Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
127 results found in 24 ms Page 3 of 13
The National Offender Management Information System (NOMIS)
of continuity and follow up of interventions with offenders as they move within the prison system and between prison and the community; and to provide a clearer alignment of prison and probation work ... This report examines the reasons for the delays and cost increases to the original integrated information system and, since the moratorium imposed by the Minister of State in order to seek options ... for project’s cost reduction, the aims of the revised National Offender Management Service (NOMS) and the progress made, the impact of the delays and rescoping on the costs and benefits achieved, and NOMS ... Rescoping necessary, but not fully successful ... An initiative to build a single offender management IT system for the prison and probation services has not delivered value for money. The NAO investigation found the project had been hampered ... by poor management leading to a three-year delay, a doubling in project costs and reductions in scope and benefits.
Full description
National Audit Office , issued in 2009
Risk cases: 4
Open Government Data - Are all exceptions to the principle of cost-free access and reuse legitimate?
secretariat for government modernisation (Secrétariat General pour la Modernisation de l'Action Publique - SGMAP), in conjunction with the Minister with responsibility for the budget, to "assess the business ... /> In order to address this issue, the commission has endeavoured to base its considerations on:<br/> - the work done on a regular basis over the last twenty or so years by Government on issues relating ... The United Kingdom, a country seen, like the United States, as a pioneer in open public data, has estimated at £6.8bn (€7,9bn) the revenue in 2010 and 2011 generated for British society by open ... ... Open data strategy should decide the costs problem ... French Cour des comptes presents analysis on implementation of the open data practice across the administration. Massive savings are expected, when public access to large amounts of highquality data ... is made easy. France is among the pioneers and countries making the most rapid progress in this domain. Charges for the reuse of the public information has been identified as the main problem.
Full description
Cour des comptes , issued in 2013
Risk cases: 1
Evaluation of the effectiveness of implementation and compliance with regulatory enactments and the legal framework of the project “E-government Portfolio”
The objective of the audit is to evaluate the effectiveness of implementation and compliance with regulatory enactments and the legal framework of the project “Egovernment Portfolio” of the national ... programme of the European Regional Development Fund (hereinafter: ERDF) of the European Union (hereinafter: EU), “Development and improvement of the infrastructural foundation for electronic governance”. ... ... Funds to absorb but no efficient project methodology? Be prepared for troubles ... Wide list of problems that can be met when more care is received by 'absorb funds' objective than by clear vision what and how can be improved. SAI Latvia's analysis shows how dangerous it can ... be for both effectiveness and financial management.
Full description
State Audit Office of Latvia , issued in 2010
Risk cases: 3
IT Support in the Judicial Chain
The Swedish National Audit Office has examined how well agencies in the judicial chain have handled known flaws in their IT support and whether the Government’s control mechanisms have provided ... the agencies with sufficient prerequisites to expand and improve IT support. ... ... Needed: good conditions by government, better steering and control by authorities ... Despite many years’ of work to modernize the IT support within the judiciary, there are still many deficiencies. The Government has not given the authorities good conditions enough to lead the work ... . The authorities, in their turn, need to improve their steering and control, as well as interact to a much higher degree.
Full description
Swedish National Audit Office , issued in 2011
Risk cases: 3
Does the Public Investment in Internet Access Reach the Population?
Middle mile network is not enough Latvia is known for its high-speed Internet provided to individuaals and business. Auditors verified results of the Government's effort to strengthen national infrastructure in this regard. They ponted at issues in: planning, risk analysis, information flow, quality and impact.
Full description
State Audit Office of the Republic of Latvia , issued in 2020
Risk cases: 6
The Board of Audit and Inspection (BAI) conducted an audit on the information systems in the area of service delivery to improve the system’s efficiency and convenience.
government has commissioned toward improving the country’s information infrastructure within a short period of time.<br/> The government is investing 1 trillion won every year in an e-government project ... for citizens in the welfare and employment sectors by utilizing the renewed information infrastructure.<br/> However, the information system of some government ministries proved to have overlapping functions ... Korea was recognized as an Information Technology (IT) powerhouse by the international community of the UN in 2010. Such an achievement is attributable to the significant investments that the Korean ... Enormous IT investments require tremendous coordination ... Korean government is investing 1 trillion won in e-government projectsevery year. Thus, the country has earned a reputation for the IT powerhouse. Apart from undeniable advantages, the huge scale ... and the speed, the information technologies are implemented with, cause some problems to be tackled. The SAI Korea turns special atention to two of them: overlapping functionalities and interconnectivity issues.
Full description
Board of Audit and Inspection of Korea , issued in 2011
Risk cases: 3
Cyber Attacks: Securing Agencies’ICT Systems
. In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... responsibility of agencies, having regard to their business operations and specific risks. In the context of a national government, those risks can range from threats to national security through to the disclosure ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
The Actıvıtıes Carrıed out wıthın the Framework of e-Transformatıon Turkey Project
'e-Transformation Turkey' Project Turkish SAI report presents a checklist of issues, which were spotted during the large scale e-Government transformation.
Full description
Turkish Court of Accounts , issued in 2006
Risk cases: 4
Managing the risk of legacy ICT to public service delivery
The cross-government report describes the case studies from four public services (state pension, Value Added Tax collection, prescription payment and consumer credit licensing services) selected ... to illustrate the range of approaches that small and large government bodies are taking to address the issues arising from legacy ICT (defined as "systems and applications that have been operationally embedded ... within a business function but superseded by newer and more effective technologies or changed business needs"). ... Possible approaches to the problem of 'legacy ICT' ... UK’s government experience in managing the risks connected to legacy ICT provides valuable insight for others facing the same problem and are considering transforming their services.
Full description
National Audit Office , issued in 2013
Risk cases: 3
CRITICAL INFRASTRUCTURE PROTECTION: EPA Urgently Needs a Strategy to Address Cybersecurity Risks to Water and Wastewater Systems
US GAO reviewed cybersecurity threats facing the water sector and the federal government’s efforts to address these threats. Auditors found out problems including: funding prioritization, incident reporting, sector-wide risk assessment and vulnerability self-assessment tool. Recent cyber incidents highlight the vulnerability of the 170,000 water and wastewater systems in the U.S. water sector.
Full description
US Government Accountability Office , issued in 2024
Risk cases: $risks.size()
previous 127 results found. Page 3 of 13 next