Regulatory Compliance in Information Systems Research

Slides:



Advertisements
Similar presentations
Lisanne Sison Director ERM Bickmore
Advertisements

Business Architecture
Chapter 10 Accounting Information Systems and Internal Controls
Information System Assurance Practices in China Key players doing IS Assurance In China Regulatory Regime and Professional Organizations -Regulatory AuthoritiesRegulatory.
It’s Time to Talk About Risk and Control
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Systems Engineering in a System of Systems Context
2011 Governance, Risk, and Compliance Conference August 29 – 31, 2011 / Orlando, FL, USA The Top Four Essential Objectives to Auditing ERM Stephen E. McBride,
By Collin Smith COBIT Introduction By Collin Smith
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
TEMPUS ME-TEMPUS-JPHES
Euseden INTERNAL AUDIT & ASSURANCE SERVICES.
Certified Business Process Professional (CBPP®) Exam Overview
Corporate Ethics Compliance *
Opportunities & Implications for Turkish Organisations & Projects
‘ KNOWLEDGE MANAGEMENT ’ ACCORDING TO B USINESS S CIENCE Omwoyo Bosire Onyancha University of South Africa Department of Information Science.
Information Technology Audit
Internal Auditing and Outsourcing
8 – 12 December 2008 Bruce Le Bransky MAFC / APEC / AFDC Shanghai Conference: Session 7.2: Challenges to Governance Structures.
Central Piedmont Community College Internal Audit.
1 Bölgesel Rekabet Edebilirlik Operasyonel Programı’nın Uygulanması için Kurumsal Kapasitenin Oluşturulmasına Yönelik Teknik Yardım Technical Assistance.
CORPORATE GOVERNANCE Regulatory expectations and current good practice Charles Cattell The Cattellyst Consultancy.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Roles and Responsibilities
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
Eloise Forster, Ed.D. Foundation for Educational Administration (FEA)
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
The common structure and ISO 9001:2015 additions
From cost to value: 2010 Global Survey on the CIO Agenda June 15 th, 2010 IT ADVISORY KPMG INTERNATIONAL.
Organization  As a member of the Strategy & Business Development team, this position will support the development and execution of Corporate, Sector,
RISK MANAGEMENT IN THE PUBLIC SECTOR CONVERGING MULTIPLE STAKEHOLDER’S EXPECTATIONS Organised by National Treasury Presented by WELEKAZI DUKUZA CEREBRO.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
ERM and Information Risks July 2013 Advisory. 1 © KPMG, a partnership established under Ghanaian law and a member firm of the KPMG network of independent.
1 northerntrust.com | © Northern Trust 2016 Changing Data Needs in Asset Management CORPORATE & INSTITUTIONAL SERVICES Prepared for the CInvO Roundtable,
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Strategic Formation Process
Lecture 20 Revision class.
Corporate Governance in Arab Countries
Overview of IT Auditing
MGT 498 TUTORIAL Success trials - mgt498tutorial.com
IIASA Governance Review
Capital Project / Infrastructure Renewal – Making the Business Case
Prepared by Rand E Winters, Jr. ASR Senior Auditor October 2014
The challenging role of internal audit
Построение культуры integrity в компании Aнар Каримов партнёр «ЭКВИТА»
E-Commerce Strategy, Implementation
HUMAN RESOURCE GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE
Internal Audit & Enterprise Risk Management
IS4680 Security Auditing for Compliance
MGT 498 Education for Service-- snaptutorial.com.
MGT 498 EDU Lessons in Excellence-- mgt498edu.com.
MGT 498 TUTORIAL Education for Service--mgt498tutorial.com.
MGT 498 Teaching Effectively-- snaptutorial.com
MGT 498 EDU Education for Service-- mgt498edu.com.
Assist. Prof. Magy Mohamed Kandil
COSO Internal Control s Framework
Chapter 12 Implementing strategy through organization
Internal Audit Strategy Survey Results & Discussion
Alignment of COBIT to Botswana IT Audit Methodology
“The biggest risk is not taking any risks.”
Chapter 8 Developing an Effective Ethics Program
Organizational Transformation
Chapter 12 Implementing strategy through organization
Eloise Forster, Ed.D. Foundation for Educational Administration (FEA)
Taking the STANDARDS Seriously
An overview of Internal Controls Structure & Mechanism
Good practices for risk assessment and control activities
Presentation transcript:

Regulatory Compliance in Information Systems Research Literature Analysis and Research Agenda Anne Cleven Research Assistant Chair of Prof. Dr. Robert Winter Institute of Information Management University of St. Gallen Müller-Friedberg-Strasse 8, CH-9000 St. Gallen Tel: +41 71 224 2192 Fax: +41 71 224 2189 anne.cleven@unisg.ch www.iwi.unisg.ch

1 2 3 4 5 Motivation Business Engineering Literature Analysis – Source Selection 3 Literature Analysis – Systemization 4 Conclusion & Future Research Agenda 5

Corporate Information Management Compliance affects… Swartz (2007) “[], a June 2006 AIIM survey co-sponsored by Xerox Global Services revealed that 63 percent of the 741 companies polled had not analyzed the risk they face from mismanaging electronic information. Forty-three percent said their firm did not have a clear approach for meeting compliance requirements. Worse, only 34 percent said that their organizations have widespread understanding of what electronic records are and how they should be retained.“ Corporate Information Management

… and … 94% Financial Reporting Panko (2006)

… and … “While much has been written about how SOX affects corporate CEOs and their external auditors, little attention has focused on its potential effect on corporate IT departments. Consequently, the full implications of SOX for IT are not well understood. One survey [11] reported “an astounding 93% of chief information officers and other senior IT executives were unaware of their information technology control assessment responsibilities under SOX.” This confusion has led to uncertainty and inconsistency regarding the use of IT outsourcing to address SOX challenges. A survey [9] of 261 corporate decision makers by the consulting firm Meta Group found that 25% had no way of determining the appropriate IT sourcing response to SOX; 21% intended to outsource more in response to SOX; and 19% intended to outsource less.” Hall, Liedtka, e.a. (2007) IT Outsourcing

1 2 3 4 5 Motivation Business Engineering Literature Analysis – Source Selection 3 Literature Analysis – Systemization 4 Conclusion & Future Research Agenda 5

Business Engineering company culture, leadership style, behavior patterns, incentive/sanctioning systems, communication practices organizational goals, success factors, products/services, targeted marked segments, core competencies, strategic projects organizationsl units, business roles, business functions, business processes, metrics, service flows, business information objects enterprise services, applications, domains software components, data resources, hardware, network architecture Terminologies, theories, generic methods, reference models, exemplary successful practices

1 2 3 4 5 Motivation Business Engineering Literature Analysis – Source Selection 3 Literature Analysis – Systemization 4 Conclusion & Future Research Agenda 5

Literature Analysis – Source Selection Based on capacious catalog of IS outlets provided by the London School of Economics (LSE) IS outlets focused on the social study of ICT Outlets focused on mainstream IS and management research Practitioner journals Conferences Search period: 2002 – today Search strategy Contributions on regulatory and/or legal compliance Keyword search using the search term ‘compliance’ Abstract evaluation 26 relevant articles

Literature Search Results 1/2

Literature Search Results 2/2

1 2 3 4 5 Motivation Business Engineering Literature Analysis – Source Selection 3 Literature Analysis – Systemization 4 Conclusion & Future Research Agenda 5

Literature Analysis – Systemization - 2 overviews on leading legal issues that affect IT and IT professionals - 1 analysis of different impacts of regulations on IT - 5x institutional and 1x neo-institutional theory as a theoretical lens through which authours investigate experiences made by companies with the implementation of regulations & deduction of respective guidelines IT auditing as a strategic approach to compliance SOX and strategic IT outsourcing correlation between SOX and strategic success - Regulation, risk and control frameworks and financial reporting, review on corporate governance frameworks, validation of ISO 17799 standard, method to develop an enterprise IT-governance - model-based proof of compliance, compliance verification knowledge management, method for rule extraction, compliant SD process, data mining in Basel II context

1 2 3 4 5 Motivation Business Engineering Literature Analysis – Source Selection 3 Literature Analysis – Systemization 4 Conclusion & Future Research Agenda 5

Conclusion & Future Research Agenda 1/2 e.g. methods and approaches for the identification of relevant regulations, deduction of a corporate culture that is in line with compliance objectives, operationalization of strategic compliance objectives,… e.g. compliance-related business roles, authorization concepts, control metrics for compliance, standardized transaction control processes,… e.g. common terminology, industry-specific reference models for corporate and IT governance, …

Conclusion & Future Research Agenda 2/2 Implications of regulatory compliance on the conduct of daily business have intensely been investigated IS discipline is however still somehow limping behind with the development of suitable concepts and solutions Holistic frameworks supporting the aligned implementation of compliance throughout each of the business engineering layers are missing

Thank you for your attention! Anne Cleven anne.cleven@unisg.ch www.iwi.unisg.ch +41 71 224 2192