Preview

Impact of Information Technology on Corporate Governance and Financial Reporting

Powerful Essays
Open Document
Open Document
10380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Impact of Information Technology on Corporate Governance and Financial Reporting
IMPACT OF INFORMATION TEHNOLOGY ON CORPORATE GOVERNANCE AND FINANCIAL REPORTING
1.0 INTRODUCTION
The introduction of the computer and advent of the Internet has changed the way we live in the modern world. This spans across every aspect of human life. Modern innovations have led to the description of the age in which we live as “the Information age”. Information technology and management therefore plays a vital role to the extent that timely access to Information could save a life while improper management of Information could lead to huge problems and losses of opportunities. In terms of Corporate governance and financial reporting, the financial implications of these losses could be great on corporate entities when quantified in monetary terms and this has led several companies to invest in finding better ways of improving on Information systems.
Corporate scandals and failures across the globe including Enron, Worldcom, Daewoo Group (in Korea) and HIH (a major insurance group) in Australia, has raised serious questions about the way public corporations are governed around the world. This is usually characterized by managers who have been trusted with company control but due to conflicting/self interest, sometimes engage in actions that are profoundly detrimental to the interests of shareholders and other stakeholders. When managerial self-dealings are excessive and left unchecked, they often have serious negative effects on corporate values and the proper functions of capital markets. Around the world there is growing consensus that it is vitally important to strenghten corporate governance to protect the rights of shareholders, curb managerial excesses, and restore confidence in capital markets.
Last year Nigeria witnessed the sacking of Managing Directors of five of Nigeria’s top banks namely Intercontinental Bank Plc, Union Bank, AfriBank, Oceanic Bank and FinBank. This was largely due to issues relating to Corporate governance and ethical code of conduct



References: Arnum, P.V. (2004). Information technology insights: Cyber security ushers IT into corporate governance practices. Chemical Market Reporter, 265(17), 17-18. Aytes, K., &Connolly, T. (2004). Computer security and risky computing practices: A rational choice perspective. Journal of Organizational and End User Computing, 16(3), 22. Bridging the gap between IT and corporate governance (2006) [Electronic version]. Sarbanes-Oxley Compliance Journal. Retrieved October 30, 2006, from http://www.s-ox.com/news/detai l.cfm articleID=1949. Canback, S. (1998). The logic of management consulting. Journal of Management Consulting, 10(2), 3-11. Carlson, L. W. (September October 2004). Using technology foresight to create business value. Research Technology Management. Carlson, S. (2004). A hard eye on what IT buys [Electronic version]. Chronicle of Higher Education, 50(36), A35-A36. Carr, N.G. (2004). Does IT matter? : Information technology and the corrosion of competitive advantage. Boston: Harvard Business School Press. Clevenson, A., Guimaraes, T., & Yoon, Y. (1998). Exploring expert system success factors for business process reengineering. Journal of Engineering and Technology Management, 15, 179-199. Colwill, C., Todd, M., Fielder, G., & Natanson, C. (2001). Information assurance. BT Technology Journal, 19(3), 107. Connor, D. (2003). Report: Data warehouse failures commonplace. Network World, 20(3), 24. Corey, D., Trimmer K., (2004). Information assurance and security. Journal of Organizational and End User Computing, 16(3), 1. CSI/FBI. (2005). Computer crime and security survey. Retrieved October 20, 2006, from http://www.cpppe.umd.edu/Books tore/Documents/2005CSISurvey.p df. Ezingeard, J., McFaden, E., & Birchall, D. (2005). A model of information assurance benefits. EDPACS, 32(11), 1. Freedman, R. (2003). Helping clients value IT investments. Harvard Business Review, 14(3), 33-39. Hall, D. (2004). Requirements and policy challenges in highly secure environments. Association for Computing Machinery Special Interest Group on Management of Data. Retrieved November 14, 2006, from http://acm.org/sigmod/. Harkness, Michael, D. (2005). Electronic banking and information assurance. Internal Auditing, 20(2), 4. Henry, R.M. (2004). The role of knowledge in information technology project governance. Unpublished doctoral dissertation, University of Pittsburg School of Business, PA. Hoffman, T. (2006, May 22). Weighting the risks. Computerworld. Retrieved October 31, 2006, from www.computerworld.com. Kabay, M. (2005). Improving information assurance education key to improving security management. Journal of Network and Systems Management, 13(3), 247. Kaplan, R., & Norton, D. (January-February 1996). Putting the balanced scorecard to work. Harvard Business Review, 74(1), 75-85. Kappelman, L., McKeeman, R., & Zhang, L. (2006). Early warning signs of IT project failure: The dominant dozen. Information Systems Management, 23(4), 3138. Klein, K., & Sorra, J. (1996). The challenge of innovation implementation. Academy of Management Review, 21(4), 1055-1080. Korotka, M., Yin, R., & Basu, S. (2005). Information assurance technical framework and end user information ownership. Journal of Information Privacy & Security, 1(1), 10. Lindsey, K., & Frolick, M. N. (2003). Critical factors for data warehouse failure. Business Intelligence Journal, 8(1). MacMillan, I.C., & McGrath, R. G., (2004). Nine new roles for technology managers. Research Technology Management, 47(3), 1626. Marsan, C. D. (2006). Q&A: Security expert recommends net diversity. Network World, 23(20), 19. Mukherjee, D., & D 'Souza, D. (2003). Think phased implementation for successful data warehousing. Information Systems Management, 20(2), 89-92. Peebles E. M. (2006). The world 's newest profession: Management consulting in the twentieth century. Harvard Business Review, 84(10), 34. Pfeffer, J, & Sutton, R. I. (January 2006). Evidence-based management. Harvard Business Review, 84(1), 63-74. Pinto, C., Arora, A., Hall, D., & Schnitz, D. (2006). Challenges to sustainable risk management: Case example in information network security. Engineering Management Journal, 18(1), 17. Price, J.L. (1997). Handbook of organizational measurement. International Journal of Manpower, 18(4-6), 303-333. Remenyi, D., & Money, A.H. (2000). The effective measurement and management of IT costs and benefits. Oxford, England: Boston, Butterworth-Heinemann. Scott, W. (2003). Organizations: Rational, natural, and open systems (5th ed). Upper Saddle River, NJ: Prentice Hall. Smith, E.W. (2001, January 8). Finding your niche in IT consulting. TechRepublic. Retrieved November 11, 2006, from http://techrepublic.com.com/51 00-6331-1028870.html. Stahl, B. (2004). Responsibility for information assurance and privacy: A problem of individual ethics. Journal of Organizational and End User Computing, 16(3), 59. Weill P., & Ross, J. (2004). IT governance: How top performers manage IT for superior results. Boston: Harvard Business School Press. Whiting, R. (2003, January 13). Warehouse worries. Information Week [Electronic version]. Retrieved October 31, 2006, from http://www.informationweek.com Williams, M.P Williams, R. (2004). Management fashions and fads: Understanding the role of consultants and managers in the evolution of ideas. Management Decision, 42(5-6), 769. Winters, F. (2002). The top 10 reasons projects fail. Retrieved November 20, 2006, from http://www.gantthead.com/ article.cfmID=l47229. Wright, S. & Wright, A. (2002). Information systems assurance for enterprise resources planning systems: Unique risk considerations. Journal of Information Systems, 16(1), 99-113.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Brown C V DeHayes D W Hoffer A J Martin E W Perkins W C 2009 Managing Information TechnologyBrown, C. V., DeHayes, D. W., Hoffer, A. J., Martin, E. W., & Perkins, W. C. (2009). Managing Information Technology (6th ed.). : Pearson Prentice Hall.…

    • 1832 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Polstra, R. M. (2005). A case study on how to manage the theft of information. Proceedings of the 2nd annual conference on Information security curriculum development (pp. 135-138). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Davidson, Mary Ann. Security Seminar. “Information Security.” Lecture. Chief Security Officer. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 16, 2001.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Powerful Essays

    Kim, David and Solomon, Michael G., 2012, Fundamentals of Information Systems Security, CH 7.p.235 and CH10. P.335.…

    • 1574 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    George Kennan Prompt

    • 415 Words
    • 2 Pages

    George F. Kennan's "Training for Statesmanship" (1953) characterizes America's distribution of power as unique, stating that unlike other nations, the “United States lacks a national uniformed police establishment functioning as the vehicle of a central political will." Kennan's most compelling observation is that power within the United States thrives in every aspect of American life---from the obvious courts of law to economic bodies, regardless of whether or not that is legal. This observation of how American power is allotted is critical to understanding why the United States remains the world's only superpower after the Cold War. While other countries harbor all of their power in the government, the United States has separated its strength into every pocket of American society in order to maximize its global influence both economically and socially.…

    • 415 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “No longer is IT just another tool the CEO might use to accomplish costs saving and operational ends. Today, information technology can help solve product problems, set new levels of service and create new distribution and communication channels.”…

    • 1414 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Innovation

    • 2282 Words
    • 10 Pages

    Kaplan, R. & Norton, D. (1996). The balanced scorecard: Translating strategy into action. Boston: Harvard Business School Press.…

    • 2282 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that…

    • 8174 Words
    • 33 Pages
    Better Essays