Drivers for the maturity of integrated governance in organizations-An empirical investigation

被引:1
|
作者
d'Arcy, Anne [1 ]
Eulerich, Marc [2 ]
机构
[1] WU Vienna Univ Econ & Business, Welthandelspl 1, A-1020 Vienna, Austria
[2] Univ Duisburg Essen, Chair Internal Auditing, Mercator Sch Management, Duisburg, Germany
关键词
assurance services; enterprise risk management; integrated governance maturity; three lines (of defense) model; RISK-MANAGEMENT; INTERNAL AUDIT; ASSURANCE SERVICES; INSIGHTS; DEFENSE;
D O I
10.1111/ijau.12338
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
This paper sheds light on the factors driving the maturity levels of integrated governance by analysing survey responses from 148 companies that reported on their efforts to coordinate and align their separated assurance functions. When an organization's assurance functions lack coordination, it can lead to challenges like isolated risk functions, incomplete risk coverage and redundant controls. Integrated governance aims to incorporate and optimize on organization's assurance functions to support an effective risk control environment and the integrity of information used by management and the governing bodies. Despite this goal, research indicates that no organization has achieved a mature level of integrated governance yet. To address this research gap, we identify key drivers for integrated governance maturity such as the awareness of integrated governance within the organization, the implementation of the Three Lines (of Defense) Model and the maturity levels of subsystems, that is, the risk management function and the internal control system.
引用
收藏
页码:485 / 499
页数:15
相关论文
共 50 条
  • [1] Improvisation and Learning in Organizations-An Opportunity for Future Empirical Research
    Vendelo, Morten Thanning
    [J]. MANAGEMENT LEARNING, 2009, 40 (04) : 449 - 456
  • [2] Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
    Bahuguna, Ashutosh
    Bisht, R. K.
    Pande, Jeetendra
    [J]. INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 164 - 177
  • [3] Towards sustainable sustainability: exploring the impact of antecedents on industry 4.0 and sustainable performance of organizations-an empirical investigation
    Reza, Mohammad Nurul Hassan
    Jayashree, Sreenivasan
    Malarvizhi, Chinnasamy Agamudai
    Gunasekaran, Angappa
    Mohiuddin, Muhammad
    [J]. ANNALS OF OPERATIONS RESEARCH, 2024,
  • [4] An empirical investigation of the drivers of software outsourcing decisions in Japanese organizations
    Bush, Ashley A.
    Tiwana, Amrit
    Tsuji, Hiroshi
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2008, 50 (06) : 499 - 510
  • [5] The Internalization of Participation and Coherence Dimensions of Governance in Tourism Destination Management Organizations-An Exploratory Approach
    Bono i Gispert, Octavi
    Anton Clave, Salvador
    Casadesus Fa, Marti
    [J]. SUSTAINABILITY, 2023, 15 (03)
  • [6] A Capability Maturity Framework for IT Security Governance in Organizations
    Maleh, Yassine
    Sahid, Abdelkbir
    Ezzati, Abdellah
    Belaissaoui, Mustapha
    [J]. INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 221 - 233
  • [7] An Empirical Investigation on Integrated Waqf Governance in Malaysian Waqf Institutions
    Zulkifli, Nursyahida
    Ismail, Mohd Nasir
    Osman, Ghazali
    Ambali, AbdulRauf
    [J]. ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2022, 7 (22): : 3 - 8
  • [8] Data Governance Maturity Model for Micro Financial Organizations in Peru
    Rivera, Stephanie
    Loarte, Nataly
    Raymundo, Carlos
    Dominguez, Francisco
    [J]. ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3, 2017, : 203 - 214
  • [9] Assessment of IT governance in organizations: A simple integrated approach
    Bin-Abbas, Hesham
    Bakry, Saad Haj
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2014, 32 : 261 - 267
  • [10] Information security governance in Saudi organizations: An empirical study
    Abu-Musa A.
    [J]. Information Management and Computer Security, 2010, 18 (04): : 226 - 276