Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
4 results found in 9 ms Page 1 of 1
Activities of the state in implementing the e-health system - Do the state, doctors and patients benefit from ehealth?
Estonia’s population is aging and the share of elderly people is increasing, as fewer children are being born and people are living longer. This creates a constantly growing need for health ... and social services and patients are also becoming more and more demanding about the volume and quality of the services provided. The more extensive and systematic implementation of e-health solutions helps ... make the health system more efficient, improves people’s health via more effective prevention, raises the awareness of patients and also contributes to the more reasonable use of health resources ... ... Why state, doctors and patients do not benefit from e-Health as much as they could? ... The report reviews whether the objectives set to the e-Health – ambitious multiyear program of Estonian Government - have been achieved. They are: higher quality of the health service and more ... efficient organisation of health care. As SAI Estonia found out, wide range problems started from two basic points: lack of strategic manager and unrealisitc schedule.
Full description
National Audit Office of Estonia , issued in 2014
Risk cases: 3
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Telecommunication solutions in the Institutions of Bosnia and Herzegovina
Strategies need systemic analysis Bosnia and Herzegovina state auditors analysed a set of strategies related to telecom solutions across the BiH administration. They found that lack of a systemic approach and of analytical support reduced abilities of the organistations to make full use of the up-to-date technologies.
Full description
Audit Office of the Institutions of Bosnia and Herzegovina , issued in 2014
Risk cases: 3
Analysis of Trends in SAI Japan’s Findings
Analysis of IT audit cases by Board of Audit of Japan in years 2004-12. ... Not used IT systems and overpaid 'ghost' services ... Wrap-up of almost a decade of SAI of Japan's IT related audits results in a form of list of most often found problems. On the top of the list are unwanted or overpaid IT systems and too expensive ... maintanance. It makes you thinking: if one of the world technology leaders could find this, what could we find in our country...
Full description
Board of Audit of Japan , issued in 2014
Risk cases: 3
4 results found. Page 1 of 1