Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
8 results found in 6 ms Page 1 of 1
Telecommunication solutions in the Institutions of Bosnia and Herzegovina
Strategies need systemic analysis Bosnia and Herzegovina state auditors analysed a set of strategies related to telecom solutions across the BiH administration. They found that lack of a systemic approach and of analytical support reduced abilities of the organistations to make full use of the up-to-date technologies.
Full description
Audit Office of the Institutions of Bosnia and Herzegovina , issued in 2014
Risk cases: 3
Activities of the state in implementing the e-health system - Do the state, doctors and patients benefit from ehealth?
. E-health solutions also save patients time. <br/> The purpose of the audit was to assess whether the objectives set to e-Health – higher quality of the health service and more efficient organisation ... Estonia’s population is aging and the share of elderly people is increasing, as fewer children are being born and people are living longer. This creates a constantly growing need for health ... and social services and patients are also becoming more and more demanding about the volume and quality of the services provided. The more extensive and systematic implementation of e-health solutions helps ... ... Why state, doctors and patients do not benefit from e-Health as much as they could? ... The report reviews whether the objectives set to the e-Health – ambitious multiyear program of Estonian Government - have been achieved. They are: higher quality of the health service and more ... efficient organisation of health care. As SAI Estonia found out, wide range problems started from two basic points: lack of strategic manager and unrealisitc schedule.
Full description
National Audit Office of Estonia , issued in 2014
Risk cases: 3
Traffic Ticketing information system
The audit included two areas of focus - the environment surrounding the Traffic Ticketing Information System - the System (designed to input, process, manage and collect payment for the traffic ... tickets) and also the internal environment of the System that guarantees the quality of its performance and safety. ... Security can hinder effectiveness ... SAI of Kuwait analysed system supporting collection of the traffic tickets - data input, processing and management. What was found was lack of basic safety measures, that hindered the effectiveness ... of the system.
Full description
State Audit Bureau of Kuwait , issued in 2014
Risk cases: 3
Effectiveness of the Tax Administration of the Republic of Slovenia in the execution of modernisation projects of the Slovenian duty information system and decreasing the number of duty sub-accounts
The Tax Administration of the Republic of Slovenia (hereinafter: the Tax Administration) is responsible for collecting taxes, fees and other compulsory levies (hereinafter: duties ... ). These are the revenue of the state budget, municipal budgets, the Health Insurance Institute of Slovenia, the Institute for Pension and Disability Insurance of Slovenia (hereinafter: duties recipients) and indirectly ... of the European Union budget. In order to improve its operations, the Tax Authority decided to modernise the Slovenian duties’ collection information system. It used this opportunity to implement also a second ... ... Shaky coordination of investments in important systems ... Slovenian SAI traced a series of problems in management of crucial IT investments in tax administration. Apart from promising goals, unclear business case gave a start to many problems at next stages ... of the project, involving additional spendings, delays and errors in data processing.
Full description
Court of Audit of the Republic of Slovenia , issued in 2014
Risk cases: 7
Analysis of Trends in SAI Japan’s Findings
Analysis of IT audit cases by Board of Audit of Japan in years 2004-12. ... Not used IT systems and overpaid 'ghost' services ... Wrap-up of almost a decade of SAI of Japan's IT related audits results in a form of list of most often found problems. On the top of the list are unwanted or overpaid IT systems and too expensive ... maintanance. It makes you thinking: if one of the world technology leaders could find this, what could we find in our country...
Full description
Board of Audit of Japan , issued in 2014
Risk cases: 3
Report on the problems connected with the development and implementation of the digitally based Shared Medication Record
The purpose of the examination was to assess whether the department of the Danish Ministry of Health, the Danish National eHealth Authority (NHA) and the five regions that are responsible ... for the hospitals have made an adequate effort to develop and implement the Shared Medication Record (SMR). With the SMR, data on the citizens’ medication can be shared across hospitals, general practitioners, etc ... . and relevant health staff and the patients have direct digital access to updated medical data round the clock. The report answers the following questions: 1) Has the Ministry of Health and the NHA provided ... ... Involvement of key participants necessary from the very beginning ... Digitally based Shared Medication Record is basis of the complex healthcare system. Rigsrevisionen analysed unsolved issues related to unclear business case, insufficient analysis of work flows ... and processes leading to implementation problems, governance not involving key players, and IT security organisation.
Full description
National Audit Office of Denmark , issued in 2014
Risk cases: 2
Finally updating the central information system for VAT control
IT system to support combating VAT frauds German Bundesrechnungshof demanded to update the IT system, which plays crucial role in the European system of fighting fraud related to the Value Added Tax (VAT). This BRH's case shows that reminding about appropriate follow-up can be as important as the very recommendation.
Full description
Bundesrechnungshof , issued in 2014
Risk cases: 1
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
8 results found. Page 1 of 1