Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
7 results found in 5 ms Page 1 of 1
Managing the risk of legacy ICT to public service delivery
The cross-government report describes the case studies from four public services (state pension, Value Added Tax collection, prescription payment and consumer credit licensing services) selected ... to illustrate the range of approaches that small and large government bodies are taking to address the issues arising from legacy ICT (defined as "systems and applications that have been operationally embedded ... within a business function but superseded by newer and more effective technologies or changed business needs"). ... Possible approaches to the problem of 'legacy ICT' ... UK’s government experience in managing the risks connected to legacy ICT provides valuable insight for others facing the same problem and are considering transforming their services.
Full description
National Audit Office , issued in 2013
Risk cases: 3
General and Creation Control of the Information Systems of the Ministry of Foreign Affairs
achieved considerable progress in the management of the information systems. The auditors reviewed and assessed all key elements of the process. ... The objective of the audit was to assess general and creation control of the information systems of the Ministry of Foreign Affairs. Since the beginning of 2009, the Ministry of Foreign Affairs has ... Overview of problems - area by area ... SAI Lithuania looked into all critical elements of a Ministry's information system, starting from IT architecture, through information security to automation of data processing.
Full description
National Audit Office of the Republic of Lithuania , issued in 2013
Risk cases: 4
Report to the Public AccountsCommittee on mitigation of cyber attacks
have addressed the risk of cyber attacks and whether they have implemented these three security controls. ... This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
Management and implementation of 1BestariNet
1BestariNet Service Project (1BestariNet) is an initiative undertaken by the Malaysian Ministry of Education (MOE) to replace and enhance ICT connectivity in schools. It is an enhancement ... to the SchoolNet service which terminated on 31 December 2010 with emphasis on end-to-end solutions (E2E) network services together with Virtual Learning Environment (VLE). Under this project, 10,000 primary ... and secondary public schools in Malaysia are equipped with high-speed 4G Internet access and a virtual learning platform, providing high-speed internet connectivity and access to a world-class Integrated Learning ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
National Audit Department of Malaysia , issued in 2013
Risk cases: 4
The rural broadband programme
Intervention in a noncompetitive market The British NAO's audit report of 2013 concerns ambitious yet delayed UK government programme, which objective was to have the best superfast broadband network in Europe by 2015. The report focuses on one of the programme's main problems: rural areas, where commercial providers had no plans to invest, because of lower returns.
Full description
National Audit Office , issued in 2013
Risk cases: 7
Informatisation of hospitals
The goals of the audit were: 1. Assesment to what degree service providers are prepared to implement the electronic health information system. 2. Assessment of government activities related ... to the construction of the health information system within the framework of the "Healthcare Informatisation Program" ... ... Sometimes it is really not about the money.. ... Informatisation of healthcare is one of the most money-consuming IT activities of the State. Polish NIK shows how a poor concept can delay modernization of hospitals. The new IT system was expected ... to take some burden off doctors, streamline medical care, prevent fraud and improve efficiency. But will it be created at all?
Full description
Sumpreme Audit Office , issued in 2013
Risk cases: 3
Software management assessment in local governments and local government educational institutions
Objective of the audit was to verify compliance of software recording and management with regulatory enactments, as well as to assess the effectiveness of software management in local governments ... and local government educational institutions. ... ... Software management assessment in local governments and local government educational institutions ... Manage your software! Local governments and local government education institution neglect basic safety procedures, use outdated or illegal kinds of software, use two and more different software ... for the same function.
Full description
State Audit Office of the Republic of Latvia , issued in 2013
Risk cases: 4
7 results found. Page 1 of 1