Reading List
Corporate Governance of IT, Compliance, and Law
DLMIGCR01-01_E
Version: 2021-06-15
Reading Types
Basic Reading
This is the background literature selected for the course, the content of which is highly relevant
to the respective course. These texts are useful resources and likely worth the purchase if
required. Nevertheless, we strive to make as many of these titles as possible available through
our library.
Required Reading
In addition to further readings, required readings are selected for Master and MBA courses. These
readings are mandatory, and the content of these texts may be included in the exam. These
readings must be available from the IU online library.
Further Reading
These readings are designed to further students’ understanding of selected topics discussed in
the course book. Rather than addressing all unit content, these readings aim to introduce
students to further research and advanced discussions regarding specific topics. The further
readings, as with the basic readings, are recommended but not mandatory. These readings must
be available from the IU online library or available for free online.
Tip
All titles from the further reading are available online in the databases, unless otherwise
indicated. If titles from journals or edited volumes are not displayed correctly, please first enter
the journal or volume title in the search field and then select the desired article or chapter.
Should you have any problems logging into the library databases or accessing full texts, please
contact the library helpdesk: [email protected]
Basic Reading
Cervone, H. F. (2017). Implementing IT governance: A primer for informaticians. Digital Library
Perspectives, 33(4), 282—287.
3
Required Reading
Unit 1
Vicente, P., & da Silva, M. M. (2011). A business viewpoint for integrated IT governance, risk, and
compliance (pp. 422—428). 2011 IEEE World Congress on Services. IEEE.
Unit 2
ISACA. (2018). COBIT 2019 framework: Governance and management objectives. ISACA.
Unit 3
Dameri, R. (2009). Improving the benefits of IT compliance using enterprise management
information systems. Electronic Journal of lnformation Systems Evaluation, 12(1), 27—31.
Unit 4
Federal Office for Information Security. (2020). IT-Grundschutz-Compendium. Edition 2019 [IT
baseline security compendium. 2019 edition].
Unit 5
Lawes, A., Sansbury, J., Griffiths, R., & Brewster, E. (2016). IT service management: Support for your
ITSM foundation exam (3rd ed.). BCS Learning & Development Limited.
Unit 6
Katulić, T., & Protrka, N. (2019). Information security in principles and provisions of the EU data
protection law. 2019 42nd International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO) (pp. 1219—1225). IEEE.
Nyoni, P., Velempini, M., & Mavetera, N. (2021). Emerging internet technologies and the regulation
of user privacy. African Journal of Information Systems, 13(1), 1—32.
4
Further Reading
(All sources can be found in the library databases unless otherwise indicated.)
Unit 1
Monks, R., & Minow, N. (2011). Corporate governance (5th ed.). Wiley.
Unit 2
Braga, G. (2020, July 13). COBIT 2019 and the IIA 2019 guiding principles of corporate governance:
Two frameworks, many similarities. ISACA.
Harisaiprasad, K. (2020, April 27). COBIT 2019 and COBIT 5 comparison. ISACA.
Unit 3
Pereira, R., & da Silva, M. M. (2013). IT compliance management process modeling based on best
practices reference models and qualitative data (pp. 178—187). 2013 17th IEEE International
Enterprise Distributed Object Computing Conference Workshops. IEEE.
Unit 4
Awad, A. I., Yen, N., & Fairhurst, M. (2018). Information security: Foundations, technologies, and
applications. Institution of Engineering and Technology.
Hintzbergen, J., Hintzbergen, K., Smulders, A., & Baars, H. (2015). Foundations of information
security based on ISO27001 and ISO27002 (3rd ed.). Van Haren.
Nicho, M., Khan, S., & Rahman, M. S. M. K. (2017). Managing information security risk using
integrated governance risk and compliance (pp. 56—66). 2017 International Conference on
Computer Applications (ICCA). IEEE.
Unit 5
Smith, K. J. (2017). The practical guide to world-class IT service management. The Anima Group.
Unit 6
Nalivaychenko, E. V., Kirilchuk, S. P., Apatova, N. V., Skorobogatova, T. N., & Boychenko, O. V. (2018).
Managing intellectual property in information economy. Astra Salvensis, 711—722.
5
Strickler, M. (2020). Recent developments in privacy law. The Business Lawyer, 76(1), 269—281.