Discover how to implement an effective IT governance structure for the long-term success of an extended enterprise
IT is no longer an enabler of corporate strategy, it is now the key element of corporate strategy. Governance of the Extended Enterprise explores how some of the world's most successful enterprises have integrated information technology with business strategies, culture, and ethics to optimize information value, attain business objectives, and capitalize on technologies in highly competitive environments.
Providing a process for change and a governance model, Governance of the Extended Enterprise encompasses the latest emerging practices from major information and knowledge businesses, providing a major new knowledge resource for enterprises. It also opens up new avenues of practice in strategy setting, enterprise management, control assessment, and risk management.
From sales-force automation to workgroup collaboration, forms processing to knowledge management systems, customer service to technical support, Governance of the Extended Enterprise will help readers improve IT governance in all facets of their organization.
About the Author
THE IT GOVERNANCE INSTITUTE® (ITGI) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise's information technology. Effective IT governance helps ensure that IT supports business goals, optimizes business investment in IT, and appropriately manages IT-related risks and opportunities. The IT Governance Institute offers symposia, original research, and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities.
INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION® (ISACA®) (www.isaca.org) is a recognized worldwide leader in IT governance, control, security, and assurance with more than 35,000 members in more than 100 countries. Founded in 1969, ISACA sponsors international conferences; publishes the Information Systems Control JournalTM; develops international information systems auditing and control standards; and administers both the globally respected Certified Information System Auditor® (CISA®) designation carried by more than 35,000 professionals since its inception, and the Certified Information Security Manager (CISMTM) designation, a groundbreaking credential earned by 5,000 professionals in its first two years.