Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
Did you mean maturity self-assessment (2)? maturity sell-assessment (2)? maturity sel-assessment (2)?
2 results found in 7 ms Page 1 of 1
Report to on the user-friendliness and user involvement in the development of e-government services in Denmark
is to provide an assessment of the authorities’ efforts to ensure that e-government services are user-friendly. The report answers the following questions: - Have the authorities involved the users ... in the development of the e-government services? - Have the authorities conducted post-launch assessments of the user-friendliness of the e-government services, and do the contracts with the suppliers of the solutions ... The e-government user-friendliness requirements are divided into five overall categories: language, design and flow, data and functionality, and accessibility. 1) The objective of the study ... ... User-friendliness of public services should be consistenty required and tested ... The Danish Rigsrevisionen is of the opinion that the user-friendliness of the services can be improved if the authorities meet all the requirements of the Danish Agency for Digitisation concerning ... the matter. The audit covered user-friendliness related problems in case of five systems, before and after the launch. The systems take-up was also considered, as well as communicating with citizens who ... are unable to use digital services.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 2
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
2 results found. Page 1 of 1