• Title/Summary/Keyword: "information governance"

Search Result 610, Processing Time 0.025 seconds

IT Governance of the Korean Conglomerates: A Comparative Case Study (국내 대기업들의 IT 거버넌스: 비교 사례 연구)

  • Zo, Hang-Jung;Song, Chan-Hoo;Kang, Hyun-Goo;Lim, Dong-Won
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.2
    • /
    • pp.335-359
    • /
    • 2009
  • This study explores the IT governance structures of the Korean conglomerates. It investigates IT organization structures, decision making frameworks and processes, communication channels, implementation mechanisms, and performance evaluation methods around IT activities of the Korean conglomerates by analyzing four different cases. The results show that all of the conglomerates have an IT service firms as one of their subsidiaries, and all the subsidiaries in the conglomerates outsource their IT divisions to the IT service firms, The client firms in the conglomerates operate IT strategy and planning teams to coordinate their IT activities with their outsourcing partners. The IT governance archetype of the Korean conglomerates is found to be "business monarchy" because the client firms mostly make IT decisions. However, the IT service firms provide the information of IT trends and solutions to their clients, so the IT governance archetype of input framework for IT decisions can be "IT monarchy". In addition, the conglomerate which has the more centralized IT governance architecture appears to prefer the more integrated implementation mechanisms for IT decisions. The results of this study are expected to be used as a benchmarking model for the organizations which try to develop an effective IT governance structure.

  • PDF

THE GOVERNANCE OF RETIREMENT FUNDS IN MEMBERS RIGHTS AND TRUSTEES DUTIES IN SOUTH AFRICA: A LESSON LEARNT FROM USA, UK AND MALAWI

  • Nevondwe, Lufuno;Odeku, Kola;Matotoka, Mothlatlego
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.1 no.3
    • /
    • pp.55-70
    • /
    • 2013
  • Purpose: The article looks at the member' rights and trustees duties and determines where should the emphasis be as it often happens that these two aspects often clash. Research Design, Data and Methodology: It is determined in this article whether the trustees owe fiduciary duties to both the fund and members and further determines whether the trustees should advance the interests of the members. Results: The article further looks at the governance of the retirement funds and argues that the proper governance of these funds protects the interest of the members. The duty to disclosure of information to members is of paramount importance to ensure that members are able to make well informed decisions. Conclusion: The article considers the issues of disclosure of information from other countries, United Kingdom, United States and Malawi. It is argued in this article that trustees must be persons who are trustworthy and have the best interest of the members at heart and must therefore familiarize themselves with the laws that regulate their duties.

Fraud Risk Management Model: A Content Analysis Approach

  • MADAH MARZUKI, Marziana;NIK ABDUL MAJID, Wan Zurina;AZIS, Nur Kamaliah;ROSMAN, Romzie;HAJI ABDULATIFF, Nik Kamaruzaman
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.717-728
    • /
    • 2020
  • The objective of this study is to explore the whole process of fraud risk management strategies that should be implemented by the organizations. Secondly, this study discusses the governance issues that arise at each stage of the process. For the purpose of this study, a content analysis of previous literatures is used as a technique for gathering data. This process usually involves codifying qualitative and quantitative information into pre-defined categories in order to derive patterns in the presentation and reporting of information. Based on our content analysis, we found that the fraud risk management process should be made of at least five stages which are inculcating the culture of managing risks in an organization, identifying the risks, evaluating the risks, determining preventive actions and implementing and reviewing stages. Our extended analysis of the fraud risk management process finds that a lot of governance issues arise in the fraud risk management process that should be solved by regulators and companies in order to ensure that fraud risk management process is embedded as corporate culture, not merely as a process. Among them are how to create the risk culture in an organization and whether auditors and risk management committees identify risks from each available source.

Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies (금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현)

  • Kim, Do-Hyeong
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.101-106
    • /
    • 2021
  • To protect financial information, financial companies establish strategies and plans for information security, operate information security management systems, establish and operate information security systems, check vulnerabilities, and secure information. This paper aims to present an information security portal system for financial companies that can gain visibility into various information security activities being undertaken by financial companies and can be integrated and managed. The information security portal system systemizes the activities of the information security department, providing an integrated environment for information security activities to participate from CEOs to executives and employees, not just from the information security department. Through this, it can also be used as information security governance that can be used by top executives to reflect information security in corporate management.

Governance, Discourse and Social Actors: A Constructivist Approach to the Global Rule-Making Process (글로벌 커뮤니케이션 거버넌스 연구를 위한 이론적 제언)

  • Moon, Sang-Hyun
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.7-45
    • /
    • 2003
  • As e-commerce has led to profound changes in the way economic transactions are made and has spurred the rapid integration of global markets, governance of e-commerce has emerged as an important policy agenda around the globe. Given the broader social and economic implications of e-commerce, it is of no surprise that the rule-making process for global e-commerce has increasingly captured the attention of scholars. Despite the substantial contributions to understanding this process, a review of the literature reveals some weaknesses in the study of emerging forms of governance in global e-commerce. This paper addresses these weaknesses and proposes an alternative theoretical framework that underscores the role of ideas and discourse in the global rule-making process.

  • PDF

A Study on the Key Factors for Activating Enterprise Architecture in the Public Sectors: A Perspective of IT Governance (공공부문 Enterprise Architecture 활성화에 영향을 미치는 핵심요인에 관한 연구: IT Governance 관점에서)

  • Kim, Choong Nyoung;Oh, Seung Woon
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.423-433
    • /
    • 2013
  • The purpose of this research is to propose a practical guideline for activating EA which has been operated in the public institutions. For this purpose, how EA is being operated in the public sector, was analyzed from the viewpoint of IT Governance and on the basis of the result, key activities for EA managers could be developed. The key activities were also compared between the two different groups in terms of EA Maturity Level and the difference in the key activities between the two were examined. As a result, it was found that the use of EA has effect on building and improving IT management systems. It is suggested that the Relational Mechanism should be better understood and recognized as necessary activities for activating EA. In addition, the higher the level of EA maturity is, the more likely such various effects as the enhancement of IT management system, user satisfaction, IT utilization, and the improvement of business can be produced. This result could be interpreted that such desired outcomes of EA could be realized only when EA is actively utilized.

A Study on the Keyword Extraction for ESG Controversies Through Association Rule Mining (연관규칙 분석을 통한 ESG 우려사안 키워드 도출에 관한 연구)

  • Ahn, Tae Wook;Lee, Hee Seung;Yi, June Suh
    • The Journal of Information Systems
    • /
    • v.30 no.1
    • /
    • pp.123-149
    • /
    • 2021
  • Purpose The purpose of this study is to define the anti-ESG activities of companies recognized by media by reflecting ESG recently attracted attention. This study extracts keywords for ESG controversies through association rule mining. Design/methodology/approach A research framework is designed to extract keywords for ESG controversies as follows: 1) From DeepSearch DB, we collect 23,837 articles on anti-ESG activities exposed to 130 media from 2013 to 2018 of 294 listed companies with ESG ratings 2) We set keywords related to environment, social, and governance, and delete or merge them with other keywords based on the support, confidence, and lift derived from association rule mining. 3) We illustrate the importance of keywords and the relevance between keywords through density, degree centrality, and closeness centrality on network analysis. Findings We identify a total of 26 keywords for ESG controversies. 'Gapjil' records the highest frequency, followed by 'corruption', 'bribery', and 'collusion'. Out of the 26 keywords, 16 are related to governance, 8 to social, and 2 to environment. The keywords ranked high are mostly related to the responsibility of shareholders within corporate governance. ESG controversies associated with social issues are often related to unfair trade. As a result of confidence analysis, the keywords related to social and governance are clustered and the probability of mutual occurrence between keywords is high within each group. In particular, in the case of "owner's arrest", it is caused by "bribery" and "misappropriation" with an 80% confidence level. The result of network analysis shows that 'corruption' is located in the center, which is the most likely to occur alone, and is highly related to 'breach of duty', 'embezzlement', and 'bribery'.