The relationship between entity related corporate governance factors and the establishment of separate risk management committee in South Africa
- Authors: Sekome, Nkoko Blessy
- Date: 2014-06-10
- Subjects: Auditing - Data processing , Financial risk management - South Africa , Information technology - Risk assessment , Corporate governance - South Africa
- Type: Thesis
- Identifier: uj:11436 , http://hdl.handle.net/10210/11132
- Description: M.Com. (Computer Auditing) , This dissertation aims to explore the entity characteristics associated with the implementation of the board-level stand-alone risk management committee (RMC) in South Africa. We developed a battery of econometric models based on triangulation of corporate governance theories which linked an entity’s decision to set up a separate risk management committee (RMC) in its board structures as a dependent variable and a host of entity-specific factors as independent variables. Data collected from audited annual reports of 181 JSE-listed non-financial entities was analysed using logistics regression estimation procedures. Our results show a strong positive relationship between the likelihood that an entity would establish a separate RMC, on the one hand, and board independence, board size, entity size, and industry type, on the other. Our study fails to find support for the hypothesis that an entity’s characteristics – such as the independence of the board chairman, the use of Big Four audit firms, financial reporting risks, and levels of financial leverage – do influence an entity’s decision to form a separate RMC. Our findings emphasize the role that information asymmetry between executive and non-executive directors, agency cost and potential damage to reputation capital of directors; diversity in background, expertise, and skills of directors; economies of scale in absorbing RMC costs; and industry-specific institutions and norms play in an entity’s decision to form a separate RMC. The implication of our findings is that policy-makers should consider the size and composition of boards and also take cognizance of entity size and industry-specific idiosyncrasies in setting recommended corporate governance practices.
- Full Text:
Engineering approach to risk management in information technology systems
- Authors: Seker, Harun
- Date: 2012-09-10
- Subjects: Risk management , Information technology - Risk assessment , Engineering - Risk assessment
- Type: Thesis
- Identifier: uj:9835 , http://hdl.handle.net/10210/7239
- Description: M.Phil. , The use of information systems has increased dramatically after the emergence of internet. Individuals, companies and organizations are becoming increasingly dependent on IT systems. Before technology and computers became such an important part of society, it was difficult to manage and control large organizations. Today computers enable the effective and efficient management of large organizations, therefore allowing them to spread throughout the country and world. Businesses are following latest advances in this era to remain competitive in the changing global market place. They use computers, automated IT systems and networks to gather, store, retrieve, process, and analyze information as well as to trade and communicate. The rapid advances in computer technology are largely a result of the research, development and design efforts of computer engineers. There is a direct correlation between a nation's wealth and scientific and technological capacity. The most effective way of taking our country forward is to enthuse our youth for science and technology. As the world makes rapid, sometimes breathtaking strides in the diverse fields of science and technology, South Africa more than ever needs qualified individuals who will use their skills and entrepreneurial spirit to enable our country to complete internationally with the best. However, Information systems and networks and their worldwide increasing usage have been accompanied by new and increasing risks. Data and information stored on and transmitted over information technology systems and networks are subject to threats from various means of unauthorized access, such as misuse, misappropriation, alteration, malicious code transmissions, denial of service or destruction and require appropriate safeguards. This research report will aim to emphasize the importance of risk management and its three activities; risk assessment, risk mitigation and evaluation and assessment. It will focus on activities that deal with the solution of problems through logical thinking, information system management This report will also deal with a case study that gives us real life examples of risk management experiences of one local computer hardware and software supplier companies. Information has become valuable assets that need to be protected after moving to a digital era and E-commerce. Protecting information can also be as critical as protecting other resources like money and physical assets.
- Full Text: