0% found this document useful (0 votes)
104 views6 pages

DLMIGCR01-01 - E - Reading List

This document provides a reading list for a course on corporate governance of IT, compliance, and law. It divides the readings into three categories: basic readings which provide background on the course topics, required readings which are mandatory parts of the course curriculum, and further readings which offer additional perspective on specific course units. The document lists relevant titles for each unit and provides tips for accessing readings through the university library databases.

Uploaded by

Pabitra Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views6 pages

DLMIGCR01-01 - E - Reading List

This document provides a reading list for a course on corporate governance of IT, compliance, and law. It divides the readings into three categories: basic readings which provide background on the course topics, required readings which are mandatory parts of the course curriculum, and further readings which offer additional perspective on specific course units. The document lists relevant titles for each unit and provides tips for accessing readings through the university library databases.

Uploaded by

Pabitra Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Reading List

Corporate Governance of IT, Compliance, and Law


DLMIGCR01-01_E

Version: 2021-06-15
Reading Types
Basic Reading

This is the background literature selected for the course, the content of which is highly relevant
to the respective course. These texts are useful resources and likely worth the purchase if
required. Nevertheless, we strive to make as many of these titles as possible available through
our library.

Required Reading

In addition to further readings, required readings are selected for Master and MBA courses. These
readings are mandatory, and the content of these texts may be included in the exam. These
readings must be available from the IU online library.

Further Reading

These readings are designed to further students’ understanding of selected topics discussed in
the course book. Rather than addressing all unit content, these readings aim to introduce
students to further research and advanced discussions regarding specific topics. The further
readings, as with the basic readings, are recommended but not mandatory. These readings must
be available from the IU online library or available for free online.

Tip

All titles from the further reading are available online in the databases, unless otherwise
indicated. If titles from journals or edited volumes are not displayed correctly, please first enter
the journal or volume title in the search field and then select the desired article or chapter.
Should you have any problems logging into the library databases or accessing full texts, please
contact the library helpdesk: [email protected]
Basic Reading

Cervone, H. F. (2017). Implementing IT governance: A primer for informaticians. Digital Library


Perspectives, 33(4), 282—287.

3
Required Reading
Unit 1

Vicente, P., & da Silva, M. M. (2011). A business viewpoint for integrated IT governance, risk, and
compliance (pp. 422—428). 2011 IEEE World Congress on Services. IEEE.

Unit 2

ISACA. (2018). COBIT 2019 framework: Governance and management objectives. ISACA.

Unit 3

Dameri, R. (2009). Improving the benefits of IT compliance using enterprise management


information systems. Electronic Journal of lnformation Systems Evaluation, 12(1), 27—31.

Unit 4

Federal Office for Information Security. (2020). IT-Grundschutz-Compendium. Edition 2019 [IT
baseline security compendium. 2019 edition].

Unit 5

Lawes, A., Sansbury, J., Griffiths, R., & Brewster, E. (2016). IT service management: Support for your
ITSM foundation exam (3rd ed.). BCS Learning & Development Limited.

Unit 6

Katulić, T., & Protrka, N. (2019). Information security in principles and provisions of the EU data
protection law. 2019 42nd International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO) (pp. 1219—1225). IEEE.

Nyoni, P., Velempini, M., & Mavetera, N. (2021). Emerging internet technologies and the regulation
of user privacy. African Journal of Information Systems, 13(1), 1—32.

4
Further Reading
(All sources can be found in the library databases unless otherwise indicated.)

Unit 1

Monks, R., & Minow, N. (2011). Corporate governance (5th ed.). Wiley.

Unit 2

Braga, G. (2020, July 13). COBIT 2019 and the IIA 2019 guiding principles of corporate governance:
Two frameworks, many similarities. ISACA.

Harisaiprasad, K. (2020, April 27). COBIT 2019 and COBIT 5 comparison. ISACA.

Unit 3

Pereira, R., & da Silva, M. M. (2013). IT compliance management process modeling based on best
practices reference models and qualitative data (pp. 178—187). 2013 17th IEEE International
Enterprise Distributed Object Computing Conference Workshops. IEEE.

Unit 4

Awad, A. I., Yen, N., & Fairhurst, M. (2018). Information security: Foundations, technologies, and
applications. Institution of Engineering and Technology.

Hintzbergen, J., Hintzbergen, K., Smulders, A., & Baars, H. (2015). Foundations of information
security based on ISO27001 and ISO27002 (3rd ed.). Van Haren.

Nicho, M., Khan, S., & Rahman, M. S. M. K. (2017). Managing information security risk using
integrated governance risk and compliance (pp. 56—66). 2017 International Conference on
Computer Applications (ICCA). IEEE.

Unit 5

Smith, K. J. (2017). The practical guide to world-class IT service management. The Anima Group.

Unit 6

Nalivaychenko, E. V., Kirilchuk, S. P., Apatova, N. V., Skorobogatova, T. N., & Boychenko, O. V. (2018).
Managing intellectual property in information economy. Astra Salvensis, 711—722.

5
Strickler, M. (2020). Recent developments in privacy law. The Business Lawyer, 76(1), 269—281.

You might also like