The Electronic Journal of Information Systems Evaluation provides critical perspectives on topics relevant to Information Systems Evaluation, with an emphasis on the organisational and management implications
For general enquiries email administrator@ejise.com
Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Information Management and Evaluation is available here

linkedin-120 

twitter2-125 

fb_logo-125 

 

Journal Article

Organizational Challenges and Barriers to Implementing IT Governance in a Hospital  pp37-45

Luis Velez Lapao

© Jan 2011 Volume 14 Issue 1, ECIME 2010 Special Issue, Editor: Miguel de Castro Neto, pp1 - 166

Look inside Download PDF (free)

Abstract

This paper describes the challenges and barriers to the introduction of “IT Governance” into a Hospital environment. It further addresses the relationship between corporate governance (hospital strategy and organization) and the role of IT Governance in managing new services deployment. Both ITIL and COBIT are introduced as a best practice for supporting Hospital Information Systems (HIS) management. IT Governance is an extensive framework; therefore we focused our study on ITIL Assessment combined with COBIT. The assessments were centered on IT Service Management, which, according to our findings, is being carried inefficiently in Hospital São Sebastião (HSS). We used both COBIT and ITIL assessment to audit and identify IT Governance weakness. These processes revealed a way to assist the organization at becoming aware about IT improvement priorities. The results were used to rethink HIS strategy in order to properly address the need to develop new health services like ambulatory surgery and connecting with out‑patients services. We used the IT Governance standard ISO/IEC 38500 to provide guiding principles for the effective use of IT according to Calder‑Moir framework. Starting with a COBIT assessment we identified IT management priorities and metrics, then we focused on the ITIL assessment steps. Finally, we applied the framework on both Service Desk and Incident Management processes. We analyzed the level of IT governance maturity and produce some recommendations to improve IT Service Management practices. The ITIL assessment identified existing gaps between the current organization practices and how the organization should perform according to ITIL, and what key actions need to be taken to close those gaps. At the end disclosed that IT Governance inefficiency is an important barrier to HIS management, mostly in IT service management which has a direct impact in users' daily work flow, and therefore on Healthcare services delivery.

 

Keywords: IT Governance, hospital information systems, IT organization, COBIT, ITIL

 

Share |

Journal Article

Towards a Theoretical Foundation of IT Governance … The COBIT 5 case  pp93-95

Jan Devos, Kevin Van de Ginste

© Sep 2015 Volume 18 Issue 2, The special issue from ECIME 2014, Editor: Jan Devos, pp93 - 210

Look inside Download PDF (free)

Abstract

Abstract: COBIT, (Control Objectives for Information and Information related Technologies) as an IT governance framework is well‑known in IS practitioners communities. It would impair the virtues of COBIT to present it only as an IT governance framework . COBIT analyses the complete IS function and offers descriptive and normative support to manage, govern and audit IT in organizations. Although the framework is well accepted in a broad range of IS communities, it is created by practitioners and therefor e it holds only a minor amount of theoretical supported claims. Thus critic rises from the academic community. This work contains research focusing on the theoretical fundamentals of the ISACA framework, COBIT 5 released in 2012. We implemented a reverse engineering work and tried to elucidate as much as possible propositions from COBIT 5 as an empiricism. We followed a qualitative research method to develop inductively derived theoretical statements. However our approach differs from the original work on grounded theory by Glaser and Strauss (1967) since we started from a general idea where to begin and we made conceptual descriptions of the empirical statements. So our data was only restructured to reveal theoretical findings. We looked at three candi date theories: 1) Stakeholder Theory (SHT), 2) Principal Agent Theory (PAT), and 3) Technology Acceptance Model (TAM). These three theories are categorized and from each theory, several testable propositions were deduced. We considered the five COBIT 5 principles, five processes (APO13, BAI06, DSS05, MEA03 and EDM03) mainly situated in the area of IS security and four IT‑related goals (IT01, IT07, IT10 and IT16). The choice of the processes and IT‑related goals are based on an experienced k nowledge of COBIT as well of the theories. We constructed a mapping table to find matching patterns. The mapping was done separately by several individuals to increase the internal validity. Our findings indicate that COBIT 5 holds theoretical supported c laims. The lower theory types such as PAT and SHT contribute

 

Keywords: Keywords: IT governance, COBIT 5, stakeholder theory, principal agent theory, TAM

 

Share |

Journal Article

Towards a Theoretical Foundation of IT Governance … The COBIT 5 case  pp96-104

Jan Devos, Kevin Van de Ginste

© Sep 2015 Volume 18 Issue 2, The special issue from ECIME 2014, Editor: Jan Devos, pp93 - 210

Look inside Download PDF (free)

Abstract

Abstract: COBIT, (Control Objectives for Information and Information related Technologies) as an IT governance framework is well‑known in IS practitioners communities. It would impair the virtues of COBIT to present it only as an IT governance framework . COBIT analyses the complete IS function and offers descriptive and normative support to manage, govern and audit IT in organizations. Although the framework is well accepted in a broad range of IS communities, it is created by practitioners and therefor e it holds only a minor amount of theoretical supported claims. Thus critic rises from the academic community. This work contains research focusing on the theoretical fundamentals of the ISACA framework, COBIT 5 released in 2012. We implemented a reverse engineering work and tried to elucidate as much as possible propositions from COBIT 5 as an empiricism. We followed a qualitative research method to develop inductively derived theoretical statements. However our approach differs from the original work on grounded theory by Glaser and Strauss (1967) since we started from a general idea where to begin and we made conceptual descriptions of the empirical statements. So our data was only restructured to reveal theoretical findings. We looked at three candi date theories: 1) Stakeholder Theory (SHT), 2) Principal Agent Theory (PAT), and 3) Technology Acceptance Model (TAM). These three theories are categorized and from each theory, several testable propositions were deduced. We considered the five COBIT 5 principles, five processes (APO13, BAI06, DSS05, MEA03 and EDM03) mainly situated in the area of IS security and four IT‑related goals (IT01, IT07, IT10 and IT16). The choice of the processes and IT‑related goals are based on an experienced k nowledge of COBIT as well of the theories. We constructed a mapping table to find matching patterns. The mapping was done separately by several individuals to increase the internal validity. Our findings indicate that COBIT 5 holds theoretical supported c laims. The lower theory types such as PAT and SHT contribute the most. The presence and contribution of a theory is significantly constituted by IT‑related goals as compared to the processes. We also make some suggestions for further research. First of al l, the work has to be extended to all COBIT 5 processes and IT‑related goals. This effort is currently going on. Next we ponder the question what other theories could be considered as candidates for this theoretical reverse engineering labour? During our work we listed already some theories with good potential. Our used pattern matching process can also be refined by bringing in other assessment models. Finally an alternative and more theoretic framework could be designed by using design science research methods and starting with the most relevant IS theories. That could lead to a new IT artefact that eventually could be reconciled with COBIT 5.

 

Keywords: Keywords: IT governance, COBIT 5, stakeholder theory, principal agent theory, TAM

 

Share |

Journal Issue

Volume 14 Issue 1, ECIME 2010 Special Issue / Jan 2011  pp1‑166

Editor: Miguel de Castro Neto

View Contents Download PDF (free)

Editorial

miguel_neto Dr Miguel de Castro Neto is presently Associate Dean at the Instituto Superior de Estatística e Gestão de Informação of the Universidade Nova de Lisboa (ISEGI‑UNL), where he is Invited Assistant Professor. He is editor of the Journal of Information Technology in Agriculture (JITAg), member of the Editorial Advisory Board of Online Information Review journal, and Scientific Advisor of the Revista Brasileira de Agroinformática.  Miguel de Castro Neto holds a PhD in Agronomic Engineering (Universidade Técnica de Lisboa) in the field of Internet‑based agricultural information systems, a Masters degree in Agricultural Economics (Universidade de Évora), a Masters degree extension in Statistics and Information Management (Universidade Nova de Lisboa) and a degree in Agricultural Engineering (Universidade de Évora).His research interests include Business Intelligence, Knowledge management and Social Computing.

Editorial

This special edition of the EJISE includes thirteen selected papers presented at the 4th European Conference on Information Management and Evaluation ‑ ECIME 2010 which were considered the most important contributions to the advances in the information systems evaluation field of study.

The conference was held at Instituto Superior de Estatística e Gestão from the Universidade Nova de Lisboa (ISEGI‑UNL), Lisbon, Portugal, and the broad topics proposed to be addressed by ECIME 2010 included: evaluation topics; management topics; e‑Government topics; new technologies, innovation and infrastructures; development topics; ethics and philosophy topics; and general topics.

These topics where covered by the presentation in the conference of 47 Papers, 4  PhD Research Papers, and 4 Work in Progress with participants coming from 25 different countries splitted in the following streams: Managing Information; Evaluation of Records and Documents; Business Intelligence; ICT issues as they specifically affect SMEs; Logistics, Supply Chain and Process Improvement; Performance assessment and measurement; Web Tools; Health Information Systems; Evaluation Issues; Health Information Systems Issues; Quality and Service Level; and IS professionals.

The 13 ECIME 2010 selected papers for publishing in this EJISE special issue cover a very wide range of interesting and up to date research areas giving us important insights and new perspectives in future developments in the field and I hope it can became an important contribution to the dynamics in the information systems evaluation research area.

 

Keywords: action research, adopter categories, adoption, adoption determinants, alliances, architectural principles, BAN, business architecture, business value, CDSS, COBIT, community, computing, consumer goods, decision-making, diffusion of innovations (DOI) theory, digital divide, disadvantaged networks, early warning scorecard, eCommerce, enterprise architecture, evidence-based protocols, factors, GDS (Global Data Synchronization), geobrowser, georeference, GIS (Geographical Information System), GLN (Global Location Numbering), global standards, GoogleEarth, GTIN (Global Trade Items Numbering), GUSI (Global Upstream Supply Initiative), health informatics and body area networks, health information management, hospital information systems, information alignment, information management, information quality, information quality, information systems, information systems architecture, information technology, institutional theory, integrated suppliers, interorganizational systems (IOSs), interpretiv

 

Share |