Browsing by Author "Sahd, Lize-Marie"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- ItemMobile technology risk management(Clute Institute, 2016) Sahd, Lize-Marie; Rudman, RiaanMobile technology is fast becoming an indispensable part of consumers’ lives and an essential business tool in improving productivity, streamlining business processes and remaining competitive. The mobile revolution is transforming business operations, but the pervasive nature of mobile technology also introduces new and significant risks into all areas of the businesses. In most businesses, however, the governance of mobile technology and its related risks is often disjointed and implemented in an ad hoc manner, resulting in all risks not being addressed. This lack of appropriate governance policies and procedures is a direct consequence of a lack of understanding of the technology and the speed at which new technologies are developed and adopted. If the risks are not addressed in a comprehensive manner, it could have severe consequences for a business. The objective of this research is to address this problem by using an appropriate control framework, Control Objectives for Information Technology (COBIT), to identify a comprehensive set of internal controls to address mobile technology risks at a governance, management and operational level. The research proposes a comprehensive set of internal controls which can be used by those charged with governance to manage each significant risk arising from the implementation of mobile technology.
- ItemSignificant risks relating relating to mobile technology(AOSIS Publishing, 2016) Sahd, Lize-MarieThe consumerisation of mobile technology is driving the large-scale adoption of mobile solutions in business models. Each component of mobile technology, however, introduces specific risks into the enterprise and those charged with governance are often unaware of all the risks they are exposed to. The research addresses this problem by using the processes of Control Objectives for Information and Related Technology (COBIT) to identify the significant risks introduced by mobile technology and linking these risks to the components of the technology. The resulting risk matrix determines an enterprise’s risk exposure given its mobile technology component landscape and identifies the most effective technology to deploy given the enterprise risk tolerance levels. The matrix also promotes improved alignment through the development of IT governance systems that correlate with business strategies and by using the understanding of IT capabilities to drive business strategies.
- ItemA structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level(Stellenbosch : Stellenbosch University, 2015-04) Sahd, Lize-Marie; Rudman, Riaan J.; Stellenbosch University. Faculty of Economic and Management Sciences. School of Accounting.ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.