CAT5:A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
Companies have more and more trends to automate their operational and organizational activities, therefore the investment of information technology (IT) continues to increase every year. However, good governance that can ensure the alignment of IT and business strategy and realized benefits from IT investments has not always followed this increase. Measurement of IT governance is then required as a basis for the continuous improvement of the IT services. This study is aimed at producing a tool CAT5 to measure the maturity level of IT governance, thus facilitating the process of improvement of IT services. CAT5 is based on COBIT 5 framework and the design used is Unified Modeling Language. Through stages of information system development, this research results in an application for measuring the maturity level of IT governance that can be used in assessing existing IT governance.
Authors and Affiliations
Souhaïl El Houssaïni, Karim Youssfi, Jaouad Boutahar
Software Quality and Productivity Model for Small and Medium Enterprises
The enterprises today including small and medium enterprises (SMEs) are dependent on software to accomplish their objectives and maintain survivability and sustainability in their businesses. Although many studies in sof...
Designing and Implementing of Intelligent Emotional Speech Recognition with Wavelet and Neural Network
Recognition of emotion from speech is a significant subject in man-machine fields. In this study, speech signal has analyzed in order to create a recognition system which is able to recognize human emotion and a new set...
An Analysis of Security Challenges in Cloud Computing
Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business...
Unique Analytical Modelling of Secure Communication in Wireless Sensor Network to Resist Maximum Threats
Security problems in Wireless Sensor Network (WSN) are still open-end problems. Qualitative evaluation of the existing approaches of security in WSN shows adoption of either complex cryptographic use or attack-specific s...
Intelligent Scheduling of Bag-of-Tasks Applications in the Cloud
The need of efficient provision resources in cloud computing is imperative in meeting the performance requirements. The design of any resource allocation algorithm is dependent on the type of workload. BoT (Bag-of-Task...