Skip to main content

IT Governance: How Top Performers Manage IT Decision Rights for Superior Results, 2004

 


Firms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company objectives and monitors performance and accountability. Based on a study of 250 enterprises worldwide, IT Governance shows how to design and implement a system of decision rights that will transform IT from an expense to a profitable investment.

Download e-book (with Request Access):

P. Weill and J. Ross, "IT Governance: How Top Performers Manage IT Decision Rights for Superior Results"

Harvard Business School Press, Boston | English | 2004 | ISBN-13: 9781591392538 | 269 pages | PDF-Scan | 26.3 MiB

Download Link: https://bit.ly/ITGovWeill | Request Access


*Terms and conditions apply




Popular posts from this blog

COBIT 2019 Process Assessment Template Tools

  COBIT® is a broad and comprehensive framework developed to support understanding, designing, and implementing the management and governance of enterprise IT. COBIT defines the components and design factors to build and sustain a best-fit governance system. COBIT was first released in 1996 by ISACA (Information Systems Audit and Control Association). The latest version, COBIT 2019, was released in 2018. COBIT 5 was published in 2012, and to include new technology and business trends in information and technology (I&T) such as digitization, COBIT 5 was updated to COBIT 2019. New insights from experts in IT and governance were included in the new version. To assist researchers, assessors, lecturers, and students in assessing the capability level of the COBIT 2019 governance and management processes, here are the COBIT 2019 process assessment template tool (spreadsheet file) based on domains. EDM (Evaluate, Direct, and Monitor): EDM01 - EDM05 (5 processes), please click https://b...

Principles of Information Security, 6th Edition, 2018

Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: Principles of Information Security , Sixth Edition. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security - not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers ...

Guide to Disaster Recovery, 1st Edition, 2003

Guide to Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. This book provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of an organization, implementation of the plan, testing and rehearsal of the plan, and actually recovering from a disaster. The book takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Chapter: Introduction to Disaster Recovery Preparing to Develop the Disaster Recovery Plan Assessing Risks in the Enterprise Prioritizing Systems and Functions for Rec...