Skip to main content

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework

ISO / IEC 38500 IT Governance ^ Compliance

In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3). 

SMEs Linked to Measurable Successful Outcomes

With regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the three key pillars mentioned technology context of the enterprise, organizational context, and environmental context.

A O (n^2) Rate of Dangerous Change: Converting Target and Legacy Systems

On tangential rhetoric, a possible derivation of the collaborative research comments by Olutoyin and Flowerday is that the narrative of stakeholder involvement related to information technology governance frameworks and networking technology (link) implementations is quantifiable. In exposition, Satyam Tyagi (2016) reflecting that compromising a single low privilege user resulting in the entire Target enterprise compromised indicates Target not understanding legislative requirements for storage data involving integrating more secure systems and documentation for the legacy systems. Therefore, the worst-case is defending each low privilege user. The even worse case that should be replaced is probably a criminal hacker, a cracker, gaining access to any a parallelized system looping with the first loop getting the maximum user accounts then the inner loop injecting the malware used in the hack Tyagi reported in 2016: this is a worse case of n^2. Target’s situation contains similarity to Israel before Christ’s arrival regarding Achan (NIV, Jos 7:13). In response, Target would benefit from demarcating legacy systems that do not enable industry-standard security integrations (link). 

This is a sealed security vault
Image by 8385 on Pixabay

Anonymous. (2016). JOBS MARKET: Me and my job. SC Magazine, 27(6), 15. 
Holt, A. L., Safari Books Online (Firm), & Books24x7, I. (2013). Governance of IT: An executive guide to ISO/IEC 38500. Swindon, UK: BCS, The Chartered Institute for IT. Olutoyin, O., & Flowerday, S. (2016). Successful IT governance in SMES: An application of the technology-organisation-environment theory. South African Journal of Information Management, 18(1), 1-8. doi:http://0-


Popular posts from this blog

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security i

On Computer Organization and Architecture: the Hierarchy

On, Abirami Thangavel wrote Superscalar & VLIW Architectures: Characteristics, Limitations & Functions. Regarding parallel architectures, superscalar and VLIW, Thangavel wrote: In computer architecture, parallel processing refers to processing of multiple instructions of a program by distributing them among multiple processors. Superscalar and Very Long Instruction Word (VLIW) are parallel architectural models based on Flynn's Taxonomy. Both superscalar and VLIW architectures are capable of executing multiple instructions at one cycle. Each uses a different method for instruction scheduling. While superscalar processors execute instructions dynamically, VLIW uses static scheduling of program instructions.[1] Thangavel was saying this: on Flynn’s Taxonomy, superscalar and VLIW architectures are based, but they have differences. Therefore, on entity priorities, entities have different descriptive capabilities. As follows, a superscalar processor is this: a microproc

Resuming Pace: I Shall Not Be Pursuing a Second Bachelor's Degree

On May the 5th, 2021, I used a strong position deciding my pursuit of a second Bachelor’s degree: my choice was the University of Maryland Global Campus (UMGC, link ), but I decided to resume my Master’s program, by itself.  Let me explain with Scripture: the Gospel of Jesus Christ According to Matthew, specifically. In ancient times, records of a man called Jesus the Christ were written. Among these records was a Gospel, According to Matthew, of Jesus Christ. According to legend, Jesus Christ stated, “Blessed are the meek: for they shall inherit the earth (KJV, Matthew 5:5, link ).” Jesus the Christ was saying those who are submissive shall inherit the earth rather than those who are brash.  In my attempt at starting a second Bachelor’s program, I eventually realized I had been too pushy: I wanted the May 19th start date, and I wanted the admission process expedited, I wanted ease of access between majors, I wanted advantages to the application process because of what UMGC (I was gra

Contact Form


Email *

Message *