE, 2019. http://dx.doi.org/10.1109/icteched6.2019.8790861.
Full textSujana, Ahmad, Nurcaweda Adinda, Ninik Lestari, Hetty Fadriani, and Adrew Mahardika. "Audit Information System Using Cobit 5." In Proceedings of the Third Workshop on Multidisciplinary and Its Applications, WMA-3 2019, 11-14 December 2019, Medan, Indonesia. EAI, 2020. http://dx.doi.org/10.4108/eai.11-12-2019.2290885.
Full textMarchão, Joaquina, Leonilde Reis, and Paula Ventura. "OPERATION MANAGEMENT USING ITIL AND COBIT FRAMEWORK." In Fourth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/itema.2020.201.
Full textHojaji, Fazilat, and Mohammad Reza Ayatollahzadeh Shirazi. "A Comprehensive SOA Governance Framework Based on COBIT." In 2010 IEEE Congress on Services (SERVICES). IEEE, 2010. http://dx.doi.org/10.1109/services.2010.33.
Full textTextor, Andreas, and Kurt Geihs. "Calculation of COBIT metrics using a formal ontology." In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2015. http://dx.doi.org/10.1109/inm.2015.7140501.
Full textMacas Ruiz, Estela Maria, Monica Del Rocio Romero Pazmino, Lorena del Cisne Tacuri Pena, Jose Ruben Caiza Caizabuano, and Gladys Elizabeth Cueva Castillo. "COBIT 5.0: Case Study Study Student Census MINEDUC." In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019. http://dx.doi.org/10.23919/cisti.2019.8760762.
Full textSaragih, Naikson Fandier, Candora Sagala, Imelda Sri Dumayanti, Indra Kelana Jaya, Edward Rajagukguk, and Asaziduhu Gea. "Evaluation of Employee Attendance System Using COBIT 5 Framework." In 2019 International Conference of Computer Science and Information Technology (ICoSNIKOM). IEEE, 2019. http://dx.doi.org/10.1109/icosnikom48755.2019.9111589.
Full textAmorim, Ana Claudia, Miguel Mira da Silva, Ruben Pereira, and Margarida Goncalves. "Using Scrum for Implementing IT Governance with COBIT 5." In 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2018. http://dx.doi.org/10.1109/edoc.2018.00033.
Full textWang, ChunMei. "Risk Management of Information Technology Outsourcing based on Cobit." In International Conference on Information System and Management Engineering. SCITEPRESS - Science and and Technology Publications, 2016. http://dx.doi.org/10.5220/0006450503620366.
Full textReports on the topic "COBIT"
Campbell, Philip LaRoche. A Cobit primer. Office of Scientific and Technical Information (OSTI), June 2005. http://dx.doi.org/10.2172/876368.
Full textEvans, K. Jr. Corbit reference manual. Office of Scientific and Technical Information (OSTI), September 1995. http://dx.doi.org/10.2172/197809.
Full textEast, E. W. Construction Operations Building Information Exchange (COBIE). Fort Belvoir, VA: Defense Technical Information Center, June 2007. http://dx.doi.org/10.21236/ada491899.
Full text