SlideShare una empresa de Scribd logo
1 de 36
Importance of Employee’s Participation on the proposed IT Governance Model The Thesis Presented by  Amr Ahmed Said Supervised by Prof. Dr. Sherif Mazen Master of Business Administration Maastricht School of Management 2011 © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 1
Biography © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 2
Agenda © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 3
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 4
Introduction ,[object Object]
IT is considered very important to deliver the business strategy and vision (ITGI,2011)
IT Governance is one of the most effective cure to IT project failures.© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 5 Importance of IT to the Delivery of the Business Strategy and Vision Source: ITGI, 2011
Business Pain Points ITG Benefits to Business © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 6 IntroductionBusiness View
IntroductionIT Governance Domains © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 7
Calder-Moir COBIT © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 8 IntroductionIT Governance Frameworks	 Source: ITGI, 2011
COSO ITIL © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 9 IntroductionIT Governance Frameworks – Cont.
IntroductionProposed IT Governance Model © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 10
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 11
Problem Definition Employees (from information security perspective) are considered to be the weakest point in the organization since they interact directly with customers, IT systems and organization’s data. At the same time employees’ are considered to be the most important source of information related to IT systems, customers, business vision, etc… © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 12 Employee’s participation in IT governance was OVERLOOKED
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 13
Research Objective © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 14
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 15
Theoretical FrameworkEmployees Satisfaction Factors © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 16
Theoretical FrameworkProposed Research Model © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 17
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 18
Research Questions © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 19
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 20
Research MethodologyIntroduction © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 21 Research Type ,[object Object]
Qualitative ApproachPhase1 ,[object Object]
Sampling : Non probability judgmental sample – 2 experts.
Objective :
Exploring the research problem, and validating research question.
Identifying any missing variables.
Recommendations from SMEs.Phase2 ,[object Object]
Sampling : Non probability simple random sample
Population: 300000
Distribution : Online on ~800 employees using direct mails, direct questionnaire and personal interviews with executives.
Collected sample size : 110 valid responses while target was 200
Applied Outcomes,[object Object]
© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 23
AnalysisReliability Test - Normality Test © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 24 ,[object Object]

Más contenido relacionado

Similar a IT Governance and Employees Participation

Integrated Project Delivery - Global Survey Results
Integrated Project Delivery - Global Survey ResultsIntegrated Project Delivery - Global Survey Results
Integrated Project Delivery - Global Survey ResultsCraig Skipsey
 
User, Customer and Digital Experience: Where Service and Business Performance...
User, Customer and Digital Experience: Where Service and Business Performance...User, Customer and Digital Experience: Where Service and Business Performance...
User, Customer and Digital Experience: Where Service and Business Performance...Enterprise Management Associates
 
Urban Local Bodies Case Study
Urban Local Bodies Case StudyUrban Local Bodies Case Study
Urban Local Bodies Case StudySandra Ahn
 
The Technology Change Imperative
The Technology Change ImperativeThe Technology Change Imperative
The Technology Change ImperativeJim Hussey
 
2014 survey-monitoring-evaluation-v4
2014 survey-monitoring-evaluation-v42014 survey-monitoring-evaluation-v4
2014 survey-monitoring-evaluation-v4Meegan Scott
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Enterprise Management Associates
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylanozewai
 
IDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcingIDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcingJohan Hallberg
 
Chapter 2 The Project Management and Information Technology Context.ppt
Chapter 2 The Project Management and Information Technology Context.pptChapter 2 The Project Management and Information Technology Context.ppt
Chapter 2 The Project Management and Information Technology Context.pptAhmadTawfigAlRadaide
 
The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...Enterprise Management Associates
 
Information Technology Project Management - part 02
Information Technology Project Management - part 02Information Technology Project Management - part 02
Information Technology Project Management - part 02Rizwan Khurram
 
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...Enterprise Management Associates
 
The State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessThe State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessEnterprise Management Associates
 

Similar a IT Governance and Employees Participation (20)

Integrated Project Delivery - Global Survey Results
Integrated Project Delivery - Global Survey ResultsIntegrated Project Delivery - Global Survey Results
Integrated Project Delivery - Global Survey Results
 
User, Customer and Digital Experience: Where Service and Business Performance...
User, Customer and Digital Experience: Where Service and Business Performance...User, Customer and Digital Experience: Where Service and Business Performance...
User, Customer and Digital Experience: Where Service and Business Performance...
 
Urban Local Bodies Case Study
Urban Local Bodies Case StudyUrban Local Bodies Case Study
Urban Local Bodies Case Study
 
The Technology Change Imperative
The Technology Change ImperativeThe Technology Change Imperative
The Technology Change Imperative
 
2014 survey-monitoring-evaluation-v4
2014 survey-monitoring-evaluation-v42014 survey-monitoring-evaluation-v4
2014 survey-monitoring-evaluation-v4
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
 
Chris Vanderweylan
Chris VanderweylanChris Vanderweylan
Chris Vanderweylan
 
IDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcingIDC Nordics - Directions 2015 Digital transformation Services and sourcing
IDC Nordics - Directions 2015 Digital transformation Services and sourcing
 
Dynamic Adaptation
Dynamic AdaptationDynamic Adaptation
Dynamic Adaptation
 
The Great Scheduler Migration
The Great Scheduler MigrationThe Great Scheduler Migration
The Great Scheduler Migration
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Chapter 2 The Project Management and Information Technology Context.ppt
Chapter 2 The Project Management and Information Technology Context.pptChapter 2 The Project Management and Information Technology Context.ppt
Chapter 2 The Project Management and Information Technology Context.ppt
 
Webinar_031615_Richardson.ppt
Webinar_031615_Richardson.pptWebinar_031615_Richardson.ppt
Webinar_031615_Richardson.ppt
 
The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...
 
Information Technology Project Management - part 02
Information Technology Project Management - part 02Information Technology Project Management - part 02
Information Technology Project Management - part 02
 
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
 
Achieving Effective Identity and Access Governance
Achieving Effective Identity and Access GovernanceAchieving Effective Identity and Access Governance
Achieving Effective Identity and Access Governance
 
Ijmet 09 11_002
Ijmet 09 11_002Ijmet 09 11_002
Ijmet 09 11_002
 
IT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and ContainersIT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and Containers
 
The State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessThe State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to Awareness
 

Último

Paragliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal PardeshParagliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal PardeshParagliding Billing Bir
 
Where to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdWhere to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdusmanghaniwixpatriot
 
How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersMakena Coast Charters
 
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelSicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelTime for Sicily
 
Phil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptxPhil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptxDitasDelaCruz
 
question 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationquestion 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationcaminantesdaauga
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxGregory DeShields
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Updatejoymorrison10
 
a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.moritzmieg
 
It’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The WorldIt’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The WorldParagliding Billing Bir
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)Mazie Garcia
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)Escort Service
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodKasia Chojecki
 

Último (15)

Paragliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal PardeshParagliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal Pardesh
 
Where to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdWhere to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasd
 
How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s Waters
 
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelSicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
 
Phil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptxPhil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptx
 
question 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationquestion 2: airplane vocabulary presentation
question 2: airplane vocabulary presentation
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptx
 
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Update
 
a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.
 
It’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The WorldIt’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The World
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and Food
 
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
 

IT Governance and Employees Participation

  • 1. Importance of Employee’s Participation on the proposed IT Governance Model The Thesis Presented by Amr Ahmed Said Supervised by Prof. Dr. Sherif Mazen Master of Business Administration Maastricht School of Management 2011 © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 1
  • 2. Biography © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 2
  • 3. Agenda © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 3
  • 4. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 4
  • 5.
  • 6. IT is considered very important to deliver the business strategy and vision (ITGI,2011)
  • 7. IT Governance is one of the most effective cure to IT project failures.© Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 5 Importance of IT to the Delivery of the Business Strategy and Vision Source: ITGI, 2011
  • 8. Business Pain Points ITG Benefits to Business © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 6 IntroductionBusiness View
  • 9. IntroductionIT Governance Domains © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 7
  • 10. Calder-Moir COBIT © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 8 IntroductionIT Governance Frameworks Source: ITGI, 2011
  • 11. COSO ITIL © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 9 IntroductionIT Governance Frameworks – Cont.
  • 12. IntroductionProposed IT Governance Model © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 10
  • 13. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 11
  • 14. Problem Definition Employees (from information security perspective) are considered to be the weakest point in the organization since they interact directly with customers, IT systems and organization’s data. At the same time employees’ are considered to be the most important source of information related to IT systems, customers, business vision, etc… © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 12 Employee’s participation in IT governance was OVERLOOKED
  • 15. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 13
  • 16. Research Objective © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 14
  • 17. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 15
  • 18. Theoretical FrameworkEmployees Satisfaction Factors © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 16
  • 19. Theoretical FrameworkProposed Research Model © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 17
  • 20. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 18
  • 21. Research Questions © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 19
  • 22. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 20
  • 23.
  • 24.
  • 25. Sampling : Non probability judgmental sample – 2 experts.
  • 27. Exploring the research problem, and validating research question.
  • 29.
  • 30. Sampling : Non probability simple random sample
  • 32. Distribution : Online on ~800 employees using direct mails, direct questionnaire and personal interviews with executives.
  • 33. Collected sample size : 110 valid responses while target was 200
  • 34.
  • 35. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 23
  • 36.
  • 37.
  • 38. AnalysisRegression Analysis © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 26 R2 = 85.3% Significant
  • 39. AnalysisRegression Analysis © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 27
  • 40. Findings and Discussion Using multiple tests, the null hypothesis for all the directional hypotheses was rejected © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 28
  • 41. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 29 Findings and DiscussionAnswers to Research Questions YES YES YES YES YES
  • 42. © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 30
  • 43. Conclusion © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 31
  • 44. Recommendations © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 32
  • 45. Future Work © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 33
  • 46. Researcher Contribution © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 34
  • 47.
  • 48. Backup Slides © Amr Said, MsM-RITI – Cairo Outreach Program, 2011. 36 Since tolerance > 0.2 And VIF (variance inflation factor) < 5 Then we don’t have multicollinearity problem