INFORMATION TECHNOLOGY GOVERNANCE DISCLOSURE COMPLIANCE OF JSE-LISTED COMPANIES

INFORMATION TECHNOLOGY GOVERNANCE DISCLOSURE COMPLIANCE OF JSE-LISTED COMPANIES

Information Technology (IT) plays a vital role in the operations of companies, easing most business processes. However, IT introduces unique risks for which governance is essential. The Johannesburg Stock Exchange (JSE) of listed companies are required to comply with the King Code of Governance 2009 (King III), including requirements related to IT, yet previous research indicated areas for improvement in compliance. This study determined the extent to which JSE-listed companies comply with the King III IT governance requirements by means of an empirical review of companies’ most recent financial reports, and found that not all businesses fully comply with these requirements. It is believed that this study will assist the Institute of Directors in Southern Africa, authors of the King reports, in clarifying the disclosure requirements of IT governance. These findings will benefit investors as agreement with governance is an important investment consideration. In addition, the present study clarifies compliance requirements of King III for companies’ management

___

  • Alkebsi, M., Aziz, K.A., Mohammed, Z.M. and Dhaifallah, B. (2014), “The
  • Relationship Between Information Technology Usage, Top Management Suppport And Internal Audit Effectiveness”, In International Management Accounting Conference VII:323-325. Amnseven. (2010), Managing organisation: The role of information technology in management,
  • Technology-in-Management#scribd, [Accessed 19.02.2015] http://www.scribd.com/doc/39672883/The.-Role-of-Information
  • Brisebois, R., Boyd, G. and Shadid, Z. (2009). “What is IT Governance? And why is it important for the IS auditor”, Toronto: INTO IT.
  • Curtin, D.P., Foley, K., Sen, K. and Morin, C. (1998), Information technology:
  • The breaking wave, USA: Irwin/McGraw Hill. Deloitte (2016), Chief Audit Executives cite skill gaps and lack of impact and influence as key concerns according to new Deloitte research report, survey-press-release.html, [Accessed 19/10/2016]
  • Ellingwood, C. (2011), The top 10 information security risks, http://www.berrydunn.com/news-details/top-10-information-security-risks, Accessed 11.12.2014]
  • Gompers, P.A., Ishii, J.L. and Metrick, A. (2001) “Corporate Governance and Equity Prices” National Bureau of Economic Research Working Paper 8449. Cambridge.
  • Gowell, M. and Anderson, R. (2012), Developing an effective internal audit technology strategy,
  • DownloadAsset.aspx?id=19472, [Accessed 3.10.2015] http://www.teammatesolutions.com/WorkArea/
  • Hall, J.A. (2011), Information technology auditing, 3rd International ed.,
  • Australia: South-Western Cengage Learning. Hirth, R.B. (2008), High value audits: An update on information technology auditing,
  • Audit/Protiviti_High_Value_Audits.pdf, [Accessed 3.10.2015]
  • Investordictionary (2016), http://www.investordictionary.com/definition/ secondary-listing, (Accessed 22.06.2016]
  • IODSA (Institute of Directors in Southern Africa) (2009), King code on governance principles for South Africa , https://c.ymcdn.com/sites/www.iodsa.co.za/ resource/collection/94445006
  • F18-4335-B7FB-7F5A8B23FB3F/King_III_Code for_Governance_Principles_.pdf, [Accessed 3.10.2015]
  • IODSA (Institute of Directors in Southern Africa) (2013), Practice note: King III reporting in terms of the JSE Listing Requirements, http://c.ymcdn.com/sites/ www.iodsa.co.za/resource/collection/24CB4885-33FA-4D34-BB84-E559E33
  • FF4E/King_III_reporting_in_terms_of_the_JSE_Listings_Requirements.pdf, Accessed 10.6.2016]
  • IODSA (Institute of Directors in Southern Africa) (2016), King Report on
  • Corporate Governance in SA, http://www.iodsa.co.za/?kingIII, [Accessed 10.2016]
  • IT governance network. (2013), IT Governance Defined, Accessed 19.02.2015]
  • Janse van Vuuren, H. (2006), Disclosing risk management policies in financial statements, North West University, Dissertation – MCom.
  • Jovarauskienė, D. and Pilinkienė, V. (2009), “E-Business or E-Technology?”,
  • Engineering Economics, 1 (61):83-89. JSE (Johannesburg Stock Exchange), (2012), JSE listing requirements – Service Issue 21.
  • KPMG, (2009), Corporate governance and King III, https://www.kpmg. com/ZA/en/IssuesAndInsights/ArticlesPublications/Tax-and-Legal-Publications/
  • Documents/Corporate%20Governance%20and%20King%203.pdf, 07.2015] Accessed
  • MacKechnie, C. (2015), Information Technology & Its Role in the Modern
  • Organization. Demand Media, technology-its-role-modern-organization-1800.html, [Accessed 19.02.2015] http://smallbusiness.chron.com/information
  • Marx, B. Van der Watt, A. and Bourne P. (2011), Dynamic Auditing, 10th ed., Durban: LexisNexis.
  • Mizoguchi, T. (2012), Information Technology Risks in Today’s Environment, diego/Documents/Seminars/SD_IIA___ISACA_Event_041112_Deloitte_IA_Top
  • _Ten_Risks.pdf, [Accessed 3.10.2015] https://chapters.theiia.org/san
  • Muwandi, T. (2010), Comparison of King III and King II, and the implications of
  • King III, http://scholar.sun.ac.za/handle/10019.1/8511, [Accessed: 20.03.2015]
  • Noraini, C.P., Bokolo, A., Rozi, N.H.N. and Masrah, A.A.M. (2015), “Risk assessment of IT governance: A systematic literature review”, Journal of theoretical and applied information technology, 17(2):184-193.
  • Oven, C., White, N., Katyal, V. and Henchock, S. (2012), Adding insight to audit:
  • Transforming Internal Audit through data analytics, http://www2.deloitte.com/ content/dam/Deloitte/us/Documents/audit/us-aers-adding-insight-pov-mobile- pdf, [Accessed 2.04.2015]
  • Pirta, R. and Strazdina, R. (2012), “Assessing the need of information technology control environment establishment”, Information Technology and Management Science, 15(1):99-104.
  • PwC (PricewaterhouseCoopers) (2015), King III, IT governance and your organisation, governance-and-kingiii-15.pdf, [Accessed 9.06.2016] https://www.pwc.co.za/en/assets/pdf/steeringpoint-kingiii-it
  • Rao, M. (2003), Enterprise IT Governance-The obvious step, 05.2015] Accessed
  • Roos, P. (2012), Service management and King
  • III, https://www.google.co.za/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&c ad=rja&uact=8&ved=0CBsQFjAAahUKEwiSyfL5nKbIAhVCVxQKHetgAUA& url=http%3A%2F%2Fwww.itsmf.org.za%2Findex.php%2F2013-03-12-07-35
  • %2Fsmexa-12%2Fpresentation-to-the-itsmf-pieter-roosv0-1d- pdf%3Fformat%3Draw&usg=AFQjCNHjfYPmk2ZSrKUzS3yxFpe- un2Gg&sig2=iUVWDm_lsf3Y8ekqOVCRNg&bvm=bv.104317490,d.d24, Accessed 18.07.2015]
  • Walker, D. & Meiring, I. (2010), King Code and developments in corporate governance,
  • WLB_2010-09_King_Code_and_Corporate_Governance.pdf, 06.2016] http://www.lib.uct.ac.za/usr/companylaw/downloads/legislation/ Accessed
  • Whittington, O.R. and Pany, K. (2006), Principles of auditing and other assurance services, Boston, MA: McGraw-Hill/Irwin.