An assimilation maturity model for IT governance and auditing

Information & Management - Tập 59 - Trang 103569 - 2022
Amitava Dutta1, Rahul Roy2, Priya Seetharaman2
1School of Business, George Mason University Fairfax, Virginia, USA
2Indian Institute of Management Calcutta, Diamond Harbour Road, Joka, Kolkata, India

Tài liệu tham khảo

Armstrong, 1999, Information technology assimilation in firms: the influence of senior leadership and IT infrastructures, Inf. Syst. Res., 10, 304, 10.1287/isre.10.4.304 Baird, 2017, Reflective technology assimilation: facilitating electronic health record assimilation in small physician practices, J. Manag. Inf. Syst., 34, 664, 10.1080/07421222.2017.1373003 Bajwa, 2008, Factors in the global assimilation of collaborative information technologies: an exploratory investigation in five regions, J. Manag. Inf. Syst., 25, 131, 10.2753/MIS0742-1222250106 Bassellier, 2003, The influence of business managers’ IT competence on IT project success, Inf. Syst. Res., 14, 317, 10.1287/isre.14.4.317.24899 Becker, 2009, Developing maturity models for IT management, Bus. Inf. Syst. Eng., 1, 213, 10.1007/s12599-009-0044-5 Benbasat, 1980, Impact of organisational maturity on information systems skill needs, MIS Q., 4, 21, 10.2307/248865 Blair, 2015, A reflexive exploration of two qualitative data coding techniques, J. Methods Meas. Soc. Sci., 6, 14 Boynton, 1987, Information technology planning in the 1990’s: directions for practice and research, MIS Q., 11, 59, 10.2307/248826 Burton-Jones, 2013, From use to effective use: a representation theory perspective, Inf. Syst. Res., 24, 632, 10.1287/isre.1120.0444 Chen, 2014, IT capability and organizational performance: the roles of business process agility and environmental factors, Eur. J. Inf. Syst., 23, 326, 10.1057/ejis.2013.4 CMMI. (2010). CMMI for development, version 1.3. Retrieved August 16, 2021, from https://resources.sei.cmu.edu/asset_files/TechnicalReport/2010_005_001_15287.pdf. Cooper, 1990, Information technology implementation research: a technological diffusion approach, Manag. Sci., 36, 123, 10.1287/mnsc.36.2.123 Cotterman, 1989, User cube: a Taxonomy of end users, Commun. ACM, 32, 1313, 10.1145/68814.68816 Craddock, 2018 Cram, 2015, Addressing the control challenges of the enterprise architecture process, J. Inf. Syst., 29, 161 Cusumano, 2012, Can services and platform thinking help the U.S. postal service?, Commun. ACM, 55, 21, 10.1145/2133806.2133814 D’Onza, 2015, Do IT audits satisfy senior manager expectations?: a qualitative study based on Italian banks, Manag. Audit. J., 30, 413, 10.1108/MAJ-07-2014-1051 DalleMule, 2017, What’s your data strategy?, Harv. Bus. Rev., 95, 112 Davenport, 1993 Davenport, 1995, Managing information about processes, J. Manag. Inf. Syst., 12, 57, 10.1080/07421222.1995.11518070 de Swart, J. (2019). Deciphering dark matter: the remarkable life of fritz zwicky. Nature VO - 573, (7772), 32. 10.1038/d41586-019-02603-7. Debreceny, 2013, IT governance and process maturity: a multinational field study, J. Inf. Syst., 27, 157 Downey, 2004, Toward a comprehensive framework: EUC research issues and trends (1999-2000), J. Organ. End User Comput., 16, 1, 10.4018/joeuc.2004100101 Dube, 2003, Rigor in information systems positivist case research: current practices, trends and recommendations, MIS Q., 27, 597, 10.2307/30036550 Dutta, 2013, Course management system adoption and usage : a process theoretic perspective, Comput. Human Behav., 29, 2535, 10.1016/j.chb.2013.06.010 Feeny, 1998, Core IS capabilities for exploiting information technology, Sloan Manag. Rev., 39, 9 Fischer, 2020, Strategy archetypes for digital transformation: defining meta objectives using business process management, Inf. Manag., 57, 10.1016/j.im.2019.103262 Frow, 2015, Managing co-creation design: a strategic approach to innovation, Br. J. Manag., 26, 463, 10.1111/1467-8551.12087 Gallivan, 2001, Organizational adoption and assimilation of complex technological innovations: development and application of a new framework, MIS Q., 32, 51 Gantz, 2014 Gao, 2019, The joint effects of IT resources and CEO support in IT assimilation: evidence from large-sized enterprises, Ind. Manag. Data Syst., 119, 1321, 10.1108/IMDS-08-2018-0345 Gardiner, T., Weber, C., & Curtis, B. (2008). Business process maturity model (BPMM) version 1.0. Retrieved November 23, 2020, from http://www.omg.org/spec/BPMM/1.0/PDF. Giessmann, 2012, Business models of platform as a service (PaaS) providers: current state and future directions, J. Inf. Technol. Theory Appl. (JITTA), 13, 31 Govindarajulu, 2003, End users: who are they?, Commun. ACM, 46, 152, 10.1145/903893.903931 Gregor, 2006, The nature of theory in information systems, MIS Q., 30, 611, 10.2307/25148742 Gregor, 2006, The nature of theory in information systems, MIS Q., 30, 611, 10.2307/25148742 Grover, 2005, An empirical evaluation of stages of strategic information systems planning: patterns of process design and effectiveness, Inf. Manag., 42, 761, 10.1016/j.im.2004.08.002 Hammer, 1993 Huff, 1988, Growth stages of end user computing, Commun. ACM, 31, 542, 10.1145/42411.42417 Hyon Song, 1994, A morphological approach to generating information technology product ideas, Inf. Manag., 27, 121, 10.1016/0378-7206(94)90011-6 2019 ISACA. (2019 b). Today's toughest challenges in IT audit: tech partnerships, talent, transformation. Retrieved from https://www.protiviti.com/sites/default/files/united_states/insights/8th-annual-it-audit-benchmarking-survey_isaca_protiviti.pdf. Johansen, 2018, Scenario modelling with morphological analysis, Technol. Forecast. Soc. Change, 126, 116, 10.1016/j.techfore.2017.05.016 Joshi, 2018, Explaining IT governance disclosure through the constructs of IT governance maturity and IT strategic role, Inf. Manag., 55, 368, 10.1016/j.im.2017.09.003 Kerr, 2013, The importance of the CobiT framework IT processes for effective internal control over financial reporting in organizations: an international survey, Inf. Manag., 50, 590, 10.1016/j.im.2013.07.012 King, 1997, Integration between business planning and information systems planning: validating a stage hypothesis, Decis. Sci., 28, 279, 10.1111/j.1540-5915.1997.tb01312.x Kohli, 2007, Innovating to create IT-based new business opportunities at united parcel service, MIS Q. Executive, 6, 199 Liang, 2007, Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management, MIS Q., 31, 59, 10.2307/25148781 Luftman, 2000, Assessing business-IT alignment maturity, Commun. Assoc. Inf. Syst., 4, 1 Mähring, 2008, Making IT project de-escalation happen: an exploration into key roles, J. Assoc. Inf. Syst., 9, 462 Markus, 2014, Foresight for a responsible future with ICT, Inf. Syst. Front., 16, 353, 10.1007/s10796-013-9479-9 Massetti, 1996, Measuring the extent of EDI usage in complex organizations: strategies and illustrative examples, MIS Q., 20, 331, 10.2307/249659 Melville, 2004, Review: information technology and organizational performance: an integrative model of IT business value, MIS Q., 28, 283, 10.2307/25148636 Mendonca, J. (2015, January 15). State Bank of India plans to be at par with private sector rivals in terms of technology. The Economic Times, pp. 1–2. Merhout, 2008, Information technology auditing: a value-added IT governance partnership between IT management and audit, Commun. Assoc. Inf. Syst., 23 Metz, 2020, Scenario development as valuation: opportunities for reflexivity, Technol. Forecast. Soc. Change, 155 Miller, 1997, Retrospective reports in organizational research: a reexamination of recent evidence, Acad. Manag. J., 40, 189, 10.2307/257026 Mishra, 2012, Electronic health records assimilation and physician identity evolution: an identity theory perspective, Inf. Syst. Res., 23, 738, 10.1287/isre.1110.0407 Mocker, 2014, Revisiting complexity in the digital age, MIT Sloan Manag. Rev., 55, 73 Mu, 2015, The assimilation of enterprise information system: an interpretation systems perspective, Inf. Manag., 52, 359, 10.1016/j.im.2015.01.004 Müller, 2015, Benefits of cloud computing: literature review in a maturity model perspective, Commun. Assoc. Inf. Syst., 37, 851 Nolan, 1979, Managing the crises in data processing, Harv. Bus. Rev., 57, 115 Nuijten, 2018, IT managers’ vs. IT auditors’ perceptions of risks: an actor–observer asymmetry perspective, Inf. Manag., 55, 80, 10.1016/j.im.2017.04.002 Oh, 2007, Service-oriented architecture and organizational integration : an empirical study of IT-enabled sustained competitive advantage, Icis, 1 QSR. (2019). NVivo - software for qualitative data analysis. Retrieved from https://www.qsrinternational.com/nvivo/home. Quaddus, 2001, Management policies and the diffusion of data warehouse: a case study using system dynamics-based decision support system, Decis. Support Syst., 31, 223, 10.1016/S0167-9236(00)00133-0 Ritchey, 2006, Problem structuring using computer-aided morphological analysis, J. Oper. Res. Soc., 57, 792, 10.1057/palgrave.jors.2602177 Rockart, 1983, The management of end-user computing, Commun. ACM, 26, 776, 10.1145/358413.358429 Röglinger, 2012, Maturity models in business process management, Bus. Process Manag. J., 18, 328, 10.1108/14637151211225225 Rondeau, 2006, How involvement, IS management effectiveness, and end-user computing impact IS performance in manufacturing firms, Inf. Manag., 43, 93, 10.1016/j.im.2005.02.001 Ross, 2003, Creating a strategic IT architecture competency: learning in stages, MIS Q. Executive, 2, 31 Ross, 2016, Designing and executing digital strategies, Proc. Int. Conf. Inf. Syst., 1 Ross, 2012 Sampler, 2014, What's your information footprint?, MIT Sloan Manag. Rev., 55, 96 Sarker, S., Lau, F., & Sahay, S. (2001). Using an adapted grounded theory approach for inductive theory building about virtual team development. ACM SIGMIS Database, 32(1), 38. 10.1145/506740.506745. Schreier, 2012 Sebastian, 2017, How big old companies navigate digital transformation, MIS Q. Executive, 16, 197 Soh, 1995, How IT creates business value : a process theory synthesis, Sixteenth Int. Conf. Inf. Syst., 29 Steinfield, 1990, The theory imperative, 13 Strauss, 1998 Urquhart, 2002, Regrounding grounded theory - or reinforcing old prejudices? A brief reply to bryant, J. Inf. Technol. Theory Appl., 4, 43 Urwiler, 2008, The IT value hierarchy: using maslow’s hierarchy of needs as a metaphor for gauging the maturity level of information technology use within competitive organizations, Inf. Syst. Manag., 25, 83, 10.1080/10580530701777206 Vaidya, 2011, Explaining sophistication in collaborative technology use: a context-technology fit perspective, Group Decis. Negot., 20, 185, 10.1007/s10726-009-9172-z Weill, 2004 Wiesche, 2017, Grounded theory methodology in information systems research, MIS Q., 41, 685, 10.25300/MISQ/2017/41.3.02 Zwicky, 1967, The morphological approach to discovery, invention, research and construction, 298