CAT5:A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
Companies have more and more trends to automate their operational and organizational activities, therefore the investment of information technology (IT) continues to increase every year. However, good governance that can ensure the alignment of IT and business strategy and realized benefits from IT investments has not always followed this increase. Measurement of IT governance is then required as a basis for the continuous improvement of the IT services. This study is aimed at producing a tool CAT5 to measure the maturity level of IT governance, thus facilitating the process of improvement of IT services. CAT5 is based on COBIT 5 framework and the design used is Unified Modeling Language. Through stages of information system development, this research results in an application for measuring the maturity level of IT governance that can be used in assessing existing IT governance.
Authors and Affiliations
Souhaïl El Houssaïni, Karim Youssfi, Jaouad Boutahar
Security Risk Assessment of Cloud Computing Services in a Networked Environment
Different cloud computing service providers offer their customers' services with different risk levels. The customers wish to minimize their risks for a given expenditure or investment. This paper concentrates on consume...
Mobile Data Collector Routing Protocol Scheme for Scalable Dense Wireless Sensor Network to Optimize Node’s Life
Wireless Sensor Networks (WSN) is a special kind of network communication architecture which has a very wide range of application and the cost-effectiveness of this architecture boosts its adaptability and usability. The...
A Novel Architecture for 5G Ultra Dense Heterogeneous Cellular Network
The mounting use of wireless devices and wide range applications in an ultra-dense heterogeneous wireless network has directed to the challenging circumstances that could not be handled till 4G. In order to deal with the...
An Algorithm that Prevents SPAM Attacks using Blockchain
There are many systems and methods for prevent-ing spam attacks. However, at present there is no specific tried-and-true method for preventing such attacks. In this paper, we propose an algorithm, “SAGA BC” to prevent sp...
Automation and Validation of Annotation for Hindi Anaphora Resolution
The process of labelling any language genre by which one can extract useful information is called annotation. This provides syntactic information about a word or a word phrase. In this paper, an effort has been made to p...