<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462018000401503</article-id>
<article-id pub-id-type="doi">10.13053/cys-22-4-2797</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Model for Information Technology Governance (GTI) in a University Environment]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cordero Guzmán]]></surname>
<given-names><![CDATA[Diego]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Bribiesca Correa]]></surname>
<given-names><![CDATA[Graciela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Católica de Cuenca Unidad Académica de Tecnologías de la Información y la Comunicación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Ecuador</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Nacional Autónoma de México Unidad de Posgrado ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>22</volume>
<numero>4</numero>
<fpage>1503</fpage>
<lpage>1518</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462018000401503&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462018000401503&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462018000401503&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The university makes use of information technology resources for an effective management of its tasks, as well as for generating information for the interested parties, among which are the accreditation and control bodies. The problem is that most of the time when computers are used, the information is not of high quality due to the lack of appropriate practices for using information technologies (IT) efficiently. This occurs because there are no effective practices for executing a proper Information Technologies Governance. The purpose of this work is to generate an Information Technology Governance (GTI) model within an organization.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Information technologies governance]]></kwd>
<kwd lng="en"><![CDATA[structures]]></kwd>
<kwd lng="en"><![CDATA[processes]]></kwd>
<kwd lng="en"><![CDATA[relational mechanisms]]></kwd>
<kwd lng="en"><![CDATA[information quality]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez-Adorno]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Rios]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Posadas-Durán]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sidorov]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sierra]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stylometry-based Approach for Detecting Writing Style Changes in Literary Texts]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2018</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>47-53</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sigalés]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formación universitaria y TIC: nuevos usos y nuevos roles]]></article-title>
<source><![CDATA[Universities and Knowledge Society Journal]]></source>
<year>2004</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jhon]]></surname>
<given-names><![CDATA[S. P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The integration of information technology in higher education: a study of faculty´s attitude towards IT adoption in the teaching process]]></article-title>
<source><![CDATA[Contaduría y Administración]]></source>
<year>2015</year>
<volume>60</volume>
<numero>S1</numero>
<issue>S1</issue>
<page-range>230-52</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khther]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Othman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[COBIT Framework as a Guide of Effective IT Governance In Higher Education: a Review]]></article-title>
<source><![CDATA[International Journal of Information Technology Convergence and Services]]></source>
<year>2013</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>21-9</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bobsin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Visentini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Alignment between the Strategic Business Plan and the Plan of Information Technology at Companies: the Comparative Analysis Through the Maturity Level and Critical Sucess Factors]]></article-title>
<source><![CDATA[Journal of Information Systems and Technology Management]]></source>
<year>2008</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>37-60</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhan-xin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo-long]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cai-yun]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identification of efficiency factors for inspection and quarantine clearance using an improved structural equation model]]></article-title>
<source><![CDATA[Journal of Industrial and Production Engineering]]></source>
<year>2014</year>
<volume>31</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>261-73</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parent]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Robb]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding IT Governance: A Case of Two Financial Mutuals]]></article-title>
<source><![CDATA[Journal of Global lnformation Management]]></source>
<year>2009</year>
<volume>17</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>59-77</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tanuwijaya]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarno]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparation of CobiT Maturity Model and Structural Equation Model for Measuring the Alignment between University Academic Regulations and Information Technology Goals]]></article-title>
<source><![CDATA[(IJCSNS), International Journal of Computer Science and Network Security]]></source>
<year>2010</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>80-92</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borreson]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yanosky]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Process and Politics: IT Governance in Higher Education]]></article-title>
<source><![CDATA[(ECAR), Key Findings]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ajami]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Qirim]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Governing IT in Higher Education Institutions]]></article-title>
<source><![CDATA[Advanced Science and Technology Letters]]></source>
<year>2013</year>
<volume>36</volume>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Faraón]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Gobierno de las TI para universidades]]></source>
<year>2011</year>
<conf-name><![CDATA[ Conferencia de Rectores de las Universidades Españolas (CRUE)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[UNiTIL: Modelo de Gobierno y Gestión de las TIC para Universidades]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<collab>Universitat Jaume I de Castelló</collab>
<source><![CDATA[Marc Tecnológic de la Universitat Jaume I de Castelló]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Castellón de la Plana ]]></publisher-loc>
<publisher-name><![CDATA[Gabinet de Planificació i Prospectiva Tecnológica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Brempt]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[De-Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Prioritising and Linking Business and IT Goals in the Financial Sector]]></source>
<year>2007</year>
<conf-name><![CDATA[ 40th Hawaii International Conference on System Sciences]]></conf-name>
<conf-loc> </conf-loc>
<page-range>46-67</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<collab>CRUE TIC</collab>
<source><![CDATA[UNIVERSITIC 2014: Descripción, Gestión y Gobierno de las TI en el Sistema Universitario Español]]></source>
<year>2014</year>
<publisher-name><![CDATA[CRUE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[J. V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelos de Gobierno TI para Instituciones de Educación Superior]]></article-title>
<source><![CDATA[Revista Politécnica]]></source>
<year>2015</year>
<volume>36</volume>
<numero>15</numero>
<issue>15</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Grant]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Communications of the Association for Information Systems]]></source>
<year>2005</year>
<volume>15</volume>
<page-range>696-712</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhong]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Vatanasakdakul]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Aoun]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[IT Governance in China: Cultural Fit and IT Governance Capabilities]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Ho Chi Minh City ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De-Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[van-Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment]]></article-title>
<source><![CDATA[Information Systems Management]]></source>
<year>2009</year>
<volume>26</volume>
<page-range>123-37</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Preston]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Karahanna]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Antecedents of IS Strategic Alignment: A Nomogical Network]]></article-title>
<source><![CDATA[Information Systems Research]]></source>
<year>2009</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>159-79</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[da Silva-Pinto]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Reis-Graeml]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Alinhamento entre Tecnologia da Informaçao e Negocios: o caso de uma Cooperativa Médica no Paraná]]></article-title>
<source><![CDATA[REGE]]></source>
<year>2011</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>259-74</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peterson]]></surname>
<given-names><![CDATA[R. R]]></given-names>
</name>
</person-group>
<source><![CDATA[Integration Strategies and Tactics for Information Technology Governance de Strategies for Information Technology Governance]]></source>
<year>2004</year>
<page-range>44</page-range><publisher-name><![CDATA[Idea Group Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De-Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[van-Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[IT Governance and Its Mechanisms]]></article-title>
<source><![CDATA[Information Systems Control Journal]]></source>
<year>2004</year>
<volume>1</volume>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peterson]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crafting Information Technology Governance]]></article-title>
<source><![CDATA[Information Systems Management]]></source>
<year>2004</year>
<volume>21</volume>
<page-range>7-22</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De-Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[van-Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information Technology Governance Best Practices in Belgian Organisations]]></source>
<year>2006</year>
<conf-name><![CDATA[ 39th Hawaii International Conference on System Sciences]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luftman]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brier]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Achieving and Sustaining Business-IT alignment]]></article-title>
<source><![CDATA[California Management Review]]></source>
<year>1999</year>
<volume>42</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>109-22</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Preston]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Antecedents and Effects of CIO Supply Side and Demand-Side Leadership: A Staged Maturity Model]]></article-title>
<source><![CDATA[Journal of Management Information Systems]]></source>
<year>2014</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>231-72</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gheorghe]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Audit Methodology for IT Governance]]></article-title>
<source><![CDATA[Informatica Economic&#259;]]></source>
<year>2010</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>32-42</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parisa]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lazar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shengnan]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Influence of Culture on IT Governance: A Literature Review]]></source>
<year>2014</year>
<conf-name><![CDATA[ 47th Hawaii International Conference on System Science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>4436-45</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van-Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[De-Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Amelinckx]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using CobiT and the Balanced Scorecard as Instruments for Service Level Management]]></article-title>
<source><![CDATA[Information Systems Control Journal]]></source>
<year>2003</year>
<volume>4</volume>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De-Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[van-Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Practices in IT Governance and Business/IT Alignment]]></article-title>
<source><![CDATA[Information Systems Control Journal]]></source>
<year>2008</year>
<volume>2</volume>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ross]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Weill]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Matrixed Approach to Designing IT Governance]]></article-title>
<source><![CDATA[MIT Sloan Management Review]]></source>
<year>2005</year>
<volume>46</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>25-35</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metodología y gobierno de la gestión de riesgos de tecnologías de la información]]></article-title>
<source><![CDATA[Revista de Ingeniería]]></source>
<year>2010</year>
<volume>31</volume>
<page-range>109-18</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilkin]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Role of IT Governance Practices in Creating Business Value in SMEs]]></article-title>
<source><![CDATA[Journal of Organizational and End User Computing]]></source>
<year>2012</year>
<volume>24</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pasquini]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[COBIT 5 and the Process Capability Model. Improvements Provided for IT Governance Process]]></source>
<year>2013</year>
<volume>1</volume>
<conf-name><![CDATA[ Proceedings of (FIKUSZ &#8217;13), Symposium for Young Researchers]]></conf-name>
<conf-loc> </conf-loc>
<page-range>67-76</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Henderson]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Venkatraman]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Oldach]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Continuous Strategic Alignment, Exploiting Information Technology Capabilities for Competitive Success]]></article-title>
<source><![CDATA[European Management Journal]]></source>
<year>1993</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>139-49</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vijay]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Madhavan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Beyond Quality: the Information Integrity Imperative]]></article-title>
<source><![CDATA[Total Quality Management]]></source>
<year>2004</year>
<volume>15</volume>
<numero>5-6</numero>
<issue>5-6</issue>
<page-range>645-54</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="book">
<collab>IT Governance Institute</collab>
<source><![CDATA[COBIT 4.0. Objetivos de control, directrices gerenciales, modelos de madurez]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Rolling Meadows ]]></publisher-loc>
<publisher-name><![CDATA[ITGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nascimento]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Weschenfelde]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Necessidade de informação dos vereadores de Florianópolis: estudo de usuário]]></article-title>
<source><![CDATA[Inf., &amp; Soc.]]></source>
<year>2002</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>252-89</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kahn]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Strong]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[R. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information quality benchmarks: product and service performance]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2002</year>
<volume>45</volume>
<page-range>184-92</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jiu-jin]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu-sheng]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan-feng]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Influence of XBRL on the Accounting Information Quality]]></source>
<year>2013</year>
<conf-name><![CDATA[ International Conference on Management Science &amp; Engineering 20th, Harbin]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Research and Implementation of Information Quality Improvement]]></source>
<year>2009</year>
<conf-name><![CDATA[ Fourth International Conference on Cooperation and Promotion of Information Resources in Science and Technology]]></conf-name>
<conf-loc>Beijing </conf-loc>
</nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tejay]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhillon]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data Quality Dimensions for Information Systems Security: A Theoretical Exposition]]></article-title>
<source><![CDATA[Security Management, Integrity, and Internal Control in Information Systems]]></source>
<year>2006</year>
<page-range>21-39</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Batini]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Scannapieco]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Data quality: concepts, methodologies and techniques]]></source>
<year>2006</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Springer Berlin Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<label>45</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González-Berna]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[La cooperación interorganizacional como elementos de aprendizaje en las organizaciones que gestionan su conocimiento: el sector de la construcción en España]]></source>
<year>2011</year>
<publisher-name><![CDATA[Centro Politécnico Superior. Universidad de Zaragoza]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<label>46</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dahlberg]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Lahdelma]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[IT Governance Maturity and IT Outsourcing Degree: An Exploratory Study]]></source>
<year>2007</year>
<conf-name><![CDATA[ 40th Annual Hawaii International Conference on System Sciences]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B47">
<label>47</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Segovia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rositas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[El Trabajo Intelectual en Grupos o Equipos Organizacionales Mexicanos: una Prueba Empírica Mediante Ecuaciones Estructurales]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B48">
<label>48</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cornejo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejía]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Aplicación del modelo de ecuaciones estructurales a la gestión del conocimiento]]></article-title>
<source><![CDATA[Latin American and Caribbean Journal of Engineering Education]]></source>
<year>2010</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>23-30</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>49</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Teo]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Manaf]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fong]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information Technology Governance: Applying the Theory of Planned Behaviour]]></article-title>
<source><![CDATA[Journal of Organizational Management Studies]]></source>
<year>2013</year>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>50</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Teo]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Manaf]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fong]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceived Effectiveness of Information Technology Governance Initiatives Among IT Practitioners]]></article-title>
<source><![CDATA[International Journal of Engineering Business Management]]></source>
<year>2013</year>
<volume>5</volume>
<numero>19</numero>
<issue>19</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B51">
<label>51</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ribbers]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Designing Information Technology Governance Processes: Diagnosing Contemporary Practices and Competing Theories]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Hawaiï ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B52">
<label>52</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Souza-Bermejo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Tonelli]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zambalde]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zuppo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluating IT governance practices and business and IT outcomes: A quantitative exploratory study in Brazilian companies]]></article-title>
<source><![CDATA[Procedia Technology]]></source>
<year>2014</year>
<volume>16</volume>
<page-range>849-57</page-range></nlm-citation>
</ref>
<ref id="B53">
<label>53</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rojas]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Método de Evaluación de la Calidad de la Información en Servicios Basada en Tratamiento Borroso]]></article-title>
<source><![CDATA[Universidad, Ciencia y Tecnología]]></source>
<year>2008</year>
<volume>12</volume>
<numero>47</numero>
<issue>47</issue>
<page-range>73-80</page-range></nlm-citation>
</ref>
<ref id="B54">
<label>54</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiuxa]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhongwen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Study on Information Quality Maturity Model in Enterprise]]></source>
<year>2007</year>
<conf-name><![CDATA[ Service Operations and Logistics, and Informatics, IEEE International Conference]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B55">
<label>55</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yanosky]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[McCredie]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[IT Governance: Solid Structures and Practical Politics]]></source>
<year>2007</year>
<conf-name><![CDATA[ ECAR Symposium]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B56">
<label>56</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elagha]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[The Use of Partial Least Squares Path Modeling in IT Governance Discipline]]></source>
<year>2014</year>
<conf-name><![CDATA[ 11th International Conference on Information Technology: New Generations]]></conf-name>
<conf-loc> </conf-loc>
<page-range>624-6</page-range></nlm-citation>
</ref>
<ref id="B57">
<label>57</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Musse]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brodbeck]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Prácticas de las Universidades de Latino América]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Cancún ]]></publisher-loc>
<publisher-name><![CDATA[TICAL]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<label>58</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alagha]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Examining the Relationship between IT Governance Domains, Maturity, Mechanisms, and Performance: An Empirical Study toward a Conceptual Framework]]></source>
<year>2013</year>
<conf-name><![CDATA[ 10th International Conference on Information Technology: New Generations]]></conf-name>
<conf-loc>Kingdom of Bahrain </conf-loc>
</nlm-citation>
</ref>
<ref id="B59">
<label>59</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kelly]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information Management and Governance in UK Higher Education Institutions - Bringing IT in from the cold Perspectives]]></article-title>
<source><![CDATA[Policy and Practice in Higher Education]]></source>
<year>2007</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7-11</page-range></nlm-citation>
</ref>
<ref id="B60">
<label>60</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Turel]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Bart]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Board-level IT governance and organizational performance]]></article-title>
<source><![CDATA[European Journal of Information Systems]]></source>
<year>2014</year>
<volume>23</volume>
<page-range>223-39</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
