Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
575 results found in 7 ms Page 13 of 58
Risk-case insufficiently regulated outsourcing
Resulting in information security breaches
 
Full description
Risk-case incomplete security management system
Resulting in incompliance with legal regulations
 
Full description
Risk-case incomplete security management system
Resulting in incoherent and incomplete data
 
Full description
Risk-case poor control mechanisms
Resulting in incompliance with legal regulations
 
Full description
Risk-case project methodologies contradict Public Procurement procedures
Resulting in ineffective project management
 
Full description
Risk-case supplier lacks experience in public administration
Resulting in basic needs not satisfied
 
Full description
Risk-case strategy not supported by determination and skills
Resulting in basic needs not satisfied
 
Full description
Risk-case organisational autonomy
Resulting in IT development in standstill
 
Full description
Risk-case unclear responsibilities
Resulting in empty concepts
 
Full description
Risk-case promising solution abandoned without substantiation
Resulting in systems' overlap
 
Full description
previous 575 results found. Page 13 of 58 next