Developing the Adaptive Digital IT Governance Framework forNext-Generation IT Governance
DOI:
https://doi.org/10.30812/matrik.v25i1.5628Keywords:
Adaptive IT Governance, Agile Governance, Digital Transformation, Maturity AssessmentAbstract
The increasing complexity of digital transformation requires an adaptive, measurable, and contextaware IT governance model. However, existing frameworks such as COBIT, ITIL, TOGAF, and ISO/IEC 38500 tend to be partial and prescriptive, failing to address strategic, operational, and innovative needs holistically. This study proposes the Adaptive Digital IT Governance Framework, a
novel governance model synthesized from eleven leading IT frameworks and structured into three integrated domains: Govern, Manage, and Adapt. Employing a Design Science Research methodology, the model was developed through a systematic framework analysis, conceptual domain formulation, iterative implementation mapping, and the design of a maturity assessment instrument. The results demonstrate that the Adaptive Digital IT Governance Framework offers a modular, scalable, and value-driven governance solution suited for diverse organizational contexts. Theoretical contributions include extending the IT governance paradigm by integrating strategic alignment, agile governance, and digital sustainability. Practically, the framework provides actionable guidance for designing, assessing, and enhancing digital governance systems across sectors. Unlike previous cross-framework synthesis efforts, the Adaptive Digital IT Governance Framework explicitly introduces the Adapt domain, operationalizing governance agility, innovation capability, and sustainability measurement. This makes the Adaptive Digital IT Governance Framework the first modular, maturity-oriented framework that simultaneously integrates strategy, operations, and adaptability, positioning it as a next-generation
model to support organizational resilience and sustainable digital transformation.
Downloads
References
[1] P. Weill and J. W. Ross, “IT governance: How top performers manage IT decision rights for superior results,” pp. 1–105, 2004.
[2] P. Weill and S. L. Woerner, “Thriving in an increasingly digital ecosystem,” MIT sloan management review, vol. 56, no. 4,
p. 27, 2015.
[3] Isaca, “Cobit 5,” 2012.
[4] S. de Haes, W. Van Grembergen, and T. Huygh, “Enterprise governance of information technology,” pp. 1–566, 2020,
https://doi.org/10.1007/978-3-030-25918-1.
[5] F. M. Njiru, “A GIS Audit Framework for Sustainable GIS Applications and Services,” pp. 1–302, 2024.
[6] F. Amagoh, “Perspectives on organizational change: systems and complexity theories,” The Innovation Journal: The public
sector innovation journal, vol. 13, no. 3, pp. 1–14, 2008.
[7] I. Graglia, “COBIT vs ITIL: A Comprehensive Comparison for IT Governance,” pp. 1–10, 2024.
[8] A. B. Consortium, “Governance for the Agile Organization,” egile bussiness, vol. 8, no. 3030597, pp. 1–22, 2025.
[9] W. D. Eggers, Paul Bien;, Shannon Lundquist;, Maximilian Lennart Nagel;, and Pankaj Kishnani;, “Government’s newfound
agility,” pp. 1–20, 2024.
[10] N. E. Governance, “GG3030 E NVIRONMENTAL G OVERNANCE I The Dutch National,” Waste Management, vol. 7, no. 7,
pp. 1–8, 2025, https://doi.org/10.1007/978-3-031-36457-0 12.
[11] W. S. de Araujo, “A method for the formulation of E-Governance strategies taking into account international rankings,” pp.
1–216, 2022, https://doi.org/10.1007/978-3-031-12673-4 4.
[12] C. R. Rodriguez, J. L. B. Ore, and D. E. Vargas, “Las variables en la metodologia de la investigacion cientifica,” vol. 78, pp.
1–231, 2021, https://doi.org/10.17993/IngyTec.2021.78.
[13] S. Gregor and A. R. Hevner, “Positioning and presenting design science research for maximum impact,” MIS quarterly, vol. 37,
no. 2, pp. 337–355, 2013, https://doi.org/10.25300/MISQ/2013/37.2.01.
[14] S. Mettler, “The submerged state: How invisible government policies undermine American democracy,” pp. 1–162, 2011,
https://doi.org/10.1080/07393148.2012.754678.
[15] P. Gillespie, “Security Compliance in Large Private Enterprise Information Systems Utilizing DevOps: An Exploratory Study,”
pp. 1–218, 2024.
[16] L. Al Omari, “IT governance evaluation: adapting and adopting the COBIT framework for public sector organisations,” pp.
1–266, 2016.
[17] S. D. Galup, R. Dattero, J. J. Quan, and S. Conger, “An overview of IT service management,” Communications of the ACM,
vol. 52, no. 5, pp. 124–127, 2009, https://doi.org/10.1145/1506409.1506439.
[18] M. Axelos, L. Bamiere, F. Colin, J.-Y. Dourmad, M. Duru, S. Gillot, B. Kurek, M. Jean-Denis, V. Requillart, and J. Mery,
“Reflexion prospective interdisciplinaire bioeconomie-Rapport de synthese,” pp. 1–300, 2020.
[19] J. Iden and T. R. Eikebrokk, “Using the ITIL process reference model for realizing IT governance: An empirical investigation,”
Information Systems Management, vol. 31, no. 1, pp. 37–58, 2014, https://doi.org/10.1080/10580530.2014.854089.
[20] G. Selig, “Implementing IT Governance-A Practical Guide to Global Best Practices in IT Management,” pp. 1–297, 2008.
[21] H. Kerzner and F. P. Saladis, “Project management workbook and PMP/CAPM exam study guide,” pp. 1–531, 2017.
[22] M. C. Paulk, “A history of the capability maturity model for software,” ASQ Software Quality Professional, vol. 12, no. 1, pp.
5–19, 2009.
[23] V. S. S. de Ataide Ramos, “A CMMI-compliant Requirements Management and Development Process,” pp. 1–24, 2014.
[24] A. Wiedemann, “IT governance mechanisms for DevOps Teams-How incumbent companies achieve competitive advantages,”
pp. 1–10, 2018, https://doi.org/10.24251/HICSS.2018.617.
[25] R. Knaster and D. Leffingwell, “SAFe 5.0 distilled: achieving business agility with the scaled agile framework,” pp. 1–626,
2020.
[26] M. Tervajoki, “IT Transformation to Support Business Driven Requirements,” pp. 1–245, 2017.
[27] Y. Maleh and A. Sahid, “Navigating IT governance for resilient organizations,” pp. 1–315, 2024, https://doi.org/10.4018/
979-8-3693-3431-7.
[28] J. Becker, B. Niehaves, J. Poeppelbuss, and A. Simons, “Maturity models in IS research,” pp. 1–302, 2010.
[29] P. Awasthi and K. T. Tai, “Leadership framework for an agile government,” pp. 1–57, 2025, https://doi.org/10.1007/
978-3-319-31816-5 4475-1.
[30] J. van de Hoven and Comande.
[31] A. R. Hevner, “A three cycle view of design science research,” Scandinavian journal of information systems, vol. 19, no. 2,
p. 4, 2007.
[32] I. Governance and C. Manajement, “COBIT 2019 Framework: Governance and Management Objectives,” pp. 1–302, 2019,
https://doi.org/10.29103/jreece.v5i1.19501.
[33] N. Labib, “Mengenal Information Systems Audit and Control Association (ISACA),” 2019, https://doi.org/10.31219/osf.io/
m93u8.
[34] O. o. G. Commerce, “Gereciando projetos de sucesso com PRINCE2:[Brazilian Portuguese print version of Managing successful
projects with PRINCE2],” pp. 1–365, 2011.
[35] P. Weill and S. L. Woerner, “Is your company ready for a digital future,” MIT Sloan Management Review, vol. 59, no. 2, pp.
21–25, 2018, https://doi.org/10.7551/mitpress/11859.003.0005.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Bambang Saras Yulistiawan, Rifka Widyastuti , RR Octanty Mulianingtyas , Galih Prakoso Rizky A, Hengki Tamando Sihotang

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
How to Cite
Similar Articles
- Magdalena Ariance Ineke Pakereng, Alz Danny Wowor, Yos Richard Beeh, Felix David, Erwien Christianto, Vincent Exelcio Susanto, Claudio Canavaro, Square Transposition Method with Adaptive Key Flexibility and Strong Diffusion Performance , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Achmad Afif Irwansyah, Aripriharta Aripriharta, Didik Dwi Aripriharta, Stochastic Optimization for Hostage Rescue Using Internet of Things and Queen Honey Bee Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 25 No. 1 (2025)
- sri suharti, Anton Yudhana, Imam Riadi, Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Andi Hary Akbar, Heri Wijayanto, I Wayan Agus Arimbawa, K-Means-Based Customer Segmentation with Domain-Specific FeatureEngineering forWater Payment Arrears Management , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 25 No. 1 (2025)
- Bob Subhan Riza, Jufriadif Na'am, Sumijan Sumijan, Tuberculosis Extra Pulmonary Bacilli Detection System Based on Ziehl Neelsen Images with Segmentation , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Lalu Zazuli Azhar Mardedi, Fahry Fahry, Miftahul Madani, Hairani Hairani, Detection of Rice Diseases using Leaf Images with Visual Geometric Group (VGG-19) Architecture and Different Optimizers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 25 No. 1 (2025)
- Rizky Afrinanda, Lusiana Efrizoni, Wirta Agustin, Rahmiati Rahmiati, Hybrid Model for Sentiment Analysis of Bitcoin Prices using Deep Learning Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Joko Handoyo, Anton Yudhana, Sunardi Sunardi, Flood Vulnerability Mapping in Cepu Subdistrict Using MamdaniFuzzy Inference System for Disaster Risk Reduction , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 25 No. 1 (2025)
- Siti Ummi Masruroh, Andrew Fiade, Muhammad Ikhsan Tanggok, Rizka Amalia Putri, Luigi Ajeng Pratiwi, Convolutional Neural Network for Colorization of Black and White Photos , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Christofer Satria, Anthony Anggrawan, Tinjauan Kritis Jurnal Ilmiah: “The Influence of Transformational Leadership and Organizational Culture on Learning Organization: a Comparative Analysis of The it Sector†, MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Hengki Tamando Sihotang, Fristi Riandari, Pilisman Buulolo, Husain Husain, Sistem Pakar untuk Identifikasi Kandungan Formalin dan Boraks pada Makanan dengan Menggunakan Metode Certainty Factor , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- Desi Vinsensia, Siskawati Amri, Jonhariono Sihotang, Hengki Tamando Sihotang, New Method for Identification and Response to Infectious Disease Patterns Based on Comprehensive Health Service Data , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Fristi Riandari, Hengki Tamando Sihotang, Husain Husain, Forecasting the Number of Students in Multiple Linear Regressions , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
.png)











