Abstract
In recent years it has become questionable whether corporate boards are able to direct and control IT effectively. There seems to be a general lack of boardlevel information regarding IT which may lead to ineffective governance over it. The aim of this paper is to demonstrate how this scenario relates to the agency problem and how agency theory may be used to offer a theoretical framework for addressing IT-related issues more effectively at board level.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Kathleen M. Eisenhardt. Agency Theory: An Assessment and Review. Academy of Management Review, 14(1):57–74, 1989.
Gary Hardy. Using IT Governance and COBIT to Deliver Value with IT and Respond to Legal, Regulatory and Compliance Challenges. Information Security Technical Report: Legal, Regulatory and Compliance Aspects of Information Security, 11(1):55–61, 2006.
IT Governance Institute. IT Governance Domain Practices and Competencies: IT Alignment - Who Is in Charge?, 2005.
M. Jensen and W. Meckling. Theory of the firm: Management behaviour, agency costs, and ownership structure. Journal of Financial Economics, 3:305–360, 1976.
Richard Nolan and F. Warren McFarlan. Information Technology and the Board of Directors. Harvard Business Review, 2005.
Karen D. Schwartz. Abc: An introduction to it governance. [WWW document]. URL http://www.cio.com/article/111700, 2007.
R. Von Solms and S.H. Von Solms. Information security governance: A model based on the direct-control cycle. Computers and Security, 25:408––412, 2006.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Posthumus, S., von Solms, R. (2008). Agency Theory: Can it be Used to Strengthen IT Governance?. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_46
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_46
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)