7
results found in
11 ms
Page 1
of 1
Risk-case no input controls and poor monitoring
Resulting in erroneous data and fraudulent transactions
Full description
Resulting in erroneous data and fraudulent transactions
Full description
Risk-case ineffective processing controls of the IT system
Resulting in "ghost" beneficiaries
Full description
Resulting in "ghost" beneficiaries
Full description
Risk-case poor integration among various sets of data
Resulting in erroneous data and fraudulent transactions
Full description
Resulting in erroneous data and fraudulent transactions
Full description
Risk-case lack of relevant documentation, internal control, audit and review
Resulting in mistakes and system abuse
Full description
Resulting in mistakes and system abuse
Full description
Risk-case lack of IT security policy
Resulting in any kind of permission can be requested, inactive users not identified
Full description
Resulting in any kind of permission can be requested, inactive users not identified
Full description
7
results found.
Page 1
of 1