Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
6 results found in 7 ms Page 1 of 1
Management and implementation of 1BestariNet
Solution. 1BestariNet serves as a major catalyst for internet penetration in Malaysia as well as the projected increase in national income. AUDIT OBJECTIVE: The audit was carried out to evaluate whether ... the management and implementation of 1BestariNet was carried out economically, efficiency and effectively to achieve the inttended objectives. AUDIT SCOPE: The audit scope includes planning, implementation ... and monitoring of 1BestariNet Project. The audit was carried out at 1BestariNet’s Project Management Office, Ministry of Education Malaysia (Education Technology Division, Procurement and Asset Management Division ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
National Audit Department of Malaysia , issued in 2013
Risk cases: 4
IT Police Systems
and organization of the project turned out to make the difference. Accordance with the public procurement law was not part of the audit as a separate investigation in that matter was carried by respective Polish ... Implementation by the Polish Police of two IT projects (E-police station and Command Support System - CSS) was audited. Both systems were to relieve the Police officers and increase the quality ... and effectiveness of their work. Audit explained the reason of failure in the case of E-police station project and success in the case of CSS. Although some irregularities occurred in both cases, careful planning ... ... A textbook example of how not to implement the IT projects ... Polish NIK compared the implementation of two flagship IT projects of the Police HQ: successful 'Command Support System' and problematic 'E-police station'. List of interesting problems appeared...
Full description
Supreme Audit Office of Poland , issued in 2013
Risk cases: 5
Open Government Data - Are all exceptions to the principle of cost-free access and reuse legitimate?
comparisons carried out extremely competently in record time by France's economic units in 36 countries;<br/> - hearings of evidence from competent official authorities, comprising official bodies in France ... The United Kingdom, a country seen, like the United States, as a pioneer in open public data, has estimated at £6.8bn (€7,9bn) the revenue in 2010 and 2011 generated for British society by open ... public data, of which £5bn (€5.8bn) is profit. As an example, a start-up has highlighted the existence of areas in which massive savings can be made by analysing prescriptions of patented drugs ... ... Open data strategy should decide the costs problem ... French Cour des comptes presents analysis on implementation of the open data practice across the administration. Massive savings are expected, when public access to large amounts of highquality data ... is made easy. France is among the pioneers and countries making the most rapid progress in this domain. Charges for the reuse of the public information has been identified as the main problem.
Full description
Cour des comptes , issued in 2013
Risk cases: 1
Managing the risk of legacy ICT to public service delivery
The cross-government report describes the case studies from four public services (state pension, Value Added Tax collection, prescription payment and consumer credit licensing services) selected ... to illustrate the range of approaches that small and large government bodies are taking to address the issues arising from legacy ICT (defined as "systems and applications that have been operationally embedded ... within a business function but superseded by newer and more effective technologies or changed business needs"). ... Possible approaches to the problem of 'legacy ICT' ... UK’s government experience in managing the risks connected to legacy ICT provides valuable insight for others facing the same problem and are considering transforming their services.
Full description
National Audit Office , issued in 2013
Risk cases: 3
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
The rural broadband programme
Intervention in a noncompetitive market The British NAO's audit report of 2013 concerns ambitious yet delayed UK government programme, which objective was to have the best superfast broadband network in Europe by 2015. The report focuses on one of the programme's main problems: rural areas, where commercial providers had no plans to invest, because of lower returns.
Full description
National Audit Office , issued in 2013
Risk cases: 7
6 results found. Page 1 of 1