Main Article Content

Abstract

Abstract: The focus on Governance, Risk and Compliance (GRC) is steadily increasing as IT companies are facing increased risk and a growing number of legal, regulatory compliances. Big IT giants like Google, Facebook already initiated to ‘emphasise’ the integration of GRC activities in order to efficiently manage data governance. This paper analyses need of GRC and its integration particularly for data governance in IT organization. Even though integrated GRC is potential candidate for storage and safe handling of user data, many companies are unsure about the importance of an integration of GRC. As per recent findings, many organisations in Australia have deployed integrated GRC software that helps underlining the benefits of GRC. Still integration of GRC is having few challenges at the moment as stakeholders are unsatisfied with the present state of integration. In this paper, author recommends few solutions to overcome challenges of integration of GRC particularly for data handling with reference to COBIT 5 framework.

Article Details

Author Biography

Akash Nepuane, CIHE Sydney Australia

Akash Nepaune is persuing bachelors in IT in CIHE.

How to Cite
[1]
A. Nepuane, “Role of GRC In the Information Governance for IT Organizations”, Ausjournal, vol. 1, no. 1, pp. 18-19, Apr. 2022.

References

1. Ayu, I.T., et al. Aligning PMBOK and COBIT for Project Management in Banking Industry: Case Study of BankXYZ. in 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). 2020.
2. Azizi, N., S.J. Miah, and F.H. Masmali. Development of an Innovative Framework for IT Risk Management. in 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). 2019.
3. Bartens, Y., F. Schulte, and S. Voß. E-Business IT Governance Revisited: An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5. in 2014 47th Hawaii International Conference on System Sciences. 2014.
4. Cámara, M.d.l., et al. Security by design factors for developing and evaluating secure software. in 2015 10th Iberian Conference on Information Systems and Technologies (CISTI). 2015.
5. Darmawan, D.Z. and Wella. IT governance evaluation on educational institutions based on COBIT 5.0 framework. in 2017 4th International Conference on New Media Studies (CONMEDIA). 2017.
6. Elhasnaoui, S., et al. A new IT Governance architecture based on multi agents system to support project management. in 2015 International Conference on Electrical and Information Technologies (ICEIT). 2015.
7. Hutapea, D.Y., R.P. Brahmantara, and D.I. Sensuse. E-Government Maturity Assessment Using COBIT5 Framework in APO Domain. in 2021 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE). 2021.
8. Jaramillo, H.D., B.F. Guaman, and E.K. Salazar. Information security in implementing web applications for small businesses based on COBIT5-SI. in 2015 10th Iberian Conference on Information Systems and Technologies (CISTI). 2015.
9. Matsikidze, H. and M. Kyobe. A Proposed Cyber security framework for auditing in financial institutions. in 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). 2020.
10. Maulana, M.M., et al. Smart Governance Design for One-Stop Government of Licensing Services in Bio-business. in 2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE). 2021.
11. Muhammad, R. and I.Y.M. Edward. Assessment of IT Governance of Bakti Internet Access Program Based on the COBIT5 Framework : Case Study: Balai Latihan Kerja Kendari. in 2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA). 2018.
12. Ningsih, K.R., et al. Developing IT investment management framework of government institution. in 2013 International Conference on Advanced Computer Science and Information Systems (ICACSIS). 2013.
13. Silva, A.P.B.d., et al. Prioritization of processes for IT Governance improvement - Case Study for DPU / Brazil. in 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). 2019.
14. Susanto, H., Y. Musashi, and K. Sugitani. Development of information security risk assessment for nuclear regulatory authority perspective: Proposition of a system application design. in 2017 11th International Conference on Information & Communication Technology and System (ICTS). 2017.
15. Tawakkal, I., A.P. Kurniati, and G.A.A. Wisudiawan. Implementing heuristic miner for information system audit based on DSS01 COBIT5 (Case study: CV Narnia distribution). in 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA). 2016.
16. Techoro, T.M., et al. Leveraging COBIT5 in NFC-based payment technology: challenges and opportunities for security risk mitigation and audit. in 2015 First Conference on Mobile and Secure Services (MOBISECSERV). 2015.