CO Bit 5
CO Bit 5
ﻳﺭ
ﻳﺛﺔ
ﻓﻲ ﺗﻘﻧﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﺭﻓﺔ ﺍﻟﺣﺩﻳﺛ
ﺍﻟﻣﺳﺎﻫﻣﺔ
ﺔ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ
ﻑ ﺩﺭﺍﺳﺔ ﺗﻁ
ﻁﺑﻳﻘﻳﺔ ﻓﻲ
ﺍﻟﺧﺎﺻﺔ"
Impacct of CO OBIT5 Framewo ork
Applica
A ation in
n Modern Bankking
Tech
hniquess
"A plied Study in Iraqi Prrivate
An App
"hareholding Banks
Sh
ﺷﻔﻴﻖ ﺍﻟﺒﺼﺮﻱ
ﺃ.ﺩ .ﻋﺒﺪ ﺍﻟﺮﺿﺎ ﻖ
ﺳﺮ ﷴ ﺍﻟﺒﺎﺣﺚ ﻋﺪﻧﺎﻥ ﻳﺎﺳ
ﺚ
ﺍﻟﻮﺳﻄﻰ
ﻰ ﺠﺎﻣﻌﺔ ﺍﻟﺘﻘﻨﻴﻴﺔ
ﺍﻻﺩﺍﺭﻳﺔ _ﺑﻐﺪﺍﺩ/ﺍﻟﺠ
ﺔ ﺍﻟﻜﻠﻴﺔ ﺍﻟﺘﻘﻨﻨﻴﺔ
ﺗﺎﺛﻴﺮ ﺗﻄﺒﻴﻖ ﻋﻤﻞ COBIT5ﻓﻲ ﺗﻘﻨﻴﺎﺕ ﺍﻟﺼﻴﺮﻓﺔ ﺍﻟﺤﺪﻳﺜﺔ ﺩﺭﺍﺳﺔ ﺗﻄﺒﻴﻘﻴﺔ ﻓﻲ ﺍﻟﻤﺼﺎﺭﻑ ﺍﻟﻌﺮﺍﻗﻴﺔ ﺍﻟﻤﺴﺎﻫﻤﺔ ﺍﻟﺨﺎﺻﺔ
ﺍﻟﻤﺴﺘﺨﻠﺺ
ﻟ ﺟﺎ ﺔ ﺗ ﻓﻲ ﺣ ﻓ ﻟﻠ ﻹ ﺎر ﻋ ﻞ COBIT5أداة رﻗﺎﺑ ﺔ ﻓﻌﺎﻟﺔ اﻻﺻ ار اﻟ ﺎﻣ ﻞ ﺗ
ﻓﻲ اداء اﻻﻋ ﺎل واﻟ اﻓ ا ﻬﻞ اﻟ واﻻﻣ ،وﻫ ا ﻣ ﺷﺄﻧﻪ ﻓﻲ اﻻﻣ ﺎل وادارة اﻟ ﺎ اﻟ ﻌﻠ ﻣﺎت اﻟ ﺳ ﺔ واﻟﻌﺎﻣﻠ
وﻓ ص اﻟﻔ ﻞ اﻟ ﻲ ﺗ اﺟﻬﻬﺎ ادارة ﺣ ل ز ﺎدة اﻟ ﺎ رت ﻣ ﻠﺔ اﻟ ﻠ ﺎت اﻟ اﺧﻠ ﺔ واﻟ ﺎرﺟ ﺔ ،وﻗ ﺗ ﻣﻊ اﻟ
إ ﺎر ﻋ ﻞ COBIT5ﻓﻲ ﺗﺎﺛ ام ﻣ اﻟﻰ ﺑ ﺎن اﺳ ﺔ اﻋ ﺎدﻫﺎ اﻟ ﻘ ﺎت اﻟ ﯾ ﺔ ،ﻟ ﻟ ﯾﻬ ف اﻟ ﺎرف ﻧ اﻟ
ﺎﻫ ﺔ اﻟ ﺎﺻﺔ اﻟ رﺟﺔ ﻓﻲ ﺳ ق اﻟﻌ اق ﻟﻸوراق اﻟ ﺎﻟ ﺔ ،وﻗ ﺻ ﻐ ﺎرف اﻟﻌ ا ﺔ اﻟ ﻓﺔ اﻟ ﯾ ﺔ ﻓﻲ اﻟ ﺗﻘ ﺎت اﻟ
ﻓﺎً ،واﻻداة ) (٢٥ﻣ ﻓﺎً ،وﺗ اﻻﻋ ﺎد ﻋﻠﻰ ﻋ ﺔ ﺑﻠﻐ ﻊ ﯾ ﻠﻎ ) (٣٧ﻣ ﻋﻠﻰ ﻣ ﺎن ،و ﻘ ﻓ ﺿ ﺎن رﺋ ﻟﻠ
ام ﺑ ﻧﺎﻣﺞ اﻟ ﻣﺔ اﻻﺣ ﺎﺋ ﺔ ﻟﻠﻌﻠ م ( وﻟﻠ ﺎم ﺑ ﻠ ﻠﻬﺎ اﺣ ﺎﺋ ﺎ ،ﺗ اﺳ )ﻗﺎﺋ ﺔ ﻓ ﻣﺔ ﻟ ﻊ ﺑ ﺎﻧﺎت اﻟ اﻟ
ﺎر ،ﻣﻌﺎﻣﻞ ﺎﺑﻲ ،اﻻﻧ اف اﻟ ﻋﺔ ﻣ اﻻدوات اﻻﺣ ﺎﺋ ﺔ ) اﻟ ﺳ اﻟ ام ﻣ اﻻﺟ ﺎ ﺔ ) ،(SPSS-19وﺗ اﺳ
اﻟﻰ ﻋ د ﻣ اﻻﺳ ﺎﺟﺎت ﯾ ،( R2وﺗ ﺻﻞ اﻟ ﺔ ،اﺧ ﺎر ، Tاﺧ ﺎر ، Fﻣﻌﺎﻣﻞ اﻟ اﻻﺧ ﻼف ،اﻻﻫ ﺔ اﻟ
ﻓﺔ اﻟ ﯾ ﺔ ،أﺿﺎﻓﺔ إﻟﻰ أن ﺗ ذات دﻻﻟﺔ اﺣ ﺎﺋ ﺔ ﻹ ﺎر ﻋ ﻞ COBIT5ﻓﻲ ﺗﻘ ﺎت اﻟ اﻫ ﻬﺎ ،ﺗ ﺟ ﻋﻼﻗﺔ ﺗﺄﺛ
وﺗ اﻟﻔ اﺋ ،ﺗ ﺔ ﻣ ﺧﻼل ﺗ ﺎرف ﻷﻧ ﺎء إ ﺎر ﻋ ﻞ COBIT5ﻛﺎداة رﻗﺎ ﺔ داﺧﻠ ﺔ ﺳﺎﻋ ت اﻟ
،ﺿ ورة أﻫ ﺎم ﻠ ﺔ ،وﻣ اﺑ ز ﺗ ﺻ ﺎت اﻟ ام اﻻﻣ ﻞ ﻟﻠ ارد ،واﻟ ﻔﺎ ﺔ واﻻﻓ ﺎح ﻷﺻ ﺎب اﻟ واﻻﺳ اﻟ ﺎ
ف، ﺔ ﻟﻠ ﺎ ﯾ اءم ﻣﻊ اﻻﻫ اف اﻻﺳ اﺗ واﻟﻌ ﺎ ﺔ ﺎﺟﺔ اﻟﻰ اﻟ اﻟ ﻲ
ﺎﻫ ﺔ اﻟ ﺎﺻﺔ. ﺎرف اﻟ ﻓﺔ اﻟ ﯾ ﺔ ،اﻟ اﻟ ﻠ ﺎت اﻟ ﻔ ﺎﺣ ﺔ :إ ﺎر ﻋ ﻞ ، COBIT5ﺗﻘ ﺎت اﻟ
_______________________________________________________________
internal and external requirements, the problem of the search centered on increased risks and
opportunities for failure The management of banks as a result of the adoption of modern
technologies, so the search aims to demonstrate the use of the level of the impact of the
framework (COBIT5) in the techniques of modern banking in the Iraqi private banks listed in the
Iraqi market for securities, The research has formulated two main hypotheses, and applied to a
community of (37) banks, a sample of (25) banks was relied on, and the tool used to collect the
study data (checklist) and to analyze them statistically, was used(SPSS-19), Of the statistical tools
(arithmetic mean, standard deviation, coefficient of difference, relative importance, test T, test F,
determination coefficient R2), the search reached a number of conclusions, the most important,
there is a statistically significant impact of the framework (COBIT5) in modern banking
techniques In addition, the implementation of the (COBIT5) framework as an internal control
tool has helped banks The most important recommendations of the search are the importance of
banking management in following up and supervising the application of the COBIT5 framework
properly, identifying the areas of the COBIT5 framework that need to be improved and taken care
of. Aligns with the Bank's strategic objectives,
ﻣﻧﻬﺟﻳﺔ ﺍﻟﺑﺣﺙ
-٢ﻣﺩﻯ ﺗﺄﺛﻳﺭ ﺗﻁﺑﻳﻖ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﻟﻠﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻓﻲ ﺇﺟﺭﺍءﺍﺕ ﻭﺍﻧﺷﻁﺔ ﺍﻟﻣﺻﺎﺭﻑ؟
-٣ﻣﺩﻯ ﺗﺄﺛﻳﺭ ﺇﻁﺎﺭ ﺍﻟﺣﻭﻛﻣﺔ ﻭﺍﻻﻧﺷﻁﺔ ﺍﻟﺭﻗﺎﺑﻳﺔ ؟ ﻭﻛﻳﻑ ﻳﻣﻛﻥ ﺃﻥ ﻳﺅﺛﺭ ﻭﺟﻭﺩﻩ ﻓﻲ ﺇﺟﺭﺍءﺍﺕ ﻭﺍﻧﺷﻁﺔ ﺍﻟﻣﺻﺎﺭﻑ ﺑﺎﺳﺗﺧﺩﺍﻡ
ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ ؟
ﺛﺎﻧﻳﺎ ً :ﺃﻫﻣﻳﺔ ﺍﻟﺑﺣﺙ Research Importance
-١ﺗﺑﺭﺯ ﺃﻫﻣﻳﺔ ﺍﻟﺑﺣﺙ ﻣﻥ ﺃﻫﻣﻳﺔ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻓﻲ ﺑﻳﺋﺔ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ ،ﻭﺫﻟﻙ ﻣﻥ ﺧﻼﻝ ﺍﻟﻧﻅﺎﻡ ﺍﻟﺭﻗﺎﺑﻲ ﻹﻁﺎﺭ ﻋﻣﻝ
COBIT5ﺑﻣﺟﺎﻻﺗﻪ ﻟﻣﺎ ﻟﻪ ﻣﻥ ﺩﻭﺭ ﻓﻲ ﻣﺳﺎﻋﺩﺓ ﺍﻟﻣﺩﻳﺭﻳﻥ ﻭﺍﻟﻣﺩﻗﻘﻳﻥ ﻭﺍﻟﻣﺳﺗﺧﺩﻣﻳﻥ ﻓﻲ ﻓﻬﻡ ﺃﻧﻅﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ،
ﻭﻓﻲ ﺗﺣﻘﻳﻖ ﺍﻟﺗﻭﺍﺯﻥ ﺑﻳﻥ ﺍﻟﻣﺧﺎﻁﺭ ﻭﺃﻧﺷﻁﺔ ﺍﻟﺭﻗﺎﺑﺔ ،ﻭﺗﻭﻓﻳﺭ ﻣﺳﺗﻭﻯ ﺟﻳﺩ ﻣﻥ ﺍﻷﻣﺎﻥ ﻭﺣﻣﺎﻳﺔ ﺍﻷﺻﻭﻝ.
-٢ﺗﺑﺭﺯ ﺃﻫﻣﻳﺔ ﺍﻟﺑﺣﺙ ﻣﻥ ﺧﻼﻝ ﺩﻭﺭ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﻟﻠﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻓﻲ ﻣﺳﺎﻋﺩﺓ ﺍﻟﻣﺻﺎﺭﻑ ﻋﻠﻰ ﺗﺻﻣﻳﻡ ﻧﻅﺎﻡ ﺭﻗﺎﺑﺔ
ﺩﺍﺧﻠﻲ ﻳﺳﺎﻋﺩﻫﺎ ﻋﻠﻰ ﺍﻻﺳﺗﺟﺎﺑﺔ ﺍﻟﺳﺭﻳﻌﺔ ﻟﻠﺗﻁﻭﺭﺍﺕ ﻓﻲ ﺍﻟﺑﻳﺋﺔ ﺍﻷﻗﺗﺻﺎﺩﻳﺔ ﺍﻟﺗﻲ ﺗﻌﻣﻝ ﺑﻬﺎ ،ﻭﻳﺳﻬﻡ ﻓﻲ ﺗﺣﻘﻳﻖ ﺃﻫﺩﺍﻓﻬﺎ ﻭﺫﻟﻙ
ﺑﺎﺧﺫ ﺍﻟﻣﺧﺎﻁﺭ ﺍﻟﻣﺭﺍﻓﻘﺔ ﺑﻧﻅﺭ ﺍﻻﻋﺗﺑﺎﺭ .
-٣ﺗﺑﺭﺯ ﺃﻫﻣﻳﺔ ﺍﻟﺑﺣﺙ ﻣﻥ ﺧﻼﻝ ﺍﻟﺗﻁﻭﺭﺍﺕ ﺍﻟﺗﻲ ﺷﻬﺩﻫﺎ ﺍﻟﺑﻠﺩ ،ﻭﺑﻳﺎﻥ ﻣﺩﻯ ﺿﺭﻭﺭﺓ ﺃﺗﺑﺎﻉ ﻭﺗﻁﺑﻳﻖ ﻧﻅﺎﻡ ﺭﻗﺎﺑﻲ ﺩﺍﺧﻠﻲ ﻭﻓﻖ ﺇﻁﺎﺭ
ﻋﻣﻝ COBIT5ﻗﺎﺩﺭ ﻋﻠﻰ ﺗﺣﻘﻳﻖ ﺍﻫﺩﺍﻑ ﺍﻟﻣﺻﺎﺭﻑ ﻓﻲ ﻭﺻﻭﻟﻬﺎ ﺍﻟﻰ ﺍﻟﻣﻳﺯﻩ ﺍﻟﺗﻧﺎﻓﺳﻳﺔ ﻭﺍﻟﺗﻧﻣﻳﺔ ﺍﻟﻣﺳﺗﺩﺍﻣﺔ.
ﺛﺎﻟﺛﺎ ً :ﺃﻫﺩﺍﻑ ﺍﻟﺑﺣﺙ Research Objectives
-١ﺑﻳﺎﻥ ﻣﺩﻯ ﺗﻁﺑﻳﻖ ﻭﺗﺑﻧﻲ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ ﺍﻟﻣﺳﺎﻫﻣﺔ ﺍﻟﺧﺎﺻﺔ ﻹﻁﺎﺭ ﻋﻣﻝ COBIT5ﺑﻣﺟﺎﻻﺗﻪ ﺍﻟﺧﻣﺳﺔ .
-٢ﻗﻳﺎﺱ ﺗﺄﺛﻳﺭ ﺗﻁﺑﻳﻖ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﺑﻣﺟﺎﻻﺗﻪ ﺍﻟﺧﻣﺳﺔ ﻋﻠﻰ ﺃﺟﺭﺍءﺍﺕ ﻭﺍﻧﺷﻁﺔ ﺍﻟﻣﺻﺎﺭﻑ ﻓﻲ ﻅﻝ ﺍﻟﺑﻳﺋﺔ ﺍﻟﻌﺭﺍﻗﻳﺔ
ﻭﺍﻟﺗﻌﺭﻑ ﻋﻠﻰ ﻁﺑﻳﻌﺔ ﻫﺫﺍ ﺍﻟﺗﺄﺛﻳﺭ ﻭﺍﺗﺟﺎﻫﻪ.
-٣ﺗﺣﺩﻳﺩ ﻭﺑﻳﺎﻥ ﺩﻭﺭ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﻓﻲ ﺗﺭﺷﻳﺩ ﺍﻟﺣﻭﻛﻣﺔ ﻭﺍﺟﺭﺍءﺍﺕ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻓﻲ ﻅﻝ ﺍﻟﺗﻘﻧﻳﺎﺕ ﺍﻟﺣﺩﻳﺛﺔ
ﺑﺎﺳﺗﺧﺩﺍﻡ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ ﻟﻠﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ ﺍﻟﻣﺳﺎﻫﻣﺔ ﺍﻟﺧﺎﺻﺔ.
ﺭﺍﺑﻌﺎ ً :ﺍﻟﻣﺧﻁﻁ ﺍﻟﻔﺭﺿﻲ ﻟﻠﺑﺣﺙ The Default Chart of the Research
ﻗﺎﻋﺪﺓ ﺍﻟﺒﻴﺎﻧﺎﺕ
ﺍﻟﻤﻮﺍﺭﺩ ﺍﻟﺒﺸﺮﻳﺔ ﺍﻟﺘﻮﺻﻴﻞ ،ﺍﻟﺨﺪﻣﺔ ﻭﺍﻟﺪﻋﻢ
)ﺍﻻﻓﺮﺍﺩ(
ﺍﻟﻤﺮﺍﻗﺒﺔ ،ﺍﻟﺘﻘﻴﻴﻢ ﻭﺍﻟﻘﻴﺎﺱ
ﻋﻼﻗﺔ ﺗﺄﺙ
ﻋﺩﺩ ﺍﻟﻣﺗﻐﻳﺭ
ﺍﻟﻣﺻﺩﺭ ﺍﻟﻣﻌﺗﻣﺩ ﺍﻻﺑﻌﺎﺩ
ﺍﻟﻔﻘﺭﺍﺕ ﺍﻟﺭﺋﻳﺳﻲ
ﻣﻥ ﺃﻋﺩﺍﺩ ﺍﻟﺑﺎﺣﺙ 11 ﺃﺳﻡ ﺍﻟﻣﺻﺭﻑ ،ﺗﺎﺭﻳﺦ ﺍﻟﺗﺎﺳﻳﺱ ،ﺭﺃﺱ ﻣﺎﻝ ﺍﻟﻣﺻﺭﻑ ،ﻋﺩﺩ ﺍﻟﻣﻭﻅﻔﻳﻥ ،ﻋﺩﺩ ﺍﻟﺩﻭﺭﺍﺕ
ﺍﻟﻣﻘﺎﻣﺔ ﺳﻧﻭﻳﺎ ً ﻓﻲ ﺍﻟﺣﺎﺳﻭﺏ ﻭﺑﺭﺍﻣﺟﺔ ،ﻣﺳﺗﻭﻯ ﻗﻁﺎﻉ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻓﻲ ﺍﻟﻣﺻﺭﻑ ، ﺍﻟﺑﻳﺎﻧﺎﺕ
ﻣﺳﺗﻭﻯ ﻗﻁﺎﻉ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻓﻲ ﺍﻟﻣﺻﺭﻑ ،ﺍﻟﻣﺳﻣﻰ ﺍﻟﻭﻅﻳﻔﻲ ،ﺳﻧﻭﺍﺕ ﺍﻟﺧﺑﺭﺓ، ﺍﻟﺷﺧﺻﻳﺔ
ﺍﻻﺧﺗﺻﺎﺹ ،ﺗﺻﻧﻳﻑ ﺍﻟﻣﺻﺭﻑ ﻭﻓﻘﺎ ً ﻟﻠﺑﻧﻙ ﺍﻟﻣﺭﻛﺯﻱ ﺍﻟﻌﺭﺍﻗﻲ
15 ﺍﻟﺗﻘﻳﻳﻡ ،ﺍﻟﺗﻭﺟﻳﻪ ﻭﺍﻟﻣﺭﺍﻗﺑﺔ )Evaluate, Direct and Monitor (EDM
)ﻋﻘﻝ ،ﷴ ﻋﻘﻝ(٢٠١٢ ، 3 .١ﺿﻣﺎﻥ ﺇﻋﺩﺍﺩ ﻭﺗﺣﺩﻳﺙ ﺍﻹﻁﺎﺭ ﺍﻟﻌﺎﻡ ﻟﺣﻭﻛﻣﻪ ﺗﻛﻧﻭﺍﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
)ﺍﻟﻌﺑﻳﺩﻱ(٢٠١٤، 3 .٢ﺿﻣﺎﻥ ﺗﺣﻘﻳﻖ ﺍﻟﻔﻭﺍﺋﺩ
(Lobbad , )2014 3 .٤ﺇﺩﺍﺭﺓ ﺍﻟﺗﻭﺍﻓﺭﻳﺔ ﻭﺍﻟﻁﺎﻗﺔ ﺍﻻﺳﺗﻳﻌﺎﺑﻳﺔ ﺇﻁﺎﺭ ﻋﻣﻝ
.٥ﺇﺩﺍﺭﺓ ﺗﻣﻛﻳﻥ ﺍﻟﺗﻐﻳﻳﺭ ﺍﻟﻣﺅﺳﺳﻲ COBIT5
(Alramahi et al 3
.٦ﺇﺩﺍﺭﺓ ﺍﻟﺗﻌﺩﻳﻼﺕ
(Kovela & )٤,201 3
.٧ﺇﺩﺍﺭﺓ ﻗﺑﻭﻝ ﺍﻟﺗﻌﺩﻳﻝ ﻭﺍﻟﺗﺣﻭﻻﺕ
)Skok, 2015 3
ﺇﺩﺍﺭﺓ ﺍﻟﻣﻌﺭﻓﺔ .٨
3
ﺇﺩﺍﺭﺓ ﺍﻟﻣﻭﺟﻭﺩﺍﺕ .٩
3
.١٠ﺇﺩﺍﺭﺓ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
3
20
ﻏﻳﺭ ﻣﻌﻧﻭﻱ
0.949 0.521 ﺍﺑﻌﺎﺩ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ
)ﻳﺗﻭﺯﻉ ﻁﺑﻳﻌﻳﺎ ً(
-٤ﺍﻟﺣﺩﻭﺩ ﺍﻟﺑﺷﺭﻳﺔ :ﺍﺗﻣﺎﻡ ﺍﻧﺟﺎﺯ ﻓﻘﺭﺍﺕ ﻗﺎﺋﻣﺔ ﺍﻟﻔﺣﺹ ﺳﻳﻛﻭﻥ ﻣﻊ ﺍﻟﻣﺳﺅﻭﻟﻳﻥ ﻭﺍﻟﻘﺎﺋﻣﻳﻥ ﻋﻠﻰ ﻧﻅﺎﻡ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻭﻣﺳﺅﻭﻟﻲ
) (ITﻓﻲ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ ﺍﻟﻣﺳﺎﻫﻣﺔ ﺍﻟﺧﺎﺻﺔ ﺍﻟﻣﺩﺭﺟﺔ ﻓﻲ ﺳﻭﻕ ﺍﻟﻌﺭﺍﻕ ﻟﻸﻭﺭﺍﻕ ﺍﻟﻣﺎﻟﻳﺔ ﺿﻣﻥ ﺍﻟﻘﻁﺎﻉ ﺍﻟﻣﺎﻟﻲ.
ﺍﻟﺩﺭﺍﺳﺎﺕ ﺍﻟﺳﺎﺑﻘﺔ
-١ﺩﺭﺍﺳﺎﺕ ﻋﺭﺑﻳﺔ
-١ﺩﺭﺍﺳﺔ )(Al-Obeidi , 2014
ﺗﻁﻭﻳﺭ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻟﻣﻭﺍﺟﻬﺔ ﻣﺧﺎﻁﺭ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺑﺎﺳﺗﻌﻣﺎﻝ ﺍﻁﺎﺭ :COBITﺩﺭﺍﺳﺔ ﺗﻁﺑﻳﻘﻳﺔ ﻓﻲ ﻣﺻﺭﻑ ﺑﻐﺩﺍﺩ. ﺍﻟﻌﻧﻭﺍﻥ
ﺩﺭﺍﺳﺔ ﻭﺗﻭﺿﻳﺢ ﺍﻟﺗﻐﻳﻳﺭﺍﺕ ﺍﻟﺗﻲ ﻁﺭﺃﺕ ﻋﻠﻰ ﻣﻔﻬﻭﻡ ﻭﻣﻛﻭﻧﺎﺕ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻣﻥ ﺧﻼﻝ ﺍﻻﻁﺭ ﺍﻟﺣﺩﻳﺛﺔ ﺍﻟﺧﺎﺻﺔ ﺑﻬﺎ ،ﻭﺗﻭﺿﻳﺢ
ﺍﻟﻬﺩﻑ ﻣﻥ ﺍﻟﺩﺭﺍﺳﺔ
ﺍﻟﻣﺧﺎﻁﺭ ﻭﺍﻟﺗﻬﺩﻳﺩﺍﺕ ﺍﻟﺗﻲ ﺗﻭﺍﺟﻪ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻓﻲ ﺑﻳﺋﺔ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﻭﻛﺫﻟﻙ ﺗﺣﺩﻳﺩ ﻣﺗﻁﻠﺑﺎﺕ ﺍﺳﺗﻌﻣﺎﻝ ﺇﻁﺎﺭ .COBIT
ﺗﺻﻣﻳﻡ ﺍﺳﺗﻣﺎﺭﺓ ﻟﻔﺣﺹ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﺑﺣﺳﺏ ﻣﺗﻁﻠﺑﺎﺕ ﺇﻁﺎﺭ ،COBITﻭﺍﻋﺗﻣﺩ ﺍﻟﺑﺎﺣﺙ ﺍﻟﻣﺗﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ﻭﺍﻻﻧﺣﺭﺍﻑ
ﻭﺍﻻﺳﺎﻟﻳﺏ ﺍﻻﺩﻭﺍﺕ
ﺍﻟﻣﻌﻳﺎﺭﻱ ﻭﺍﻻﺭﺗﺑﺎﻁ ﺍﻟﺑﺳﻳﻁ ﺑﻳﺭﺳﻭﻥ ﻟﻐﺭﺽ ﺍﺟﺭﺍء ﺍﻟﺗﺣﻠﻳﻝ ﺍﻻﺣﺻﺎﺋﻲ ﻹﺟﺎﺑﺎﺕ ﺃﻓﺭﺍﺩ ﺍﻟﻌﻳﻧﺔ ،ﻓﺿﻼً ﻋﻥ ﺍﺳﺗﺧﺩﺍﻡ ﺍﺧﺗﺑﺎﺭ tﻟﻘﻳﺎﺱ
ﺍﻻﺣﺻﺎﺋﻳﺔ
ﻣﻌﻧﻭﻳﺔ ﺍﻟﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ.
ﻣﺻﺭﻑ ﺑﻐﺩﺍﺩ ،ﻭﻫﻭ ﺍﺣﺩ ﺍﻟﺷﺭﻛﺎﺕ ﺍﻟﻣﺳﺎﻫﻣﺔ ﻓﻲ ﺍﻟﻌﺭﺍﻕ ،ﻛﻣﺟﺗﻣﻊ ﺩﺭﺍﺳﺔ. ﻣﺟﺗﻣﻊ ﻭﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ
ﻭﺟﻭﺩ ﺗﻛﺎﻣﻝ ﺑﻳﻥ ﺇﻁﺎﺭ COSOﻟﻠﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻭﺇﻁﺎﺭ ،COBITﻭﺗﻌﺩ ﺣﻭﻛﻣﺔ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺟﺯء ﻣﻥ ﺣﻭﻛﻣﺔ ﺍﻟﺷﺭﻛﺎﺕ
ﻭﺗﺳﻬﻡ ﻓﻲ ﺍﻟﺭﻗﺎﺑﺔ ﻋﻠﻰ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﺩﺍﺭﺓ ﺍﻟﻣﺧﺎﻁﺭ ﺑﺷﻛﻝ ﺍﻓﺿﻝ،ﻳﺣﺗﻭﻱ ﺇﻁﺎﺭ COBITﻋﻠﻰ ﻣﺟﻣﻭﻋﺔ ﻣﻥ ﺍﻟﻣﻔﺎﻫﻳﻡ
ﻭﺍﻟﻣﺑﺎﺩﺉ ﻭﺍﻟﻣﺟﺎﻻﺕ ﻭﺍﻻﻧﺷﻁﺔ ﺍﻟﺭﻗﺎﺑﻳﺔ ﺍﻟﺗﻲ ﻳﻣﻛﻥ ﺍﺳﺗﻌﻣﺎﻟﻬﺎ ﻓﻲ ﺗﻁﻭﻳﺭ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻭﺣﻭﻛﻣﺔ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﻫﻧﺎﻙ ﺗﻁﺑﻳﻖ ﺍﻻﺳﺗﻧﺗﺎﺟﺎﺕ
ﺑﺷﻛﻝ ﻛﺑﻳﺭ ﻟﻸﻧﺷﻁﺔ ﺍﻟﺭﻗﺎﺑﻳﺔ ،ﺍﻥ ﺭﺑﻁ ﺍﻻﻧﺷﻁﺔ ﺍﻟﺭﻗﺎﺑﻳﺔ ﻹﻁﺎﺭ COBITﺑﻧﻣﻭﺫﺝ ﻧﺿﺞ ﺍﻟﻘﺩﺭﺓ ﻳﺳﺎﻋﺩ ﺇﺩﺍﺭﺓ ﺍﻟﻣﻧﻅﻣﺔ ﻋﻠﻰ ﻣﻌﺭﻓﺔ
ﺩﺭﺟﺔ ﺗﻁﺑﻳﻖ ﺍﻻﻧﺷﻁﺔ ﺍﻟﺭﻗﺎﺑﻳﺔ ﻭﺑﺎﻟﺗﺎﻟﻲ ﺍﻟﻌﻣﻝ ﻋﻠﻰ ﺗﻁﻭﻳﺭﻫﺎ ﺑﺣﻳﺙ ﺗﺳﺗﻁﻳﻊ ﺍﻟﺣﺩ ﻣﻥ ﻣﺧﺎﻁﺭ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ.
-٢ﺩﺭﺍﺳﺎﺕ ﺍﺟﻧﺑﻳﺔ
-Study (Lubbad, 2014)٢
ﻧﺣﻭ ﻧﻣﻭﺫﺝ ﻣﺧﺗﺻﺭ ﻹﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﻠﻘﻁﺎﻉ ﺍﻟﺣﻛﻭﻣﻲ ﺍﻟﻔﻠﺳﻁﻳﻧﻲ ﻭﻓﻘﺎ ً ﻹﻁﺎﺭ COBIT5
ﺗﺣﺩﻳﺩ ﻣﻔﺎﻫﻳﻡ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﻭﺍﻟﻣﺟﺎﻻﺕ ﻭﺍﻟﺭﺑﻁ ﻣﻊ ﺣﻭﻛﻣﺔ ﺍﻟﺷﺭﻛﺎﺕ ﻭﺇﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﺍﻟﺗﺣﻘﻖ ﻣﻥ
ﺍﺳﺗﺧﺩﺍﻡ ﺍﻷﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﻳﺔ ﻟﻠﻌﻣﻠﻳﺎﺕ ﻋﺎﻟﻳﺔ ﺍﻟﻣﺳﺗﻭﻯ COBITﻛﺄﺳﺎﺱ ﻹﻁﺎﺭ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﺍﻗﺗﺭﺍﺡ ﻧﻣﻭﺫﺝ ﺍﻟﻬﺩﻑ ﻣﻥ ﺍﻟﺩﺭﺍﺳﺔ
ﻣﺧﺗﺻﺭ ﻟﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻓﻘًﺎ ﻟـ ،COBIT5ﺩﺭﺍﺳﺔ ﻣﺭﺟﻌﻳﺔ ﻟﺗﻧﻔﻳﺫ ﺍﻟﺣﻛﻡ ﺍﻟﺭﺷﻳﺩ ﻟﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ.
ﺍﺳﺗﺧﺩﻣﺕ ﺍﻟﺩﺭﺍﺳﺔ ﺍﻻﺳﺗﺑﻳﺎﻥ ﻛﺄﺩﺍﺓ ﻟﺟﻣﻊ ﺍﻟﺑﻳﺎﻧﺎﺕ ،ﺗﻡ ﺗﺣﻠﻳﻝ ﺍﻟﻣﺩﺧﻼﺕ ﺑﺎﺳﺗﺧﺩﺍﻡ ﺍﻟﺣﺯﻣﺔ ﺍﻹﺣﺻﺎﺋﻳﺔ ﻟﻠﻌﻠﻭﻡ ﺍﻻﺟﺗﻣﺎﻋﻳﺔ ) SPSS ﻭﺍﻻﺳﺎﻟﻳﺏ ﺍﻻﺩﻭﺍﺕ
،(18ﻭﻓﻖ ﻣﻘﻳﺎﺱ ﻟﻛﻳﺭﺕ. ﺍﻻﺣﺻﺎﺋﻳﺔ
ﺗﻛﻭﻥ ﻣﺟﺗﻣﻊ ﺍﻟﺩﺭﺍﺳﺔ ﻣﻥ ﻣﺩﻳﺭﻱ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻓﻲ ﺍﻟﻣﻌﺎﻫﺩ ﺍﻟﺣﻛﻭﻣﻳﺔ ﺍﻟﻔﻠﺳﻁﻳﻧﻳﺔ ﺣﻳﺙ ﺗﻡ ﺗﻁﺑﻳﻖ ﺍﻟﺩﺭﺍﺳﺔ ﻋﻠﻰ ﺍﻟﻘﻁﺎﻉ
ﻣﺟﺗﻣﻊ ﻭﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ
ﺍﻟﺣﻛﻭﻣﻲ ﺍﻟﻔﻠﺳﻁﻳﻧﻲ ﻓﻲ ﻗﻁﺎﻉ ﻏﺯﺓ .
ﺩﺭﺍﺳﺔ ﺍﻟﻌﻣﻠﻳﺎﺕ ﺭﻓﻳﻌﺔ ﺍﻟﻣﺳﺗﻭﻯ ﺫﺍﺕ ﺍﻷﻭﻟﻭﻳﺔ ﻹﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﻭﺍﻗﺗﺭﺍﺡ ﻧﻣﻭﺫﺝ ﻣﺧﺗﺻﺭ ﻟﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻓﻘًﺎ ﻟـ COBIT5ﺍﻟﺗﻲ ﺗﻧﻁﺑﻖ ﻋﻠﻰ ﺍﻟﻘﻁﺎﻉ ﺍﻟﺣﻛﻭﻣﻲ،ﺍﺳﺗﺧﻠﺻﺕ ﺍﻟﺩﺭﺍﺳﺔ ﺗﻌﺭﻳﻔﻬﺎ ﻟﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،
ﺍﻻﺳﺗﻧﺗﺎﺟﺎﺕ
ﻭﻫﻲ:
"ﻣﺳﺅﻭﻟﻳﺔ ﺍﻹﺩﺍﺭﺓ ﺍﻟﻌﻠﻳﺎ ﻭﺍﻟﺗﻧﻔﻳﺫﻳﺔ ﻋﻥ ﻣﻭﺍءﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺩﻣﺟﻬﺎ ﻣﻊ ﺍﻷﻋﻣﺎﻝ ﺍﻟﺗﺟﺎﺭﻳﺔ ﻟﺗﻣﻛﻳﻥ ﺍﻟﻣﻧﻅﻣﺔ ﻣﻥ ﺗﺣﻘﻳﻖ
ﺃﻫﺩﺍﻓﻬﺎ ﻭﺍﺳﺗﺭﺍﺗﻳﺟﻳﺎﺗﻬﺎ ﻣﻥ ﺧﻼﻝ ﺍﻻﺳﺗﺧﺩﺍﻡ ﺍﻟﻛﻔﻭء ﻭﺍﻟﻔﻌﺎﻝ ﻟﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ" ،ﻭﺃﻭﺻﺕ ﺍﻋﺗﻣﺎﺩ ﺗﻁﺑﻳﻖ ﻧﻣﻭﺫﺝ ﻟﺣﻭﻛﻣﺔ
ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻓﻘﺎ ﻟﻠﻧﻣﻭﺫﺝ ﺍﻟﻣﻘﺗﺭﺡ ﻓﻲ ﻫﺫﻩ ﺍﻟﺩﺭﺍﺳﺔ.
ﺗﺗﺑﻊ ﻫﺫﻩ ﺍﻟﺩﺭﺍﺳﺔ ﻣﻧﻬﺟﺎ ً ﻛﻣﻳﺎ ً ﻣﻥ ﺧﻼﻝ ﺍﺧﺗﺑﺎﺭ ﺗﻁﺑﻳﻖ ﺇﻁﺎﺭ COBIT5ﻓﻲ ﺍﻟﺑﻧﻭﻙ ﺍﻷﺭﺩﻧﻳﺔ ،ﻣﻥ ﺧﻼﻝ ﺍﺳﺗﺑﻳﺎﻥ ﻭﺯﻉ ﻋﻠﻰ ﻛﻝ ﻣﻥ
ﺍﻟﻣﺩﻳﺭﻳﻥ )ﺍﻟﺗﺩﻗﻳﻖ ﺍﻟﺩﺍﺧﻠﻲ ،ﻭﻗﺳﻡ ﺍﻻﻣﺗﺛﺎﻝ ،ﻭﻧﻅﻡ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺗﻡ ﺍﺳﺗﺧﺩﺍﻡ ﺑﻌﺽ ﺍﻷﺳﺎﻟﻳﺏ ﺍﻹﺣﺻﺎﺋﻳﺔ ﻣﻥ ﺧﻼﻝ ﺑﺭﻧﺎﻣﺞ ﺍﻟﺣﺯﻣﺔ
ﻭﺍﻻﺳﺎﻟﻳﺏ ﺍﻻﺩﻭﺍﺕ
ﺍﻹﺣﺻﺎﺋﻳﺔ ﻟﻠﻌﻠﻭﻡ ﺍﻻﺟﺗﻣﺎﻋﻳﺔ ) :(SPSSﻣﻌﺎﻣﻝ ﺃﻟﻔﺎ ﻛﺭﻭﻧﺑﺎﺥ ،ﺍﻟﺗﺭﺩﺩﺍﺕ ﻭﺍﻟﻧﺳﺏ ﺍﻟﻣﺋﻭﻳﺔ ،ﺍﻟﻣﺗﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ،ﺍﻻﻧﺣﺭﺍﻑ
ﺍﻻﺣﺻﺎﺋﻳﺔ
ﺍﻟﻣﻌﻳﺎﺭﻱ ،ﺍﺧﺗﺑﺎﺭ ﻣﻌﺎﻣﻝ ﺗﺿﺧﻡ ﺍﻟﺗﺑﺎﻳﻥ ،ﺍﺧﺗﺑﺎﺭ ﻛﻭﻟﻣﻭﺟﻭﺭﻭﻑ-ﺳﻣﻳﺭﻧﻭﻑ ،ﺍﺧﺗﺑﺎﺭ ﻓﺭﻳﺩﻣﺎﻥ ،ﺍﺨﺘﺒﺎﺭ) (tﻟﻟﻤﺠﻤﻭﻋﺎﺕ ﺍﻟﻤﺴﺘﻘﻟﺔ،
ﺗﺣﻠﻳﻝ ﺍﻟﺗﺑﺎﻳﻥ ﺍﻷﺣﺎﺩﻱ ،ﻭﺍﺧﺘﺒﺎﺭ ﺍﻗﻞ ﻓﺮﻕ ﻣﻌﻨﻮﻱ.
ﻳﺗﻛﻭﻥ ﻣﺟﺗﻣﻊ ﺍﻟﺩﺭﺍﺳﺔ ﻣﻥ ﺑﻧﻭﻙ ﺃﺭﺩﻧﻳﺔ ،ﺗﻣﺛﻝ ﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ ﻣﺩﻳﺭﻱ ﻗﺳﻡ ﺍﻟﺗﺩﻗﻳﻖ ﺍﻟﺩﺍﺧﻠﻲ ﻭﺍﻻﻣﺗﺛﺎﻝ ﻭﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻳﺑﻠﻎ
ﻣﺟﺗﻣﻊ ﻭﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ
ﻋﺩﺩﻫﻡ 38ﻣﺩﻳﺭﺍ ً ﻓﻲ ﺍﻟﺑﻧﻭﻙ ﺍﻟﺗﻲ ﺧﺿﻌﺕ ﻟﻠﺩﺭﺍﺳﺔ.
ﻫﻧﺎﻙ ﺍﻟﻌﺩﻳﺩ ﻣﻥ ﺍﻟﻣﺧﺎﻁﺭ ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺎﺳﺗﺧﺩﺍﻡ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ .ﻗﺩ ﺗﻌﺗﻣﺩ ﺍﻹﺩﺍﺭﺓ ﻋﻠﻰ ﺍﻷﻧﻅﻣﺔ ﺍﻟﺗﻲ ﺗﺣﺗﻭﻱ ﻋﻠﻰ ﺃﺧﻁﺎء
ﻣﺑﺭﻣﺟﺔ ﺗﺅﺩﻱ ﺇﻟﻰ ﺑﻳﺎﻧﺎﺕ ﻏﻳﺭ ﺩﻗﻳﻘﺔ ﺃﻭ ﺗﺳﻣﺢ ﺑﻣﻌﺎﻟﺟﺔ ﺑﻳﺎﻧﺎﺕ ﻏﻳﺭ ﺻﺣﻳﺣﺔ ،ﻭﻫﻧﺎﻙ ﺃﻳﺿﺎ ً ﺧﻁﺭ ﺍﻟﻭﺻﻭﻝ ﻏﻳﺭ ﺍﻟﻣﺻﺭﺡ ﺑﻪ ﺇﻟﻰ
ﺍﻟﺑﻳﺎﻧﺎﺕ ﻭﺍﻟﺑﺭﺍﻣﺞ ﺍﻟﺗﻲ ﻗﺩ ﺗﺅﺩﻱ ﺇﻟﻰ ﺗﻐﻳﻳﺭﺍﺕ ﻏﻳﺭ ﻣﺻﺭﺡ ﺑﻬﺎ ﻋﻠﻰ ﺍﻟﻣﻠﻔﺎﺕ ﺍﻟﺭﺋﻳﺳﻳﺔ ﻭﺍﻟﺑﺭﺍﻣﺞ ،ﻳﺧﺗﻠﻑ ﻣﺩﻯ ﻭﻁﺑﻳﻌﺔ ﻫﺫﻩ ﺍﻻﺳﺗﻧﺗﺎﺟﺎﺕ
ﺍﻟﻣﺧﺎﻁﺭ ﺣﺳﺏ ﻁﺑﻳﻌﺔ ﻭﺧﺻﺎﺋﺹ ﺃﻧﻅﻣﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﻭﻧﺗﻳﺟﺔ ﻟﺫﻟﻙ ﻋﻧﺩﻣﺎ ﻳﻛﺳﺏ ﻣﺩﻗﻘﻭ ﺍﻟﺣﺳﺎﺑﺎﺕ ﻣﻌﺭﻓﺔ ﻓﻲ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ،
ﻳﺟﺏ ﻋﻠﻳﻬﻡ ﺍﻟﻧﻅﺭ ﻓﻲ ﺍﻟﻛﻳﻔﻳﺔ ﺍﻟﺗﻲ ﻳﻣﻛﻥ ﺃﻥ ﺗﺅﺩﻱ ﺑﻬﺎ ﻣﺧﺎﻁﺭ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺇﻟﻰ ﺃﺧﻁﺎء.
IT Governance Evaluation: Adapting and Adopting the COBIT Framework for Public
Sector Organisations. ﺍﻟﻌﻧﻭﺍﻥ
ﺗﻘﻳﻳﻡ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ :ﺗﻛﻳﻳﻑ ﻭﺍﻋﺗﻣﺎﺩ ﺇﻁﺎﺭ COBITﻟﻠﻣﺅﺳﺳﺎﺕ ﺍﻟﻘﻁﺎﻉ ﺍﻟﻌﺎﻡ.
ﺍﻟﻬﺩﻑ ﻣﻥ ﻫﺫﺍ ﺍﻟﺑﺣﺙ ﻫﻭ ﺍﺳﺗﻛﺷﺎﻑ ﻣﺎ ﺇﺫﺍ ﻛﺎﻥ ﻫﻧﺎﻙ ﺗﺣﺩ ﻣﺣﺗﻣﻝ ﻳﺗﻌﻠﻖ ﺑﻁﺭﻳﻘﺔ ﺍﺳﺗﺧﺩﺍﻡ ﺇﻁﺭ ﻋﻣﻝ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
ﻓﻲ ﺍﻟﻘﻁﺎﻉ ﺍﻟﻌﺎﻡ ﺍﻻﺳﺗﺭﺍﻟﻲ؛ ﺗﺻﻣﻳﻡ ﻭﺗﺟﺭﺑﺔ ﺇﺻﺩﺍﺭ ﺳﻳﺎﻗﻲ ﻣﻥ ﺇﻁﺎﺭ COBITﻹﺟﺭﺍء ﺗﻘﻳﻳﻣﺎﺕ ﻷﻧﻅﻣﺔ ﺇﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻬﺩﻑ ﻣﻥ ﺍﻟﺩﺭﺍﺳﺔ
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ؛ ﻭﺍﺳﺗﻛﺷﺎﻑ ﺍﻟﻌﻭﺍﻣﻝ ﺍﻟﺗﻲ ﺗﺅﺛﺭ ﻋﻠﻰ ﻗﺑﻭﻟﻬﺎ ﻭﺍﻋﺗﻣﺎﺩﻫﺎ.
ﺗﻡ ﺗﻁﻭﻳﺭ ﺍﺳﺗﺑﻳﺎﻥ ﻋﺑﺭ ﺍﻹﻧﺗﺭﻧﺕ ﻟﺟﻣﻊ ﺗﺻﻭﺭﺍﺕ ﺍﻟﻣﺳﺗﺟﻳﺑﻳﻥ ﻷﻫﻣﻳﺔ ﺃﻫﺩﺍﻑ ﻋﻣﻠﻳﺎﺕ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻋﺎﻟﻳﺔ ﺍﻟﻣﺳﺗﻭﻯ 37 ﻭﺍﻻﺳﺎﻟﻳﺏ ﺍﻻﺩﻭﺍﺕ
ﻣﻥ ﺇﻁﺎﺭ COBIT5ﻧﻅﺭﺍ ﻟﺣﺳﺎﺳﻳﺗﻬﺎ ﺃﺿﺎﻓﺔ ﺍﻟﻰ ﺍﺟﺭﺍء ﺍﻟﻣﻘﺎﺑﻠﺔ ﻣﻊ ﻋﺿﻭ ﻣﺳﺗﺟﻳﺏ ﻳﻣﺛﻝ ﻣﺩﻳﺭﺍ ً ﻋﺎﻣﺎ ً ﺃﻭ ﺃﻋﻠﻰ ﻓﻲ ﻧﻔﺱ ﻗﻁﺎﻉ ﺍﻻﺣﺻﺎﺋﻳﺔ
ﺗﺗﻣﺛﻝ ﺑﻣﺅﺳﺳﺎﺕ ﺍﻟﻘﻁﺎﻉ ﺍﻟﻌﺎﻡ ﺍﻻﺳﺗﺭﺍﻟﻲ ﻭﺗﻣﺛﻠﺕ ﻋﻳﻧﺔ ﺍﻟﺑﺣﺙ ﺑﺎﻟﻣﺳﺗﺟﻳﺑﻳﻥ ﺍﻟﻣﺣﻠﻳﻳﻥ ﺍﻟﻣﺗﻭﺍﺟﺩﻳﻥ ﻓﻲ ﺗﻠﻙ ﺍﻟﻣﺅﺳﺳﺎﺕ ﻣﺟﺗﻣﻊ ﻭﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ
ﻳُﻧﻅﺭ ﺇﻟﻰ ﺃﻁﺭ ﻋﻣﻝ ﺃﻓﺿﻝ ﺍﻟﻣﻣﺎﺭﺳﺎﺕ ﺍﻟﺗﻲ ﺗﻡ ﺗﻛﻳﻳﻔﻬﺎ ﺑﺷﻛﻝ ﺍﻋﺗﺑﺎﻁﻲ ﻟﺗﻘﻠﻳﻝ ﻛﻔﺎءﺓ ﻭﻓﻌﺎﻟﻳﺔ ﺗﻘﻳﻳﻡ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ،ﻭﻳﻣﻛﻥ ﺃﻥ ﻳﺳﺗﺧﻠﺹ ﻣﻧﻬﺟﻳﺎ ً ﺗﻘﻳﻳﻡ ﺇﻁﺭ ﻋﻣﻝ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﻣﺻﻣﻡ ﻟﻳﻧﺎﺳﺏ ﺍﻻﺣﺗﻳﺎﺟﺎﺕ ﺍﻟﻣﺣﺩﺩﺓ ﻟﻛﻝ ﺍﻻﺳﺗﻧﺗﺎﺟﺎﺕ
ﻣﺅﺳﺳﺔ ﺃﻭ ﻗﻁﺎﻉ ﻋﻠﻰ ﺣﺩﺓ ﻣﻥ ﺇﻁﺭ ﻭﻧﻣﺎﺫﺝ ﺃﻓﺿﻝ ﺍﻟﻣﻣﺎﺭﺳﺎﺕ ﻣﺛﻝ ).(COBIT
ﺍﻟﺟﺎﻧﺏ ﺍﻟﻧﻅﺭﻱ
ﻹﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﻟﻣﺷﺭﻭﻋﺎﺕ ﺍﻟﻣﻘﺑﻭﻟﺔ ﻋﺎﻟﻣﻳﺎ ً ﻳﺳﺗﺧﺩﻣﻪ ﺍﻟﻣﺩﻗﻘﻭﻥ ﻭﺍﻟﺷﺭﻛﺎﺕ ﻛﺂﻟﻳﺔ ﻟﺩﻣﺞ ﺍﻟﺗﻘﻧﻳﺎﺕ ﻓﻲ ﺗﻧﻔﻳﺫ ﺍﻟﺭﻗﺎﺑﺔ
ﻭﺗﻠﺑﻳﺔ ﺃﻫﺩﺍﻑ ﺃﻋﻣﺎﻝ ﻣﺣﺩﺩﺓ ﻭﻳﻛﻭﻥ ﻣﻧﺎﺳﺏ ﺗﻣﺎﻣﺎ ً ﻟﻠﻣﺅﺳﺳﺎﺕ ﺍﻟﺗﻲ ﺗﺭﻛﺯ ﻋﻠﻰ ﺗﺣﺳﻳﻥ ﺇﺩﺍﺭﺓ ﺍﻟﻣﺧﺎﻁﺭ ﻭﺗﺧﻔﻳﺿﻬﺎ (Bernard,
). 2012: 7
ﻭﻳﻣﻛﻥ ﺗﻠﺧﻳﺹ ﺑﻌﺽ ﺍﻟﻣﺯﺍﻳﺎ ﻭﺍﻟﻔﻭﺍﺋﺩ ﺍﻹﺿﺎﻓﻳﺔ ﺍﻟﺗﻲ ﻳﻘﺩﻣﻬﺎ ﺍﻹﻁﺎﺭ(https://www.itgovernance.eu) -:
-١ﺍﻟﺣﻔﺎﻅ ﻋﻠﻰ ﻣﻌﻠﻭﻣﺎﺕ ﻋﺎﻟﻳﺔ ﺍﻟﺟﻭﺩﺓ ﻟﺩﻋﻡ ﺍﻟﻘﺭﺍﺭﺍﺕ ﺍﻟﺗﺟﺎﺭﻳﺔ.
-٢ﺗﺣﻘﻳﻖ ﺍﻷﻫﺩﺍﻑ ﺍﻻﺳﺗﺭﺍﺗﻳﺟﻳﺔ ﻭﺗﺣﻘﻳﻖ ﻓﻭﺍﺋﺩ ﺍﻷﻋﻣﺎﻝ ﻣﻥ ﺧﻼﻝ ﺍﻻﺳﺗﺧﺩﺍﻡ ﺍﻟﻔﻌﺎﻝ ﻭﺍﻟﻣﺑﺗﻛﺭ ﻟـ )(IT
-٣ﺍﻟﺣﻔﺎﻅ ﻋﻠﻰ ﺍﻟﻣﺧﺎﻁﺭ ﺍﻟﻣﺗﻌﻠﻘﺔ ﺑﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻓﻲ ﻣﺳﺗﻭﻯ ﻣﻘﺑﻭﻝ.
-٤ﺩﻋﻡ ﺍﻻﻣﺗﺛﺎﻝ ﻟﻠﻘﻭﺍﻧﻳﻥ ﺫﺍﺕ ﺍﻟﺻﻠﺔ ﻭﺍﻟﻠﻭﺍﺋﺢ ﻭﺍﻻﺗﻔﺎﻗﺎﺕ ﻭﺍﻟﺳﻳﺎﺳﺎﺕ ﺍﻟﺗﻌﺎﻗﺩﻳﺔ.
ﻭﻗ ﺩ ﺳ ﺎﻫﻣﺕ ﺍﻟﻌﺩﻳ ﺩ ﻣ ﻥ ﺍﻟ ﺩﻭﺍﻓﻊ ﻓ ﻲ ﺇﻧﺗﺷ ﺎﺭ COBIT5ﻟﻠﺭﻗﺎﺑ ﺔ ﺍﻟﺩﺍﺧﻠﻳ ﺔ ﻭﺣﻭﻛﻣ ﺔ ﺗﻛﻧﻭﻟﻭﺟﻳ ﺎ ﺍﻟﻣﻌﻠﻭﻣ ﺎﺕ ﺫﺍﺕ ﺍﻟﺻ ﻠﺔ ﻭﻫ ﻲ
ﻛﺎﻵﺗﻲ) (Mangalaroj et al ,2014: 4) -:ﺧﺎﻟﺩ ﻭﻣﺎﻳﻭ(65 :2016 ،
-١ﺗﻧﻔﻳ ﺫ ﻣﺗﻁﻠﺑ ﺎﺕ ﺍﻟﻘ ﻭﺍﻧﻳﻥ ﺍﻟﻣﺭﺗﺑﻁ ﺔ ﺑﺎﻟﺭﻗﺎﺑ ﺔ ﻋﻠ ﻰ ﺗﻘﻧﻳ ﺎﺕ ﺍﻟﺻ ﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛ ﺔ ﻭﺍﻟﻣﺗﻌﻠﻘ ﺔ ﺑﺿ ﻭﺍﺑﻁ ﺧﺎﺻ ﺔ ﻓ ﻲ ﻣﺟ ﺎﻻﺕ ﻣﻌﻳﻧ ﺔ
ﻛﺎﻋﺩﺍﺩ ﺍﻟﻘﻭﺍﺋﻡ ﺍﻟﻣﺎﻟﻳﺔ ﻣﺛﻝ ﻗﺎﻧﻭﻥ ).BASELIII ،Sarbanes Oxley (SOX
-٢ﻣﻌﻅﻡ ﺍﻟﻣﺅﺳﺳﺎﺕ ﻻ ﺗﺯﺍﻝ ﻟﻡ ﺗﺿﻊ ﺭﻗﺎﺑﺔ ﻛﺎﻓﻳﺔ ﻋﻠﻰ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ.
-٣ﻣﺑﺎﺩﺭﺍﺕ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺗﺗﺿ ﻣﻥ ﺗﺑﻧ ﻲ ﺃﺭﺿ ﻳﺔ ﻟﻠﺭﻗﺎﺑ ﺔ ﺍﻟﺩﺍﺧﻠﻳ ﺔ ﻭﺍﻟﻣﻣﺎﺭﺳ ﺎﺕ ﺍﻟﺟﻳ ﺩﺓ ﺍﻟﺗ ﻲ ﺗﺳ ﺎﻋﺩ ﻓ ﻲ ﺯﻳ ﺎﺩﺓ
ﻗﻳﻣﺔ ﺍﻟﻣﺅﺳﺳﺔ ﻭﺗﺧﻔﻳﺽ ﻭﺗﺣﺳﻳﻥ ﺍﻟﻣﺧﺎﻁﺭ ﻭﺍﻷﺳﺗﺧﺩﺍﻡ ﺍﻷﻣﺛﻝ ﻟﻠﻣﻭﺍﺭﺩ.
-٤ﺗﻭﺍﺟﻪ ﺍﻟﻣﺅﺳﺳﺔ ﻣﺟﻣﻭﻋﺔ ﻭﺍﺳﻌﺔ ﻣﻥ ﺍﻟﺗﻬﺩﻳﺩﺍﺕ ﺍﻟﺧﺎﺭﺟﻳﺔ ﺍﻟﻧﺎﺷﺋﺔ ﻋﻥ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺑﻣﺎ ﻓﻲ ﺫﻟﻙ ﺇﺳ ﺎءﺓ ﺍﻻﺳ ﺗﺧﺩﺍﻡ
ﻭﺍﻟﺟﺭﺍﺋﻡ ﺍﻹﻟﻛﺗﺭﻭﻧﻳﺔ ﻭﺍﻻﺣﺗﻳﺎﻝ ﻭﺍﻷﺧﻁﺎء ﻭﺍﻹﻏﻔﺎﻻﺕ.
-٣ﺃﻫﺩﺍﻑ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5
ﺍﻥ ﺍﻫﺩﺍﻑ ﺇﻁﺎﺭ ﻋﻣﻝ ﻛﻭﺑﺕ ٥ﻳﻣﻛﻥ ﺗﻭﺿﻳﺣﻬﺎ ﻋﺑﺭ ﺍﻟﺷﻛﻙ ) (٢ﻭﻫﻲ ﻛﺂﻻﺗﻲ-:
.١ﺇﻧﺷﺎء ﺍﻟﻘﻳﻣﺔ ﻭﺗﺣﻘﻳﻖ ﺍﻟﻔﻭﺍﺋﺩ :ﺇﻧﺷﺎء ﻗﻳﻣﺔ ﺟﺩﻳﺩﺓ ﻟﻠﻣﺅﺳﺳﺎﺕ ﻣﻥ ﺧﻼﻝ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﻟﺣﻔﺎﻅ ﻭﺍﻟﺯﻳﺎﺩﺓ ﻋﻠﻰ ﺍﻟﻘﻳﻣﺔ
ﺍﻟﻣﻘﺩﻣﺔ ﻣﻥ ﺍﻷﺳﺗﺛﻣﺎﺭﺍﺕ ﺍﻟﺣﺎﻟﻳﺔ ﻭﺍﻟﺗﺧﻠﺹ ﻣﻥ ﺃﻋﻣﺎﻝ ﻭﺃﺻﻭﻝ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺗﻲ ﻻ ﺗﺿﻳﻑ ﻗﻳﻣﺔ ﻛﺎﻓﻳﺔ ﻟﻠﻣﺅﺳﺳﺔ .
.٢ﺗﺧﻔﻳﺽ ﻭﺗﺣﺳﻳﻥ ﻣﺳﺗﻭﻳﺎﺕ ﺍﻟﻣﺧﺎﻁﺭ :ﻣﺧﺎﻁﺭ ﺍﻷﻋﻣﺎﻝ ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺄﺳﺗﺧﺩﺍﻡ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻣﻌﺎﻟﺟﺗﻬﺎ ﻭﺗﺑﻧﻳﻬﺎ
ﻭﺗﻣﻠﻛﻬﺎ ﻭﺗﺷﻐﻳﻠﻬﺎ ﻭﺃﺩﺭﺍﺟﻬﺎ ﻓﻲ ﺍﻟﻣﺅﺳﺳﺔ ﻭﺗﺗﻛﻭﻥ ﻣﻥ ﺍﻷﺟﺭﺍءﺍﺕ ﺍﻟﺗﻲ ﻣﻥ ﺍﻟﻣﻣﻛﻥ ﺍﻥ ﺗﺅﺛﺭ ﻋﻠﻳﻬﺎ ﻭﺑﻳﻧﻣﺎ ﻳﺭﻛﺯ ﺗﻭﻟﻳﺩ ﺍﻟﻘﻳﻣﺔ
ﻋﻠﻰ ﺇﻧﺷﺎء ﺍﻟﻣﻧﻅﻭﻣﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺗﻳﺔ ﻓﺈﻥ ﺇﺩﺍﺭﺓ ﺍﻟﻣﺧﺎﻁﺭ ﺗﻌﻣﻝ ﻋﻠﻰ ﺣﻔﻅﻬﺎ ﻓﻳﻧﺑﻐﻲ ﺍﻥ ﺗﺗﻛﺎﻣﻝ ﺇﺩﺍﺭﺓ ﺍﻟﻣﺧﺎﻁﺭ ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺗﻛﻭﻧﻠﻭﺟﻳﺎ
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻣﻊ ﺃﺳﻠﻭﺏ ﺇﺩﺍﺭﺗﻬﺎ ﻓﻲ ﺍﻟﻣﺅﺳﺳﺔ ﻟﺿﻣﺎﻥ ﺗﺭﻛﻳﺯ ﺍﻟﻣﺅﺳﺳﺔ ﻋﻠﻰ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﺗﻘﺎﺱ ﺑﺎﻟﻁﺭﻳﻘﺔ ﺍﻟﺗﻲ ﺗﺑﻳﻥ
ﺷﻔﺎﻓﻳﺔ ﺗﺄﺛﻳﺭ ﺗﺧﻔﻳﺽ ﻣﺧﺎﻁﺭ ﺍﻷﻋﻣﺎﻝ ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻓﻲ ﺣﻔﻅ ﺍﻟﻘﻳﻣﺔ ).(Hard , 2006: 56
.٣ﺍﻷﺳﺗﺧﺩﺍﻡ ﺍﻷﻣﺛﻝ ﻟﻠﻣﻭﺍﺭﺩ :ﺍﻟﺗﺄﻛﺩ ﻣﻥ ﻭﺟﻭﺩ ﺍﻷﻋﻣﺎﻝ ﻭﺍﻟﻘﺩﺭﺍﺕ ﻭﺍﻟﻣﻣﺎﺭﺳﺎﺕ ﺍﻟﻣﻼﺋﻣﺔ ﻟﺗﻧﻔﻳﺫ ﺍﻟﺧﻁﺔ ﺍﻷﺳﺗﺭﺍﺗﻳﺟﻳﺔ ﻭﺗﻭﻓﻳﺭ
ﺍﻟﻣﻭﺍﺭﺩ ﺍﻟﻣﻼﺋﻣﺔ ﻭﺍﻟﻛﺎﻓﻳﺔ ﺑﻣﺎ ﻳﺿﻣﻥ ﺗﻭﻓﻳﺭ ﺑﻧﻳﺔ ﺗﺣﺗﻳﺔ ﻟﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺷﺎﻣﻠﺔ ﻭﻣﺗﻛﺎﻣﻠﺔ ﻭﺃﻗﺗﺻﺎﺩﻳﺔ ﻭﺃﻥ ﺗﻛﻭﻥ ﺍﻟﺗﻘﻧﻳﺎﺕ
ﺍﻟﺟﺩﻳﺩﺓ ﻭﻓﻘﺎ ً ﻟﻣﺗﻁﻠﺑﺎﺕ ﺃﻋﻣﺎﻝ ﺍﻟﻣﺅﺳﺳﺔ ). (ISACA, 2012: 15
z
ﺇﺩﺍﺭﺓ ﺍﻟﻌﻼﻗﺎﺕ
Manage Relationships APO08
ﺕ -ﺍﻟﺑﻧ ﺎء ،ﺍﻻﻣ ﺗﻼﻙ ﻭﺍﻟﺗﻧﻔﻳ ﺫ ) :Build, acquire and implement (BAIﻳﺷ ﻣﻝ ﻫ ﺫﺍ ﺍﻟﻣﺟ ﺎﻝ 10ﻋﻣﻠﻳ ﺎﺕ ﺭﺋﻳﺳ ﻳﺔ
ﺗﺣﺩﺩ ﻭﺗﻐﻁﻲ ﻣﺗﻁﻠﺑﺎﺕ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﻣﺗﻼﻙ ﺍﻟﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﻭﺗﻧﻔﻳ ﺫﻫﺎ )(Central Bank of Iraq,2019: 44-47
ﻓﻲ ﺇﻁﺎﺭ ﺍﻟﻌﻣﻠﻳﺎﺕ ﺍﻟﺗﺟﺎﺭﻳﺔ ﺍﻟﺣﺎﻟﻳﺔ ﻟﻠﻣﺅﺳﺳﺔ ﻛﻣﺎ ﻣﻭﺿﺢ ﻓﻲ ﺍﻟﺟﺩﻭﻝ):(Greyling, 2015: 42) (٧
ﺟﺩﻭﻝ ) :(٧ﺃﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﺔ ﻋﺎﻟﻳﺔ ﺍﻟﻣﺳﺗﻭﻯ /ﻋﻣﻠﻳﺎﺕ ﺍﻟﻣﺟﺎﻝ ﺍﻟﺛﺎﻟﺙ BAI
Transitioning
ﺇﺩﺍﺭﺓ ﺍﻟﻣﻌﺭﻓﺔ
BAI08
Manage Knowledge
ﺇﺩﺍﺭﺓ ﺍﻟﻣﻭﺟﻭﺩﺍﺕ
BAI09
Manage Assets
Source: Greyling, Governing the strategic alignment of big data with the use
of the COBIT 5 control framework, 2015: P48.
ﺙ-ﺍﻟﺗﻭﺻ ﻳﻝ ،ﺍﻟﺧﺩﻣ ﺔ ﻭﺍﻟ ﺩﻋﻡ ) : Deliver, service and support (DSSﺗﺷ ﻣﻝ ﺟﻣﻳ ﻊ ﺍﻟﻌﻣﻠﻳ ﺎﺕ ﺍﻟﺭﺋﻳﺳ ﻳﺔ )(6
ﻟﻠﻣﺟ ﺎﻝ ﻭﺍﻟﺗ ﻲ ﺗﺭﻛ ﺯ ﻋﻠ ﻰ ﺟﻭﺍﻧ ﺏ ﺗﻘ ﺩﻳﻡ ﺗﻛﻧﻭﻟﻭﺟﻳ ﺎ ﺍﻟﻣﻌﻠﻭﻣ ﺎﺕ ﻭﻳﺷ ﻣﻝ ﻣﺟ ﺎﻻﺕ ﻣﺛ ﻝ ﺗﻧﻔﻳ ﺫ ﺍﻟﺗﻁﺑﻳﻘ ﺎﺕ ﺩﺍﺧ ﻝ ﻧﻅ ﺎﻡ ﺗﻛﻧﻭﻟﻭﺟﻳ ﺎ
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻧﺗﺎﺋﺟﻬﺎ ﻓﺿﻼ ﻋﻥ ﻋﻣﻠﻳﺎﺕ ﺍﻟﺩﻋﻡ ﺍﻟﺗﻲ ﺗﻣﻛﻥ ﻣﻥ ﺍﻟﺗﻧﻔﻳﺫ ﺍﻟﻛﻔﻭء ﻭﺍﻟﻔﻌﺎﻝ ﻷﻧﻅﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻛﻣﺎ ﻣﺑﻳﻥ ﻓ ﻲ
ﺍﻟﺟﺩﻭﻝ): (Weber, 2014 : 34) (٨
ﺟﺩﻭﻝ ) (٨ﺃﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﺔ ﻋﺎﻟﻳﺔ ﺍﻟﻣﺳﺗﻭﻯ /ﻋﻣﻠﻳﺎﺕ ﺍﻟﻣﺟﺎﻝ ﺍﻟﺭﺍﺑﻊ DSS
Source: Weber, Addressing the incremental risks associated with adopting a Bring
Your Own Device program by using the COBIT 5 framework to identify key
controls, 2014: P39.
ﻟﻠﺗﻛﻧﻭﻟﻭﺟﻳﺎ .
ﻭﻋﺭﻓﺕ ﺍﻟﺗﻛﻧﻠﻭﺟﻳﺎ ﺑﺄﻧﻬﺎ ﺗﻁﺑﻳﻖ ﺍﻟﻣﻌﺭﻓﺔ ﺍﻟﻌﻠﻣﻳﺔ ﻋﻠﻰ ﺍﻟﻌﻣﻠﻳﺎﺕ ﺍﻟﻣﺻﺭﻓﻳﺔ ،ﻭﺍﻻﺳﺗﺧﺩﺍﻡ ﺍﻟﺷﺎﻣﻝ ﻟﻛﺎﻓﺔ ﺍﻻﻻﺕ ﻭﺍﻟﻣﻌﺩﺍﺕ
ﺍﻟﺣﺩﻳﺛﺔ ﺍﻟﺗﻲ ﻣﻥ ﺷﺄﻧﻬﺎ ﺭﻓﻊ ﻛﻔﺎءﺓ ﺍﻟﻌﻣﻝ ﻭﺑﺩﻭﻥ ﺍﺧﻁ ء).(Nazer ,2017: 15
ﺏ -ﺍﻟﻣﻌﻠﻭﻣﺎﺕ :ﻭﻳﻘﺻﺩ ﺑﺎﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺑﻳﺎﻧﺎﺕ ﺍﻟﺗﻲ ﺗﻣﺕ ﻣﻌﺎﻟﺟﺗﻬﺎ ﺑﺣﻳﺙ ﺃﺻﺑﺣﺕ ﺫﺍﺕ ﺩﻻﻟﺔ ﻣﺑﻳﻧﺔ ﻭﺫﺍﺕ ﻣﻌﻧﻰ ﻓﺗﻣﺛﻝ ﺛﺭﻭﺓ
) ،(Salmi et al, 2012: 15ﻋﻠﻳﻧﺎ ﺃﻥ ﻧﺗﺩﺍﻭﻟﻬﺎ ﻭﻧﺗﻧﺎﻗﻠﻬﺎ ﻭﻧﻌﺩﻫﺎ ﻓﻲ ﺟﺩﺍﻭﻝ ﻭﺗﻘﺎﺭﻳﺭ ﻭﻣﺅﺷﺭﺍﺕ ﻭﺇﺣﺻﺎءﺍﺕ ﻭﻗﻭﺍﻋﺩ
ﺑﻳﺎﻧﺎﺕ ،ﻭﺫﻟﻙ ﻟﻧﺳﺗﻔﻳﺩ ﻣﻧﻬﺎ ﻓﻲ ﺍﺗﺧﺎﺫ ﺍﻟﻘﺭﺍﺭ ﻓﺎﻟﻣﻌﻠﻭﻣﺔ ) ،(Al-Khoury ,1998: 11ﺃﺻﺑﺣﺕ ﺳﻠﻌﺔ ﺍﻟﻳﻭﻡ ﻭﺛﺭﻭﺓ
ﺍﻟﻣﺳﺗﻘﺑﻝ ﻭﺍﻟﺷﻛﻝ ) (٣ﻳﻭﺿﺢ ﻋﻠﻰ ﺍﻥ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻣﺎ ﻫﻲ ﺇﻻ ﺟﺯء ﻣﻥ ﻧﻅﺎﻡ ﺍﻭﺳﻊ ﻭﺍﺷﻣﻝ ﺃﻻ ﻭﻫﻭ ﻧﻅﺎﻡ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ.
ﺑﻳﺋﺔ ﺍﻷﻋﻣﺎﻝ
ﺍﻟﻣﻧﻅﻣﺔ
ﻧﻅﻡ ﺍﻟﻌﻣﻝ
ﻧﻅﺎﻡ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
ﺍﻷﻓﺭﺍﺩ
ﻣﻛﻭﻧﻧﺎﺕ
ﺍﻟﺑﺭﻣﺟﻳﺎﺕ ﺍﻷﺟﻬﺯﺓ
ﻣﻛﻭﻧﻧﺎﺕ ﻭﺍﻟﻣﻌﺩﺍﺕ
I
IT
ﺍﻟﺑﻳﺎﻧﺎﺕ
ﺷﺑﻛﺎﺕ
ﺍﻟﺷ
ﺍﻟﻣﺳﺗﻔﺩﻳﻥ ﻓﻲ ﺇﻁﺎﺭ ﻣﺎ ﻳﺻﻁﻠﺢ ﻋﻠﻳﻪ ﺍﻟﺣﻭﺳﺑﺔ ﺍﻟﻣﻭﺯﻋﺔ Distributed Computingﺃﻭ ﺍﻟﻣﻌﺎﻟﺟﺔ ﺍﻟﻣﻭﺯﻋﺔ
، (Al-Tai,2010: 107) Distributed Processingﻭﺍﻥ ﻫﺫﻩ ﺍﻟﺷﺑﻛﺎﺕ ﺗﻘﻭﻡ ﺑﻌﻣﻝ ﺍﺗﺻﺎﻝ ﺑﻳﻥ ﻣﻭﺍﻗﻊ ﺍﻟﻌﻣﻝ ﺣﻳﺙ
ﺗﻛﻭﻥ ﻣﻧﺗﺷﺭﺓ ﻓﻲ ﻣﺧﺗﻠﻑ ﺃﻗﺳﺎﻡ ﺍﻟﻣﺅﺳﺳﺔ ﻟﺗﺑﺎﺩﻝ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﻟﺗﻭﺍﺻﻝ ﺑﻭﺍﺳﻁﺔ ﺍﻻﻧﺗﺭﻧﻳﺕ ) (Internetﻣﻥ ﺧﻼﻝ ﻣﺎ ﻳﻁﻠﻖ
ﻋﻠﻳﻬﺎ ﺷﺑﻛﺎﺕ ﺍﻟﺧﺎﺩﻡ ﺑﻌﻳﺩﺓ ﺍﻟﻣﺩﻯ ﻭﺍﻟﺫﻱ ﻳﻐﻁﻲ ﻣﺳﺎﺣﺎﺕ ﺟﻐﺭﺍﻓﻳﺔ ﻭﺍﺳﻌﺔ ﻭﺗﺿﻡ ﻋﺷﺭﺍﺕ ﺍﻵﻻﻑ ﺑﻝ ﻣﺋﺎﺕ ﺍﻵﻻﻑ ﻣﻥ ﺍﻟﺷﺑﻛﺎﺕ
ﻭﺍﻟﺣﻭﺍﺳﻳﺏ ﺍﻟﻣﺭﺗﺑﻁﺔ ﻣﻊ ﺑﻌﺿﻬﺎ ﻓﻲ ﻣﺧﺗﻠﻑ ﺩﻭﻝ ﺍﻟﻌﺎﻟﻡ ﻣﺛﻝ ﺍﻟﺷﺑﻛﺔ ﺍﻟﻌﻧﻛﺑﻭﺗﻳﺔ ﺍﻟﻌﺎﻟﻣﻳﺔ (World Wide Web
).(Al-Tamimi,2015: 32) WWW
ﺙ -ﻗﻭﺍﻋﺩ ﺍﻟﺑﻳﺎﻧﺎﺕ :Databaseﻫﻲ ﺍﻟﻭﻋﺎء ﺍﻟﺫﻱ ﻳﺣﺗﻭﻱ ﻋﻠﻰ ﺍﻟﻣﻠﻔﺎﺕ ﻭﺍﻟﻣﻭﺿﻭﻋﺎﺕ ﻭﺍﻟﺑﻳﺎﻧﺎﺕ ﺍﻟﻣﻧﻅﻣﺔ ﻭﺍﻟﻣﺗﺭﺍﺑﻁﺔ ﻣﻊ
ﺑﻌﺿﻬﺎ ﻭﺍﻟﻣﺧﺯﻭﻧﺔ ﻋﻠﻰ ﺍﺟﻬﺯﻩ ﺍﻟﺣﺎﺳﻭﺏ ،ﻭﺍﻟﺗﻲ ﺗﺷﻛﻝ ﺍﻟﻣﺎﺩﺓ ﺍﻻﻭﻟﻳﺔ ﻟﻧﻅﻡ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺗﻲ ﺗﻡ ﻣﻌﺎﻟﺟﺗﻬﺎ ﻭﺗﺣﺩﻳﺛﻬﺎ
ﻭﺍﺳﺗﺭﺟﺎﻋﻬﺎ ﻟﻠﻭﺻﻭﻝ ﺇﻟﻰ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﻭﻳﻣﻛﻥ ﺗﺣﺩﻳﺙ ﻭﺗﻌﺩﻳﻝ ﻭﺇﺿﺎﻓﺔ ﺍﻟﺑﻳﺎﻧﺎﺕ ﺑﺎﺳﺗﻣﺭﺍﺭ ﻟﺗﻭﺍﻛﺏ ﺍﻟﺗﻁﻭﺭ ﻭﺍﻟﺗﻐﻳﺭﺍﺕ ﺍﻟﻣﺳﺗﺟﺩﺓ
ﻭﺍﻟﺗﻲ ﺗﺩﻋﻡ ﺍﻟﻣﺩﻳﺭﻳﻥ ﻓﻲ ﺍﺗﺧﺎﺫ ﺍﻟﻘﺭﺍﺭﺍﺕ ﺍﻟﻣﻧﺎﺳﺑﺔ ﻓﻲ ﺍﻟﻭﻗﺕ ﺍﻟﻣﻧﺎﺳﺏ ﻭﻟﻳﺗﻣﻛﻥ ﺑﺎﻗﻲ ﺍﻟﻣﺳﺗﺧﺩﻣﻳﻥ ﺍﻟﻧﻬﺎﺋﻳﻳﻥ ﻣﻥ ﺍﻟﻘﻳﺎﻡ
ﺑﺎﻋﻣﺎﻟﻬﻡ ﺑﻛﻔﺎءﺓ ﻭﻓﺎﻋﻠﻳﺔ ) ،(Al-Tamimi,2015: 32ﻭﺗﺑﺭﺯ ﺍﻫﻣﻳﺔ ﺍﺳﺗﺧﺩﺍﻡ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻓﻲ ﺇﺩﺍﺭﺓ ﻗﺎﻋﺩﺓ
ﺍﻟﺑﻳﺎﻧﺎﺕ ﺑﺎﻟﻣﻧﺎﻓﻊ ﺍﻵﺗﻳﺔ(Abdellatif,٢٠١٠:19) :
ﺗﻛﺎﻣﻝ ﺍﻟﺑﻳﺎﻧﺎﺕ Data Integration
ﻣﺷﺎﺭﻛﺔ ﺍﻟﺑﻳﺎﻧﺎﺕ Data Sharing
ﺍﻟﻣﺭﻭﻧﺔ ﻓﻲ ﺍﻋﺩﺍﺩ ﺍﻟﺗﻘﺎﺭﻳﺭ Reporting Flexibility
ﺗﻘﻠﻳﻝ ﺍﻟﺗﻌﺎﺭﺽ ﻭﺍﻻﺳﻬﺎﺏ ﻓﻲ ﺍﻟﺑﻳﺎﻧﺎﺕ Minimal Data Redundancy and Data Inconsistence
ﺑﺭﻏﻡ ﺍﻟﻘﻳﻣﺔ ﺍﻟﻣﺿﺎﻓﺔ ﺍﻟﺗﻲ ﺗﺣﺻﻝ ﻋﻠﻳﻬﺎ ﺍﻟﻣﺅﺳﺳﺔ ﺗﻌﺗﺑﺭ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻣﻥ ﺃﻛﺛﺭ ﺍﻟﻣﺟﺎﻻﺕ ﻋﺭﺿﻪ ﻟﻠﻌﺩﻳﺩ ﻣﻥ
ﺍﻟﻣﺧﺎﻁﺭ ﻭﻏﺎﻟﺑﺎ ً ﻣﺎ ﻳﻬﺗﻡ ﺍﻟﻣﻧﻅﻣﻭﻥ ﻭﺍﻟﻣﺷﺭﻋﻭﻥ ﺑﺎﻟﻣﺧﺎﻁﺭ ﺍﻟﺗﺷﻐﻳﻠﻳﺔ ﻭﺍﻟﻧﻅﺎﻣﻳﺔ ﺍﻟﻣﺗﻌﻠﻘﺔ ﺑﺎﻟﻧﻅﻡ ﺍﻟﺗﻛﻧﻭﻟﻭﺟﻳﺔ ﻭﺍﻟﺗﻲ ﺗﺷﻣﻝ
ﻣﺧﺎﻁﺭ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺃﻣﻥ ﻧﻅﻡ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ) ،((Al-Sawah, 2016: 7ﻭﻓﻲ ﺍﻟﺟﺩﻭﻝ ) (١٠ﻣﺧﺎﻁﺭ ﻣﺣﺩﺩﺓ ﻟﻠﺭﻗﺎﺑﺔ
ﺍﻟﺩﺍﺧﻠﻳﺔ ﺍﻟﺗﻲ ﺗﺗﻌﺭﺽ ﻟﻬﺎ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻓﻲ ﺍﻟﻣﺻﺎﺭﻑ:
ﺍﻟﺟﺩﻭﻝ ) (١٠ﻣﺧﺎﻁﺭ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺗﻲ ﺗﺗﻌﺭﺽ ﻟﻬﺎ ﺍﻟﻣﺻﺎﺭﻑ
ﻣﻔﻬﻭﻣﻬﺎ ﺃﻧﻭﺍﻉ ﺍﻟﻣﺧﺎﻁﺭ ﺕ
ﺗﺷﻣﻝ ﻫﺫﻩ ﺍﻟﻣﺧﺎﻁﺭ ﺑﺗﻭﻗﻑ ﺃﻧﻅﻣﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﻧﺎﺗﺟﺔ ﻋﻥ ﺍﻟﻛﻭﺍﺭﺙ ﺍﻟﻁﺑﻳﻌﻳﺔ ﺃﻭ
ﺍﻟﺑﺷﺭﻳﺔ ﻣﻣﺎ ﻳﻧﺗﺞ ﻋﻧﻪ ﺗﻌﻁﻝ ﺍﻟﺧﺩﻣﺎﺕ ﺍﻟﻣﻘﺩﻣﺔ ﺇﻟﻰ ﺍﻟﺯﺑﺎﺋﻥ ،ﻟﺫﺍ ﺗﻁﻠﺏ ﺣﻣﺎﻳﺔ ﺃﻣﻥ
ﻣﺧﺎﻁﺭ ﺗﻭﺍﻓﺭ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
ﺍﻣﻌﻠﻭﻣﺎﺕ ﻣﻥ ﺍﻟﻣﺧﺎﻁﺭ ﻭﺍﻟﺗﻬﺩﻳﺩﺍﺕ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻭﺍﻟﺧﺎﺭﺟﻳﺔ ﻣﻥ ﺧﻼﻝ ﻭﺿﻊ ﺍﻷﺟﺭﺍءﺍﺕ ١
ﻭﺍﻟﻭﺳﺎﺋﻝ ﺍﻟﻭﻗﺎﺋﻳﺔ ﻟﺣﻣﺎﻳﺔ ﻭﺳﺭﻳﺔ ﻣﻌﻠﻭﻣﺎﺕ ﺍﻋﻣﻝ ﺍﻟﻣﺻﺭﻓﻲ ﻭﺍﻟﺫﻱ ﺍﺻﺑﺢ ﻳﺷﻛﻝ
ﻣﻭﺿﻭﻋﺎ ً ﻫﺎﻣﺎ ً ﻟﻠﻣﺅﺳﺳﺎﺕ
ﻭﺗﺗﻣﺛﻝ ﻫﺫﻩ ﺍﻟﻣﺧﺎﻁﺭ ﺍﻹﺧﻔﺎﻕ ﻓﻲ ﺗﻠﺑﻳﺔ ﻋﻣﻠﻳﺎﺕ ﺗﻁﻭﻳﺭ ﺃﻭ ﺻﻳﺎﻧﺔ ﺃﻧﻅﻣﺔ ﺍﻟﺑﺭﺍﻣﺞ ﻣﺧﺎﻁﺭ ﺃﺧﻁﺎء ﺗﻁﻭﻳﺭ
ﻟﻣﺗﻁﻠﺑﺎﺕ ﺍﻟﻣﺳﺗﺧﺩﻡ ﺍﻟﻧﻬﺎﺋﻲ ،ﺃﻭ ﻋﺩﻡ ﺗﺩﻋﻳﻡ ﺃﻧﺷﻁﺔ ﺍﻟﻌﻣﻝ ،ﺑﺳﺑﺏ ﺿﻌﻑ ﺃﺟﺭﺍءﺍﺕ ﺍﻟﺑﺭﺍﻣﺞ ٢
ﺍﻟﺗﺩﻗﻳﻖ ﻭﺍﻟﺿﺑﻁ .
ﻭﺗﺷﺗﻣﻝ ﻫﺫﻩ ﺍﻟﻣﺧﺎﻁﺭ ﺑﺗﺭﻛﺯ ﺍﻟﻣﻬﺎﻡ ﻭﺍﻷﻧﺷﻁﺔ ﺍﻟﺭﺋﻳﺳﺔ ﻋﻧﺩ ﺍﻋﻁﺎء ﺍﻟﺻﻼﺣﻳﺎﺕ ﻣﺧﺎﻁﺭ ﻋﺩﻡ ﺍﻟﻔﺻﻝ ﺑﻳﻥ
ﻭﺍﻟﻣﺳﺅﻟﻳﺎﺕ ﺑﻳﺩ ﺑﻌﺽ ﺍﻟﻣﻭﻅﻔﻳﻥ ﻣﺛﻝ ﺗﺣﻠﻳﻼﺕ ﺍﻟﻧﻅﻡ ﻭﻣﺗﺎﺑﻌﺔ ﺍﻟﺷﺑﻛﺎﺕ ﻭﺍﻟﺗﻁﻭﻳﺭ ﺍﻟﻭﺍﺟﺑﺎﺕ ٣
ﻭﺇﺩﺍﺭﺓ ﻗﻭﺍﻋﺩ ﺍﻟﺑﻳﺎﻧﺎﺕ ﻣﻣﺎ ﻳﺅﺩﻱ ﺇﻟﻰ ﺗﻌﺎﺭﺽ ﻣﺻﺎﻟﺢ ﺍﻟﻌﻣﻝ ﺍﻟﻣﺻﺭﻓﻲ .
ﻭﺗﺷﺗﻣﻝ ﺑﺎﻟﻣﺧﺎﻁﺭ ﺍﻟﻧﺎﺗﺟﺔ ﻋﻥ ﺿﻌﻑ ﺗﺷﻐﻳﻝ ﻭﺍﺳﺗﺧﺩﺍﻡ ﺗﻘﻧﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻛﻣﺎ ﻫﻭ
ﻣﺧﻁﻁ ﻣﻣﺎ ﻳﻌﺭﺽ ﺳﻼﻣﺔ ﻭﺟﻭﺩﺓ ﺍﻟﺑﻳﺎﻧﺎﺕ ﻭﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﻟﻣﻭﺟﻭﺩﺍﺕ ﺍﻟﻬﺎﻣﺔ ﻟﻠﺧﻁﺭ
ﻣﺧﺎﻁﺭ ﺍﻟﺗﻭﻗﻑ ﺃﻭ ﺍﻟﻔﺷﻝ
ﻭﺑﺎﻟﺗﺎﻟﻲ ﺍﻟﺧﺳﺎﺋﺭ ﺍﻟﻣﺣﺗﻣﻠﺔ ﺃﻭ ﺳﻭء ﺍﻻﺳﺗﺧﺩﺍﻡ ،ﻓﺿﻼ ﻋﻥ ﺃﺧﻁﺎﺭ ﺗﺯﻭﻳﺩ ﺧﺩﻣﺎﺕ ٤
ﻟﻠﺗﻘﻧﻳﺎﺕ
ﺍﻻﻧﺗﺭﻧﺕ ﺍﻟﻣﺻﺭﻓﻳﺔ ﻭﺍﻟﺗﻲ ﺗﺗﻁﻠﺏ ﻣﺭﺍﻗﺑﺗﻬﺎ ﺑﺷﻛﻝ ﺟﻳﺩ ﺃﻭ ﻳﺗﺭﺗﺏ ﻋﻠﻰ ﺿﻌﻑ ﺍﻟﺭﻗﺎﺑﺔ
ﺿﻳﺎﻉ ﺳﺭﻳﺔ ﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﻣﺻﺭﻑ ﻭﺍﻟﺯﺑﺎﺋﻥ ،ﻭﻣﺻﺩﺍﻗﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ .
ﻭﺗﺷﺗﻣﻝ ﺑﺎﻟﻣﺧﺎﻁﺭ ﺍﻟﻧﺎﺗﺟﺔ ﻋﻥ ﺃﻧﻅﻣﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺗﻲ ﺗﻌﻣﻝ ﻓﻲ ﺑﻳﺋﺔ ﻏﻳﺭ ﺁﻣﻧﺔ ﻭﻏﻳﺭ
ﻣﺧﺎﻁﺭ ﺍﻟﺩﺧﻭﻝ ﺍﻟﺷﺧﺻﻲ
ﻣﺣﻣﻳﺔ ﻣﻣﺎ ﻳﻌﺭﺽ ﺃﻧﻅﻣﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﻣﺧﺎﻁﺭ ﺍﻟﺳﺭﻗﺔ ﺃﻭ ﺍﻟﺩﺧﻭﻝ ﺍﻟﺷﺧﺻﻲ ﻏﻳﺭ ٥
ﻏﻳﺭ ﺍﻟﻣﺻﺭﺡ ﺑﻪ
ﺍﻟﻣﺻﺭﺡ ﺑﻪ.
ﻭﺗﺷﺗﻣﻝ ﻫﺫﻩ ﺍﻟﻣﺧﺎﻁﺭ ﺑﺿﻌﻑ ﺇﺟﺭﺍءﺍﺕ ﺇﺩﺍﺭﺓ ﺍﻟﺗﻐﻳﻳﺭ ،ﺍﻟﻼﺯﻣﺔ ﻟﻠﺗﺄﻛﺩ ﻣﻥ ﺇﻥ ﺍﻟﺗﻐﻳﻳﺭﺍﺕ ﻣﺧﺎﻁﺭ ﺇﺩﺍﺭﺓ ﺍﻟﺗﻐﻳﻳﺭ
٦
ﺍﻟﺗﻲ ﻳﺗﻡ ﺗﻁﺑﻳﻘﻬﺎ ﻳﻣﻛﻥ ﺃﻥ ﺗﺅﺛﺭ ﺑﺷﻛﻝ ﻋﻛﺳﻲ ﻓﻲ ﺳﻼﻣﺔ ﻭﺍﻣﻥ ﺍﻟﺑﻳﺎﻧﺎﺕ.
ﻭﺗﺷﺗﻣﻝ ﻫﺫﻩ ﺍﻟﻣﺧﺎﻁﺭ ﻓﻲ ﺗﻌﺭﺽ ﻣﺧﺗﻠﻑ ﻗﻭﺍﻋﺩ ﺑﻳﺎﻧﺎﺕ ﺍﻟﻣﺻﺎﺭﻑ ﻟﻼﻧﺗﻬﺎﻛﺎﺕ ﺍﻷﻣﻧﻳﺔ
ﻣﺧﺎﻁﺭ ﺍﻣﻥ ﻗﺎﻋﺩﺓ ﺍﻟﺑﻳﺎﻧﺎﺕ
ﺑﺳﺑﺏ ﻋﺩﻡ ﺗﻭﺍﻓﺭ ﺃﻭ ﺿﻌﻑ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻋﻠﻰ ﺳﻳﺎﺳﺔ ﺍﻟﺩﺧﻭﻝ ،ﻭﺣﻣﺎﻳﺔ ﻗﺎﻋﺩﺓ ٧
ﺍﻟﺑﻳﺎﻧﺎﺕ.
ﻣﺧﺎﻁﺭ ﺗﻘﺩﻳﻡ ﺍﻟﺧﺩﻣﺎﺕ
ﻭﺗﺗﻣﺛﻝ ﻫﺫﻩ ﺍﻟﻣﺧﺎﻁﺭ ﺑﺿﻌﻑ ﺍﺳﺗﺟﺎﺑﺔ ﺍﻟﻣﺻﺎﺭﻑ ﻓﻲ ﺗﻘﺩﻳﻡ ﺍﻟﺧﺩﻣﺎﺕ ﺍﻟﻰ ﺍﻟﻐﻳﺭ ﻣﻣﺎ
ﻟﻠﻐﻳﺭ ٨
ﻳﺅﺩﻱ ﺇﻟﻰ ﺗﻌﻁﻳﻝ ﺍﻟﺧﺩﻣﺎﺕ ﺍﻟﻣﻘﺩﻣﺔ ﻟﻠﺯﺑﺎﺋﻥ.
ﻭﺗﻌﻧﻲ ﻣﺧﺎﻁﺭ ﺍﺧﺗﺭﺍﻕ ﺷﺑﻛﺎﺕ ﺍﻟﻣﺻﺭﻑ ﻣﻥ ﻗﺑﻝ ﺗﻬﺩﻳﺩﺍﺕ ﺍﻟﺟﻬﺎﺕ ﺍﻟﺧﺎﺭﺟﻳﺔ ،ﻭﺍﻟﺗﻲ
ﺗﺅﺩﻱ ﺇﻟﻰ ﺍﻟﻛﺷﻑ ﻭﺍﻻﻁﻼﻉ ﻋﻠﻰ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺳﺭﻳﺔ ﻭﺍﻟﺣﺳﺎﺳﺔ ﺃﻭ ﺗﺩﻣﻳﺭ ﺍﻷﺟﻬﺯﺓ ﻣﺧﺎﻁﺭ ﺍﺧﺗﺭﺍﻕ ﺷﺑﻛﺎﺕ
٩
ﻭﺍﻟﻣﻌﺩﺍﺕ ،ﻓﺿﻼ ﻋﻥ ﺍﺧﻁﺎﺭ ﺧﺩﻣﺎﺕ ﺍﻻﻧﺗﺭﻧﺕ ﻭﺍﻟﺗﻲ ﺗﺗﻁﻠﺏ ﻣﺭﺍﻗﺑﺔ ﻭﻣﺗﺎﺑﻌﺔ ﺿﻣﺎﻧﺎ ً ﺍﻻﺗﺻﺎﻻﺕ
ﻟﻠﻣﺣﺎﻓﻅﺔ ﻋﻠﻰ ﻣﺻﺩﺍﻗﻳﺔ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﻣﻘﺩﻣﺔ.
62.4 ﺍﻟﻣﺟﺎﻝ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 22.12 0.69 3.12 ﺍﻟﺗﻘﻳﻳﻡ ،ﺍﻟﺗﻭﺟﻳﻪ ﻭﺍﻟﻣﺭﺍﻗﺑﺔ
0 ﺍﻻﻭﻝ
64.6
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 22.29 0.72 3.23 ﺿﻣﺎﻥ ﺗﺣﻘﻳﻖ ﺍﻟﻔﻭﺍﺋﺩ ﺛﺎﻧﻳﺎ ً
0
61.8
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 24.27 0.75 3.09 ﺿﻣﺎﻥ ﺗﺣﺳﻳﻥ ﺍﻟﻣﺧﺎﻁﺭ ﺛﺎﻟﺛﺎ ً
0
61.8
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 27.83 0.86 3.09 ﺿﻣﺎﻥ ﺗﺣﺳﻳﻥ ﺍﻟﻣﻭﺍﺭﺩ ﺭﺍﺑﻌﺎ ً
0
61.0
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 26.56 0.81 3.05 ﺿﻣﺎﻥ ﺍﻟﺷﻔﺎﻓﻳﺔ ﻭﺍﻹﻓﺻﺎﺡ ﻷﺻﺣﺎﺏ ﺍﻟﻣﺻﻠﺣﺔ ﺧﺎﻣﺳﺎ ً
0
) ،(%71.80ﻭﺑﺷﻛﻝ ﻋﺎﻡ ﺑﻠﻐﺕ ﻗﻳﻣﺔ ﺍﻟﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ﻟﻠﻣﺟﺎﻝ ) (3.16ﻭﻫﻲ ﺗﺯﻳﺩ ﻋﻥ ﻣﺗﻭﺳﻁ ﻣﻘﻳﺎﺱ ﻟﻛﻳﺭﺕ ،ﻭﺑﻠﻐﺕ
ﺍﻷﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ) (%63.20ﻭﺍﻟﺫﻱ ﻳﻣﺛﻝ ﻣﺳﺗﻭﻯ ﺗﻁﺑﻳﻖ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﻠﻣﺟﺎﻝ ﺍﻟﺛﺎﻧﻲ ﻓﻲ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ
ﺍﻟﻣﺳﺎﻫﻣﺔ ﺍﻟﺧﺎﺻﺔ ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺳﻭﻕ ﺍﻟﻌﺭﺍﻕ ﻟﻼﻭﺭﺍﻕ ﺍﻟﻣﺎﻟﻳﺔ ﻣﺣﻝ ﺍﻟﺩﺭﺍﺳﺔ ﻭﻓﻖ ﺇﻁﺎﺭ ﻋﻣﻝ ،COBIT5ﻭﻳﺑﺗﻌﺩ ﺻﻌﻭﺩﺍ ً ﻋﻥ
ﺩﺭﺟﺔ ﺍﻟﻘﻁﻊ ) (%60ﻭﺣﺳﺏ ﺍﻻﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﻟﻠﻣﻘﻳﺎﺱ.
ﺟﺩﻭﻝ) (12ﺍﻻﻭﺳﺎﻁ ﺍﻟﺣﺳﺎﺑﻳﺔ ﻭﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ﻭﻣﻌﺎﻣﻝ ﺍﻻﺧﺗﻼﻑ ﻭﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ﻟﻣﺟﺎﻝ ﺍﻟﺗﻭﺍﻓﻖ ،ﺍﻟﺗﺧﻁﻳﻁ ﻭﺍﻟﺗﻧﻅﻳﻡ
ﻗﺭﺍﺭ
ﻗﺭﺍﺭ ﺗﻁﺑﻳﻖ
ﺍﻟﺗﻁﺑﻳﻖ ﺍﻻﻫﻣﻳﺔ ﻣﻌﺎﻣﻝ ﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻭﺳﻁ
ﺣﺳﺏ ﺍﻟﻔﻘﺭﺍﺕ ﺕ
ﺑﺎﻷﺗﺟﺎﻩ ﺍﻟﻧﺳﺑﻳﺔ ﺍﻻﺧﺗﻼﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ﺍﻟﺣﺳﺎﺑﻲ
ﺍﻟﻣﻘﻳﺎﺱ
ﺍﻟﻌﺎﻡ
63.2
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 25.63 0.81 3.16 ﺍﻟﺗﻭﺍﻓﻖ ،ﺍﻟﺗﺧﻁﻳﻁ ﻭﺍﻟﺗﻧﻅﻳﻡ
0
68.0
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 22.94 0.78 3.40 ﺗﻔﻌﻳﻝ ﺍﻹﻁﺎﺭ ﺍﻟﻌﺎﻡ ﻹﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻭﻻ
0
61.8
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 28.16 0.87 3.09 ﺇﺩﺍﺭﺓ ﺍﻻﺳﺗﺭﺍﺗﻳﺟﻳﺔ ﺛﺎﻧﻳﺎ
0
62.2
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 30.87 0.96 3.11 ﺇﺩﺍﺭﺓ ﺩﻭﺍﺋﺭ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺛﺎﻟﺛﺎ
0
59.8
ﻏﻳﺭ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 30.10 0.90 2.99 ﺇﺩﺍﺭﺓ ﺍﻻﺑﺗﻛﺎﺭﺍﺕ ﺭﺍﺑﻌﺎ
0
57.4
ﻏﻳﺭ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 30.66 0.88 2.87 ﺇﺩﺍﺭﺓ ﻣﺣﻔﻅﺔ ﺍﻟﻣﺷﺎﺭﻳﻊ ﺧﺎﻣﺳﺎ
0
58.6
ﻏﻳﺭ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 32.76 0.96 2.93 ﺇﺩﺍﺭﺓ ﺍﻟﻣﻭﺍﺯﻧﺔ ﻭﺍﻟﺗﻛﺎﻟﻳﻑ ﺳﺎﺩﺳﺎ
0
64.2
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 24.92 0.80 3.21 ﺇﺩﺍﺭﺓ ﺍﻟﻣﻭﺍﺭﺩ ﺍﻟﺑﺷﺭﻳﺔ ﺳﺎﺑﻌﺎ
0
61.4
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 31.60 0.97 3.07 ﺇﺩﺍﺭﺓ ﺍﻟﻌﻼﻗﺎﺕ ﺛﺎﻣﻧﺎ
0
62.2
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 31.83 0.99 3.11 ﺇﺩﺍﺭﺓ ﺍﺗﻔﺎﻗﻳﺎﺕ ﺍﻟﺧﺩﻣﺔ ﺗﺎﺳﻌﺎ
0
61.8
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 32.69 1.01 3.09 ﺇﺩﺍﺭﺓ ﺍﻟﻣﺯﻭﺩﻳﻥ ﻋﺎﺷﺭﺍ
0
61.4
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 33.22 1.02 3.07 ﺇﺩﺍﺭﺓ ﺍﻟﺟﻭﺩﺓ ﺍﺣﺩﻋﺷﺭ
0
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 67.0 26.57 0.89 3.35 ﺇﺩﺍﺭﺓ ﺍﻟﻣﺧﺎﻁﺭ ﺍﺛﻧﻰ ﻋﺷﺭ
0
71.8
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 25.07 0.90 3.59 ﺇﺩﺍﺭﺓ ﺃﻣﻥ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺛﻼﺛﺔ ﻋﺷﺭ
0
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 63.00 28.25 0.89 3.15 ﺍﻟﺑﻧﺎء ،ﺍﻻﻣﺗﻼﻙ ﻭﺍﻟﺗﻧﻔﻳﺫ
ﻏﻳﺭ ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 57.60 29.51 0.85 2.88 ﺇﺩﺍﺭﺓ ﺍﻟﺑﺭﺍﻣﺞ ﻭﺍﻟﻣﺷﺎﺭﻳﻊ ﺍﻭﻻ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 63.20 27.85 0.88 3.16 ﺇﺩﺍﺭﺓ ﺗﻌﺭﻳﻑ ﺍﻟﻣﺗﻁﻠﺑﺎﺕ ﻭﺍﻻﺣﺗﻳﺎﺟﺎﺕ ﺛﺎﻧﻳﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 64.00 30.00 0.96 3.20 ﺇﺩﺍﺭﺓ ﻋﻣﻠﻳﺔ ﺍﺧﺗﻳﺎﺭ ﻭﺑﻧﺎء ﺍﻟﺣﻠﻭﻝ ﺛﺎﻟﺛﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 67.20 35.12 1.18 3.36 ﺇﺩﺍﺭﺓ ﺍﻟﺗﻭﺍﻓﺭﻳﺔ ﻭﺍﻟﻁﺎﻗﺔ ﺍﻻﺳﺗﻳﻌﺎﺑﻳﺔ ﺭﺍﺑﻌﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 61.60 31.82 0.98 3.08 ﺇﺩﺍﺭﺓ ﺗﻣﻛﻳﻥ ﺍﻟﺗﻐﻳﻳﺭ ﺍﻟﻣﺅﺳﺳﻲ ﺧﺎﻣﺳﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 62.60 30.67 0.96 3.13 ﺇﺩﺍﺭﺓ ﺍﻟﺗﻌﺩﻳﻼﺕ ﺳﺎﺩﺳﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 61.80 29.77 0.92 3.09 ﺇﺩﺍﺭﺓ ﻗﺑﻭﻝ ﺍﻟﺗﻌﺩﻳﻝ ﻭﺍﻟﺗﺣﻭﻻﺕ ﺳﺎﺑﻌﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 64.20 30.53 0.98 3.21 ﺇﺩﺍﺭﺓ ﺍﻟﻣﻌﺭﻓﺔ ﺛﺎﻣﻧﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 64.60 30.34 0.98 3.23 ﺇﺩﺍﺭﺓ ﺍﻟﻣﻭﺟﻭﺩﺍﺕ ﺗﺎﺳﻌﺎ
ﻣﻁﺑﻖ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 62.60 38.02 1.19 3.13 ﺇﺩﺍﺭﺓ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻋﺎﺷﺭﺍ
ﻭﺍﻟﺣﻭﺍﺩﺙ ،ﻭﺇﺩﺍﺭﺓ ﺍﻟﻣﺷﺎﻛﻝ ،ﻭﺇﺩﺍﺭﺓ ﺍﻻﺳﺗﻣﺭﺍﺭﻳﺔ ،ﻭﺇﺩﺍﺭﺓ ﺧﺩﻣﺎﺕ ﺃﻣﻥ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﺇﺩﺍﺭﺓ ﺿﻭﺍﺑﻁ ﺍﺟﺭﺍءﺍﺕ ﺍﻻﻋﻣﺎﻝ( ،ﻭﻳﻣﻛﻥ
ﺗﻭﺿﻳﺢ ﺫﻟﻙ ﻛﺎﻵﺗﻲ-:
-1ﺇﻥ ﺃﻛﺛﺭ ﺍﻷﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﻳﺔ ﺗﻁﺑﻳﻘﺎ ً ﻫﻭ ﺍﻟﻬﺩﻑ ﺍﻟﺭﺍﺑﻊ )ﺇﺩﺍﺭﺓ ﺍﻻﺳﺗﻣﺭﺍﺭﻳﺔ( ﺇﺫ ﺑﻠﻎ ﺍﻟﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ) ،(3.35ﻭﻳﻘﺎﺑﻝ ﺷﺩﺓ
ﺍﻻﺟﺎﺑﺔ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ ،ﻭﺑﻠﻐﺕ ﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ) ،(%67ﻭﺑﻣﻌﺎﻣﻝ ﺍﺧﺗﻼﻑ ). (28.36
-2ﺇﻥ ﺃﺿﻌﻑ ﺍﻷﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﻳﺔ ﺗﻁﺑﻳﻘﺎ ً ﻫﻭ ﺍﻟﻬﺩﻑ ﺍﻟﺛﺎﻟﺙ )ﺇﺩﺍﺭﺓ ﺍﻟﻣﺷﺎﻛﻝ( ﺇﺫ ﺑﻠﻎ ﺍﻟﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ) ،(3.08ﻭﻳﻘﺎﺑﻝ ﺷﺩﺓ
ﺍﻻﺟﺎﺑﺔ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ ،ﻭﺑﻣﻌﺎﻣﻝ ﺍﺧﺗﻼﻑ ) ،(32.79ﻭﺑﻠﻐﺕ ﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ) ،(%61.60ﻭﻳﻌﺗﺑﺭ ﻣﻁﺑﻖ ﺣﺳﺏ ﺍﻟﻣﻘﻳﺎﺱ
ﺍﻟﻌﺎﻡ .
-٣ﻳﺑﻳﻥ ﺍﻟﺟﺩﻭﻝ ﺍﺩﻧﺎﻩ ﻣﺳﺗﻭﻯ ﺗﻁﺑﻳﻖ ﺇﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﻠﻣﺟﺎﻝ ﺍﻟﺭﺍﺑﻊ ،ﻓﻘﺩ ﻅﻬﺭﺕ ﺍﻟﻣﺗﻭﺳﻁﺎﺕ ﺍﻟﺣﺳﺎﺑﻳﺔ ﻟﺟﻣﻳﻊ
ﺍﻷﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﻳﺔ ﻋﺎﻟﻳﺔ ﺍﻟﻣﺳﺗﻭﻯ ،ﺿﻣﻥ ) ،(3.35 -3.08ﻭﺗﻘﺎﺑﻝ ﺷﺩﺓ ﺍﻻﺟﺎﺑﺔ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ ﻋﻠﻰ ﻣﻘﻳﺎﺱ ﻟﻳﻛﺭﺕ ،ﻛﻣﺎ
ﻧﻼﺣﻅ ﺍﻥ ﻗﻳﻡ ﺍﻷﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ﻟﻔﻘﺭﺍﺕ ﺍﻷﻫﺩﺍﻑ ﺍﻟﺭﻗﺎﺑﻳﺔ ﻟﻠﻣﺟﺎﻝ ﺍﻻﻭﻝ ﺗﻘﻊ ﺿﻣﻥ ﺣﺩﻩ ﺍﻷﺩﻧﻰ ) (%61.60ﻭﺣﺩﻩ ﺍﻻﻋﻠﻰ
) ،(%76ﻭﺑﺷﻛﻝ ﻋﺎﻡ ﺑﻠﻐﺕ ﻗﻳﻣﺔ ﺍﻟﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ﻟﻠﻣﺟﺎﻝ ) (3.24ﻭﻫﻲ ﺗﺯﻳﺩ ﻋﻥ ﻣﺗﻭﺳﻁ ﻣﻘﻳﺎﺱ ﻟﻛﻳﺭﺕ ،ﻭﺑﻠﻐﺕ ﺍﻷﻫﻣﻳﺔ
ﺍﻟﻧﺳﺑﻳﺔ ) (%64.80ﻭﻫﺫﺍ ﻳﻌﻧﻲ :ﺇﻥَ ﻣﺳﺗﻭﻯ ﺗﻁﺑﻳﻖ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﻠﻣﺟﺎﻝ ﺍﻟﺛﺎﻧﻲ ﻓﻲ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ
ﺍﻟﻣﺳﺎﻫﻣﺔ ﺍﻟﺧﺎﺻﺔ ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺳﻭﻕ ﺍﻻﻭﺭﺍﻕ ﺍﻟﻣﺎﻟﻳﺔ ﻣﺣﻝ ﺍﻟﺩﺭﺍﺳﺔ ﻭﻓﻖ ﺇﻁﺎﺭ ﻋﻣﻝ ،COBIT5ﺑﻠﻎ ) (%64.80ﻭﺍﻟﺫﻱ ﻳﺑﺗﻌﺩ
ﺻﻌﻭﺩﺍ ً ﻋﻥ ﺩﺭﺟﺔ ﺍﻟﻘﻁﻊ ) (%60ﻭﺣﺳﺏ ﺍﻻﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﻟﻣﻘﻳﺎﺱ ﻟﻳﻛﺭﺕ.
ﺍﻟﺟﺩﻭﻝ ) (14ﺍﻻﻭﺳﺎﻁ ﺍﻟﺣﺳﺎﺑﻳﺔ ﻭﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ﻭﻣﻌﺎﻣﻝ ﺍﻻﺧﺗﻼﻑ ﻭﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ﻟﻣﺟﺎﻝ ﺍﻟﺗﻭﺻﻳﻝ ،ﺍﻟﺧﺩﻣﺔ ﻭﺍﻟﺩﻋﻡ
ﻗﺭﺍﺭ ﺍﻟﺗﻁﺑﻳﻖ ﻗﺭﺍﺭ ﺗﻁﺑﻳﻖ ﺍﻻﻫﻣﻳﺔ ﻣﻌﺎﻣﻝ ﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻭﺳﻁ
ﺍﻟﻔﻘﺭﺍﺕ ﺕ
ﺑﺎﻷﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﺣﺳﺏ ﺍﻟﻣﻘﻳﺎﺱ ﺍﻟﻧﺳﺑﻳﺔ ﺍﻻﺧﺗﻼﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ﺍﻟﺣﺳﺎﺑﻲ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 64.80 27.47 0.89 3.24 ﺍﻟﺗﻭﺻﻳﻝ ،ﺍﻟﺧﺩﻣﺔ ﻭﺍﻟﺩﻋﻡ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 65.40 30.89 1.01 3.27 ﺇﺩﺍﺭﺓ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻭﻻ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 62.60 29.39 0.92 3.13 ﺇﺩﺍﺭﺓ ﺍﻟﺧﺩﻣﺎﺕ ﺍﻟﻣﻁﻠﻭﺑﺔ ﻭﺍﻟﺣﻭﺍﺩﺙ ﺛﺎﻧﻳﺎ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 61.60 32.79 1.01 3.08 ﺇﺩﺍﺭﺓ ﺍﻟﻣﺷﺎﻛﻝ ﺛﺎﻟﺛﺎ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 67.00 28.36 0.95 3.35 ﺇﺩﺍﺭﺓ ﺍﻻﺳﺗﻣﺭﺍﺭﻳﺔ ﺭﺍﺑﻌﺎ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 65.80 29.79 0.98 3.29 ﺇﺩﺍﺭﺓ ﺧﺩﻣﺎﺕ ﺃﻣﻥ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺧﺎﻣﺳﺎ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 66.60 30.33 1.01 3.33 ﺇﺩﺍﺭﺓ ﺿﻭﺍﺑﻁ ﺍﺟﺭﺍءﺍﺕ ﺍﻻﻋﻣﺎﻝ ﺳﺎﺩﺳﺎ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 63.40 27.13 0.86 3.17 ﺍﻟﻣﺭﺍﻗﺑﺔ ،ﺍﻟﺗﻘﻳﻳﻡ ﻭﺍﻟﻘﻳﺎﺱ
ﻏﻳﺭ ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 59.40 29.97 0.89 2.97 ﻣﺭﺍﻗﺑﺔ ﻭﺗﻘﻳﻳﻡ ﻭﻗﻳﺎﺱ ﺍﻻﺩﺍء ﻭﺍﻟﻣﻁﺎﺑﻘﺔ ﺍﻭﻻ
ﻣﺭﺍﻗﺑﺔ ﻭﺗﻘﻳﻳﻡ ﻭﻗﻳﺎﺱ ﻧﻅﺎﻡ ﺍﻟﺿﺑﻁ ﻭﺍﻟﺭﻗﺎﺑﺔ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 65.40 26.91 0.88 3.27 ﺛﺎﻧﻳﺎ
ﺍﻟﺩﺍﺧﻠﻲ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 65.60 28.66 0.94 3.28 ﺗﻘﻳﻳﻡ ﻭﻗﻳﺎﺱ ﺍﻻﻣﺗﺛﺎﻝ ﻟﻠﻣﺗﻁﻠﺑﺎﺕ ﺍﻟﺧﺎﺭﺟﻳﺔ ﺛﺎﻟﺛﺎ
ﺣﺳﺎﺑﻲ ﺑﻠﻎ ) ،(3.44ﻭﺗﻘﺎﺑﻝ ﺷﺩﺓ ﺍﻻﺟﺎﺑﺔ ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ ﻋﻠﻰ ﻣﻘﻳﺎﺱ ﻟﻳﻛﺭﺕ ،ﻭﺑﻣﻌﺎﻣﻝ ﺍﺧﺗﻼﻑ ) ،(25.29ﻭﺍﻟﺫﻱ ﻳﻌﺑﺭ ﻋﻥ
ﻗﺩﺭﺓ ﺍﻟﻣﺻﺎﺭﻑ ﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ ﻋﻠﻰ ﺍﺳﺗﺧﺩﺍﻡ ﻗﺎﻋﺩﺓ ﺑﻳﺎﻧﺎﺕ ﻣﺗﻛﺎﻣﻠﺔ ﺧﺎﺻﺔ ﺑﻪ ﻟﺗﻌﻅﻡ ﻣﺳﺗﻭﻯ ﺍﻟﺭﺿﺎ ﻣﻥ ﻗﺑﻝ ﻣﺳﺗﺧﺩﻣﻳﻬﺎ ﺑﺗﻠﺑﻳﺔ
ﺃﺣﺗﻳﺎﺟﺎﺕ ﺍﻟﻌﻣﻝ ﺑﻛﻔﺎءﺓ ،ﻭﺑﻠﻐﺕ ﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ) ،(%68.80ﻭﻳﺷﻳﺭ ﺍﻻﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﺍﻟﻰ ﺧﻳﺎﺭ ﻣﻁﺑﻖ ،ﻭﺑﻠﻎ ﻣﻌﺎﻣﻝ
ﺍﻻﻧﺣﺭﺍﻑ) ،(0.87ﻭﻫﺫﻩ ﺍﻟﻧﺗﻳﺟﺔ ﺗﺷﻳﺭ ﻟﻠﺑﻌﺩ ﻣﺳﺗﻭﻯ ﺟﻳﺩﺍ ً ﻣﻥ ﺍﻻﻫﻣﻳﺔ ﻟﺩﻯ ﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ.
-٥ﺍﻟﻣﻭﺍﺭﺩ ﺍﻟﺑﺷﺭﻳﺔ )ﺍﻷﻓﺭﺍﺩ( ) :(Human Resourcesﺗﻡ ﻗﻳﺎﺱ ﻫﺫﺍ ﺍﻟﺑﻌﺩ ﻣﻥ ﺧﻼﻝ ﻁﺭﺡ ﺍﺭﺑﻌﺔ ﺍﺳﺋﻠﺔ ،ﺣﻘﻘﺕ ﺍﻟﻔﻘﺭﺓ )(3
ﺍﻋﻠﻰ ﻭﺳﻁ ﺣﺳﺎﺑﻲ ﺑﻠﻎ ) ،(3.44ﻭﺗﻘﺎﺑﻝ ﺷﺩﺓ ﺍﻻﺟﺎﺑﺔ ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ ﻋﻠﻰ ﻣﻘﻳﺎﺱ ﻟﻳﻛﺭﺕ ،ﻭﺑﻣﻌﺎﻣﻝ ﺍﺧﺗﻼﻑ ) ،(23.85ﻣﻣﺎ
ﻳﺷﻳﺭ ﺍﻟﻰ ﻗﺩﺭﺓ ﺍﻟﻣﺻﺎﺭﻑ ﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ ﻋﻠﻰ ﺇﻋﻁﺎء ﻛﻝ ﻣﻭﻅﻑ ﺻﻼﺣﻳﺎﺕ ﻋﻣﻝ ﺗﺗﻧﺎﺳﺏ ﻭﻣﺳﺅﻭﻟﻳﺎﺗﻪ ،ﻭﺑﻠﻐﺕ ﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ
) ،(%68.80ﻭﻳﺷﻳﺭ ﺍﻻﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﻟﻠﻣﻘﻳﺎﺱ ﺍﻟﻰ ﺧﻳﺎﺭ ﻣﻁﺑﻖ ،ﻭﺑﻠﻎ ﻣﻌﺎﻣﻝ ﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ) ،(0.82ﻭﺣﻘﻘﺕ ﺍﻟﻔﻘﺭﺓ ) (1ﺍﺩﻧﻰ
ﻭﺳﻁ ﺣﺳﺎﺑﻲ ﺑﻠﻎ ) ،(3.28ﻭﺗﻘﺎﺑﻝ ﺷﺩﺓ ﺍﻻﺟﺎﺑﺔ ﻣﻁﺑﻖ ﺇﻟﻰ ﺣﺩ ﻣﺎ ﻋﻠﻰ ﻣﻘﻳﺎﺱ ﻟﻳﻛﺭﺕ ،ﻭﺑﻣﻌﺎﻣﻝ ﺍﺧﺗﻼﻑ ) ،(25.69ﻭﺍﻟﺫﻱ ﻳﻌﺑﺭ
ﻋﻥ ﻗﺩﺭﺓ ﺍﻟﻣﺻﺎﺭﻑ ﻋﻳﻧﺔ ﺍﻟﺩﺭﺍﺳﺔ ﻋﻠﻰ ﺗﻭﻅﻳﻑ ﺍﻻﻓﺭﺍﺩ ﺫﻭﻱ ﺍﻟﻣﻬﺎﺭﺍﺕ ﺍﻟﻼﺯﻣﺔ ﺑﻣﺎ ﻳﺗﻼءﻡ ﻣﻊ ﺍﻟﻌﻣﻝ ﺍﻟﻣﺻﺭﻓﻲ ﻟﺗﺣﻘﻳﻖ ﺍﻟﺗﻣﻳﺯ
ﻭﺍﻻﺑﺩﺍﻉ ﻓﻲ ﺗﻘﺩﻳﻡ ﺧﺩﻣﺎﺕ ﺃﻓﺿﻝ ،ﻭﺑﻠﻐﺕ ﺍﻻﻫﻣﻳﺔ ﺍﻟﻧﺳﺑﻳﺔ ) ،(%65.60ﻭﻳﺷﻳﺭ ﺍﻻﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﺍﻟﻰ ﺧﻳﺎﺭ ﻣﻁﺑﻖ ،ﻭﺑﻣﻌﺎﻣﻝ ﺍﺧﺗﻼﻑ
) ،(0.84ﻭﻫﺫﻩ ﺍﻟﻧﺗﻳﺟﺔ ﺗﺷﻳﺭ ﺇﻟﻰ ﺃﻥ ﻟﻬﺫﺍ ﺍﻟﺑﻌﺩ ﻣﺳﺗﻭﻯ ﺟﻳﺩﺍ ً ﻣﻥ ﺍﻻﻫﻣﻳﺔ.
ﺍﻟﺟﺩﻭﻝ ) (16ﺍﻷﻭﺳﺎﻁ ﺍﻟﺣﺳﺎﺑﻳﺔ ﻭﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ﻭﻣﻌﺎﻣﻝ ﺍﻻﺧﺗﻼﻑ ﻭﺍﻻﻫﻣﻳﺔ ﻟﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ )ﻣﻛﻭﻧﺎﺕ ( IT
ﻗﺭﺍﺭ ﺍﻟﺗﻁﺑﻳﻖ ﻗﺭﺍﺭ ﺍﻟﺗﻁﺑﻳﻖ ﺍﻻﻫﻣﻳﺔ ﻣﻌﺎﻣﻝ ﺍﻻﻧﺣﺭﺍﻑ ﺍﻟﻭﺳﻁ
ﺍﻟﻔﻘﺭﺍﺕ ﺕ
ﺑﺎﻷﺗﺟﺎﻩ ﺍﻟﻌﺎﻡ ﺣﺳﺏ ﺍﻟﻣﻘﻳﺎﺱ ﺍﻟﻧﺳﺑﻳﺔ ﺍﻻﺧﺗﻼﻑ ﺍﻟﻣﻌﻳﺎﺭﻱ ﺍﻟﺣﺳﺎﺑﻲ
72.2
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 20.50 0.74 3.61 ﺍﻻﺟﻬﺯﺓ ﻭﺍﻟﻣﻌﺩﺍﺕ )(Hardware ﺍﻭﻻ ً
0
70.0
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 22.29 0.78 3.50 ﺍﻟﺑﺭﻣﺟﻳﺎﺕ )(Software ﺛﺎﻧﻳﺎ ً
0
ﺍﻟﻘﻳﺎﻡ ﺑﺈﺟﺭﺍءﺍﺕ ﻣﻌﺗﻣﺩﺓ ﻭﻣﻁﺑﻘﺔ ﺗﻌﻧﻰ ﺑﺄﻟﻳﺎﺕ
72.0
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 24.06 0.87 3.60 ﺗﻁﻭﻳﺭ ﻭﺷﺭﺍء ﻭﻓﺣﺹ ﻭﺗﺷﻐﻳﻝ ﺍﻟﺑﺭﺍﻣﺞ ﺑﻛﻔﺎءﺓ 1
0
ﻋﺎﻟﻳﺔ
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 71.2 24.43 0.87 3.56 ﺍﺳﺗﺧﺩﺍﻡ ﺍﻟﺑﺭﻣﺟﻳﺎﺕ ﺍﻟﺗﻲ ﺗﻣﺗﺎﺯ ﺑﺎﻟﻣﺭﻭﻧﺔ ﺃﺫ ﻳﺳﻬﻝ 3
71.8
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 24.23 0.87 3.59 ﻗﻭﺍﻋﺩ ﺍﻟﺑﻳﺎﻧﺎﺕ )(Database ﺭﺍﺑﻌﺎ ً
0
ﺍﺳﺗﺧﺩﺍﻡ ﻗﺎﻋﺩﺓ ﺑﻳﺎﻧﺎﺕ ﻣﺗﻛﺎﻣﻠﺔ ﺧﺎﺻﺔ ﺑﻪ ﻟﺗﻌﻅﻡ
68.8
ﻣﻁﺑﻖ ﺑﺷﻛﻝ ﻛﺑﻳﺭ 25.29 0.87 3.44 ﻣﺳﺗﻭﻯ ﺍﻟﺭﺿﺎ ﻣﻥ ﻗﺑﻝ ﻣﺳﺗﺧﺩﻣﻳﻬﺎ ﺑﺗﻠﺑﻳﺔ 1
0
ﺃﺣﺗﻳﺎﺟﺎﺕ ﺍﻟﻌﻣﻝ
ﻣﻁﺑﻖ ﺍﻟﻰ ﺣﺩ ﻣﺎ 66.4 27.11 0.90 3.32 ﺃﻋﺗﺑﺎﺭ ﻣﻬﺎﺭﺓ ﺍﻟﻌﺎﻣﻠﻳﻥ ﺍﺣﺩ ﻋﻧﺎﺻﺭ ﺍﻟﺗﺭﻗﻳﺔ ﻓﻲ 4
)** (0.837ﻋﻧﺩ ﻣﺳﺗﻭﻯ ﺍﻟﻣﻌﻧﻭﻳﺔ ) (0.01ﻭﻫﺫﺍ ﻳﻭﻓﺭ ﺩﻋﻡ ﻓﻲ ﻗﺑﻭﻝ ﺍﻟﻔﺭﺿﻳﺔ ﺍﻟﺭﺋﻳﺳﺔ ﺍﻻﻭﻟﻰ )ﺗﻭﺟﺩ ﻋﻼﻗﺔ ﺍﺭﺗﺑﺎﻁ ﺑﻳﻥ ﻣﺟﺎﻻﺕ
ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ(.
ﺟﺩﻭﻝ ) (17ﻣﻌﺎﻣﻼﺕ ﺍﻻﺭﺗﺑﺎﻁ ﺑﻳﻥ ﻣﺟﺎﻻﺕ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﻭﺍﺑﻌﺎﺩ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ
COBIT5
ﺍﻟﻣﺭﺍﻗﺑﺔ، ﺍﻟﺑﻧﺎء، ﺍﻟﺗﻭﺍﻓﻖ، ﺍﻟﺗﻘﻳﻳﻡ،
ﺣﻭﻛﻣﺔ ﻭﺇﺩﺍﺭﺓ ﺍﻟﺗﻭﺻﻳﻝ،ﺍﻟﺧﺩ
ﺍﻟﺗﻘﻳﻳﻡ ﺍﻻﻣﺗﻼﻙ ﺍﻟﺗﺧﻁﻳﻁ ﺍﻟﺗﻭﺟﻳﺔ
ﺗﻛﻧﻠﻭﺟﻳﺎ ﻣﺔ ﻭﺍﻟﺩﻋﻡ
ﻭﺍﻟﻘﻳﺎﺱ ﻭﺍﻟﺗﻧﻔﻳﺫ ﻭﺍﻟﺗﻧﻅﻳﻡ ﻭﺍﻟﻣﺭﺍﻗﺑﺔ
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
ﺍﻟﻣﻌﻧﻭﻳﺔ ) (0.01ﻭﻫﺫﺍ ﻳﻭﻓﺭ ﺩﻋﻡ ﻓﻲ ﻗﺑﻭﻝ ﺍﻟﻔﺭﺿﻳﺔ ﺍﻟﺭﺋﻳﺳﺔ ﺍﻻﻭﻟﻰ )ﺗﻭﺟﺩ ﻋﻼﻗﺔ ﺍﺭﺗﺑﺎﻁ ﺑﻳﻥ ﻣﺟﺎﻻﺕ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5
ﻭﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ.
ﺟﺩﻭﻝ ) (18ﺗﺎﺛﻳﺭ ﻣﺟﺎﻻﺕ ﺇﻁﺎﺭ ﻋﻣﻝ COBIT5ﻓﻲ ﺍﺑﻌﺎﺩ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ )ﻛﻔﺎءﺓ ﻣﻛﻭﻧﺎﺕ(IT
)ﺍﻟﺗﻘﻳﻳﻡ ،ﺍﻟﺗﻭﺟﻳﻪ ﻭﺍﻟﻣﺭﺍﻗﺑﺔ( )ﺍﻟﺗﻭﺍﻓﻖ ،ﺍﻟﺗﺧﻁﻳﻁ ﻭﺍﻟﺗﻧﻅﻳﻡ( )ﺍﻟﺑﻧﺎء ،ﺍﻻﻣﺗﻼﻙ ﻭﺍﻟﺗﻧﻔﻳﺫ( )ﺍﻟﺗﻭﺻﻳﻝ ،ﺍﻟﺧﺩﻣﺔ ﺍﻟﺩﻋﻡ( )ﻭﺍﻟﻣﺭﺍﻗﺑﺔ،
ﺍﻟﺗﻘﻳﻳﻡ ﻭﺍﻟﻘﻳﺎﺱ( ﻓﻘﺩ ﺑﻠﻐﺕ ) (0.624 )،(0.725 )،(0.647) ،(0.745) ،(0.851ﻋﻠﻰ ﺍﻟﺗﺭﺗﻳﺏ ﻭﻫﻲ ﻣﻌﻧﻭﻳﺔ ﺍﺣﺻﺎﺋﻳﺎ ً ﻋﻧﺩ
ﺍﻟﻣﺳﺗﻭﻯ ) ،(%1ﺍﺫ ﺑﻠﻐﺕ ﻗﻳﻣﺔ tﺍﻟﻣﺣﺳﻭﺑﺔ ﻟﻬﺎ ) (4.991 )،(8.188 )،(5.960 )،(6.745 )،(6.225ﺑﻣﻌﻧﻭﻳﺔ
) (0.000 )،(0.000 )،(0.000)،(0.000)،(0.000ﻋﻠﻰ ﺍﻟﺗﺭﺗﻳﺏ ﻭﻫﻲ ﺍﻗﻝ ﻣﻥ ﻣﺳﺗﻭﻯ ﺍﻟﻣﻌﻧﻭﻳﺔ ) ، (%1ﻭ ﻳﺗﺿﺢ ﻣﻥ
ﺧﻼﻝ ﻗﻳﻡ ﻣﻌﺎﻣﻝ ﺍﻟﻣﻳﻝ ﺍﻟﺣﺩﻱ ) (βﺑﺎﻥ ﺯﻳﺎﺩﺓ ﺍﻱ ﻣﺟﺎﻝ ﻣﻥ ﻣﺳﺗﻭﻯ ﺗﻁﺑﻳﻖ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻭﻓﻖ ﺍﻁﺎﺭ ﻋﻣﻝ ) COBIT5ﺍﻟﺗﻘﻳﻳﻡ،
ﺍﻟﺗﻭﺟﻳﻪ ﻭﺍﻟﻣﺭﺍﻗﺑﺔ( )ﺍﻟﺗﻭﺍﻓﻖ ،ﺍﻟﺗﺧﻁﻳﻁ ﻭﺍﻟﺗﻧﻅﻳﻡ( )ﺍﻟﺑﻧﺎء ،ﺍﻻﻣﺗﻼﻙ ﻭﺍﻟﺗﻧﻔﻳﺫ( )ﺍﻟﺗﻭﺻﻳﻝ ،ﺍﻟﺧﺩﻣﺔ ﺍﻟﺩﻋﻡ( )ﻭﺍﻟﻣﺭﺍﻗﺑﺔ ،ﺍﻟﺗﻘﻳﻳﻡ
ﻭﺍﻟﻘﻳﺎﺱ( ﺑﻣﻘﺩﺍﺭ ﻭﺣﺩﺓ ﻭﺍﺣﺩﺓ ﺳﻳﺅﺩﻱ ﺇﻟﻰ ﺯﻳﺎﺩﺓ ﻓﻲ )ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ ﻓﻲ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻟﻌﺭﺍﻗﻳﺔ ﺍﻟﺧﺎﺻﺔ( ﻣﻘﺩﺍﺭﻫﺎ
) (0.624 )،(0.725) ،(0.647) ،( 0.745 )،(0.851ﻋﻠﻰ ﺍﻟﺗﺭﺗﻳﺏ
ﺍﻻﺳﺗﻧﺗﺎﺟﺎﺕ ﻭﺍﻟﺗﻭﺻﻳﺎﺕ
ﺃﻭﻻ :ﺍﻻﺳﺗﻧﺗﺎﺟﺎﺕ
-١ﺍﻥ ﺑﻳﺋﺔ ﺍﻟﻣﺻﺭﻑ ﺗﺗﺳﻡ ﻓﻳﻬﺎ ﺍﻟﻣﺳﺗﺟﺩﺍﺕ ﻭﺗﻌﺯﺯﻫﺎ ﺍﻟﺗﻐﻳﻳﺭﺍﺕ ﺍﻟﻣﺳﺗﺗﻣﺭ ﻟﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﺍﻻﺗﺻﺎﻻﺕ ،ﺟﻣﻳﻌﻬﺎ
ﺗﺷﻛﻝ ﺗﺣﺩﻱ ﻳﻭﺍﺟﻬﻪ ﻣﺗﺧﺫﻭﺍ ﺍﻟﻘﺭﺍﺭ.
-٢ﻟﻡ ﺗﻌﺩ ﺗﻘﻧﻳﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻭﻅﻳﻔﺔ ﺩﻋﻡ ﺩﺍﺧﻝ ﺍﻟﻣﺻﺎﺭﻑ ،ﺑﻝ ﺍﺻﺑﺣﺕ ﻋﺎﻣﻝ ﺗﻣﻛﻳﻥ ﺍﺳﺎﺳﻲ ﻷﺳﺗﺭﺍﺗﻳﺟﻳﺎﺕ
ﺍﻻﻋﻣﺎﻝ ﻭﺗﻁﻭﺭ ﺍﻟﻧﻅﻡ ﺍﻟﻣﺎﻟﻳﺔ ،ﻭﺍﻟﺗﺣﺩﻱ ﺍﻟﻣﺗﻣﺛﻝ ﺑﺗﻠﺑﻳﺔ ﺍﺣﺗﻳﺎﺟﺎﺕ ﺍﺻﺣﺎﺏ ﺍﻟﻣﺻﻠﺣﺔ ﻭﺍﻟﺯﺑﺎﺋﻥ ،ﺑﺗﻭﻓﻳﺭ ﺍﻟﺧﺩﻣﺎﺕ
ﺑﺄﻧﺳﺏ ﻭﺍﻓﺿﻝ ﺍﻟﻣﻣﺎﺭﺳﺎﺕ ﺍﻟﺗﻘﻧﻳﺔ ،ﺩﻋﺕ ﺍﻟﺣﺎﺟﺔ ﺍﻟﻰ ﺍﻋﺗﻣﺎﺩ ﺍﻁﺎﺭ COBIT5ﺑﻣﺟﺎﻻﺗﻪ ﻭﺍﻫﺩﺍﻓﺔ ﻭﺍﻧﺷﻁﺗﺔ ﺍﻟﻣﺧﺗﻠﻔﺔ.
-٣ﺗﻡ ﺑﻧﺎء ﺍﻹﺻﺩﺍﺭ ﺍﻟﺧﺎﻣﺱ ﺍﻟﺣﺎﻟﻲ ﻣﻥ COBIT5ﻋﻠﻰ ﺧﻣﺳﺔ ﻣﺑﺎﺩﻯء ﺃﺳﺎﺳﻳﺔ ﻟﻠﺣﻭﻛﻣﺔ ﻭﺇﺩﺍﺭﺓ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
)ﺗﻠﺑﻳﺔ ﺍﺣﺗﻳﺎﺟﺎﺕ ﺍﺻﺣﺎﺏ ﺍﻟﻣﺻﻠﺣﺔ ،ﺗﻐﻁﻳﺔ ﺍﻟﻣﺻﺎﺭﻑ ﻣﻥ ﺍﻟﻧﻬﺎﻳﺔ ﻟﻠﻧﻬﺎﻳﺔ ،ﺗﻁﺑﻳﻖ ﺇﻁﺎﺭ ﻋﻣﻝ ﻭﺍﺣﺩ ﻣﺗﻛﺎﻣﻝ ،ﺗﻣﻛﻳﻥ
ﻧﻬﺞ ﺷﺎﻣﻝ ،ﻓﺻﻝ ﺍﻟﺣﻭﻛﻣﺔ ﻋﻥ ﺍﻹﺩﺍﺭﺓ(.
-٤ﺃﻅﻬﺭﺕ ﻧﺗﺎﺋﺞ ﺍﻟﺗﺣﻠﻳﻝ ﺍﻹﺣﺻﺎﺋﻲ ﻟﻠﺑﺣﺙ ﺣﻭﻝ ﺃﺑﻌﺎﺩ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ ،ﺍﻟﻣﺗﻌﻠﻘﺔ ﺑﻣﺳﺗﻭﻯ ﺗﻁﺑﻳﻖ ﻣﻛﻭﻧﺎﺕ
ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ،ﺑﺎﻥ ﻫﻧﺎﻙ ﺗﻘﺩﻳﺭ ﺑﻣﺳﺗﻭﻯ ﺃﻋﻠﻰ ﻣﻥ ﺍﻟﻭﺳﻁ ﺍﻟﺣﺳﺎﺑﻲ ﺍﻟﻣﻌﻳﺎﺭﻱ ) (3ﻣﻣﺎ ﻳﺩﻝ َ
ﺇﻥ ﺍﻟﻣﺻﺎﺭﻑ
ﺍﻟﻌﺭﺍﻗﻳﺔ ﺍﻟﻣﺳﺎﻫﻣﺔ ﺍﻟﺧﺎﺻﺔ ﻣﺣﻝ ﺍﻟﺩﺭﺍﺳﺔ ﺗﻁﺑﻖ ﻭﺑﺷﻛﻝ ﻛﺑﻳﺭ ﻟﺗﻘﻧﻳﺎﺕ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ.
COBIT5ﺇﻁﺎﺭﺍ ً ﻟﻠﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻳﺗﻧﺎﻣﻰ ﺍﻹﻁﺎﺭ ﻟﻳﻛﻭﻥ ﻗﺎﺑﻼً ﻟﻠﻁﺑﻳﻖ ﻋﺎﻟﻣﻳﺎ ً ﻟﻣﻌﺎﻟﺟﺔ ﻗﺿﺎﻳﺎ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ -٥
ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺍﻟﺣﺎﻟﻳﺔ ﺧﺎﺻﺔ ﻓﻳﻣﺎ ﻳﺗﻌﻠﻖ ﺑﺈﺩﺍﺭﺓ ﺍﻟﻣﺅﺳﺳﺎﺕ ﺍﻟﻣﺻﺭﻓﻳﺔ ،ﻟﺗﻘﻳﻳﻡ ﺣﺎﻟﺔ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻭﺇﺩﺍﺭﺓ ﺍﻟﻣﺧﺎﻁﺭ
ﺍﻟﻣﺭﺗﺑﻁﺔ ﺑﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ
ﺛﺎﻧﻳﺎ :ﺍﻟﺗﻭﺻﻳﺎﺕ
-١ﺿﺭﻭﺭﺓ ﺃﻫﺗﻣﺎﻡ ﺇﺩﺍﺭﺓ ﺍﻟﻣﺻﺎﺭﻑ ﺑﺎﻟﻣﺗﺎﺑﻌﺔ ﻭﺍﻻﺷﺭﺍﻑ ﻣﻥ ﺍﺟﻝ ﺍﻟﺗﺄﻛﺩ ﻣﻥ ﺃﻥ ﺍﻟﺭﻗﺎﺑﺔ ﺗﻧﻔﺫ ﺑﺷﻛﻝ ﺳﻠﻳﻡ ﻭﺗﺣﻘﻖ ﺍﻫﺩﺍﻓﻬﺎ.
-٢ﻋﻠﻰ ﺇﺩﺍﺭﺓ ﺍﻟﻣﺻﺎﺭﻑ ﺍﻷﻫﺗﻣﺎﻡ ﺑﻣﺟﺎﻝ ﺍﻟﺭﻗﺎﺑﺔ ﺍﻟﺩﺍﺧﻠﻳﺔ ﻟﻣﻭﺍﺟﻬﺔ ﺍﻟﻣﺧﺎﻁﺭ ،ﻭﺍﻟﺗﻲ ﺗﺯﺩﺍﺩ ﺑﺯﻳﺎﺩﺓ ﺍﻻﻋﺗﻣﺎﺩ ﻋﻠﻰ ﺗﻘﻧﻳﺎﺕ
ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ
( ﻳﺳﺎﻋﺩ ﺍﻟﻣﺻﺎﺭﻑ ﻓﻲ ﺗﻭﻓﻳﺭ ﻣﺳﺗﻭﻯ ﺟﻳﺩ ﻣﻥ ﺍﻻﻣﺎﻥ ﻭﺣﻣﺎﻳﺔ ﺍﻻﺻﻭﻝ ﻭﺍﺭﺷﺎﺩCOBIT5) ﺃﺗﺑﺎﻉ ﻭﺍﻟﻌﻣﻝ ﺑﺈﻁﺎﺭ-٣
.ﻭﺍﺭﺷﺎﺩ ﺍﻟﻣﺩﻗﻘﻳﻥ ﻟﺗﻭﺛﻳﻖ ﻭﺗﻌﺯﻳﺯ ﺍﺭﺍﺋﻬﻡ ﺑﺗﻘﺩﻳﻡ ﺍﻟﻣﺷﻭﺭﻩ ﻟﻺﺩﺍﺭﺓ ﺣﻭﻝ ﺍﻟﻧﻅﺎﻡ ﺍﻟﺭﻗﺎﺑﻲ
. ﺍﺧﺿﺎﻉ ﺗﻘﻧﻳﺎﺕ ﺍﻟﺻﻳﺭﻓﺔ ﺍﻟﺣﺩﻳﺛﺔ ﻟﻠﺗﻁﻭﻳﺭ ﻭﺗﺣﺩﻳﺙ ﺍﻟﻣﺳﺗﻣﺭﻳﻥ-٤
ﻧﺗﻳﺟﺔ ﺍﻟﺗﻐﻳﻳﺭ، ﺃﻟﺗﺯﺍﻡ ﻭﺗﺑﻧﻲ ﺍﺩﺍﺭﺍﺕ ﺍﻟﻣﺻﺎﺭﻑ ﺣﻭﻛﻣﺔ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﻟﺗﻠﺑﻳﺔ ﺍﺣﺗﻳﺎﺟﺎﺕ ﺍﺻﺣﺎﺏ ﺍﻟﻣﺻﻠﺣﺔ-٥
ﺍﻻﺳﺗﺗﺭﺍﺗﻳﺟﻲ ﻭﺗﻌﻘﺩ ﺑﻳﺋﺔ ﺍﻻﻋﻣﺎﻝ ﻭﺍﻟﻬﻳﺎﻛﻝ ﺍﻟﺗﻧﻅﻳﻣﻳﺔ
ﻭﺗﺣﻘﻳﻖ ﺍﻫﺩﺍﻑ ﺗﻛﻧﻭﻟﻭﺟﻳﺎ ﺍﻟﻣﻌﻠﻭﻣﺎﺕ ﺑﻣﺎ ﻳﺗﻭﺍءﻡ ﻣﻊ ﺍﻷﻫﺩﺍﻑ، ﺗﺣﺩﻳﺩ ﺍﻟﻣﺟﺎﻻﺕ ﺍﻟﺗﻲ ﺑﺣﺎﺟﺔ ﺇﻟﻰ ﺗﺣﺳﻳﻥ ﻭﻋﻧﺎﻳﺔ-٦
. ﺍﻹﺳﺗﺭﺍﺗﻳﺟﻳﺔ ﻟﻠﻣﺻﺭﻑ
ﺍﻟﻣﺻﺎﺩﺭ
1- Abdellatif, Mazen Ismail (2010), the impact of electronic audit on the quality
of the performance of the auditor "applied research in a number of private
sector companies", research in legal accounting, Arab Institute of Certified
Accountants.
2- Adikara, Fransiskus (2013), Implementasi Tata Kelola Teknologi Informasi
Perguruan Tinggi Berdasarkan COBIT 5 Pada Laboratorium Rekayasa
Perangkat Lunak Universitas Esa Unggul, Seminar Nasional Sistem Informasi
Indonesia, Fakultas Ilmu Komputer, Universitas Esa Unggul.
3- Adu-Frimpong, Afia Afra (2015), Evaluating the Effects of Internal Control in
the Operations of Financial Institutions: A Case Study of Bond Savings and
Loans, Thesis for Master of Business Administration (Finance), College of Art
and Social Science, Kwame Nkrumah University of Science and Technology,
Kumasi.
4- Al-Abbadi, Hashem Fawzi and Al-Aridi, Jalil Kadhim (2012), Information
Management Systems: A Strategic Perspective, Safa Publishing and
Distribution House, Amman.
5- Al-Basri, Abdul-Ridha Shafiq, Taher, Hadeel Adel (2018), Electronic Banking
Techniques and their Impact on the Quality of Banking Service - A
Comparative Exploratory Study of Some Branches of Iraqi Government and
Private Banks, Journal of Administration and Economics, Vol.
6- Ali, Ben Kotib (2017), the role of auditing in the light of electronic data
processing in improving the quality of accounting information: a study of a