Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
> Area:"culture heritage"
Results found in 45 ms
  (Click on a topic/risk node to traverse and access the reports)
Area culture heritage Topic legacy systems Risk(s) identified: (Topic : legacy systems) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified Topic management dashboard Risk(s) identified: (Topic : management dashboard) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic agile projects Risk(s) identified: (Topic : agile projects) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic data center consolidation Risk(s) identified: (Topic : data center consolidation) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic indicative Risk(s) identified: (Topic : indicative) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused mandatory publication open data at work concrete action plan national information infrastructure Topic directive Risk(s) identified: (Topic : directive) many use outdated software languages and hardware lack of consistent risk analysis One of goals not identified most electronic records remained unscheduled no policies, plans and practices to guide an expert IT system acquisition insufficient automation in managing large volumes of data control of electronic records is difficult in a decentralized computing environment obsolescent and aging storage media put electronic records at risk complexity of electronic records precludes simple transfer to text formats electronic records are dependent on evolving software and hardware savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused mandatory publication open data at work concrete action plan national information infrastructure Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic civil service staff Risk(s) identified: (Topic : civil service staff) staff reduced number of staff reduced by minimising recruitment long-term operating models not set no information on workforce's skills entities’ workforce information is incomplete and not comparable Topic consultants Risk(s) identified: (Topic : consultants) staff reduced number of staff reduced by minimising recruitment long-term operating models not set no information on workforce's skills entities’ workforce information is incomplete and not comparable large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic temporary staff Risk(s) identified: (Topic : temporary staff) staff reduced number of staff reduced by minimising recruitment long-term operating models not set no information on workforce's skills entities’ workforce information is incomplete and not comparable Topic civil service system Risk(s) identified: (Topic : civil service system) staff reduced number of staff reduced by minimising recruitment long-term operating models not set no information on workforce's skills entities’ workforce information is incomplete and not comparable Topic internal control Risk(s) identified: (Topic : internal control) staff reduced number of staff reduced by minimising recruitment long-term operating models not set no information on workforce's skills entities’ workforce information is incomplete and not comparable basic approach not equally effective bacground affects performance positive approach to learning savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic immigrant students Risk(s) identified: (Topic : immigrant students) basic approach not equally effective bacground affects performance positive approach to learning Topic records and documents management Risk(s) identified: (Topic : records and documents management) most electronic records remained unscheduled no policies, plans and practices to guide an expert IT system acquisition insufficient automation in managing large volumes of data control of electronic records is difficult in a decentralized computing environment obsolescent and aging storage media put electronic records at risk complexity of electronic records precludes simple transfer to text formats electronic records are dependent on evolving software and hardware Topic large scale undertaking Risk(s) identified: (Topic : large scale undertaking) savings goals not planned insufficient quality and frequency of risk analysis different interpretations of guidance Topic product marking Risk(s) identified: (Topic : product marking) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic user friendliness Risk(s) identified: (Topic : user friendliness) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic information society Risk(s) identified: (Topic : information society) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic interoperability Risk(s) identified: (Topic : interoperability) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused Topic open data Risk(s) identified: (Topic : open data) large number of public-sector actors are involved in policy making complexity of the regulations divided resources no role for end-users data and information systems are underused mandatory publication open data at work concrete action plan national information infrastructure Topic personal data protection Risk(s) identified: (Topic : personal data protection) mandatory publication open data at work concrete action plan national information infrastructure Topic ICT infractructure Risk(s) identified: (Topic : ICT infractructure) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic data centers Risk(s) identified: (Topic : data centers) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic cyber security Risk(s) identified: (Topic : cyber security) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities Topic data protection Risk(s) identified: (Topic : data protection) Formalized approach to optimization goals Lack of clear development plans and well-organised infrastructure Involvement of many institutions in security activities