Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
58 results found in 9 ms Page 1 of 6
Insufficient monitoring of consultancy work in large-scale IT projects
Insufficient monitoring of consultancy work in large-scale IT projects The German Federal Ministry of the Interior did not sufficiently plan, monitor and control consultancy work in two large-scale IT projects, not being thus able to evaluate the amount of work done and pay accordingly. It was recommended by SAI the establishment of a quality management system and its application mandatory for large-scale IT projects
Full description
Bundesrechnungshof , issued in 2017
Risk cases: 1
Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... ... Inadequate management and control of domain administrator privileges ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges.
Full description
National Audit Office of Denmark , issued in 2015
Risk cases: 4
Coordinated Audit on Information Technology Governance
IT governance needs awareness and SAIs' support The OLACEFS auditors found that the greatest challenge for the SAIs is to raise the awareness of the audit institutions about the importance of IT governance and the benefits that could be obtained by improving its degree of maturity. The audit was conducted by 11 SAIs and coordinated by TCU of Brasil. They concluded: 'It is important, even urgent, to invest resources to implement or enhance: the IT committees; the IT planning process; strategic IT planning; monitoring the IT contracting process; the business continuity plan; the designation of a responsible person or unit to manage security information; a risk management process; an asset inventory process; an information security committee; and a policy for access control.'
Full description
Latin American andCaribbean Organization of Supreme Audit Institutions , issued in 2015
Risk cases: 5
Analysis of Trends in SAI Japan’s Findings
Analysis of IT audit cases by Board of Audit of Japan in years 2004-12. ... Not used IT systems and overpaid 'ghost' services ... Wrap-up of almost a decade of SAI of Japan's IT related audits results in a form of list of most often found problems. On the top of the list are unwanted or overpaid IT systems and too expensive ... maintanance. It makes you thinking: if one of the world technology leaders could find this, what could we find in our country...
Full description
Board of Audit of Japan , issued in 2014
Risk cases: 3
Use of European Union funds in promoting information society
The National Audit Office audited the use of the aid allocated from the structural funds of the European Union (hereinafter EU aid) in the information technology (IT) area of the state. The National ... Audit Office is of the opinion that the state is too focussed on financing the IT developments aimed at the state when distributing aid for the implementation of the National Information Society ... Development Plan, and not paid enough attention on improving the competitiveness of companies and supporting the IT development projects that are aimed at the third sector. Also, the selection of IT projects ... Riigikontroll auditeeris Euroopa Liidu struktuurifondidest ehk tõukefondidest eraldatud toetuste (edaspidi ELi toetusraha) kasutamist riigi infotehnoloogia (IT) valdkonnas. Uuriti, kas raha jagamine ... toetuste jagamisel keskendunud liiga riigile suunatud IT-arenduste rahastamisele ning jätnud tagaplaanile ettevõtete konkurentsivõime parandamisele ja kolmandale sektorile suunatud IT arendusprojektide ... toetamise. Samuti ei ole IT-projektide valik olnud läbipaistev ning riigi järelevalve projektide elluviimise üle on jäänud formaalseks. ... Balance needed for success of Information Society Development Plan ... 50% of aid has been granted primarily for the development of information systems of state agencies, i.e. as much as the other two target groups - business and citizens - put together. Information ... , true suppervision and measurement of progress are listed by the Estonian SAI as next key elements necessary to keep balanced development of strategy for Information Society.
Full description
National Audit Office of Estonia , issued in 2012
Risk cases: 2
Federal Agencies Need to Address Aging Legacy Systems
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
General Accountability Office , issued in 2016
Risk cases: 3
Lessons learned from government ICT-projects
This audit has been performed on request of the Dutch parliament. Some newspapers mentioned government losses of four to five billion euro's on a yearly bases. These news items caused the parliament ... to request this audit. The audit has been performed in only 5 months time and consisted of the re-use of earlier performed audits. We have 'recycled' earlier findings about ICT-projects. ... 'Expensive' does not always mean 'High Quality', so... do not feed the spiral ... Excellent analysis of systemic errors commited when designing Government IT projects. The report aims at the essence of problems which are encountered far from information technologies - in: politics ... , business, psychology... Do not be mislead by date of report, it is evergreen for all who really want to know why IT projects fail.
Full description
Netherlands Court of Audits , issued in 2007
Risk cases: 3
Information security work at nine agencies
Difficulties in achieving appropriate IT security Together with the Swedish NAO we assume that the picture that emerges at the agencies audited applies also to most of the other agencies in the public administration. The information security work is not given high enough priority in relation to the risks that exist. This applies to both the Government, which should have been clearer in its directions to agencies on this matter, and to agency managements, which did not give priority to the work of information security to the extent required. Much indicates that it is difficult for many agencies to achieve an appropriate level of information security work.
Full description
Swedish National Audit Office , issued in 2016
Risk cases: 4
Information Technology Cost Estimation Agencies Need to Address Significant Weakness in Policies and Practices
To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
General Accountability Office , issued in 2012
Risk cases: 4
Online fraud
Uneven response to online fraud This type of fraud can affect everyone, but yet it is not a strategic priority for local police forces and the response from industry is uneven. UK NAO underlines: For too long, as a low-value but high-volume crime, online fraud has been overlooked by government, law enforcement and industry. It is a crime that can affect everyone. Fraud is now the most commonly experienced crime in England and Wales, is growing rapidly and demands an urgent response. Yet fraud is not a strategic priority for local police forces, and the response from industry is uneven.
Full description
National Audit Office , issued in 2017
Risk cases: 6
58 results found. Page 1 of 6 next