Company Divestment: Applicability of Existing IT Governance Frameworks

Annamaré Wolmarans, Neels Kruger, Neil Croft

Abstract


The successful accomplishment of a divestiture is generally calculated by the dimension of accomplishment in realizing the elemental strategic goal that the company set out to achieve when adopting a divestment strategy. The paper will highlight the substantial role that IT has to fulfil in bringing company divestment to completion by investigating if any one of the existing IT Governance frameworks and standards could be implemented or adopted to serve as a managerial and governance framework towards company divestment. The IT department has a fundamental function to fulfill in the disentanglement of systems and IT infrastructure. In order to achieve this goal it is imperative to have a well-defined IT governance framework to guide the disentanglement processes and ensure the smooth execution of the IT divestment process.

Keywords


Alignment; Divestment; IT Governance; IT Governance Frameworks;

Full Text:

PDF

References


G.T. Hickman and D.H. Smaltz, “The Healthcare Information Technology Planning Fieldbook: Tactics,

Tools and Templates for Building Your IT Plan,” Chicargo: 2008, pp. 3 – 12. Available [Online]:

http://www.himss.org/files/HIMSSorg/content/files/Code%2041_IT%20Planning_Hickman_Smaltz_HI

MSs.pdf . Retrieved: 2 Augustus 2015.

P.R. da Cunha, L.M. Martins, J.A.B. Moura and A.D. de Figueiredo, “IT Governance Practices for

Electric Utilities: Insights from Brazil and Europe,” Open Journal of Information Systems (OJIS), 1st

ed., vol. 2, 2015, pp. 9 – 28.

G. Spafford, “The Benefits of Standard IT Governance Frameworks,” ITBusinessEdge, 2003, Available

[Online] http://www.datamation.com/netsys/article.php/2195051/The-Benefits-of-Standard-ITGovernance-

Frameworks.htm. Retrieved: 8 October 2015.

D.N. Boote and P. Beile, 2005. “Scholars before researchers: On the centrality of the dissertation

literature review in research preparation. Educational Researcher, 34th ed., vol. 6, 2005, pp. 3 – 15.

L.A. Machi and B.T. McEvoy, “The literature review: Six steps to success,” Thousand Oaks, CA:

Corwin, 2009.

P. Willson and C. Pollard, “Exploring IT Governance in Theory and Practice in a Large Multi-National

Organisation in Australia,” Information Systems Management, 26th ed., vol. 2, 2009, pp. 98 – 109.

S.K. McGinnis, L.K. Pumphrey, K.Trimmer and C. Wiggings, “Sustaining and Extending

Organizational Strategy via Information Technology Governance,” Proceedings of the 37th Hawaii

International Conference on System Sciences, p. 60158, pp. 1 – 10, Big Island, Hawaii, 5 – 8 January,

IEEE.

G. Steenkamp, “The applicability of using COBIT as a framework to achieve compliance with the King

III Report’s requirements for good IT governance,” South African Journal of Accountability and

Auditing Research, 11th ed., 2011, pp. 1 – 8.

R. Goosen and R. Rudman, “The development of an integrated framework in order to address King III’s

IT governance principles at a strategic level,” S.Afr.J.Bus.Manage. 44th ed., vol. 4, 2013, pp. 91 – 103.

A. Perazzo, and G. Willis, “Bridging the Gap Between IT and Business,” The IT Manager’s Guide to

ITIL v3, 2008, An Internet.com IT Management eBook. Jupitermedia Corp. Available [Online]:

http://www.lh.ru/lhknwdb.nsf/0/53230d04ec736aaec3257609002f3f69/$FILE/itil_v3_ebook.pdf.

Retrieved: 30 May 2014.

G. Kim, 2003. “Surbanes-Oxley, Fraud Prevention, and IMCA: A Framework for Effective Controls

Assurance,” Computer Fraud & Security, 9th ed., September 2003, pp. 12 – 16.

N. Zeinolabedin, M. Khademi and N. Rahbar, “Assessing Efficiency of ITIL Framework to Align

Business and IT,” Research Inventy: International Journal of Engineering and Science, 21st ed., vol. 5,

, pp. 13 – 26.

E. Wessels and J. Van Loggerenberg, “IT Governance: Theory and Practice,” Proceedings of the

Conference on Information Technology in Tertiary Education, Pretoria, South Africa. 18 – 20

September 2006.

R.J. Butler, “Applying the CobiT® Control Framework to Spreadsheets Developments. Extracted from

Controlling the Subversive Spreadsheet – Risks, Audit and Development Methods,” Proceedings of

EuSpRIG 2001 Conference.

S. Khanyile and H. Abdullah, “COBIT 5: an evolutionary framework and only framework to address

the governance and management of enterprise IT,” University of South Africa. [Online]

http://osprey.unisa.ac.za/TechnicalReports/Cobit5.pdf. Retrieved: 23 August 2015.

J. Schekkerman, “How to survive in the jungle of Enterprise Architecture Frameworks,” Victoria:

Trafford, 2004.

The Open Group: TOGAF “Enterprise Edition” Version 8.1. Available [Online]

http://pubs.opengroup.org/architecture/togaf8-doc/arch/. Retrieved: 16 August 2015.

T. Meuller, D. Schuldt, B. Sewald, M. Morisse and J. Petrikina, “Towards inter-organizational

Enterprise Architecture Management – Applicability of TOGAF 9.1 for Network Organizations,”

Proceedings of the Nineteenth American Conference on Information Systems, Chicago, Illinois, August

– 17, 2013, pp. 1 – 13.

S. Cots and M. Casadesús, “Exploring the service management standard ISO 20000,” Total Quality

Management, 26th ed., vol. 5, 2015, pp. 515 – 533.

ISO/IEC 20000:2005(E). First Edition, Information Technology – Service Management – Part 1:

Specifications.

T. Carlson, “Information Security Management: Understanding ISO17799,” Lucent Technologies

Worldwide Services, 2001.

ISO/IEC 35800:2008(E). First Edition, Corporate governance on information technology.

R. Butler and M.J. Butler, 2010. “Beyond King III: Assigning accountability for IT governance in South

African enterprises,” South African Journal for Business Management, 41st ed., vol. 3, 2010, pp. 33 –

Haviluddin, Rayner Alfred, Patricia Anthony. 2012. The Utilization of COBIT Framework Within IT

Governance: A Study of Literature. Jakarta, Indonesia. The 2nd ACIKITA International Conference on

Science and Technology (AICST). Proceeding ACIKITA, ISBN: 978-602-18102-1-7.

DOI: 10.13140/2.1.3616.4160. Pg. 369-384.




DOI: http://dx.doi.org/10.19732/10.19732/vol1122016

Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman 
W : http://ijcandi.org
E  : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

Creative Commons License
IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats