Academic literature on the topic 'COBIT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COBIT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "COBIT"

1

Syuhada, Aldy Maulana. "Kajian Perbandingan Cobit 5 dengan Cobit 2019 sebagai Framework Audit Tata Kelola Teknologi Informasi." Syntax Literate ; Jurnal Ilmiah Indonesia 6, no. 1 (January 20, 2021): 30. http://dx.doi.org/10.36418/syntax-literate.v6i1.2082.

Full text
Abstract:
Teknologi Informasi atau biasa disebut TI merupakan hal terpenting bagi kemajuan perusahaan, semakin berkembangkan TI maka harus dilakukan tata kelola TI yang baik sesuai dengan standart yang ada dan harus dievaluasi terus menerus. Salah satu cara untuk mengevaluasi tata kelola TI yaitu dengan dilakukanya audit teknologi informasi. Salah satu framework yang sering digunakan untuk melakukan audit tata kelola TI adalah COBIT. Tujuan dari penelitian ini adalah mengetahui perbandingan antara COBIT 5 dengan COBIT 2019 serta mengetahui kekurangan dan kelebihan dari masing-masing COBIT tersebut. Metode yang digunakan yaitu kualitatif dengan studi literatur yang berisi tentang uraian teori, temuan dan bahan penelitian lain yang diperoleh sebagai acuan untuk dijadikan landasan kegiatan penelitian. Hasil yang diperoleh dari penelitian ini yaitu terdapat beberapa perbedaan dari segi gambaran secara umum pada COBIT 2019 memiliki desain faktor, segi domain, pada COBIT 2019 terdapat tiga domain tambahan dan bersifat objective. Selanjutnya dari segi prinsip COBIT 2019 memiliki 9 prinsip yang telah dikembangkan dari COBIT sebelumnya. Selanjutnya dari goal cascade dan dari perhitungan kinerja, COBIT 5 hanya menggunakan capability level tetapi pada COBIT 2019 adanya penambahan menjadi capability level dan maturity level. Dari segi kelebihan COBIT 5 lebih banyak digunakan sedangkan dari kekurangannya tidak bersifat flexible sedangkan COBIT 2019 kelebihannya lebih bersifat flexible dan kekurannya prinsip dan detail domainya lebih banyak sehingga akan lebih sulit dalam implementasi.
APA, Harvard, Vancouver, ISO, and other styles
2

Fajrin, Rati Amanda, Murahartawaty Murahartawaty, and Soni Fajar S. Gumilang. "Perancangan Tata Kelola Teknologi Informasi di BAPAPSI Pemkab Bandung Menggunakan framework COBIT 5 Pada Domain EDM dan DSS." Journal of Information Systems Engineering and Business Intelligence 2, no. 2 (October 29, 2016): 74. http://dx.doi.org/10.20473/jisebi.2.2.74-80.

Full text
Abstract:
Abstrak— Teknologi informasi memiliki peranan penting untuk mendukung pelaksanaan informasi publik. Pemerintah Kabupaten Bandung memiliki salah satu badan, yaitu BAPAPSI. Permasalahan yang ada di BAPAPSI, terutama pada bidang PPI adalah tidak meratanya jaringan internet di seluruh kecamatan, jaringan internet yang buruk, penanganan insiden yang buruk dan pengadaan server yang tidak mendukung penggunaan aplikasi di BAPAPSI. Oleh karena itu, untuk menyelesaikan masalah yang ada di lingkungan BAPAPSI menggunakan metodologi 7 lifecycle COBIT 5. COBIT 5 menyediakan panduan yang lengkap, pedoman yang komprehensif dalam membantu organisasi untuk mencapai efektivitas penggunaan TI. Tahap pertama pada penelitian ini adalah melakukan penilaian tingkat kapabilitas, kemudian memetakan governance objective, enterprise goals, IT Related Goals dan IT Process pada COBIT 5. Sehingga menghasilkan proses prioritas yaitu EDM04 dan DSS01 yang akan dianalisis dan dilakukan perancangan prosedur tata kelola TI dengan menggunakan COBIT 5. Pada penelitian ini juga merekomendasikan struktur organisasi sasaran sesuai dengan kebutuhan Pemerintah Kabupaten Bandung.Kata Kunci— tata kelola TI, COBIT 5, domain EDM, domain DSS, PemerintahanAbstract— Information technology has an important role to support the implementation of public information. Bandung regency government has one of the bodies, named BAPAPSI. The existing problems in BAPAPSI, especially in PPI are uneven internet network in all districts, bad internet connection, bad handling of the incident, and the procurement of servers that do not support the use of the application in BAPAPSI. Therefore, 7 lifecycle COBIT 5 methodology is used to solve the problems in BAPAPSI. COBIT 5 provides complete, comprehensive guidelines in helping organizations to achieve the effective use of IT. The first stage in this research is assess capability level, then the next stage are mapping governance objective, enterprise goals, IT Related Goals and IT Process on COBIT 5. So, the results are the priority process on EDM04 and DSS01 domain to be analyzed and to design procedure IT governance using COBIT 5. This research also recommends the target of organizational structure in accordance with the needs of the Bandung regency government.Keywords— IT Governance, COBIT 5, EDM domain, DSS domain, Government
APA, Harvard, Vancouver, ISO, and other styles
3

AB, Mutiara, Prihandoko, Prasetyo E, and Widya C. "Analyzing COBIT 5 IT Audit Framework Implementation using AHP Methodology." JOIV : International Journal on Informatics Visualization 1, no. 2 (April 17, 2017): 33. http://dx.doi.org/10.30630/joiv.1.2.18.

Full text
Abstract:
COBIT has been known as the best practice standard in IT Governance, both in management or evaluated of the IT utilization. The role of IT Audit framework to evaluate the benefits of Information Technology in an enterprise either its gain benefits or fail in order to achieved the business objective. In Indonesia, most organization has been implemented the IT as their main support of process business, and deliberately conduct the evaluation of the implementation used some IT Audit framework such as ITIL, TOGAF, COBIT and other Government rule. Those frameworks have been known as an IT governance framework, most of organizations are choosing COBIT and ITIL due to the internal control issues. Therefore, this research will be focus on COBIT 5 utilization as an IT audit frameworks, a comparison also will be done between the COBIT 5 and ITIL. The comprehensive parameters in COBIT 5 which provides 5 category process in two domain, management and control will be the variables of prioritizing process among them for each object. This paper will analyze the use of those parameters for some selected organization and prioritize them using the Analytical Hierarchy Process (AHP) methodology that will lead to create a new model of IT Audit frameworks based on the user requirement and opinion. the analyzing process the implementation of COBIT 5 framework in some organizations, and priorities the preferred attributes of COBIT 5 that very likely and suitable to the culture and needs of user in Indonesia using AHP Methodology, and create the best qualified model of IT Audit that fit with the requirements of the organizations especially for Indonesia organizations and companies.
APA, Harvard, Vancouver, ISO, and other styles
4

Boy, Radja, Jay Idoan Sihotang, and Jimmy Moedjahedy. "Analisa Efektivitas Pembelajaran Daring Melalui Zoom Meeting Menggunakan Framework COBIT 5 Domain Deliver, Service, and Support (DSS)." CogITo Smart Journal 8, no. 1 (June 19, 2022): 35–46. http://dx.doi.org/10.31154/cogito.v8i1.389.35-46.

Full text
Abstract:
Penelitian ini dibuat dengan tujuan untuk mengetahui apa yang sebenarnya didapatkan mahasiswa/i selama pembelajaran daring berlangsung, seberapa efektif pembagian materi yang disampaikan, dan apa saran yang para mahasiswa/i berikan untuk membuat pembelajaran daring ini menjadi lebih baik dari sebelumnya. Pengumpulan data dilakukan dengan pembagian kuesioner yang berbasis COBIT 5 dengan domain Deliver, Service, and Support (DSS). Responden kuesioner penelitian adalah mahasiswa/i Fakultas Teknologi Informasi Universitas Advent Indonesia dengan jumlah responden 52. Metode penelitian yang dipakai adalah metode deskriptif dengan pendekatan kualitatif yang akan digunakan saat menganalisa data yang dikumpulkan melalui hasil kuesioner dan dibandingkan dengan panduan dari COBIT 5 dengan domain Deliver, Service, and Support (DSS). Hasil dari penelitian ini menunjukkan bahwa pembelajaran daring menggunakan Zoom Meeting dinilai efektif, dengan tingkat kematangan masing-masing sub-domain dimulai dari DSS1 sebesar 3,71 yang termasuk level 4 indeks kematangan COBIT 5, DSS5 sebesar 2,98 yang termasuk level 3 indeks kematangan COBIT 5, dan DSS7 sebesar 3,92 yang termasuk level 4 indeks kematangan COBIT 5. Tingkat kapabilitas harapan masing-masing sub-domain sebesar 4,5 dengan rata-rata nilai kesenjangan sebesar 0,96.Kata kunci—COBIT 5, Pembelajaran Daring, Zoom Meeting
APA, Harvard, Vancouver, ISO, and other styles
5

Grembergen, Wim Van. "Millennium conversion & COBIT." Computer Audit Update 1997, no. 7 (July 1997): 17–24. http://dx.doi.org/10.1016/s0960-2593(97)84494-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nurtrisha, Widyatasya Agustika. "IDENTIFICATION OF THE DOMAIN PROCESS INTERSECTIONS BETWEEN COBIT 4.1 AND COBIT 5 IN THE DETERMINATION OF IT GOVERNANCE ASSESSMENT." Jurnal Pilar Nusa Mandiri 17, no. 1 (March 5, 2021): 85–92. http://dx.doi.org/10.33480/pilar.v17i1.2229.

Full text
Abstract:
The implementation of information technology has an essential role in organizational development to support a business process. Currently, information technology is widely adopted by the organization. It is believed to help improve the efficiency of the ongoing business process so that IT management is needed in a more structured. Thus, need a guideline that can guide IT governance so it can be measured and utilized. COBIT is one of the frameworks that can utilize in providing IT governance guidelines for organizations, and it is the main reference used in implementing IT governance in organizations. Still, the assessment process takes a long time because many processes are assessed. So conducted this research to determine the similar activities between COBIT 4.1 and COBIT 5 as the basis for determining the development of an organizational assessment process that the organization will carry out to see the efficiency of the assessed process domain. This research is focused on several organizations that have carried out IT governance assessments with COBIT 4.1 and will then implement the assessment process using COBIT 5. Still, it will usually take more time and effort if done separately to streamline the assessment process and identify domain intersects. The process from COBIT 4.1 and COBIT 5 so that the effort to carry out the assessment can be more streamlined. Thus, this research will produce a study result related to which activities intersect with each other to determine the IT governance assessment in an organization.
APA, Harvard, Vancouver, ISO, and other styles
7

Zen Munawar, S.T, S.Kom., M.Kom. "AUDIT TATA KELOLA TEKNOLOGI INFORMASI DENGAN FRAMEWORK COBIT 5 DI PT. BEST STAMP INDONESIA." TEMATIK 1, no. 2 (December 30, 2014): 35–43. http://dx.doi.org/10.38204/tematik.v1i2.47.

Full text
Abstract:
Abstrak : Pemakaian Teknologi Informasi pada PT. Best Stamp Indonesia saat ini telah dilakukan audit dengan COBIT 4.1 namun seiring perkembangan COBIT maka perlu diketahui jika dilakukan dengan COBIT 5 bagaimana efisiensi dan process capability levels tata kelola teknologi informasi yang sudah ada. Audit tata kelola teknologi informasi dimaksudkan untuk membuat pemetaan proses monitoring, evaluasi dan akses terhadap process capability levels.Berdasarkan hal tersebut maka perlu dilakukan audit dengan COBIT 5 dalam pengelolaan teknologi informasi, agar dapat mengetahui sejauh mana penerapan tata kelola Teknologi Informasi dan apakah sistem yang telah dibuat sesuai tujuan perusahaan. Dalam penelitian ini menggunakan model process capability levelssebagai alat ukur terhadap jawaban responden dari kuesioner yang dibuat berdasarkan framework Cobit 5 serta sebagai definisi dan pemahaman proses tata kelola teknologi informasi yang sedang berjalan. Dari rekapitulasi jawaban dari para responden, maka didapatkan nilai process capability levels saat ini sebesar 3,0 pada skala 0-5. Agar bisa mendapatkan hasil yang diharapkan, maka dibuatlah beberapa usulan untuk meningkatkan kinerja serta sebagai acuan perbaikan tata kelola teknologi informasi di PT. Best Stamp Indonesia dimasa yang akan datang. Dari hasil implementasi diperoleh hasil bahwa model tata kelola TI dan model audit sistem informasi COBIT dapat diterapkan pada proses teknologi informasi di perusahaan, namun demikian perlu dilakukan penyesuain atau modifikasi terhadap prosesnya.
APA, Harvard, Vancouver, ISO, and other styles
8

Ruslam, Reza Zulfikar, Nur Indrawati, and Yan Andriariza Ambhita Sukma. "PENILAIAN TATA KELOLA TEKNOLOGI INFORMASI PADA SISTEM LOGISTIK PT XYZ BERDASARKAN COBIT (INFORMATION TECHNOLOGY GOVERNANCE ASSESSMENT AT LOGISTIC SYSTEM OF PT XYZ BASED ON COBIT)." Masyarakat Telematika Dan Informasi : Jurnal Penelitian Teknologi Informasi dan Komunikasi 9, no. 2 (December 31, 2018): 125. http://dx.doi.org/10.17933/mti.v9i2.124.

Full text
Abstract:
AbstractInformation Technology governance assessment at PT XYZ is deemed necessary to provide recommendations for corrective actions related to logistics service provision which are the main business processes of PT XYZ. This study uses the COBIT 4.1 framework with the scope of the logistics system. This study produces recommendations for corrective actions related to IT governance based on the COBIT 4.1 framework in the PT XYZ logistics system. The study produced problem-root improvement recommendations, matury-level improvement recommendations, IT Goals recommendations, and Business Goals recommendations; derived from 4 (four) domains in COBIT 4.1, namely: Planning and Organizing (PO), Procurement and Implementation (AI), Service Delivery and Support (DS), and Monitor and Evaluation (ME). AbstrakPenilaian tata kelola Teknologi Informasi pada PT XYZ dipandang perlu dilakukan untuk memberikan rekomendasi tindakan perbaikan terkait penyediaan layanan logistik yang merupakan proses bisnis utama PT XYZ. Penelitian ini menggunakan kerangka kerja COBIT 4.1 dengan lingkup sistem logistik. Penelitian ini mengasilkan rekomendasi tindakan perbaikan terkait tata kelola TI berdasarkan kerangka kerja COBIT 4.1 pada sistem logistik PT XYZ. Penelitian menghasilkan rekomendasi perbaikan akar masalah, rekomendasi perbaikan tingkat maturitas, rekomendasi IT Goals, dan rekomendasi Business Goals; yang berasal dari 4 (empat) domain dalam COBIT 4.1, yaitu: Perencanaan dan Pengorganisasian (PO), Pengadaan dan Implementasi (AI), Penyampaian Layanan dan Dukungan (DS), dan Monitor dan Evaluasi (ME).
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Jie, and Le Ping Shen. "Assessment Model of Corporate Governance with COBIT-Based IT Governance." Advanced Materials Research 121-122 (June 2010): 550–57. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.550.

Full text
Abstract:
Organizations are more concerned about the appropriate IT governance. The growing dependency on IT due to the increasing volume of business process automation further challenges the role of Information System Auditor. IT Governance Institute has developed COBIT as a model for this purpose.AS one of the most important and widely adopted performance measurement methods, COBIT is an attractive tool to measure and evaluate IT contribution to corporate performance. In this paper, we review the potential role of information technology as a corporate governance tool and explore the Control Objectives for Information and related Technology (COBIT). As the worlds leading IT governance and control framework COBIT should be gauged not only in simple control terms but by reference to the useful assessment of corporate governance efficiency.
APA, Harvard, Vancouver, ISO, and other styles
10

Santacruz Espinoza, Julio Jhovany, Cesar Remigio Vega Abad, Luis Fernando Pinos Castillo, and Oscar Efrén Cárdenas Villavicencio. "Sistema cobit en los procesos de auditorías de los de sistemas informáticos." Journal of Science and Research: Revista Ciencia e Investigación 2, no. 8 (December 29, 2017): 65. http://dx.doi.org/10.26910/issn.2528-8083vol2iss8.2017pp65-68.

Full text
Abstract:
EL presente trabajo de investigación ha sido realizado para mostrar los beneficios del uso de sistema COBIT en los procesos de auditorías de los sistemas informáticos, la problemática se relaciona en ¿Cómo incide en el proceso de auditorías en las instituciones, empleo del sistema COBIT?, el objetivo principal es identificar la incidencia del uso del sistema COBIT en el proceso de auditorías empleados por os sistemas informáticos dentro de las organizaciones tanto de carácter público como privado; con el fin de lograr nuestros objetivos planteados de la investigación se desarrollará primeramente con la conceptualización de términos claves para un fácil entendimiento de la temática, como conclusión: podemos decir el sistema COBIT permite identificar la metodología mediante la utilización de información de los departamentos informáticos, para determinar los recursos de la (T.I) Tecnología de la información, especificados en el sistema COBIT, como son los archivos, programas, redes informáticas incluidos el personal que los utiliza o manipula la información, con el propósito de proveer la información que la organización o empresa requiere para conseguir sus objetivos.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "COBIT"

1

Steiner, Štefan. "COBIT v malom podnikaní." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74146.

Full text
Abstract:
The aim of this work is to develop a universal procedure introducing the concept of IT Governance using COBIT methodology to a small business environment. This thesis understands COBIT as a tool with which is possible to create a new business strategy for a firm and which will provide more competitive force for the firm in the competitive fight. The main contribution of this thesis is a theoretical research, which resulted in the proposal as how should a small company (which close-up characteristic is described in more detail in the work) proceed in a case that it decides to efficiently manage, manage and control the business IS / IT. This theoretical approach is then tested as a case study on a real small enterprise.
APA, Harvard, Vancouver, ISO, and other styles
2

Smažil, Petr. "Informační management podle Cobit 5." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-192379.

Full text
Abstract:
The thesis focuses on the concept of information management, its history and definition by various authors and also according to Cobit 5 methodology particularly its part Cobit 5: Enabling Information. The aim of the thesis is the application of Cobit 5 information model on a specific problem with information in the selected company and assessing the suitability of this application.
APA, Harvard, Vancouver, ISO, and other styles
3

Tarbajovský, Maroš. "Nasadzovanie a hodnotenie IT Governance v organizáciách." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-11772.

Full text
Abstract:
The main objective of this thesis is to meet Governance as a new approach in company organization, especially in IT sector. The idea is about harmonization of IT and business strategy, that should ensure achieving company goals and missions, and lead company in the right direction of advancement, what is directly connected with implementation of relevant measures of IT processes. As chapter "Governance", is describing how this approach should by ensure in whole organization on a different levels. We can translate Governance as implementation of certain best practices and procedures that lead company to process standardization and formalization. The most exercising methodologies and guidelines in IT sphere as ITIL, Val IT, CobiT, ISO 27000 are reviewed in thesis. By these methodologies organizations should be able to better optimize processes and accomplish regulation frame in particular industry. Another very important contribution of process standardization is by providing better possibilities for measurement and assessment, that is reviewed in chapter "Evaluation of IT processes performance". There is also transparent guideline which provides a simple steps procedure how to implement IT Governance in organization using CobiT and Vat IT. As this branch is relatively "young", especially in Czech Republic, management is still familiarizing with it. Last chapter is dedicated to analyze approach to ITG in Czech Republic banking sector.
APA, Harvard, Vancouver, ISO, and other styles
4

Škoviera, Martin. "Implementace ITIL a COBIT pomocí nastrojů ARIS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234919.

Full text
Abstract:
This master's thesis explores the topic of guidance for the COBIT framework and ITIL library in the context of business process management. It encompasses various process modelling languages and diagrams for companies active in information and communication technologies. Through the selected ARIS tool set and the mapping of all 64 processes, the establishment of individual processes can now be achieved, which is explained by modelling a total of 101 diagrams. The thesis also contains an example of process deployment for a selected company, which is accompanied by an implementation of a dashboard application that monitors the ticket flow of service operation processes.
APA, Harvard, Vancouver, ISO, and other styles
5

Štolbová, Milena. "Řízení informační bezpečnosti v metodikách ITIL a Cobit." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-12065.

Full text
Abstract:
IT security management is one of the essential processes in the company. This thesis deals with aspects of managing the IT security by the methodology of ITIL and COBIT. First part is focused on covering the IT security, defining the terms and concept necessary for indicating the impact of the IT security breach, the common threads which the company needs to resist and stance of methodology ITIL, COBIT and ISO/IEC 27002:2005 for managing the IT security and its specifics. In the following chapter there is a sentencious look at the structure of methodology of COBIT and more detailed depiction of COBIT Security Baseline document. The next chapter defines the methodology of ITIL, briefly compares the ITIL v2 and ITIL v3 versions, and what is more, comes up with structured view into the document of Security management which details the concept of IT security management within the company by the ITIL standards. The main thesis objective located in the last chapter is to compare the main features of both methodologies, the range of their aplicability within the company, and which is the most important, comparing them in the field of managing the IT security.
APA, Harvard, Vancouver, ISO, and other styles
6

Sherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.

Full text
Abstract:
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007.
The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
APA, Harvard, Vancouver, ISO, and other styles
7

Eremiáš, Karel. "Audit informačního systému společnosti Terms a.s." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-165170.

Full text
Abstract:
Práce shrnuje problematiku auditu informačního systému a tyto poznatky následně využívá při provedení auditu informačního systému v reálné společnosti. Audit je prováděn pomocí metodiky COBIT a respektuje nejen požadavky metodiky kladené na audit ale i speciální požadavky, které stanovila organizace. Práce zároveň ověřuje použitelnost metodiky COBIT při provádění auditu v podmínkách středně velké české společnosti.
APA, Harvard, Vancouver, ISO, and other styles
8

Kieviet, Frèda. "Applying COBIT in an ERP environment, with specific reference to Qmuzik /." Link to the online version, 2006. http://hdl.handle.net/10019/1066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Enslin, Zacharias. "Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprises." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20116.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to. The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented.
AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word. Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
APA, Harvard, Vancouver, ISO, and other styles
10

Kieviet, Freda. "Applying COBIT in an ERP environment, with specific reference to Qmuzik." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/3390.

Full text
Abstract:
Thesis (MAcc (Accountancy ))--University of Stellenbosch, 2006.
ERP applications have evolved into enterprise-wide applications, which are generally acknowledged today as a critical component in an organisation’s information strategy. When implementing an ERP application, the control and governance of all IT processes are critical to ensure that value is delivered, risks are managed and that the investment in IT (ERP) delivers a reasonable return. It should, therefore, be important to focus on mitigating IT process risks that have an impact on the ERP environment, so that the level of residual risk is acceptable and aligned with the business objectives. This assignment focuses on using the generally accepted IT framework, COBIT (Control Objectives for Information and related Technology), as governance and control model. The criticality of each COBIT control objective (IT process) is evaluated by applying the COBIT control objectives in an ERP environment. Specific reference is also made to Qmuzik as an ERP application. By applying COBIT in an ERP environment, the most critical IT processes applicable to ERP are identified, in order to ensure that the minimum process controls for these IT processes are designed and implemented.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "COBIT"

1

Goltsche, Wolfgang. COBIT kompakt und versta ndlich: Der Standard zur IT Governance - so gewinnen Sie Kontrolle u ber Ihre IT - so steuern Sie Ihre IT und erreichen Ihr Ziel. Wiesbaden: Vieweg, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

COBIT 5 for information security. Rolling Meadows, IL: ISACA, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institute, IT Governance. CobiT security baseline: An information security survival kit. Rolling Meadows, Ill: IT Governance Institute, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moisand, Dominique. CobiT: Pour une meilleure gouvernance des systèmes d'information. Paris: Eyrolles, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Harry, Boonen, ed. IT governance based on COBIT 4.1: A management guide. 3rd ed. Zaltbommel: Van Haren Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Information Systems Audit and Control Foundation (Rolling Meadows). COBIT: Governance, control and audit for information and related technology. 3rd ed. Rolling Meadows (Ill.): Information Systems Audit and Control Foundation, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moeller, Robert R. Sarbanes-Oxley internal controls: Effective auditing with AS5, CobiT and ITIL. Hoboken, N.J: John Wiley & Sons, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

hlich, Martin Fro. IT-Governance: Leitfaden fu r eine praxisgerechte Implementierung. Wiesbaden: Gabler, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Institute, IT Governance. IT governance implementation guide: How do I use CobiT to implement IT governance? Rolling Meadows, Ill: IT Governance Institute, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Otter, Martine. Guide des certifications SI: Comparatif, analyse et tendances : ITIL, CobiT, ISO 27001, eSCM... 2nd ed. Paris: Dunod, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "COBIT"

1

Marti, Richard. "COBIT." In Governance, Risk, and Compliance Handbook, 181–89. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118269213.ch13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pilorget, Lionel. "Evaluation des Reifegrads (COBIT)." In MIIP: Modell zur Implementierung der IT-Prozesse, 215–32. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9769-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guldentops, Erik. "Governing Information Technology Through CobiT." In Integrity, Internal Control and Security in Information Systems, 115–59. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blanco, Miguel Ángel, and Mario Piattini. "Adapting COBIT for Quantum Computing Governance." In Communications in Computer and Information Science, 274–83. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58793-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lepofsky, Ron. "COBIT® 5 for Information Security." In The Manager’s Guide to Web Application Security:, 133–45. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0148-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sheppey, Terence, and Ross McGill. "Frameworks for Compliance: COSO and COBIT." In Sarbanes-Oxley, 299–341. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

De Haes, Steven, and Wim Van Grembergen. "COBIT as a Framework for IT Assurance." In Management for Professionals, 129–49. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14547-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, WoongChul, and DaeHun Yoo. "Assessment of IT Governance of COBIT Framework." In U- and E-Service, Science and Technology, 82–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10580-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

van Grembergen, Wim, and Steven de Haes. "COBIT as a Framework for IT Assurance." In Enterprise Governance of Information Technology, 165–82. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-84882-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pretorius, Elmari, and Basie von Solms. "Information Security Governance using ISO 17799 and COBIT." In Integrity and Internal Control in Information Systems VI, 107–13. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-7901-x_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "COBIT"

1

Svata, Vlasta. "COBIT 2019: Should We Care?" In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2019. http://dx.doi.org/10.1109/acitt.2019.8779995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miranda, Noreen B., Maria Rosario D. Rodavia, and Mir-mel I. Miranda. "IT Infrastructure Auditing using COBIT Framework." In 2019 6th International Conference on Technical Education (ICTechEd6). IEEE, 2019. http://dx.doi.org/10.1109/icteched6.2019.8790861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sujana, Ahmad, Nurcaweda Adinda, Ninik Lestari, Hetty Fadriani, and Adrew Mahardika. "Audit Information System Using Cobit 5." In Proceedings of the Third Workshop on Multidisciplinary and Its Applications, WMA-3 2019, 11-14 December 2019, Medan, Indonesia. EAI, 2020. http://dx.doi.org/10.4108/eai.11-12-2019.2290885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marchão, Joaquina, Leonilde Reis, and Paula Ventura. "OPERATION MANAGEMENT USING ITIL AND COBIT FRAMEWORK." In Fourth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/itema.2020.201.

Full text
Abstract:
Information and Communication Technologies management is now increasingly challenging in a highly digital and connected world, with different services emerging for different clients with heterogeneous infrastructures, software, assets, different service requirements, security risks increasing, organizational structures not flexible to adjust. These are some of the variables to manage in Information and Communication Technologies departments. This paper aims to present a literature review to support the design of an approach for service operation management in a medium-sized organization, to improve operational efficiency, cost optimization and stakeholder satisfaction, relevant topics in any organization strategy. The applied methodology includes a literature study related with the frameworks Control Objectives for Information and Related Technology (COBIT) and Information Technology Infrastructure Library (ITIL). The main results underlying the literature review were based on the use of keywords in the subject domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Hojaji, Fazilat, and Mohammad Reza Ayatollahzadeh Shirazi. "A Comprehensive SOA Governance Framework Based on COBIT." In 2010 IEEE Congress on Services (SERVICES). IEEE, 2010. http://dx.doi.org/10.1109/services.2010.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Textor, Andreas, and Kurt Geihs. "Calculation of COBIT metrics using a formal ontology." In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2015. http://dx.doi.org/10.1109/inm.2015.7140501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Macas Ruiz, Estela Maria, Monica Del Rocio Romero Pazmino, Lorena del Cisne Tacuri Pena, Jose Ruben Caiza Caizabuano, and Gladys Elizabeth Cueva Castillo. "COBIT 5.0: Case Study Study Student Census MINEDUC." In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019. http://dx.doi.org/10.23919/cisti.2019.8760762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saragih, Naikson Fandier, Candora Sagala, Imelda Sri Dumayanti, Indra Kelana Jaya, Edward Rajagukguk, and Asaziduhu Gea. "Evaluation of Employee Attendance System Using COBIT 5 Framework." In 2019 International Conference of Computer Science and Information Technology (ICoSNIKOM). IEEE, 2019. http://dx.doi.org/10.1109/icosnikom48755.2019.9111589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Amorim, Ana Claudia, Miguel Mira da Silva, Ruben Pereira, and Margarida Goncalves. "Using Scrum for Implementing IT Governance with COBIT 5." In 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2018. http://dx.doi.org/10.1109/edoc.2018.00033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, ChunMei. "Risk Management of Information Technology Outsourcing based on Cobit." In International Conference on Information System and Management Engineering. SCITEPRESS - Science and and Technology Publications, 2016. http://dx.doi.org/10.5220/0006450503620366.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "COBIT"

1

Campbell, Philip LaRoche. A Cobit primer. Office of Scientific and Technical Information (OSTI), June 2005. http://dx.doi.org/10.2172/876368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Evans, K. Jr. Corbit reference manual. Office of Scientific and Technical Information (OSTI), September 1995. http://dx.doi.org/10.2172/197809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

East, E. W. Construction Operations Building Information Exchange (COBIE). Fort Belvoir, VA: Defense Technical Information Center, June 2007. http://dx.doi.org/10.21236/ada491899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography