Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
> Area:"agriculture"
Results found in 63 ms
  (Click on a topic/risk node to traverse and access the reports)
Area agriculture Topic legacy systems Risk(s) identified: (Topic : legacy systems) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Topic management dashboard Risk(s) identified: (Topic : management dashboard) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic agile projects Risk(s) identified: (Topic : agile projects) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic data center consolidation Risk(s) identified: (Topic : data center consolidation) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic indicative Risk(s) identified: (Topic : indicative) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified lack of access to all data some business rules switched off limited verification of data provided by applicants weaknesses in critical internal controls data not widely available unclear governance and division of responsibilities insufficient data at coordination level savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused mandatory publication open data at work concrete action plan national information infrastructure no policy too late and too fragmented planning ineffective monitoring regulations' update delayed and incomplete cost related rules not modified nobody responsible for coordination lack of training and practice lack of quality control Topic directive Risk(s) identified: (Topic : directive) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified weaknesses in critical internal controls data not widely available savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Measuring influence on outcomes performance measurement frameworks large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused working hours not rearranged working hours not recorded regularly staffing levels not optimised lack of analysis where and when the problem is triggered no IT support mandatory publication open data at work concrete action plan national information infrastructure no policy too late and too fragmented planning ineffective monitoring regulations' update delayed and incomplete cost related rules not modified nobody responsible for coordination lack of training and practice lack of quality control Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic IT architecture Risk(s) identified: (Topic : IT architecture) lack of information architecture IT security policy not implemented Topic business continuity management Risk(s) identified: (Topic : business continuity management) lack of information architecture IT security policy not implemented Topic taxation systems Risk(s) identified: (Topic : taxation systems) lack of access to all data some business rules switched off limited verification of data provided by applicants Topic small business Risk(s) identified: (Topic : small business) lack of access to all data some business rules switched off limited verification of data provided by applicants Topic interoperability Risk(s) identified: (Topic : interoperability) lack of access to all data some business rules switched off limited verification of data provided by applicants large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic user friendliness Risk(s) identified: (Topic : user friendliness) lack of access to all data some business rules switched off limited verification of data provided by applicants large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic performance measurement Risk(s) identified: (Topic : performance measurement) lack of access to all data some business rules switched off limited verification of data provided by applicants weaknesses in critical internal controls data not widely available Measuring influence on outcomes performance measurement frameworks Topic application controls Risk(s) identified: (Topic : application controls) lack of access to all data some business rules switched off limited verification of data provided by applicants Topic compliance costs Risk(s) identified: (Topic : compliance costs) lack of access to all data some business rules switched off limited verification of data provided by applicants Topic consultants Risk(s) identified: (Topic : consultants) lack of access to all data some business rules switched off limited verification of data provided by applicants Measuring influence on outcomes performance measurement frameworks large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic internal control Risk(s) identified: (Topic : internal control) weaknesses in critical internal controls data not widely available savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic civil service staff Risk(s) identified: (Topic : civil service staff) weaknesses in critical internal controls data not widely available Topic open data Risk(s) identified: (Topic : open data) weaknesses in critical internal controls data not widely available large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused mandatory publication open data at work concrete action plan national information infrastructure no policy too late and too fragmented planning ineffective monitoring regulations' update delayed and incomplete cost related rules not modified nobody responsible for coordination lack of training and practice lack of quality control Topic service center Risk(s) identified: (Topic : service center) weaknesses in critical internal controls data not widely available Topic job scheduling Risk(s) identified: (Topic : job scheduling) weaknesses in critical internal controls data not widely available working hours not rearranged working hours not recorded regularly staffing levels not optimised lack of analysis where and when the problem is triggered no IT support Topic emergency preparedness Risk(s) identified: (Topic : emergency preparedness) unclear governance and division of responsibilities insufficient data at coordination level Topic cost estimation Risk(s) identified: (Topic : cost estimation) not fully comprehensive estimations cost estimations not well-documented poor analysis poor policy Topic government IT agency Risk(s) identified: (Topic : government IT agency) not fully comprehensive estimations cost estimations not well-documented poor analysis poor policy Topic large scale undertaking Risk(s) identified: (Topic : large scale undertaking) savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic regulators Risk(s) identified: (Topic : regulators) Measuring influence on outcomes performance measurement frameworks Topic product marking Risk(s) identified: (Topic : product marking) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic information society Risk(s) identified: (Topic : information society) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused no policy too late and too fragmented planning ineffective monitoring regulations' update delayed and incomplete cost related rules not modified nobody responsible for coordination lack of training and practice lack of quality control Topic personal data protection Risk(s) identified: (Topic : personal data protection) mandatory publication open data at work concrete action plan national information infrastructure Topic requirements management Risk(s) identified: (Topic : requirements management) erroneous assessments of needs cost-effectiveness not assessed Topic relocation of government jobs Risk(s) identified: (Topic : relocation of government jobs) underestimated issues related to relocation lack of guidelines on cost calculation increase of sickness absence and recruitment problems Topic ICT infractructure Risk(s) identified: (Topic : ICT infractructure) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic data centers Risk(s) identified: (Topic : data centers) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic cyber security Risk(s) identified: (Topic : cyber security) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic data protection Risk(s) identified: (Topic : data protection) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities no policy too late and too fragmented planning ineffective monitoring regulations' update delayed and incomplete cost related rules not modified nobody responsible for coordination lack of training and practice lack of quality control