IT governance in China

Cultral fit and IT governance capabilities

Xijin Zhong, Savanid Vatanasakdakul, Chadi Aoun

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

5 Citations (Scopus)


Despite the researchers' and practitioners' enthusiasm for the global diffusion of information technology governance (ITG) concept and frameworks, there is a general lack of cultural awareness in ITG research. This paper examines both whether Chinese culture influences the performance ITG capabilities in organizations and how this influence is manifested. An analytical framework rooted in contingency theory is used in this paper to examine the fit (i.e., complementarity or conflicting) between ITG capabilities and Chinese cultural values. On the basis of the dynamic nature of cultural values, this paper proposes four conditions that are expected to compensate existing conflicts. These conditions are: a firm's dependency on Confucian entrepreneurship; social reputation; and shared goals; as well as its exposure to international business environment. The authors also bridge general cultural dimensions and indigenous Chinese culture values, which enables a cross-cultural comparison to be made. By exploring the potential influences of national culture on ITG, this paper contributes to the contextualization of ITG and benefits the cross-country transfer of ITG concepts and practices.

Original languageEnglish
Title of host publicationProceedings - Pacific Asia Conference on Information Systems, PACIS 2012
EditorsShan L. Pan, Tru H. Cao
Place of PublicationHo Chi Minh City
PublisherPacific Asia Conference on Information Systems
Number of pages15
Publication statusPublished - 2012
Event16th Pacific Asia Conference on Information Systems, PACIS 2012 - Ho Chi Minh City, Viet Nam
Duration: 11 Jul 201215 Jul 2012


Other16th Pacific Asia Conference on Information Systems, PACIS 2012
CountryViet Nam
CityHo Chi Minh City

Fingerprint Dive into the research topics of 'IT governance in China: Cultral fit and IT governance capabilities'. Together they form a unique fingerprint.

Cite this