114
results found in
14 ms
Page 9
of 12
The Actıvıtıes Carrıed out wıthın the Framework of e-Transformatıon Turkey Project
'e-Transformation Turkey' Project Turkish SAI report presents a checklist of issues, which were spotted during the large scale e-Government transformation.
Full description
'e-Transformation Turkey' Project Turkish SAI report presents a checklist of issues, which were spotted during the large scale e-Government transformation.
Full description
Turkish Court of Accounts
, issued in 2006
Risk cases: 4
GAO-20-701, COVID-19: Federal Efforts Could Be Strengthened by Timely and Concerted Actions
Overview of the response to the COVID-19 The bimonthly GAO report on efforts related to the COVID-19 pandemic examines key actions the federal government. Among others, interesting points: medical supply chain, future vaccine distribution, data collection and cybersecurity.
Full description
Overview of the response to the COVID-19 The bimonthly GAO report on efforts related to the COVID-19 pandemic examines key actions the federal government. Among others, interesting points: medical supply chain, future vaccine distribution, data collection and cybersecurity.
Full description
US Government Accountability Office
, issued in 2020
Risk cases: 6
Improving government’s planning and spending framework
Value for money vs. short-term planning NAO reviewed the UK government's progress in improving their planning and spending framework. The auditors found that the complex structure and lack of longer term perspective in planning form a significant obstacle to fully benefit from the framework.
Full description
Value for money vs. short-term planning NAO reviewed the UK government's progress in improving their planning and spending framework. The auditors found that the complex structure and lack of longer term perspective in planning form a significant obstacle to fully benefit from the framework.
Full description
National Audit Office
, issued in 2018
Risk cases: 7
Management of State Information Resources
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... . Audit procedures were performed in all major institutions which form and implement the policy of information resources: Ministry of Transport and Communications, Ministry of the Interior, Ministry ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... . Audit procedures were performed in all major institutions which form and implement the policy of information resources: Ministry of Transport and Communications, Ministry of the Interior, Ministry ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2013
Risk cases: 3
The National Offender Management Information System (NOMIS)
This report examines the reasons for the delays and cost increases to the original integrated information system and, since the moratorium imposed by the Minister of State in order to seek options ... for project’s cost reduction, the aims of the revised National Offender Management Service (NOMS) and the progress made, the impact of the delays and rescoping on the costs and benefits achieved, and NOMS ... ’ fitness to deliver. The aim of one integrated information system (C-NOMIS i.e. National Offender Management Information System) was to improve information sharing about offenders; address the lack ... Rescoping necessary, but not fully successful ... An initiative to build a single offender management IT system for the prison and probation services has not delivered value for money. The NAO investigation found the project had been hampered ... by poor management leading to a three-year delay, a doubling in project costs and reductions in scope and benefits.
Full description
This report examines the reasons for the delays and cost increases to the original integrated information system and, since the moratorium imposed by the Minister of State in order to seek options ... for project’s cost reduction, the aims of the revised National Offender Management Service (NOMS) and the progress made, the impact of the delays and rescoping on the costs and benefits achieved, and NOMS ... ’ fitness to deliver. The aim of one integrated information system (C-NOMIS i.e. National Offender Management Information System) was to improve information sharing about offenders; address the lack ... Rescoping necessary, but not fully successful ... An initiative to build a single offender management IT system for the prison and probation services has not delivered value for money. The NAO investigation found the project had been hampered ... by poor management leading to a three-year delay, a doubling in project costs and reductions in scope and benefits.
Full description
National Audit Office
, issued in 2009
Risk cases: 4
The Public Web Sites During a Period of Transmission to e-Government
Websites of e-Transformation Turkish auditors bring back their audit of 2006, in which they, among others reveiwed public websites during a period of transmission to e-Governmentbasics of the e-Transformation project.
Full description
Websites of e-Transformation Turkish auditors bring back their audit of 2006, in which they, among others reveiwed public websites during a period of transmission to e-Governmentbasics of the e-Transformation project.
Full description
Turkish Court of Accounts
, issued in 2006
Risk cases: 6
Homelessness
Homelessness grows despite increased spendings to reduce it British NAO analyses the root-causes of unsuccessful effort to reduce homelessness in England. They point at a side effect of the Goverment reform of welfare reform and at lack of full impact assessment.
Full description
Homelessness grows despite increased spendings to reduce it British NAO analyses the root-causes of unsuccessful effort to reduce homelessness in England. They point at a side effect of the Goverment reform of welfare reform and at lack of full impact assessment.
Full description
National Audit Office
, issued in 2016
Risk cases: 3
Steps Needed to Identify Acquisition Training Needs for Non-Acquisition Personnel
Non-Acquisition staff can be crucial for acquisition Despite from hundreds of billions of dollars spent annually to acquire products and services, the US Department of Defense does not full information about staff to be trained. The information is needed about the non-acquisition staff, who can play crucial role in particular acquisitions. As GAO underlines, their identification is necessary to fully understand the training needs and... budget.
Full description
Non-Acquisition staff can be crucial for acquisition Despite from hundreds of billions of dollars spent annually to acquire products and services, the US Department of Defense does not full information about staff to be trained. The information is needed about the non-acquisition staff, who can play crucial role in particular acquisitions. As GAO underlines, their identification is necessary to fully understand the training needs and... budget.
Full description
US Government Accountability Office
, issued in 2019
Risk cases: 4
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark
, issued in 2013
Risk cases: 3
Swedish Customs control – an accurate enterprise?
It is better to know your own errors Control activities play an important role in successful work of Customs Service. Lack of thoroughful analysis of own errors can lead to ineffective use of some tools, and as a result, to difficulty in focus identification.
Full description
It is better to know your own errors Control activities play an important role in successful work of Customs Service. Lack of thoroughful analysis of own errors can lead to ineffective use of some tools, and as a result, to difficulty in focus identification.
Full description
Swedish National Audit Office
, issued in 2019
Risk cases: 4