Abstract

Information Technology (IT) governance has risen in importance in recent years, driven by various trends in IT development. With rapid growth in the country and the globalization of the IT sector, there is growing interest in IT governance in Malaysia. This study aims to explore whether IT practitioners with different job functions, education levels, education areas of specialization, certifications and experience levels have different perceptions of IT governance effectiveness in their organization. The results reveal differences in perceived IT governance effectiveness between different job function groups, but not between groups with different education levels, certification or experience levels. The findings for education area of specialization are not conclusive. The findings of this study will help IT managers to identify areas of focus to maximize effectiveness of IT governance initiatives through their IT staff. The implications of the findings are discussed at the end of the paper.

Highlights

  • Information Technology (IT) governance has risen in importance in recent years, becoming a priority in most organizations [1]

  • The objective of this study is to explore whether IT practitioners with different job functions, education levels, education areas of specialization, certifications and experience levels have different perceptions of IT governance effectiveness in their organization

  • The results show that there is a difference in perceived IT governance effectiveness between IT practitioners with different job functions

Read more

Summary

Introduction

IT governance has risen in importance in recent years, becoming a priority in most organizations [1]. Value creation of IT investments is increasingly recognized as providing an important contribution to business, IT costs continue to rise [1] and have to be managed well. Organizations are increasingly dependent on IT due to the pervasive use of technology [3]. Business operations are at risk due to exposure to threats to intellectual assets, information and IT from internal and external hackers, viruses, malware and phishing [4]. IT as the custodian of data has to comply with more and more information and privacy‐related legislation, such as the Malaysian Personal Data Protection Act of 2010

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call