575
results found in
6 ms
Page 16
of 58
Risk-case users not satisfied with effectiveness
Resulting in slow subscription to the Service Centre
Full description
Resulting in slow subscription to the Service Centre
Full description
Risk-case system deficiencies
Resulting in economies of scale and efficiencies not achieved
Full description
Resulting in economies of scale and efficiencies not achieved
Full description
Risk-case ambitious goal prevails over realistic tailoring
Resulting in too complex projects
Full description
Resulting in too complex projects
Full description
Risk-case complexity of some of the key components
Resulting in failures in cooperation, providing compability and change management
Full description
Resulting in failures in cooperation, providing compability and change management
Full description
Risk-case deficiencies in basic security measures against cyber attacks
Resulting in failure to protect data from external intruders
Full description
Resulting in failure to protect data from external intruders
Full description
Risk-case need to monitor the use of privileged user access rights
Resulting in abuse of access to IT systems and health data
Full description
Resulting in abuse of access to IT systems and health data
Full description
Risk-case inadequate logging
Resulting in inability to detect and track cyber attacks and abuse of user privileges
Full description
Resulting in inability to detect and track cyber attacks and abuse of user privileges
Full description
Risk-case incentives to take up employment
Resulting in risk of increasing the homelessness
Full description
Resulting in risk of increasing the homelessness
Full description