Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
12 results found in 9 ms Page 1 of 2
Audit of the Government, Government-guaranteed and Municipal Debt Management Information Systems in the Ministry of Finance of the Republic of Bulgaria
The main audit question studied during the audit was: Are the government, government-guaranteed (SDMS) and municipal debt management information systems (CMDR) at the Ministry of Finance effective ... ? The audit covered the period from 01.01.2013 to 31.12.2013 and investigated four major areas: IT system strategy and general management; IT security and controls against disasters; Operational controls ... and Documentation; Application Controls. ... ... Even effective and modern IT systems require improvements and updates to ensure their security and accountability ... For the management of the government, government-guaranteed and municipal debt the Ministry of Finance has established an advanced integrated information infrastructure. According to Bulgarian SAI ... the established system is effective and provides updated, complete and correct information. Nevertheless the audit report points out areas of security, application controls as well as documentation as the subjects ... that need further improvement and optimization.
Full description
Bulgarian National Audit Office , issued in 2014
Risk cases: 3
Software Developement Effective Practices and Federal Chalenges in Applying Agile Methods
To identify effective practices in applying Agile for software developement solutions and federal challenges in implementing Agile techniques. ... Agile project approach in government practice ... Useful products delivered in a short time are basis for often applauded features of agile project approach. Applied by many private companies, it tends as well to be more and more popular among state ... administrations. American GAO reviewed set of agile projects and revealed - apart from advantages - a set of commonly occurring problems: poor team work, lack of time and deficit of customers’ trust.
Full description
General Accountability Office , issued in 2012
Risk cases: 4
Information Technology Cost Estimation Agencies Need to Address Significant Weakness in Policies and Practices
To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
General Accountability Office , issued in 2012
Risk cases: 4
VETERANS’ HEALTH CARE - Preliminary Observations on VHA’s Claims Processing Delays and Efforts to Improve the Timeliness of Payments to Community Providers
Due to increases in expenditures and utilization of VA care in the community services in recent years, VHA has had difficulty processing claims in a timely manner. In planning to consolidate its ... existing VA care in the community programs, as required by law, the agency said it will examine strategies for improving the timeliness and accuracy of its payments to community providers.<br ... /> This statement, which is based on ongoing work, summarizes GAO’s preliminary observations about (1) VHA’s, Medicare’s, and TRICARE’s claims processing timeliness in fiscal year 2015; (2) factors that have impeded ... Data processing hold back by technology limitation, workload and administrative burden ... US GAO analyzed all factors of slower processing and user unfriendliness that occur sometimes to the veterans healthcare. The main focus is data processing - and it has been proved that it can ... be failing not only because of technology, but also because of work-process design, staff and organisation.
Full description
General Accountability Office , issued in 2016
Risk cases: 6
Public access point to the Polish e-Administration
Coordinated audit series (46 auditees) focused on a web solution applied to give an easy access to Government e-services (the project planned to be completed in 2013) The audit was performed in 2008 ... and public report issued in March 2009. Primary goal of th presentation was intended to illustrate the use of 'e-Government Algorithm' elaborated by EUROSAI IT Working Group in 2005. One of issues mede better ... known by the audit was 'Project Frameworks vs Public Procurement'. ... ... Buyer, provider and methodologies need a balance ... Presentation based on a vast audit by Polish SAI which subject was of big network project aiming to provide one access point to Government and Selfgovernments services. The presentation illustrates ... old EUROSAI IT Wg 'Algorithm approach' and focuses on procurement systemic problems.
Full description
Supreme Audit Office of Poland , issued in 2008
Risk cases: 3
Data security and positions with access to confidential information
This government wide audit on information security and positions with access to confidential information has been performed at all ministries ans for each ministry also at one of the agencies ... . The 2007 Civil Service Data Information Security Decree (in Dutch: VIR 2007) is the legal foundation of the first part of this audit (data security). The Security Screening Act (in Dutch: WVO ... ) is the foundation of the second part (positions with access to confidential information). Only four of the organizations we have audited show an acceptible level of compliance with the 2007 Civil Service Data ... ... Shortcomings in information security and in positions with access to confidential information ... Surprising weaknesses were revealed by the NCA in its Government-wide operational audit performed as part of the 2011 audit into the state of central government accounts: Poor quality of data ... protection policy and poor protection of information systems. Also, non vetted positions with access to confidential information.
Full description
Netherlands Court of Audits , issued in 2012
Risk cases: 3
Use of European Union funds in promoting information society
The National Audit Office audited the use of the aid allocated from the structural funds of the European Union (hereinafter EU aid) in the information technology (IT) area of the state. The National ... Audit Office checked whether the distribution of funds for the development of the information society has been balanced and transparent, and whether the distribution of aid is adequately supervised ... . Balanced distribution of aid means that development of the information society entails paying attention (and ideally providing proportional funding) to information systems aimed at the public sector, private ... Riigikontroll auditeeris Euroopa Liidu struktuurifondidest ehk tõukefondidest eraldatud toetuste (edaspidi ELi toetusraha) kasutamist riigi infotehnoloogia (IT) valdkonnas. Uuriti, kas raha jagamine ... infoühiskonna arendamise eesmärgil on olnud tasakaalustatud ja läbipaistev ning kas toetuste jagamise üle tehakse piisavat järelevalvet. Riigikontrolli hinnangul on riik infoühiskonna arengukava rakendamiseks ... toetuste jagamisel keskendunud liiga riigile suunatud IT-arenduste rahastamisele ning jätnud tagaplaanile ettevõtete konkurentsivõime parandamisele ja kolmandale sektorile suunatud IT arendusprojektide ... Balance needed for success of Information Society Development Plan ... 50% of aid has been granted primarily for the development of information systems of state agencies, i.e. as much as the other two target groups - business and citizens - put together. Information ... , true suppervision and measurement of progress are listed by the Estonian SAI as next key elements necessary to keep balanced development of strategy for Information Society.
Full description
National Audit Office of Estonia , issued in 2012
Risk cases: 2
Effectiveness of development of broadband network or high-speed internet
The National Audit Office audited whether the state has made every effort to ensure that everyone can have unlimited access to fast internet connection by 2020. The National Audit Office also ... analysed whether the network of fibre-optical cables or the basic broadband network, which is built with European Union support and should guarantee high-speed internet connection, has helped to achieve ... this goal. ... ... ... Slower broadband paid by customers ... The Estonian Information Society Development Plan foresees that high-speed internet of 30 Mbit/s should be accessible to all people in Estonia by 2020 and that 60% of the population will be using ... superfast internet of over 100 Mbit/s. To achieve these goals, the state, with the help of European Union support, decided to establish a broadband network which is not further than 1.5 km from 98% of homes ... and institutions. Private companies have not entirely met the Government's expectations. The Estonian SAI has looked for an answer: Why?
Full description
National Audit Office of Estonia , issued in 2015
Risk cases: 3
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Management of State Information Resources
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... . Audit procedures were performed in all major institutions which form and implement the policy of information resources: Ministry of Transport and Communications, Ministry of the Interior, Ministry ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
National Audit Office of the Republic of Lithuania , issued in 2013
Risk cases: 3
12 results found. Page 1 of 2 next