Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
5 results found in 5 ms Page 1 of 1
Managing the risk of legacy ICT to public service delivery
within a business function but superseded by newer and more effective technologies or changed business needs"). ... The cross-government report describes the case studies from four public services (state pension, Value Added Tax collection, prescription payment and consumer credit licensing services) selected ... to illustrate the range of approaches that small and large government bodies are taking to address the issues arising from legacy ICT (defined as "systems and applications that have been operationally embedded ... Possible approaches to the problem of 'legacy ICT' ... UK’s government experience in managing the risks connected to legacy ICT provides valuable insight for others facing the same problem and are considering transforming their services.
Full description
National Audit Office , issued in 2013
Risk cases: 3
Operation of the Record Systems Applied in the Eligibility Scheme of Benefits and Services Provided from the Social Security Funds
Hungarian SAI evaluated the set-up and operation of the basic registries of managing bodies (National Health Insurance Fund, Central Administration of National Pension Insurance, National Tax ... and Customs Administration), as well as the dataflow amongst them. In addition, the control system of fulfilling the data provision obligation was evaluated, as well as the IT support activities and whether ... the records had proven reliable in supporting services in compliance with eligibilities and in filtering unjustified services. The audited period covered the years 2007-2010. ... ... Well considered regulations are essential for good quality data ... bases managed by different entities, in a changing legal environment. ... State Audit Office of Hungary.has proved that date safety may depend on quality of regulations. The report on record systems of social security services casted light on risk connected with huge data
Full description
State Audit Office of Hungary , issued in 2012
Risk cases: 2
Report to on the user-friendliness and user involvement in the development of e-government services in Denmark
), The Danish Customs and Tax Authorities (the Ministry of Taxation); - The Danish electronic land registration system, The Court Administration (the Ministry of Justice); - online notification of change ... The e-government user-friendliness requirements are divided into five overall categories: language, design and flow, data and functionality, and accessibility. 1) The objective of the study ... is to provide an assessment of the authorities’ efforts to ensure that e-government services are user-friendly. The report answers the following questions: - Have the authorities involved the users ... ... User-friendliness of public services should be consistenty required and tested ... The Danish Rigsrevisionen is of the opinion that the user-friendliness of the services can be improved if the authorities meet all the requirements of the Danish Agency for Digitisation concerning ... the matter. The audit covered user-friendliness related problems in case of five systems, before and after the launch. The systems take-up was also considered, as well as communicating with citizens who ... are unable to use digital services.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 2
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Effectiveness of the Tax Administration of the Republic of Slovenia in the execution of modernisation projects of the Slovenian duty information system and decreasing the number of duty sub-accounts
The Tax Administration of the Republic of Slovenia (hereinafter: the Tax Administration) is responsible for collecting taxes, fees and other compulsory levies (hereinafter: duties ... ). These are the revenue of the state budget, municipal budgets, the Health Insurance Institute of Slovenia, the Institute for Pension and Disability Insurance of Slovenia (hereinafter: duties recipients) and indirectly ... of the European Union budget. In order to improve its operations, the Tax Authority decided to modernise the Slovenian duties’ collection information system. It used this opportunity to implement also a second ... ... Shaky coordination of investments in important systems ... Slovenian SAI traced a series of problems in management of crucial IT investments in tax administration. Apart from promising goals, unclear business case gave a start to many problems at next stages ... of the project, involving additional spendings, delays and errors in data processing.
Full description
Court of Audit of the Republic of Slovenia , issued in 2014
Risk cases: 7
5 results found. Page 1 of 1