Issue 26 ¦ May 2008 it Why IT projects fail 1 In this issue Austria 4 Country focus Oman 12 Why Information Systems Projects Fail Jordan 18 Why IT projects fail Germany 26 Key issues for relying on External Consultants for Public Sector IT Projects Sweden 30 Effective IT Governance:How to Get Good, Secure IT Services Slovenia 36 Audit of IT system of the Tax administration of the Republic of Slovenia Lithuania 38 Shall be blessed Japan 42 Audit of Computer Systems used by the Japanese Government China CNAO’s Pre-audit investigation Guideline for IT Audit 46 Editorial This edition covers a wide range of topics, and includes some further material based on presentations at INTOSAI IT Audit Working Group’s Performance Audit Seminar held on Oman in 2007 on the topic “Why IT Projects Fail”. This is a subject which we all return to time and time again. Despite a huge amount of diagnosis, and lots of guidance on the cure, why do failures still arise, and worse still why do the same problems arise over and over again? Steve Doughty It is interesting to note that, for example in the UK, Government has been computerising since the 1950s. The delivery model was then largely in-house development, but over the years this as moved through in-house but involving external consultants, contracting out, market testing and outsourcing, Private Finance deals, and framework and strategic “partnerships”. But despite all these different delivery models failures still happen. Common words that feature in reports are words like “large, complex, inflexible, lack of user involvement, lack of training…”. Of course, we do not have all the answers, but what we do know is that if best practice is adopted and that a project’s scope is kept at “what we know we can do now” and not allowed to expand, budgets and timescales are realistic etc., the chances of success are significantly higher. In this, another bumper edition, we have contributions from Austria, China, Germany, Japan, Jordan, Lithuania, Oman, Slovenia and Sweden. We are most grateful for these articles which demonstrate the huge and varied amount of IT audit and related activity going on around the world. Whilst on the subject of credit to our authors, I must apologise to Stephen Kateregga, Assistant Director of Audit, and Ashok Ghosh, Consultant, from the Office of the Auditor General of Uganda. We unfortunately omitted to credit them for their very comprehensive article on their experience of IT Governance in SAIs in Edition 25 of intoIT. So, on behalf of our readers, a big “thank you” to all our contributors. The journal only survives because of your contributions, so please keep them coming. We are particularly keen to include a range of short news items about what is happening in the IT audit world in YOUR country. We happy to receive these at any time – please email them to [email protected] . We are very much aware of the difficulty in writing in English if that is not your first language, and are very happy to provide help and guidance to make sure that your article gets published to the best advantage. I am looking forward to hearing from you soon (yes, that means you!). Steve Doughty Editor IntoIT is the journal of the INTOSAI Working Group on IT Audit. The journal is normally published twice a year, and aims to provide an interesting mix of news, views and comments on the audit of ICT and its use in Supreme Audit Institutions (SAIs). Material in the journal is not copyrighted for members of INTOSAI. Articles from intoIT can be copied freely for distribution within SAIs, reproduced in internal magazines and used on training courses. The Editor welcomes unsolicited articles on relevant topics, preferably accompanied by a photograph and short biography of the author, and short news items for inclusion in future issues. The views expressed by contributors to this journal are not necessarily those of the editor or publisher. Contributions should be sent to: The Editor of intoIT National Audit Office 151 Buckingham Palace Road London SW1W 9SS United Kingdom, E-mail: [email protected], Web site: www.intosaiitaudit.org Country Focus Austria Le Leipzig Bonn B Frankfurt nkfurt Am M Maain Main Lubin Lu Lod Wrocla aw B g LUX. Kra ra Nurnberg urnberg Pr Prague Karlsru sruh ruhe uhe Ostrava O Ost t CZECH H CZECH Stuttgart Stuttg gart art B Brno sbourg bou SLOVAKIA Munchen Mun Munchen en B Bratislava r Vie Vien enna Vienna Zurich Z u Bern Ber n Innsbruc bu k Innsbruck G Gyo Gy Gyor Gyor Bud SWITZERLAN SW WI WITZERLAN AN ND ND Rhin e GIU UM U AUSTRIA R AUSTRIA Gra G raz ra Graz A SLOVENIA Ljubljan Ljubljana naa M ano Mila no Venezia Turin rrin Genova G ova enova Rijeka eka Rijeka naco aco co s seille P Zagreb Zag b CROATI OATIA OA IIA CROATIA Bolo logna lo Bolo l Firenze renze HUNGARY H UNGARY G BOSNIA BOSNIA Sara rajevo raj vo Split YUGOSL U AUSTRIA Historical background First traits of human settlement in Austria can be traced back to the Middle Palaeolithic era (Neanderthal). The most important archaeological evidence of Palaeolithic art was found in Lower Austria (Fanny of Galgenberg near Krems, around 32,000 BC, or Venus of Willendorf, around 25,000 BC). In the Copper, Bronze and Iron Age, people mainly focused on producing widely used raw materials, building trade centres and extensive trade routes. Iron Age culture was dominated by the Celts: the Hallstatt Culture even named the Early Iron Age. From 15 BC onwards, the area of today’s Austria, which then comprised the provinces Noricum, Pannonia and Raetia, officially became part of the Roman Empire with important settlements such as Carnuntum near Vienna (Vindobona), Virunum and Magdalensberg near Klagenfurt. After the slow decline of the Roman Empire and the confusion of the Migration Period (settlements by Goths, Slavs and Avars) part of today’s territory was included into the Carolingian Empire as marches. The most important example of the art of those times is the Tassilo Chalice at Kremsmünster Abbey (around 780). Already in the 9th century there was an “Ostmark” (Ostarichi), which became the main land of Austria in the 10th century. The first record showing the name Austria dates from 996 where it is written as Ostarrîchi. In 1278, Rudolf I, of the House of Habsburg, secured the Austrian duchies effectively for the House of Habsburg for the next 650 years The Habsburgs ruled almost constantly as Holy Roman Emperors from the mid 15th century onwards. In addition to the hereditary lands of Lower Austria and Styria, they soon acquired Carinthia, Tyrol and Carniola. Salzburg only became part of Austria in 1816. Since the 15th century, Austria was being threatened by the Ottoman Empire. In 1529 and 1683 the Turks besieged Vienna – although without success. Prince Eugen’s final defeat of the Turks at the end of the 17th century marked the beginning of an unprecedented golden age in Austrian culture. Austria and especially Vienna became the hub of Baroque architecture and painting. Artists such as Fischer von Erlach, Lukas von Hildebrandt and Jacob Prandtauer influenced profane and sacred Baroque architecture in Austria and Central Europe. During their reign, Maria Theresia (1740 to 1780) and her son Joseph I initiated fundamental state reforms (compulsory school attendance, absolute discharge, administrative reforms). Emperor Francis II abdicated as Holy Roman Emperor in 1806 under pressure from Napoleon. Already two years before, in 1804, the Empire of Austria had been founded on the remnant of the Holy Roman Empire and existed until 1867. In the late 18th and early 19th century, the Classical period of Western music flourished in Vienna. Best-known composers of this time were Joseph Haydn, Wolfgang Amadeus Mozart, Ludwig van Beethoven and Franz Schubert. The Austrian empire of 1804 and the dual monarchy Austria-Hungary (1867 to 1918) were multi-ethnic empires belonging to the German Federation. Like Prussia and Russia, Austria remained an absolutistic state, which was dominated by Minister Metternich’s police. This time of domestic retreat, of “Biedermeier”, bore fruit in painting (Ferdinand Georg Waldmüller), literature (Franz Grillparzer, Johann Nestroy) and music (Franz Schubert). In 1848, the peoples of the monarchy fighting for democracy and independence started the first revolution. They were defeated and Franz Joseph I was enthroned. Military defeats against Italy and Germany weakened the Habsburgs and led to profound political reforms. In the 19th century, Austria was also industrialized. But it was also a period of great cultural achievements. The historical buildings on Ringstrasse in Vienna (opera, parliament, university, etc.) were constructed and Venus of Willendorf the composers Johannes Brahms and Anton Bruckner worked in Vienna along with Johann Strauss and Gustav Mahler. At the beginning of the 20th century Jugendstil art (Otto Wagner) evolved around a group of artists who objected to prevailing conservatism. Representatives of the “Second Viennese School (Arnold Schönberg, Alban Berg, Anton Webern) set the direction music developed in the 20th century. This period surrounding the downfall and end of the Austrian monarchy was best described in the literary works of Stefan Zweig and Karl Kraus. In the early 20th century Vienna was also a scientific centre. World-renowned researchers in natural sciences (physics, medicine), philosophy or economics worked there at the time. The assassination of Archduke Franz Ferdinand in Sarajevo in 1914 by a Serbian nationalist was the immediate cause for the outbreak of World War I, leading to the downfall and the end of the monarchy. Emperor Franz Joseph died in 1916 and his successor Karl I had to leave Austria, when the first republic was founded in 1918. In the post war years, hyperinflation shook the young republic of Austria and could only be ended by introducing a new currency. This led to modest economic upswing, but in 1933 one third of the workforce was still unemployed. There was political tension between the opposing parties, which led to turmoil and civil war. Austria’s bad economic state in the 1930s encouraged the occupation by the German Reich in 1938. After World War II, Austria became an independent state again, but was also divided into occupation zones. Only in 1955, Austria regained full independence by concluding the Austrian State Treaty with the Four Occupying Powers. Austria became a member of the United Nations in 1955, on 1st January 1995 it joined the European Union and in 2002, the EU’s common currency, the Euro, was introduced. 5 Geographical background 60 per cent of Austria’s territory is located in the Eastern Alps. Therefore, Austria is often referred to as “Alpine Republic” in the media. There are larger plains along the Danube valley, in the Vienna Basin, in southern Styria and Burgenland. Austria’s highest mountain, Grossglockner (3,798 m) is located in the mountain range of Hohe Tauern between Carinthia and Tyrol. The second highest peak is Wildspitze (3,768 m), followed by Grossvenediger (3,674 m). Parts of the alpine region of Carinthia, Tyrol and Salzburg form the national park Hohe Tauern. This protected area comprises about 1,836 sq km. The highest alpine pass is Grossglocknerstrasse with an elevation of 2,504 m at Hochtor, its highest point. Lake Constance and Lake Neusiedl are the largest lakes, parts of both being on Austrian territory. The lakes of Carinthia (lakes Ossiach, Millstatt and Weissensee), the lakes of Salzkammergut (Wolfgangsee and Mondsee) are of special importance for tourism. Natural riverside areas can be found in all of Austria. The most important rivers are the Danube in Upper and Lower Austria and in Vienna, the Drau in Carinthia, the Inn in Tyrol, the Salzach in Salzburg, the Rhine in Vorarlberg and the Mur and Mürz in Styria. Austria lies in the temperate climate zone with oceanic and continental features. Generally, we talk about Central European transitional climate or alpine climate in the alpine region, where the winters are cooler due to higher elevations. 2005 2006 Growth in GDP (“securing growth opportunities”) + 2.0% + 3.3% Inflation rate (“sufficiently stable currency”) + 2.3% + 1.5% Unemployment rate + 7.3% + 6.8% 5.2% 4.8% Employed (“high employment”) + 1.0% + 1.7% Balance on current account (absolute) + Є5.16 billion + Є8.22 billion Balance on current account (in relation to GDP) (“foreign trade balance”) + 2.1% + 3.2% Unemployment rate according to EUROSTAT Source: AMS; WIFO; Statistik Austria The main reasons for the high income from tourism lie in undisturbed mountain and lake regions, the high number of cultural institutions, good infrastructure, the central position in Europe, modern accommodation and the high training level of staff. Tourism concentrates on three branches: ¬ City tourism concentrates mainly on Vienna and the Länder capitals. Tourists visit Austria the whole year round for cultural trips, adventure holidays or to attend conferences. ¬ Winter tourism is mostly concentrated on the alpine regions. Besides skiing holidays, health trips to the thermal regions get ever more attractive. In glacier regions skiing is possible all year round. ¬ In summer, tourists in Austria prefer active holidays and holidays at the lakes. Active tourists go cycling or paragliding and, ever more frequently, hiking and mountain climbing. In the past years summer and winter resorts have been transformed to all-year resorts to secure all-year occupancy. Economic background Development of the gross domestic product (nominal): The indicators for macroeconomic equilibrium (high employment, sufficiently stable currency, securing growth opportunities, foreign trade balance) show the following development as compared to the past years: GDP (billion €) 2004 237 2005 245 More and more tourists stay in better hotels. There is a trend towards shorter holidays, which are booked later as the tourists wait for snow reports in winter and for sunny periods in summer. 2006 258 Politics Tourism Tourism is one of the most important business sectors in Austria. 120 million overnight stays were reported in Austria for 2006. They amounted to an income of 13.3 billion Euro from non-resident visitors. The tourism net currency receipts accounted for 5.9 billion Euro. 6 Austria is a democratic republic. Its law emanates from the people. Austria is a federal republic with nine Länder: Burgenland, Carinthia, Lower Austria, Upper Austria, Salzburg, Styria, Tyrol, Vorarlberg and Vienna (federal capital). It has a federal constitution. Since 1955 Austria has been member of the United Nations; in 1995 it joined the European Union. Its currency is the Euro within the framework of economic and monetary union. The federal president is the highest representative of the state. He or she is elected for six years and can be re-elected once. The government consists of the federal chancellor and the ministers. The president nominates the chancellor and the ministers upon suggestion of the chancellor. There are two legislative bodies in Austria. The National Council is the dominant chamber of the Austrian legislation and is elected by the people based on proportional representation. The National Assembly is elected for five years, if the National Council or the federal president and the government do not shorten the legislative term. The number of members of the Federal Council is based on the population of the länder. The Federal Council has an absolute right of veto, when the competence of the Austrian Länder is limited by constitutional laws. In all other cases it has suspensive veto, which can be reversed by an inertia decision of the National Council. The Austrian Court of Audit The Austrian Court of Audit (ACA) is Austria’s independent supreme audit institution and has especially been established for the audit of the federal, länder and local levels of government. In addition to auditing the financial management and consultation services based thereupon – its most important strategic function – it also renders further services with major importance for the good governance of the state and performs special notarial functions. The Austrian Court of Audit audits the accounts and the financial management of the Austrian state for the National Council, the Länder parliaments and the municipal councils. Some facts about Austria Inhabitants 8.3 million Area 83,871 sq km – somewhat smaller than the US state of Maine; somewhat smaller than Portugal, about as large as Japan’s second largest island Hokkaido; somewhat smaller than French-Guiana. Religions 5.9 million Roman-Catholics (73.6%) 380,000 Protestants (Augsburg Confession, Helvetic Confession) (4.7%) 340,000 Moslems (4.2%) 180,000 Orthodox (2.2%) 8,140 Israelites 0.96 million without religious confession Language German Regional languages Croatian Slovenian Hungarian Recognised Sign language As an independent body of the National Council, the Austrian Court of Audit audits all financial operations of the federal government, enterprises in the ownership of the federal government and other legal entities defined by law. The audits of the Austrian Court of Audit are based on the principles of economy, efficiency and effectiveness as well as on the correctness of the accounting compliance with existing regulations. When auditing the financial operations of the länder, municipalities and municipal associations, the Austrian Court of Audit acts as independent audit institution of the länder parliaments. It audits the financial management of the respective land, enterprises of the land government in the ownership of a land alone or together with other entities defined by law as well as the financial management of municipalities with at least 20,000 inhabitants (including enterprises the municipality controls). The Austrian Court of Audit also audits the financial management of the social insurance institutions and other legal entities defined by law. Following the audit mandate laid down in the Austrian Constitution, the Austrian Court of Audit is independent of the government and directly reports to legislative assemblies (National Council and länder parliaments). The Austrian Court of Audit reports to the National Council, the länder parliaments and the municipal councils on its activities and individual findings. The reports to the legislative assemblies have to be published after being submitted to the National Council, the respective land parliament or municipal council. Objectives and mandate Mandate The Austrian Court of Audit fulfils its mandate – as laid down in the federal constitution – directly towards the National Council, the Länder parliaments as well as decision-makers in politics, administration and the economy. Even if it acts on a request or motion, the Austrian Court of Audit remains independent and is not bound by any instructions. Objectives As its primary objective, the Austrian Court of Audit aims at the most effective use of public funds, i.e. cost reductions on the one hand, and increased benefits from the use of public funds on the other hand. It checks whether public funds are raised and used in a lawful manner, as well as in a cost-efficient, economical and effective way and according to the principles of sustainable development. Thus the Austrian Court of Audit fulfils its mandate as laid down in the federal constitution, for the optimisation of income and expenditure. This strategic objective is also in line with the Austrian Court of Audit’s aim to increase the efficiency and effectiveness of public auditing. Organisation of the Austrian Court of Audit The Austrian Court of Audit is headed by the President, who is elected by the National Council upon proposal of its Main Committee for a single term of office of twelve years. His deputy is the highestranking official of the Austrian Court of Audit. The President has the same responsibilities as members of the federal government. He is entitled to participate in the debates of the National Council as well as of its committees and sub-committees dealing with ACA reports, federal financial statements and pertinent sections of the Federal Finance Bill. The Austrian Court of Audit is headed by the President and organised monocratically. The President is responsible for the decisions taken. The new organisation centralises its services in five Directorates-General and 35 specialised departments. To support selective as well as crosscutting work and audits, related tasks and audit areas have systematically been assigned to the respective Directorate-General. 7 President Cabinet Directorate General 1 Directorate General 2 Directorate General 3 Directorate General 4 Directorate General 5 Department S1-1 Department S2-1 Department S3-1 Department S4-1 Department S5-1 Budget and infrastructure Strategic planning, controlling Editing of reports IT affairs Communication and parliamentary relations Department S1-2 Department S2-2 Department S3-2 Department S4-2 Department S5-2 Education Health International affairs, INTOSAI General Secretariat General legal and economic issues Human resources, administration and development Department S1-3 Department S2-3 Department S3-3 Department S4-3 Department S5-3 Research Hospitals EU financial management Federal financial statements, national budget, survey of public sector incomes Knowledge management Department S1-4 Department S2-4 Department S3-4 Department S4-4 Department S5-4 Science Social affairs Waterway and air transport telecommunications Banking, debt management Federal administration Department S1-5 Department S2-5 Department S3-5 Department S4-5 Department S5-5 Culture, art and media Energy Building and construction Economic affairs, competition Länder administration Department S1-6 Department S2-6 Department S3-6 Department S4-6 Department S5-6 Foreign affairs and defence Comprehensive environmental protection Land transport Labour market affairs Local governments, municipal associations Department S1-7 Department S2-7 Department S3-7 Department S4-7 Department S5-7 Judicial administration and domestic affairs Urban and regional planning Fiscal administration Real estate, property administration Organisation, staffing, IT systems By handwritten letter of 23 December 1761 Empress Maria Theresia establishes the predecessor of the present Court of Audit, the “Accounting Chamber”, assigning it the duty “to scrutinise all accounts and to point out all shortcomings discovered in matters relating to public finance and, in particular, public spending”. The Government Audit Act leads to the reorganisation of the supreme audit institution, which is now directly and exclusively accountable to the National Assembly. At the same time the mandate and the authority of the government audit institution are enlarged. Its functions, in particular, include: 1. expressing an opinion with suspensory effect on all important financial matters until a decision is made by the Empress, i.e. exercising the right to preventive control; The Supreme Court of Audit of the monarchy is incorporated into the institutional framework of the newly established Republic. It is answerable to the State Council. 2. making recommendations for improvements to accounting methods; 3. assuming the direction and guidance of all accounting agencies. 1761 8 Staff Units ... 1918 The Court of Audit is now entitled to audit all financial operations of the government as well as government debts. The audit mandate is moreover expanded to foundations, funds, institutions and entities in which the government holds a financial interest. The Court of Audit is charged with verifying compliance of the administration of public funds with existing laws and regulations. It is also tasked with a new field of competence, namely assessing the economic efficiency and expediency of financial operations. 1919 The Federal Constitutional Act of 1 October 1920 dedicates an entire chapter to government audit, thus providing its basic constitutional framework. The Austrian Court of Audit is directly subordinated to the National Council (first chamber of parliament). The President of the Austrian Court of Audit is elected by the National Council upon nomination by the Standing Committee and can be removed from office by resolution of the National Council. At the level of the Austrian Länder it is within the discretion of the respective constitutional assemblies to confer upon the Austrian Court of Audit the same audit authority exercised by the Court at the federal level (optional jurisdiction). 1920 ... President of the Austrian Court of Audit and of INTOSAI ¬ Member of the Supervisory Board of ÖBB-Infrastruktur-Betriebs AG (railway infrastructure company) Education ¬ Managing Director of ÖBB-Immobilienmanagement GmbH (real estate management of the Federal Railways) Compulsory school, secondary higher school, A-levels in 1975. Law studies at Vienna University, Austria, graduation in 1981 with a doctoral degree. Professional experience Government administration Different management functions in the federal financial administration (e.g. staffing and general policy matters) and in the provincial administration (e.g. managing function in the cabinet of the province governor of Carinthia). Parliament Executive director of a political group in parliament; responsible for coordinating activities between the government and parliament; promotion of intra-parliamentary cooperation between the representatives of the different political parties; direct cooperation with the federal ministries. Private sector Different managing functions in the private sector, e.g.: ¬ Member of the Board of Directors of Eisenbahn-Hochleistungsstrecken AG (railway construction company) ¬ Member of the Board of Directors of ÖBBHolding AG (railway holding company) 1 July 2004: President of the Austrian Court of Audit and Secretary General of the International Organization of Supreme Audit Institutions (INTOSAI) ¬ Professional Standards Committee (PSC) ¬ Subcommittee on Internal Control Standards ¬ Capacity Building Committee (CBC) ¬ Sub-committee 3: Promote best practices and quality assurance through voluntary peer reviews ¬ Working Group on IT Audit ¬ Working Group on Environmental Auditing ¬ Working Group on Privatisation, Economic Regulation and Public-Private Partnerships ¬ Working Group on Programme Evaluation ¬ Working Group on Accountability for and Audit of Disaster-related aid General Secretariat of INTOSAI The General Secretariat is located at the Austrian Court of Audit in Vienna. Under the direction of the Secretary General the tasks of the Secretariat include the management of the accounts of that worldwide umbrella organisation. According to its statutes, INTOSAI consists of the Congress, the Governing Board, the General Secretariat and various committees and working groups. In 1977 the IXth Congress in Lima, Peru, adopted the “Lima Declaration of Guidelines on Auditing Precepts”. In line with INTOSAI’s motto “experientia mutua omnibus prodest” (Shared experience benefits all) the General Secretariat keeps in contact with the more than 180 members in the time between congresses and organises seminars, expert meetings and other events. As Secretary General: ¬ ex-officio member of the Finance and Administration Committee ¬ observer in the PSC steering committee ¬ chair of the INTOSAI task force on Communication Strategy founded at the XIXth INCOSAI The provisional constitution provides for a State Court of Audit “to perform the financial audits and monitor the financial operations of the federal and Länder governments, the local authorities in communities with more than 20,000 inhabitants and their enterprises, institutions and other legal entities”. The mandate of the Austrian Court of Audit is transferred to the Court of Audit of the German Reich, which establishes a branch office in Vienna. 1939 ACA is member in the following committees, working groups and task forces: ... 1945 The Fifth Chapter of the Constitution is amended and the new Court of Audit Act is passed. ... 1948 9 The European Commission chose 20 basic public services and worked out an assessment system for the survey. The EU-wide survey resulted in a score for the online sophistication of 75 per cent. Full availability online has reached almost 50 per cent. In both indicators, Austria heads the results in providing eServices for its citizens. 95 per cent of the administrative tasks were available online, 83 per cent could be completed online. Audit principles The Austrian Court of Audit audits the economy, efficiency and effectiveness of the public administration and of public enterprises on the basis of regularity and legality in the interest of sustainable development. After auditing the legality of financial management, regularity is audited. Furthermore, savings potentials are defined for: ¬ efficiency: optimum relation between input and output (target-performancecomparison); Auditing information technology ¬ economy: minimum expense for the task to be performed; ¬ effectiveness: high degree of target achievement; and recommendations are issued. E-Government services in the Austrian administration The Austrian administration was ranked top in the EU’s e-government benchmarking exercise of 2006 for “Online Availability of Public Services: How is Europe Progressing1“. Two indicators were used to monitor the eEurope action plan: online sophistication of basic public services available and public services fully available online. These indicators were defined in 2000 and evaluated in 2006. Assessed were the online sophistication of basic public services in the EU member states, in Norway, Iceland and Switzerland. The 5th International Congress of Supreme Audit Institutions (INTOSAI) resolves to set up its permanent international secretariat at the Austrian Court of Audit. 1965 10 ... ACA also performs IT audits. An ACA team deals with essential aspects such as legislature in e-government and its implementation. This team also completes performance audits, which are performed at all levels and in all areas. To cover all aspects of this task, the team consists of technicians and lawyers. IT is an essential element for modernising and optimising the administration. Therefore ACA tries to consult auditees and provide them with information on new technological developments and processes. In general, procurement, technology, accounting and fulfilment of the contracted services are audited in IT projects. Apart from auditing IT implementation projects and new developments, special focus is laid on crosscutting audits of the administrative institutions. ACA compares whether these institutions want to implement similar technological innovations and whether synergy effects can be identified. Essential elements in auditing are fulfilling the functionalities and the scope of available functionalities and infrastructure. ACA stated that today’s technological opportunities lead to functionalities, which are too comprehensive for the users. IT audits Health insurance card in Austria; e-card The electronic health insurance card (dubbed “e-card”) is an electronic ID for using medical services from health insurance in Austria; on the reverse side, it incorporates a printed image of the European Health Insurance form. As an additional feature, the e-card may also be used as a Citizen Card after a no-charge certification process. As of January 2006, the e-card replaced the paper-based health-insurance voucher (“Krankenschein”) in Austria. The card holder data are stored and administered centrally in two parallel computing centres and made available online depending on the application and the access rights. Data are transmitted after encryption and signature; the signature is activated without a PIN code when the e-card is inserted in the card reader. The e-card system was designed as an online system and can be expanded for future uses, such as for electronic prescriptions, or patients’ electronic case histories. The Austrian Constitutional Convention proposes to enlarge the scope of responsibilities of the Austrian Court of Audit and to expand its audit authority to encompass municipalities with less than 20,000 inhabitants, stock corporations in which the public sector holds a stake of 25 per cent or more and EU direct aid. A special committee is set up in the National Council to commence preliminary deliberations on the report submitted by the Austrian Constitutional Convention. The deputisation rules regarding the representation of the President are re-drafted. The function of Vice President is abolished. If the President is prevented from discharging his or her duties, the President is to be represented by the most senior civil servant of the Austrian Court of Audit. 1994 ... 2005 Government budgeting NEW Reorganisation of IT–based government budgeting on the basis of managerial standard software was introduced in 1998 and successfully completed in May 2004. Central idea of Government budgeting NEW was the appropriation of budget law data on expenditure and income directly to the relevant department in the ministry. Bookkeeping should audit the data and non-cash performance. By transferring the tasks completed by bookkeeping to the ministry, bookkeepers in the ministries can be reduced by one half. Electronic files in public administration In public administration electronic files substitute paper files and are considered original files. Each print-out of an electronic file is a copy of the original. In administration the electronic file substitutes paper and all related procedures until filing. Eleven federal ministries and BHAG (Austrian federal bookkeeping agency) have used an electronic filing system acquired from the same producer in one procurement exercise in January 2005. Only the Ministry of Defence has used its own electronic filing system since 2002. | Contact Johann Vilanek ([email protected]) 1 http://ec.europa.eu/information_society/eeurope/ i2010/docs/benchmarking/online_availability_ 2006.pdf. Dr Josef Moser Dr Moser graduated in 1981 from the University of Vienna with a doctoral degree in Law. After a career in the public service in Carinthia, from 1992 to 2003 he was executive director of a parliamentary group in the Austrian parliament; and from 2002 also responsible for coordinating activities between the coalition parties and the federal ministries. Afterwards he had different managing functions in the ÖBB (railway company). Since 2004 he has been President of the Austrian Court of Audit and Secretary General of INTOSAI. 11 f a Str. of Horm r uz R N RAI T TA Om an h Musc cat U. A. E. Dhab abii Dhabi I A Al Khal a uf O M AN Al Ghayd an Arab ian Se Sal a all ah N Al Mu M kal l a OMAN By Awatif Amin Qassim, Specialist – Information Technology Department State Audit Institution – Oman [email protected] 12 Why information systems projects fail: Guidelines for Successful Projects Introduction Information and communication technology (ICT) plays an essential part in our life and the way we react with the external environment. Information systems are one of the ICT elements which shape our daily tasks by introducing value and quality to our daily activities. Technologies are emerging fields and are rapidly changing and the changes are moving around the globe in developed and developing countries. Information systems are the core of today’s emerging businesses. Billions of dollars are exchanged on daily basis based on automated systems and information technology. It is essential that information system projects are properly scoped and implemented successfully. According to Gheorghiu, A. (2006), a survey showed that around 70-80% of all information technology and information systems fail. Despite best practice and defined procedures and methodology applied in project management, as well as the development and the advancement in the project management field, the world is still experiencing failures in implementing information system based projects, especially in developing countries in the Middle East. The gravity of information systems is increasing day by day around the globe, but at the same time the failure rate of information systems projects is still high. Why Systems or Information Technology Projects fail Different research and studies, regarding information systems or information technology project failure show the highest risk factors that were behind the project failure. The world’s statistics always publish failure rate in general, which clearly can prove for business and information technology executives that there is failure at IS projects regardless of whether it is high or low for (IS) or (IT) projects. The key objective of all the research and studies is information and communications technology awareness which can reduce or resolve failure rate for a project by using the accurate and professional techniques. Different types of existing surveys results published by IT Cortex providing statistical information regarding the rate of failure in IS or IT projects. Following are lists of the existing surveys: 1. (2001) The Robins-Gioia survey. 2. (2001) The Conference Board survey. 3. (1997) The KPMG Canada survey. 4. (1995) The Chaos report. 5. (1995)The OASIG survey. All Cortex statistics generally agreed on the below points regarding the failure at information systems and information technology project: ¬ Unsuccessful IT projects are more likely than successful projects. ¬ Nearly 20% of IT projects are satisfactory. ¬ Failure rates are much more likely in case of large size IT projects compared to small and medium size projects. Information Systems and Information Technology Project Common Failure factors Information systems projects always and everywhere around the globe have a reputation for failure, i.e. unused, partially used, cancelled and many other factors. Each project differs from another even if it is for the same system because each project has its own requirements, project management, users, organisation culture, team skills and knowledge, and many other aspects that are linked directly to the organisation and not to the project itself. Different research studies have been made which describe and summarise the most common failure factors in IS projects. Most of the results show similar failure factors but each factor can have different priorities which link to the project and the 14 organisation itself. Moreover, the project and organisation always have a strong relationship with each other which can shape the final outcome of the project in terms of failure or success. According to Dorsey (2000), in all the studies that have been done till now regarding Information systems, failure or success have highlighted top management support as a critical success factor in any project. Any project without full commitment from the top management, in case of problems can collapse at any time during the project life cycle. One of the researches listed risk factors ranking wise. ComputerWeekly.com joined forces with Oxford University to carry out a research into the state of IT project management in the United Kingdom. The research was led by Sauer, (2003) fellow for information management at Templeton College, and sponsored by the French Thornton partnership. The aim of the research was to help Information technology and business executives create realistic expectations for Information technology projects and improve the performance of project management, besides developing the skills required for project management. The most common risk factors ranking wise were one of the outcomes of the research. Table 1 opposite lists ranking wise risk factors. Although there is a high rate of information systems project failure there are ways of enhancement and areas of improvements. Different books, research and studies give clear improvement factors that can help avoid failure in IS projects. The improvements factors were published after detailed study and investigation of different kinds of IS projects among multiple industries around the globe. The main aim of all the existing improvement factors is to reduce or resolve the failure rate at IS projects. Moreover, they help the top management and project managers to use standard best practices and move towards a technology world with minimum risk factors. One of the research have clearly defined improvement factors regarding information systems project, Table 2 lists the factors. The CHAOS study, which was conducted by Johnson, et al (2000) has defined a recipe for success as a CHAOS 10. Moreover, they have clearly explained that no project requires the entire 10 recipe ingredients for success, but the more factors present in a project, the more value can be added to the project. Table 3 lists the CHAOS 10 recipe ingredients for success. Each success factor has been weighted according to its influence on the project’s success. The more success rate, the lower project risk. Table 1: Risk ranking Rank ing and risk 1. Lack of top management commitment 11. Shortage of knowledge/ skills in the project team 2. Misunderstanding of scope/ objectives/requirements 12. Improper definition of roles and responsibilities 3. Lack of client/end-user commitment/involvement 13. Artificial deadlines 4. Changing scope/objectives 5. Poor planning/estimation 15. New or radically business process/task 6. Inadequate project management 16. Employment of new technology 7. Failure to manage end-users expectations 17. Poor control against target 8. Conflict among stakeholders 18. Number of organisational units involved 9. Change is senior management ownership 19. Lack of effective methodologies 10. Lack of adequate change control 14. Specification not frozen 20. Staff turnover 21. Multiple vendors Table 2: Ranking wise improvement factors Ranking and factor I. A. Greater top management support Alignment of IT project initiatives to business strategy J. Greater understanding of project management on the part of top management, project boards and clients B. More commitment from users C. More power and decisions making authority D. Greater financial control and flexibility E. Greater Control over staff resources F. Commitment to requirements and scope once specified K. Greater realism in setting targets. Several respondents railed against imposed rather than planned targets and deadlines L. Establishment of a supportive project/programme office. G. More project management training H. Commitment to a stable project management method Table 3: CHAOS 10 – Recipe for Success 1. Executive Support 18 2. User Involvement 16 3. 14 Experienced project manager 4. Clear business objectives 12 5. Minimised scope 10 6. Standard software infrastructure 8 7. 6 Firm basic requirements 8. Formal methodology 6 9. 5 Reliable estimates 10. Other criteria 5 15 Project Guidelines The guidelines have developed by the author after thorough research and investigation into the information systems project failure issue and the aim of the concern guidelines was to resolve or reduce project failure rate by following the accurate guidelines in small or medium size IS projects. Twenty project guidelines have been developed for the three essential project stages, namely: Table 4: Twenty project summary guidelines Guideline Number Before starting the project 1. Prior to selecting a project 1 Analyse the organisation environment using standard tools such as SWOT or PEST 2 Align Business with ICT Strategy 3 Ensure management buy-in 4 Ensure adequate project resources 5 Ensure project team have the required skills and knowledge to run the project 6 Clearly define scope, objectives and requirements 7 Break project down into manageable components 8 Construct the project’s product to be flexible and open to future change 9 Make use of previous experience 10 Establish clear criteria for supplier selection 11 Carry out detailed costing and establish a feasible project budget 12 Maintain communication at all levels 13 Boost awareness inside the organisation of the project 14 Adopt a good project management strategy 15 Create risk plan and monitor it 16 Establish timetable to give users enough knowledge to accept new system 17 Establish documentation standards and backup strategy 2. During the project 3. After the project execution In reality it is not necessary for an organisation to follow all the concerned guidelines but to understand the standard steps which can be followed in a IS project. These guidelines can be used as a best practice. Each guideline is developed to keep a project on the right track and minimise the risk before, during and after the project. The first and second project stages are the most critical which require focus and clear understanding not only from a project manager but more importantly top management. Top management support is essential at all the stages of a project before, during, after the implementation. Finally, the guidelines are not developed exclusively for information systems specialists, project managers and technical people. Their aim is to cover and help the entire range starting from top management through to the ordinary users in an organisation. The whole plan is to understand what is required for a successful information systems project. Table 4, lists the twenty project guidelines summary for all the three stages before, during, and after project implementation. Guidelines 3,12, and 13 are repeated at more than one stage. During the project Repeated Guidelines 3,12 and 13 After the project implementation 3 Ensure management buy-in 12 Communication at all levels is essential 13 Boost awareness inside the organisation of the project 18 Periodic reviews once project is live 19 Consider ongoing user training 20 Establish a project knowledge base Repeated Guidelines 3 and 12 16 3 Ensure management buy-in 12 Communication at all levels is essential Messages from leaders and professionals regarding the article The culture 50 years ago in the world was totally different from that of today, which means it is still changing. So we have to keep abreast of the changes and receive what is best from the culture but at the same time refrain from what is not useful. The most important thing is that we have to follow a new culture, the culture of technology and information H.M.Qaboos Bin Said (2007) “Information technology is not a magic formula that is going to solve all our problems. But it is a powerful force that can and must be harnessed to our global mission of peace and development” Kofi Annan (2003) Awatif Amin Qassim Awatif is a Specialist in the Information Technology Department at the State Audit Institution Sultanate of Oman. She studied for her MSc in Information Systems at Kingston University, London Nicosia CYPRUS Eu ph rat es SYRIA Beirut e a D s Damascus LEBANON Po r t Said Alexandria Tel Aviv ISRAEL Amm n Amma Amman R. I R A Q ad Sea Se ea Dead phrate RDAN JORDAN ro Ben S uez ef S A U D I El-M A R A B I A R. le Ni Al Manam E G Y P T Aswa n Medina Riyadh Why IT projects fail Mec a Po r t S u JORDAN Research continually shows that many information technology (IT) projects all over the world have difficulties with completion on time or on budget or on scope. In fact many are cancelled before completion or not implemented. Project success is affected by many factors such as project team, suppliers, customers and stakeholders; the truth is that they can all provide a source of failure. There are many different reasons for the failure of IT projects but the most common reasons are rooted in the project management process itself, this paper covers the key reasons of IT projects failures. 18 IT Projects fail when they do not meet one or more of the following criteria for success: ¬ delivered on time, ¬ on or under budget, ¬ satisfies user requirements. Only a few projects achieve all three. So what are the key factors for IT project failure? Organisations and individuals have studied a number of projects, successful as well as failed ones, and some common factors emerged. A number of these factors are involved in any particular project failure and they interact with each other. Here then are some of the most important reasons for failure. Lack of a project methodology The project methodology or project lifecycle describes the approach that will be taken to carry out a project. Lack of a project methodology will force the project manager to make on-the-fly decisions, based more on gut reactions than factual and objective analysis. Projects should follow a well thought-out route to avoid going in circles, getting lost, and hitting countless roadblocks. Taking an unstructured approach is a risk that will lead to unstable results because things rarely fall into place by themselves. Methodologies vary greatly from project to project, taking into account environmental factors and project specifics. And, of course, the methodology is relative to the size of and the complexity the project. The bigger the project, the more important it is to have a methodology. But regardless of size, every project methodology must address three core issues: planning, development and implementation. By following a pre-defined set of guidelines and a migration path, you have something concrete to which you may refer and measure progress against. Poor planning Planning is one of key factors that affect the success of any project because “Fail to plan is a plan to fail”. The project manager should pay a lot of attention to this area and give it enough time and effort regardless of time pressure. They should be aware of bad results when a project plan is non-existent, out of date, incomplete or just poorly constructed. To plan for a project is to set the foundation for project work by defining the tasks to be accomplished, and the time, resources, staffing, communication and costs involved in completing these tasks. The quality of a detailed plan of work depends on the project manager’s technical expertise. Lack of such expertise will lead to a much more generalised plan, in this case the project should have a technical leader whose responsibility it is to cooperate with project manager to make detailed plans. A successful project needs: Risk plans Every IT project involves some degree of risk. Not doing an explicit risk assessment is one of the major problems with project planning. Projects that do not have a plan for handling risks can be hit by sudden unexpected events and be faced with unachievable schedules and deliverables. They can end up losing the client, and because of that we realise the importance of an adequate risk plan. Risk management has become a major issue especially as projects get bigger. Success here means creating a plan to assess the risks, the ‘which’, the ‘what’ and the ‘why’ of each risk identified and planned for. Quality assurance plans Projects must develop a QA plan as part of the overall project plan to explain the planning, implementation and assessment procedures they will put in place to ensure that project outputs comply with business standards and best practice, as well as any specific quality assurance and quality control activities. A QA plan integrates all the technical and quality aspects of the project in order to provide a “blueprint” for obtaining the type and quality of environmental data and information needed for a specific decision or use. The project’s QA plan should cover the issues listed in Figure 1. When deliverables are supplied, the project should also provide documentation describing the QA tests performed and evidence of compliance. The more detailed planning the higher the chances of success. Each and every activity that is expected down the line gets due attention. Not only is this pre-planning well documented, but also even after the project has taken off, if things don’t exactly pan out as planned, the project manager should not hesitate to re-plan, avoiding project management failure, and readily incorporate the changed circumstances in their new version, so that future events are controlled. Figure 1: Issues in a QA Plan Fitness for purpose Deliverables should be fit for purpose. For example, projects should be internally consistent, up to standard, free of bugs and perform well. This does not necessarily mean perfection, but fit for purpose consistent with the level of funding and project resources. Best Practice for processes Projects should follow best practice for creating their deliverables, e.g. technical design and architecture, programming, web sites, and data capture. This should include processes, workflow, tools, equipment and methods. Adherence to specifications Projects will be asked to develop their own specifications. This might involve requirements specifications, functional specifications, and/or technical specifications. Once specifications are agreed, deliverables must conform to them. Adherence to standards Projects must ensure that their deliverables conform to company standards for content, metadata, interoperability, terminology, learning and linking. Accessibility legislation Business systems should be accessible to a diverse range of users. In order to achieve it we advise that all resources meet good practice standards and guidelines pertaining to the media in which they are produced. Project plans should consider cost, resources and requirements needed to succeed. These plans should be timed so that there can be a monthly plan, a weekly plan, and a daily task schedule so that everyone can follow the progress of the project step by step. Poorly defined project scope – unclear goals and objectives A project manager should understand the compromise between what they want to accomplish and what they are actually able to deliver. When goals exceed the ability to deliver timely results, the project will surely fail. Successful projects always have a welldefined scope that states realistic goals, and attainable objectives, establishes clear milestones, defines benefits and deliverables, and conducts regular technical reviews and measurements. By this you can ensure that the project will be visible to all parties including senior management and clients. The scope should be clearly defined as part of the project definition. Much of the work at that time is directed at agreeing the optimum definition of the project – both in terms of its deliverables and in terms of how it will operate. This scope definition will form the baseline against which potential changes are assessed and against which the project’s performance is measured. The concept of well-defined scope is affected by many factors. For example the goal of the project may be partially clear because of poor requirements gathering in the definition stage of project, goals and objectives might be unclear because project users lack the experience to describe what they really require. 19 Project problems start with the three most common scope mistakes: ¬ Overrunning initial cost estimations. ¬ Over – or underestimating project schedule This is a double-edged sword: setting a generous timeframe runs the risk of the project becoming obsolete by the time it is completed, but setting a tight timeframe in relation to the amount of work required will put a strain on personnel. ¬ Miscalculating the work to personnel ratio. Vague requirements, poor user input, lack of user involvement Lack of user involvement will cause a great deal of resentment among the corporate user community, projects may be seen as something forced upon them by developers who only want to test out their new toys. It should not be forgotten that projects are built to support end users, not developers. Requirements need to be worked out on both sides because there is a symbiotic relationship between users and developers: ¬ Users, who know the business processes best, need to clearly express their requirements and provide feedback on each project deliverable. ¬ Developers, who know what technology can be used to put those business processes into place, need to ask the right questions and not make any assumptions about what they think the users mean. Nothing kills projects faster than giving users something they did not ask for and then pretending they did. IT teams may be given a vague and informal set of requirements, and they, in turn, may not bother to consult with users or ask any questions, as a result they will build what they believe is needed, not what users need. Scope creep, objective and requirements changes during Project IT projects suffer from two classic problems in project management, scope creep and feature creep. Scope creep refers to uncontrolled and unexpected changes in user expectations and requirements as a project progress, while feature creep refers to uncontrolled addition of features to a system based on the incorrect assumption that one small feature will add nothing to cost or time. The project manager should understand project trade-offs and make the right decisions related to resources, features and time schedule even though the requirement changes. He should be aware of the risks of change and the risks of not changing and should have the ability to balance these risks before deciding what to do. One obvious solution is to establish a reasonably stable requirements baseline before any other work goes forward. But even when this is done, requirements may still continue to creep. No one can design Figure 2: Example scope and change control process Participants Project office Identify Capture Review, assess Assign for review Propose action External suppliers Steering committee Contract revision Approve for action Assign for action Action Action Review action Agree closure 20 a process that assumes requirements are stable. In virtually all projects, there will be some degree of learning what the requirements really are while building the project. Projects could be headed for trouble if architectures and processes are not change-friendly, or if there are poorly established guidelines that determine how and when requirements can be added, removed and implemented and who will bear the cost of the changes. On the other hand, if you build a project from small, iterative phases instead of mammoth, serial deliverables, you will deliver more quickly, leaving less chance for change to overcome the work, and less risk of large project failure. Another recommended solution for scope creep is a change control process. Change control will involve a combination of procedures, responsibilities and systems. The key to success is to have a well-controlled but efficient process. Define and agree: ¬ On what basis changes should be approved, ¬ Who does what, ¬ The membership of the change control board(s), ¬ The detailed procedures, forms etc, ¬ Protocols for levels of authority, e.g. what types of change can be approved without reference to the project’s business owners, ¬ Linkage to other management procedures, e.g. the issue management process, configuration management, ¬ Which tools will be used to support and manage the process, ¬ How to communicate and promote the process and its importance to all participants. Any participant or other concerned party may raise Change Requests. The Project Office team and Project Manager will ensure they are captured and actively manage them to conclusion. An initial review should be made to examine the need for change, how it could be achieved and what the consequences would be. The most appropriate member of the Project Team would normally perform this review. Based on those conclusions, the recommended action would be proposed. In this example, there are three possible courses for the approval of the change: ¬ Minor changes within scope can be approved by the Project Manager, ¬ Any change affecting an external subcontractor would need to be reviewed with that contractor who would agree any necessary contract revisions or payments etc, ¬ Changes of scope and contract revisions would require the approval of the Steering Committee or the Change Control Board. In making the decision, the Project Manager, Change Control Board or Steering Committee would be guided by pre-established principles for making change decisions. After the action is agreed the work is assigned for action by the Project Team and/or the external sub-contractor. When complete, the action would be reviewed and the Change Request closed. It is possible that the agreed action could have more than one stage. For example, it might be better to introduce a temporary solution so that the overall benefit from the project can be delivered, and then build a permanent solution after the system is live. Poor architecture – inflexible and difficult to change Any environment usually develops, and according to this development many issues may change such as strategies aligned to this environment objective, requirement etc. The concept that “what we are using today may be useless tomorrow” is clear and understood. This concept should be considered when building any project. If the project architecture is inflexible for updates, then this project may collapse because of daily changes and rapid developments. An example of flexible architecture is the Patriot missile used during the Gulf War. It was not designed to intercept scud missiles, but the software was able to be reconfigured to support the new function. On the other end of the flexibility spectrum was a security program created to protect sensitive wordprocessing documents. Everything worked well for a few months until the operating system was updated. The word-processing programs still worked, but the security program became useless and unfixable because much of its code was tied to operating system features that were dropped in the new system. People must think ahead about what is likely to change. If you do architecture right, you will not have to restart from zero again and rebuild the project from the beginning as nothing is existed because you are able to add and modify features that caused by any change any time, but if you do it wrong, you will suffer death by a thousand cuts. Bad choices show up as long-term limitations, aggravation and costs. 21 Stakeholder conflicts All the stakeholders of the project should share similar business interests. For example, assume that a project is being built, but after a while the developers need some clarifications, i.e., with input A, does the system choose X, Y, or Z? If stakeholders cannot agree on answers this will force them to acknowledge deep incompatibilities among their business interests, then the system will be cancelled in an expensive failure for the entire enterprise. It becomes a problem when the stakeholders work under the illusion that everyone is going to get everything that they want. They will contradict each other by their differences rather than going through conflict resolution in the early stages. The developers will expose the stakeholders’ irreconcilable differences because programmers cannot create an ambiguous system. Stakeholder conflicts can play many different roles in project failures. Often, stakeholders have personal reasons for not being able to work together. When ego and pride get in the way of any project, it will almost always end in some disaster. Other projects, especially smaller projects within larger projects, never go anywhere because the internal stakeholders cannot agree on priorities. These are “pretend projects,” meaning a few developers work on them part time, but nothing is ever delivered. Whatever the case is, you should always think like this if you start any fixed-fee project you should end it according to a specific deadline, because it is important to allocate budget ahead of time. Lack of top management support and involvement Insufficient budget and poor resource allocation Few projects have the chance of getting off the ground without the support of senior managers in the organisation. Without executive support the project managers in the organisation will find it difficult to align business requirement with their projects. It is a problem when developers do not know who the “real” sponsors are, and keep progressing without sponsor involvement. For the best true sponsors need to be shown up and communicate with the team, follow the project step by step, hear good and bad news in “small pieces” rather than in “one chunk”, this way you will avoid losing their support if any surprise comes on the way. Non-sponsored projects are taken less seriously and may sometimes be viewed as merely someone’s pet project. Without the backing of senior management to lend credibility to these projects, originators will have a difficult time recruiting employees to participate in development and testing. Teams are usually made up of people from different departments who all have their own set of priorities and of course, they all have their own bosses, so it is natural that those involved in any project will have tendency to keep the best interests of their own department in mind, and there’s nothing wrong with that. In fact, that’s why they are on the team, to represent the needs of their department. However the risk is in having a selfish person or group who may control project, ignoring requirements of others. Financial threats are the result of poor budget forecasting and tracking, lack of inter-department charge backs, and ineffective tracking of resource and cost allocations. Insufficient budget is still a major reason for missing goals and objectives of projects within the quality framework that is required. Project Y always needs to be delivered tomorrow within X budget. When we talk about budget we should be aware of what may happen if there is not enough funding, so a resource assessment should be made carefully by conducting complete and accurate financial analysis. A resource assessment describes the people, skills, hardware, software, and network resources needed to complete a project. Resource assessment is sometimes the practical first step to making staffing decisions for a project. The project manager is typically responsible for assessing resource needs and deciding whether a formal, documented assessment is necessary. What kinds of projects need a Resource Assessment? Although every project undergoes some kind of resource assessment, they are frequently informal and undocumented. Large, complex projects, and those working with new technology, will benefit most from formal assessment of resource needs. A resource assessment needs to consider and document the items in Figure 3. Poor schedule estimation, unrealistic or long timescales Figure 3: Resource assessment contents Project Name 22 Staffing & Skills Inventory What staff are already assigned to the project? What skills do they have? Roles/Skills Needs What roles and skills are needed that aren’t covered by project staffing? Staffing Needs What is needed to address roles and/or skills not covered by staff already assigned to the project? Training Needs What training is needed to cover skill gaps? Hardware & Network Needs What hardware and network resources does the project require? Software Needs Does the project require any specialised software? Support Needs What kinds of support are needed from other C&C units to address needs for skills and/or roles not covered by project staffing? Scheduling project work is an essential element of project management. A project schedule makes it clear to all participants when work is expected to be completed. It also shows the time-related dependencies between different project tasks. In a complex project, several schedules may be necessary, covering different levels of detail or different parts of the project. Poor time estimation can cause project related problems. One common problem during the creation of the Work Breakdown Structure is assuming that the time on task equals duration. The time on task is the time the task will take to complete without interruptions, whereas duration is the time the task actually take to complete including interruptions. Using the time on task to estimate schedule is a common mistake made by project managers. Who schedules the project? Another common problem is using linear approximation when estimating schedule. For example, if you doubled the cows in a farm, you double your production of milk. The IT projects are beyond the scope of such approximations. Assume we have a large IT project using a team with a staff of one hundred people. Linear thinking would support the conclusion that increasing the people by 100 percent would decrease the schedule and increase the cost to approximately the same degree. In reality, doubling the staff produces a non-linear result. In general, every project has a minimum achievable schedule. Many managers are well aware of the need for fast delivery, leading to other problems of unrealistic timescales. These are set without considering the volume of work that needs to be done to ensure delivery. As a result these projects are either delivered late or only have a fraction of the facilities that were asked for or they are bug-filled, because of that every project manager should consider volume of work, number of staff, number of working hours, and the duration of each task in parallel to avoid any kind of pressure. It is true that working under pressure can increase the quantity of results one receives, but, after a point, dramatically reduces the quality of those results. In fact pressure sometimes produces the opposite of its intended effect. On the other hand if the project manager sets long time scales, the project may be obsolete as a result of changes in requirements. Normally requirements change from time to time due to changes within the project users’ environment. If the project objective is to serve certain society; it should be parallel to their requirements. The key recommendation is that the project time scales should be short, which means that larger projects should be split into separate projects. Setting overall completion dates must be done by the project sponsor and stakeholders. The project manager assists by digesting information about scope, deliverables, and resources, and estimating times for completion of project tasks. Once an overall schedule is set, the project manager is responsible for monitoring the progress of the project and revising the schedule if needed. This must be done in consultation with project team members who are doing the work. Working with team members to produce accurate time estimates is one of the high mysteries of the art of project management. The project manager must balance the needs for honesty and realism with appropriate motivation to keep the project on track despite inevitable surprises. There will typically be give and take as a project proceeds among budget, features, and schedule. It is essential for the project manager to keep all participants informed as to current schedule status. Time schedules should be reviewed to see if they are realistic and participants should be encouraged to express their reservations on it. Communication breakdowns failure to communicate and act as a team Projects sometimes fail because of inadequate communication between team members; in such cases they lack the ability to work as a cohesive unit and are in constant disagreement. The arguments and infighting cause everyone to move in opposite directions, lowered morale, and spawn an “us versus them” atmosphere. Another common problem is the size of the project team. There is a direct relationship between the size of the project team and the difficulty of keeping all members of that team up to date on changes, progress, tools and issues. Such problems are common on large projects, especially if people are working at different sites. In many troubled projects no one person has an overview of the whole project. Each project member needs to know how his or her piece of work fits into the entire architecture. The key recommendation here is to avoid forming a team of more than five members, instead opting to form multiple teams working on individual objectives. Each of these smaller teams has a manager, who is himself part of a management team. In extreme cases multiple management teams exist and an executive team is formed. The focus of each team is rigorously defined and strictly enforced/policed. In general communications problems can be avoided by adopting a communication plan at the planning phase. A communication plan identifies people with an interest in the project (stakeholders), communication needs, and methods of communication. Communication planning helps to ensure that everyone who needs to be informed about project activities and results gets the information they need. The project manager is responsible for identifying communication needs and deciding whether a formal communication plan is needed. Although every project undergoes some kind of communication planning, it is frequently informal – determining who needs to attend which meetings, receive which reports, etc. Projects of long duration will benefit from formal planning because the project stakeholders are likely to change over time. Projects that affect a large number of people or organisations may also benefit from formal planning to ensure full identification of all stakeholders and of communication needs. A communication plan needs to consider and document the items in Figure 4. Figure 4: Communication Plan Contents Project Name List of Stakeholders Who has interest in the project? See the project definition for an initial list of stakeholders. Be sure to include both business and technical stakeholders. Information Needs What kinds of information about the project are of interest? Consider need to communicate plans, status and progress reports, changes, major events, availability of prototypes and demonstrations, etc. Communication Methods What information will be communicated to what groups in what ways? Common methods include reporting and documentation, email, meetings, and web sites. 23 Staffing – Insufficient number, inappropriate skills Staffing is one of the most critical elements of a project’s success. Without staff, there is no project. Once you have defined the project and are clear about at least some of the project’s initial tasks, you can define your staffing needs. It is important to know the type of staff that the project needs, e.g. database administrator, one or more programmers, and technical writer. Once the type of staff has been defined, you need to get individuals assigned to your project. The best places to go for staffing resources are the project’s sponsor and stakeholders. You should be prepared to answer the following questions that might come up when you ask for staffing resources: ¬ What percentage of their time will you need? ¬ How long will you need this person? ¬ What are the benefits of this particular person working on the project? ¬ How do the skills needed and this person’s skills match up? ¬ How many members do you need to share workload? Most IT projects require a diverse range of skills; the project must have the right people to do the right job. For example, programmers need to have experience in the technology before counting on them, so they should be selected wisely. Furthermore, managers can perform poorly if they lead projects that do not match their expertise. The project manager should have enough experience and knowledge from similar projects before, so that the same mistakes will not be repeated. Projects which deal with high technology need managers with solid technical skills. In such projects, authority must reside with people who understand the implications of specific technical risks. However, the best technologists are not necessarily always poised to be the best managers. The skill set for management and programming is disjoint. The larger the project, the more need there is for people with excellent planning, oversight, organisation, and communications skills; excellent technologists do not necessarily have these abilities. The solution to skill-driven challenges is easy to define but difficult and expensive to accomplish. A project needs to attract and retain the most highly skilled and productive people. A well paid project team with the right specialised skills is worth far more to an organisation than a group of lower-cost people who need weeks or months of fumbling through a new process or technology before they can start being productive. In a straightforward phrase “you get what you pay for”. 24 Poor testing The developers will do a great deal of testing during development but eventually users must run acceptance tests to see if the project meets their business requirements. This stage should be before the project implementation, skipping the testing phase because the project is way behind schedule will lead to a downright failure. However testing often fails to catch many faults before a project goes live because: ¬ Poor requirements which cannot be tested, ¬ Poorly or unplanned tests meaning that the project is not methodically checked, ¬ Inadequately trained users who do not know the purpose of testing, ¬ Inadequate time to perform tests as the project is late. Users should do the acceptance testing, in order to build their confidence with a project and to utilise their experience of the business. To do so they need good testable requirements, well designed and planned tests, be adequately trained, and have sufficient time to achieve the testing objectives. IT illiteracy Sometimes adopting new technology may lead to a failure, even though it is successfully tested, implementing it for the first time in the project is in itself a risk. Will the team use it in the right way? Will they have enough practice while they don’t have expertise? Will it satisfy the project requirements? It is related to the failure to align business objectives with IT and its processes. This usually occurs when the company’s internal controls have material weaknesses or when it is in non-compliance with various processes. Therefore each project should have Internal or external auditors who have an obligation to publicly report facts. Hidden costs of going “lean and mean” Any failure will be viewed as a direct result of underperformance, even though underperformance is not often a significant factor in the failure of most projects. Instead, failed projects often have goals that were inherently unattainable, poor staff, etc. Late warning signals The early project milestones involve diagrams, designs, and other documents that do not involve working code, these and other project milestones then go by or less on schedule, and testing may start more or less on time, so that errors which discovered days before the deadline of the project will cause the project not to be completed even close to its deadline. | Rasha Abdel Rahman References Department of Information Technology, Audit Bureau of Jordan Rasha Abdel Rahmman graduated from the Information Technology Faculty of the University Of Jordan with a B.Sc Computer Science. She has worked for the Audit Bureau of Jordan since 2004 in a variety of technical and managerial posts. She has specialist skills as a developer and administrator of Oracle databases. She is a qualified IT Auditor and has represented the Audit Bureau at international events. Glaser, J (2004) Management’s role in IT project failures Healthcare Financial Management, October. Grossman, Ira (2003) Why so many IT projects fail, and how to find success Financial Executive, Volume 19, Issue 3, page 28. Humphrey, W (2005) Why Big Software Projects Fail: The 12 Key Questions The Journal of Defense Software Engineering, March Issue. Armour, P (2005) Project Portfolios: Organisational Management of Risk Communications of the ACM, Volume 48, Issue 3, page 17. James P. Lewis Fundamentals of Project Management, 3rd edition. James P. Lewis Team-Based Project Management in Back Matter (1), Back Matter (2), and Back Flap Betts, M (2003) Why IT Projects Fail [Online journal] Computerworld, Volume 37, Issue 34, Page 44. Available from Academic Search Premier at http://www.ebscohost.com [Accessed July 21, 2005]. Jenster, P and Hussey, D (2005) Create a common culture between IT and business people to reduce project failures Computer Weekly, March 22. Coley consulting (2001-2005), Why projects fail, Available at http://www.coleyconsulting. co.uk/sitemap.htm Simon Wallace (2004) The ePMbook, Available at www.epmbook.com Ephraim Schwartz (2004) online research IT Myth 5: Most IT projects fail, August 13. Paul Chin (2003) online research Cold Case File: Why Projects Fail, May 6. 25 ad Bornholm (DENMARK) Puttgarden Kiel Bay Kie lC an al Mecklenburger Bucht Kiel Pomeranian Bay Stralsund Rostock Lubeck Sea Bremerhaven Wilmhelmshaven Swinoujscie Hamburg Schwerin Emden Szczecin en Elb Ha ve l e Bremen Oldenburg Wittenberge DS Od GERMANY Ems Braunschweig nschweig es W Frankfurt e Neiss e Essen Halle Dusseldorf Cottbus Elb Dortmund Leipzig Gorlitz Kassel ogne Dresden Erfurt EEisenach Bad Hersfeld Siegen Zielona Gora Spree Dessau D Gottingen ngen rg POLA Magdeburg Magdebu er Bielefeld Munster Potsdam l na Hannover Osnabruck hede Gorzow Wielkop er Berlin tella n dk Mit a Werra Jena Gera Bonn Fuld Chemnitz Zwickau Decin Usti nad Labem a Koblenz e ell Mai Bamberg Wurzburg Rhein-MainDonau-Kanal Mannheim Rhin e Karlsruhe Heilbronn Plzen CZECH REPUBLIC ava Vit Heidelberg Saarbrucken Prague Cheb n Mainz os M Hra Kral Hof Frankfurt Am Main Wiesbaden Nurnberg Regensberg Ceske Budejovice GERMANY Dr. Ulrich Ditzen, Member and Audit Director in charge of IT Audit highlights the general structural IT problems of German federal departments and agencies. He reports on the current situation and procedures in place, highlights the shortage of staff with adequate IT skills in the public service, discusses the importance of the use of external consultants for planning and implementing IT projects in the German federal administration, the major shortcomings made in purchasing consultancy services and the conditions in which the use of external consultants can add value. 26 Key issues for relying on External Consultants for Public Sector IT Projects Audit findings generated by the German SAI on general structural IT problems of German federal departments and agencies include computer literacy, experience with suppliers and with relevant legal practices. The problems facing us can be illustrated by a quote from the budget documents of a German federal government department: 90% of the IT budget has been definitely allocated to operation and maintenance. IT-related staffing is often quantitatively and qualitatively inadequate to meet current requirements. Either the number of posts is insufficient or posts are vacant and it is difficult to recruit adequately skilled staff. The use of external staff may be a potential solution. There are a number of recurring problems and factors critical to the success of IT projects. The objectives of projects are often not clearly defined in terms of content, use of resources, value added and specific requirements. It is often difficult to identify the biggest common denominator. Deadlines are often set first without stating how to accomplish the objective. Staff with operational responsibilities are often not asked or do not clearly state their preferences. No investment appraisal is carried out. IT project implementation periods are often so long that, given ever shorter innovation cycles, there is a risk that specifications laid down initially become outdated and obsolete while project implementation is still underway. Management consulting firms often point out the following recurring problems and factors critical to the success of IT projects: skills available in-house are often limited, so is expertise in procurement and contractawarding procedures, in project steering and the later transfer of know-how. Changing specifications and managing the changes are often impaired by the shortage of adequate skills among public sector staff. These skills “In recent years, the degree of IT integration in operational functions, the intensity of IT support, the connectivity between workplaces at branch offices and headquarters, the degree of information density but also the dependence of stable operations on the high quality of IT systems have steadily increased.” Further factors to be considered are: ¬ Between 1995 and 2003, total IT expenditure (budget title groups 55 and 56) increased by more than 150%. Broken down by capital expenditure on IT and recurring expenditure on IT support services, these increases are 175% and 450% respectively. ¬ There are 15 federal government departments (ministries) with a total of 435 agencies. There are 211,000 federal workers (137,140 civil servants and 73,875 employees, excluding the Armed Forces and Federal Employment Agency). Total budget expenditure in FY 2007 was about €260 billion. As far as can be ascertained under the present budget system, specific IT expenditure totals €2 billion. However, we have reason to believe that an undetermined amount of IT-related expenditure is hidden under budget items that belong to construction projects and to the performance of operational functions by departments and agencies. ¬ As of early 2007, the civilian departments and agencies were equipped with 140,000 personal computers, while 135,000 personal computers were in place within the remit of the Ministry of Defence and 95,000 in the Federal Employment Agency. In the federal ministries, nearly 100% workplaces are equipped with personal computers. In the subordinate agencies, more than 90% of workplaces are equipped with personal computers. Since 1999, departments are fully connected by a single intranet, which was built up in connection with the relocation of the seat of the Federal Government and Parliament from Bonn to Berlin. Audit findings generated by the German SAI on general structural IT problems of German federal departments and agencies IT services have become vital for government operations and transactions. However, IT applications and structures have for many years evolved as isolated solutions with an exclusive focus on the operational needs of the department or agency in question. The ’patchwork’ grown over time had to be harmonised, as compatibility problems of the applications and a large number of (unused) IT system functions resulted in a lack of acceptance and in ‘frictional loss’. Systems integration has become ever more important for suppliers and service providers but above all for the purchasers. Audit results generated by the German SAI on problems with the availability of staff Frequently, the project staff do not have adequate skills and the project leader does not have any solid experience. Staff are not released from their previous functions or are assigned to a project for different periods. Successful support by a coach would require intensive participation, steering and acceptance of the services delivered. A clear strategy as to developing skills needed in-house has often been lacking. The transfer of consultants’ expertise has often not been stipulated in an extra contract. The importance of external consultancy for public-sector IT projects IT projects have become increasingly complex and their implementation requires more input. This is due to higher quality requirements, the widening scope of functions to be performed, the increasing number of stakeholders, the need to take into account existing IT systems and the stronger integration between different IT systems. Project objectives often conflict in terms of performance, time and resources. Until recently, no generally accepted definitions of the terms “experts” and “support services” existed within the German federal administration. Other terms such as “assessor”, “business advisor”, “consultant” and “coach” have frequently been used indiscriminately without much regard for a precise and uniform definition. In 2005, the German SAI developed, in agreement with the Federal Ministry of Finance, a definition of “external consultancy”. According to this definition, the subject of external consultancy is the provision of a service against remuneration with the objective of developing, assessing and imparting to the decision-makers practical recommendations with respect to concrete decisions to be taken by the contracting authorities and, where appropriate, providing further advice during implementation. In the context of this definition, recipients of the consultancy services are federal departments and agencies, quangos and grant recipients. The service provider is a natural or legal person active outside this field. The German SAI’s audit work has revealed that consultants are primarily relied on in the following stages of IT projects: 1. identification of requirements, 2. drawing up of specifications, 3. valuation / estimates of costs and expenditure, 4. negotiations with contractors, 5. change request procedure, 6. review and revision, risk assessment, 7. testing and acceptance. The administration often justifies its reliance on consultancy services with the following arguments: Funding can be obtained more quickly because funds for “procurement” are easier to obtain than funds for hiring staff. A consultancy contract is usually made for a limited period of time. This improves the chances for a project to be approved, facilitates quick implementation and the overcoming of internal conflicts. The use of external consultants also enhances the legitimacy and prestige of projects, often generates new ideas and facilitates the discovery of other options. On rare occasions, external consultants serve as trouble shooters. 27 contract award procedure, project results Audit findings generated by the implementation and use German SAI on general IT-related evaluation, of results. staffing problems in German federal departments and agencies Audit experience in connection with the implementation of As a result of the increasing use of external staff, private-sector staff are used for long results generated by consultancy periods of time to perform inherently administrative functions. There is a trend to contract out even sophisticated and conceptual IT functions to the private sector. External (private-sector) staff permanently perform functions of everincreasing importance. Where external staff are used to evade internal staffing problems, this creates a high and increasing dependence on external expertise in an environment of rapid technological change. Departments and agencies increasingly lose the ability to assess and act upon emerging issues. Declining budgets, increased cost pressure and shortage of staff resources increasingly restrict the scope for government action. Shortcomings found by the German SAI concerning the use of consultants There is a general trend to rely on consultants also for the performance of core functions. The contracting authority often has inadequate competence for controlling. Mistakes are made most frequently during the following stages and in the following fields: planning of the use of consultants (identification of the need for consultancy services), performance (value for money), 28 In a number of cases, the German SAI has had doubts as to whether results generated by consultancy had the intended effect or were suitable as a sound basis for decisions. These doubts were based on the criterion that successful necessary consultancy should have a clear influence on further action, current and future decision-making. Scientific study A scientific study carried out in the public sector revealed that the feasibility of the problem solution worked out is the most important criterion for selection (80%). However, the criterion is ultimately met in only 50% of the cases reviewed. The study further found that the proposed solution was often implemented only “to a small extent” and that, in nearly one third of the cases, consultants had to remain active during implementation. The know-how expected to be generated was transferred in only two thirds of the cases reviewed. Summary and outlook (Core) functions that should be reserved to the public sector include developing and deciding on the IT strategy, IT portfolio, IT architecture, IT standards, IT controlling and reporting, IT procurement and management of IT interfaces. In its audit work, the German SAI has found that the factors critical to the success of consultancy for IT projects and the measures necessary in this context are: 1. the definition of problems and objectives, 2. the necessity of consultancy, 3. performance (value for money), 4. the specification of requirements, 5. the methods of awarding contracts for consultancy services, 6. the precise formulation of contractual provisions, 7. monitoring, steering and acceptance, 8. the implementation of the results developed by consultancy. To address an IT problem, the administration should accurately analyse and determine the current situation, the objective to be accomplished and the difficulties emerging or identified in achieving the objective. The German SAI’s audit findings highlight the fact that, on the whole, the decisions about the use of external consultants are too rarely based on a sound and sensible analysis of the problem and that the objectives and criteria have often not been determined in a way permitting project evaluation. Before considering the award of a contract to an external service provider, the administration should critically examine whether it can perform the service itself. In the course of its audit work, the German SAI has found that, in many cases, departments and agencies give reasons for the use of consultants that are not directly connected with the problem to be solved, e.g. “opening up other perspectives“ or “better way of convincing the policymaking level of the validity of results [generated by third parties] on which action should be taken“. Such reasons often were more important than the need to compensate for a lack of professional or technical in-house expertise. It is always necessary to carry out an investment appraisal, in the course of which all alternative options need to be stated and evaluated. The Bundesrechnungshof found that, preliminary to awarding contracts to external consultants, investment appraisals, which are a necessary tool for verifying compliance with the requirements of efficiency and effectiveness, have rarely been carried out. Based on the German SAI’s experience, there are the following alternatives to commissioning external private-sector consultants: Apart from performance of the service by the department or agency itself, support can be obtained from, for example, internal consultancy teams of the public administration from their own or another government department. If purchasing external consultancy is the most cost-effective option, the administration needs to unambiguously and comprehensively describe the consulting service to be performed. If the administration itself is not capable of describing the service required, this is evidence of the fact that the project is not yet ‘mature’ enough for calling in external expertise. Where the department or agency in question is not able to describe the problem to be solved or – as frequently observed – needs a third party to describe the problem, it will also not be able to verify whether a specification of requirements drawn up by an external consultant actually meets the requirements of the department or agency. As a matter of principle, a public invitation to bid must be issued and, where appropriate, such invitation has to be published throughout the European Union. A contract award by negotiated procedure is admissible in few exceptional cases only. However, in most of the cases audited by the German SAI, contracts for consultancy services were awarded without competition. Contracts must be worded so as to ensure that the content and timing of the service purchased are described unambiguously in a way permitting verification. Prior to awarding a contract for consultancy services, there should be full understanding of the essential contents of the contract. This includes the description of both the service to be provided and of the results aimed at. Sound evaluation criteria and milestones defined in detail should be available at an early stage. By appropriate monitoring and steering of the consultancy activities, the administration can make a substantial contribution to their success. The results generated by consultancy have to be accepted on a timely basis in order to safeguard the possibility of claiming damages for breach of contract or poor performance. The Bundesrechnungshof has found that departments and agencies adequately monitor and steer the consultancy projects only in a few cases, that the acceptance of the service was frequently delayed, that ambiguous specifications such as “assisting the contracting authority with … “ or “… will be available as consultant beyond that period“ hamper any effective monitoring of service provision. Such formulas are no appropriate basis for accepting the service. A reliable and transparent ex post project results evaluation should be carried out after the conclusion of any consultancy project. In many cases, the results evaluations required under budgetary law had not been carried out. The German SAI often had doubts as to whether results generated by consultancy had the desired effects or whether they were used at all as a basis for decision-making. On balance, budget funds were spent on consultancy work whose results added little or no value; due to omitting ex post results evaluations, no lessons were learnt to prevent deficiencies in future similar cases. The administration needs to transparently document each successive step from the description of the problem via the verification of needs to the implementation of the results generated by consultancy. This is an indispensable prerequisite for carrying out any ex post project results evaluation. In the course of its audits, the German SAI frequently found inadequate and incomplete records. Comprehensive documentation avoids duplication and provides key information for the staff assigned to an IT project later on and for the planning of future projects. The use of consultants may effectively support administrative activities in cases where problems cannot be solved in-house. The extent to which external consultants are used will continue to increase, especially in the case of major IT projects. Nevertheless, the risks and potential errors are as manifold as the possibilities for making use of external expertise. The decisive factor is the ability of the contracting authority to identify its own needs and to monitor the provision and success of the service purchased. Consultancy services are not a commodity whose choice is merely governed by its price (as in the case of hardware or IT infrastructure services). It is absolutely necessary for the decisionmakers to be aware that the principles of economy and efficiency also apply to the use of external expertise (need, efficiency, competition, evaluation of results). Alternative options would be service centres within the administration having the necessary special skills and expertise needed to cover the entire remit of a department or even to perform crossboundary advisory functions. | Ulrich Ditzen Ulrich Ditzen is a graduate of Darmstadt Technical University where he earned doctorate in economics in 1980. He is a Member of the German SAI, the Bundesrechnungshof and is currently Audit Director of the unit in charge of IT auditing. He joined the Bundesrechnungshof in 1987 and held posts in various audit units such as telecommunications and electronic accounting. Prior to that, he worked at the Federal Ministry of the Economy. 29 û 8 8 û 6 rojo Kiruna ki Kolari Kelloselka Ou nas Kamilarvi ea joki rn To Malmb erg et odo B n lve Jokmokk Lu Ke mijo ki Rovaniemi Mo leal ve Sandnes San sjoen n Kemi oden B Mosjoen Sk elle ftal ve n Norwegian Sea Iijoki Lulea ite a P Oulu Ou lujo ki Storuman Skellefte a û 4 6 64û Lycksel Vilh elmina Um ea Nams N os analven Steink jejer Steink Kajaa lve n Kokkol a Umea Angerm SWEDEN Storsjon Trondh ei m FINLAND Ornskoldsvi Indalsa lven K k Vaasa Ostersund Molde Alesund e Seinajoki Aanekoski Jyvaskyl Andalsnes Harnosan d Ang e NORWAY Sundsval l Ljusnan Ost Glama Floro erd ala Hudiksval lve n l Gulf of Bothnia M Jamsa n Lage or i P Lilleh ammer Tamp er e Hameenlinna Rauma Lah t Mora Klar Hamar erg B en a Gavle Falun n alve 60û Turku Dal orlang B e alve Helsi n Drammen Up sal p Oslo Karlsta d Otra Stavang er Vanern g a Sk û 6 5 Vannersb or g Uddevalla ak err Goteb or g Hiiumaa Motala Falkop ing oras B Jonkop ing f f o Fin lan d ESTO Nykop ing arnu P Norrkop ing Linkop ing Gotaalv Gul Tallin Sodertalje Mariesta d Mellerud Arendal ALAND ISLANDS Stockholm Oreb r o orsg P runn Kristiansand a Vasteras Haug esund Saaremaa Vattern Vastervi k Nassj o V il North Sea Klaip eda LITHUANIA û 4 2 Effective IT Governance: How to Get Good, Secure IT Services SWEDEN This article describes experiences from 19 audits of the Government’s and the public administration senior managers’ IT governance. Our main conclusions are that there is an urgent need for stronger IT governance at both the levels of the Government and senior managers. Only such governance can ensure that good, secure IT services will be conceived, developed and implemented, as well as meet all significant requirements for IT security. Since the audits were conducted actions have been taken at both levels to strengthen IT governance. In Sweden, according to the Government, government agencies should become proficient information technology (IT) users, especially in two areas: (1) good e-services, as part of e-government, and (2) security of these services, that is, the protection of the confidentiality, integrity, availability, and traceability of data, as well as the protection of IT systems. The Swedish National Audit Office (SNAO) audited the performance within these areas, performing 19 audits, from 2002 to 20071. The IT Governance audits can be classified in three audit areas: 1. Effective IT-Based Investment in Business Change – Focus on Agency senior managers 2. Effective Web Sites and Good e-Services – Focus on the IT Governance of the Government and Agency senior managers 3. Effective Security for Information Assets and especially for e-Services – Focus on the IT security governance of the Government and Agency senior managers Audit Question Did the agencies manage investment in IT-based business change so as to achieve efficiency? Methods Used Our audits were based on the IT investment management model (ITIM) of the U.S. Government Accountability Office (GAO), supplemented by Swedish legal requirements and adapted to the Swedish administrative environment. This adaptation was key in making it easy for senior managers at different levels in the agency to understand the audits. During the audits, we noted that senior managers did not have any problem relating their work to our norm. The norm includes agencies’ operational activities, such as strategies, with the requirements for each: ¬ Develop proposals: An innovation system, built on activities that are well managed and developed, which produces good investment proposals, including those for IT support2. ¬ Assess proposals: (1) Investment proposals include proposed development programmes (for example, for IT support) and (2) assessments based on an agency’s available IT resources (including a database). ¬ Select proposals for implementation: New proposals are related to earlier, ongoing and approved development programmes (so-called “investment portfolios”), so as to guarantee links to the (1) investment strategy and (2) evidence trail for tracking decisions. They are described below, together with some lessons to be learned. Audit area 1: Effective IT-Based Investment in Business Change – Focus on Agency senior managers In this area, we audited the IT governance of senior managers in five agencies heavily dependent on IT: the National Labour Market Administration, the National Land Survey, the National Road Administration, Statistics Sweden, and the Swedish Meteorological and Hydrological Institute. In particular, 1 2 30 we looked at IT governance in terms of the steps senior managers took to assure good investment in IT business change. Until June 30, 2003, there were two public audit offices in Sweden: Riksrevisionsverket (RRV) and Riksdagens revisorer (the Parliamentary Auditors). On July 1, 2003, these two offices were amalgamated to form Riksrevisionen (RiR). The RRV and the RiR have the same English name: Swedish National Audit Office (SNAO). An innovation system consists of a network of groups, organizations, people, and rules in which new processes and methods are created. ¬ Manage implementation: (1) Programmes are given realistic conditions for success, (2) project risks are assessed and managed, (3) standards are used consistently, and (3) completed projects are monitored. ¬ Knowledge management: Good use made of the experience acquired to continuously improve the investment process. ¬ Create and maintain the investment process: Sufficient oversight of the investment process, identifying strengths, weaknesses, and possibilities for improvement. For each audit area we used these methods: asked the senior managers to answer a questionnaire with self-evaluation questions, asked for relevant documents showing the agencies’ activities for each strategy in our audit norm, analysed the answers on the self-evaluation questionnaire and the norm-related documents, interviewed 15 to 25 staff, drafted an audit report and asked for agency comments, gathered agency representatives to a special seminar in which both the identified problems and possible solutions were discussed, and informed senior managers of our findings and recommendations. Audit Findings We found that the five agencies, despite their long experience with IT investment, had considerable shortcomings in the governance of IT investment (see IntoIT issue 18 Better managed investment in IT-based business development). These agencies lacked: ¬ sufficiently well-developed processes to elicit good ideas as to how IT can be effectively managed; ¬ periodic, systematic reviews of their investment processes, enabling them to identify where change is needed; ¬ adequate articulation of their investment strategies, making it difficult to justify and select among competing proposals; ¬ obtaining a clear and comprehensive understanding of an investment proposal; ¬ ¬ business management driven projects in combination with well-established methods and models for managing and undertaking investment project; and achieve the anticipated benefits of IT investments in an agency’s operations. Shortcomings in investment strategies created problems when translating the assessment of IT investment proposals into approved decisions. Because the investment proposals did not link well with the operational strategies, the risk increased that the proposals would not lead to the investments sought by each agency. In addition, investment decisions were not always based on clear descriptions of the proposal’s expected business benefits and implementation risks. Furthermore, proposals setting out the comparative costs, risks, and effects of alternative approaches to IT investment projects were not adequately dealt with, nor were proposals clearly linked to each other. These combined factors prevented decision-makers from obtaining a clear and comprehensive understanding of an investment proposal. Moreover, IT projects were inadequately integrated into (1) previously approved investment projects and (2) the IT systems – the environment – in which they were intended to operate or which they were intended to support. An IT investment alone rarely achieves the anticipated benefits in an agency’s operations. It is often necessary to change working methods, staff development and organisation. In addition, governance of the IT projects was carried out at too low a management level. This meant that the governance of individual business projects was more geared to reacting to problems that arose (reactive management) rather than to systematic risk assessment (proactive management). With systematic risk assessment, an environment is created and maintained in which risks are not allowed to develop into problems. Finally, well-established methods and models for managing and undertaking investment projects, such as those identified in the IT investment management model, were not used consistently. Experience and knowledge of different components of the investment process were not utilised in a systematic way, which all the agencies in our audits acknowledged to be an area for improvement. In addition, we found it difficult to (1) obtain an overview of the knowledge that exists and (2) gain access to the knowledge when needed. In particular, only one of the agencies had utilised lessons from past investment projects for new ones. Recommendations In general, all five agencies should improve each step in the IT investment process. In addition, the Government should exert better governance of government agencies that are concerned with IT investment. 3 32 Audit area 2: Developing Effective Web Sites and Good E-Services – Focus on the IT Governance of the Government and Agency senior managers In audit area 2, we audited the development of e-services, asking detailed questions concerning the development of effective Web sites and good e-services. As part of this audit area, in 2002-03, we initiated audit project A. Two risks were defined in a pre-study: (1) the digital divide and (2) poor usability of Web sites and other services, which were squeezed out by investment in e-services. In 2003, we initiated audit project B, a materiality and risk analysis of the government’s IT governance of the transition to e-government – that is, 24-hour, 7-day government agencies. We found eight main risk areas3: ¬ overall governance of government agencies’ work on e-government; ¬ agencies’ implementation of e-government; ¬ administration and operation of the infrastructure for different types of services; ¬ use of e-services; ¬ the effects of investments in e-government; ¬ the support for the work on e-government; ¬ the sources – what are they? – and purpose of the current fashion of investing in e-government; and ¬ technical advances as a foundation (that is, the development of components for Internet applications) for e-services. Audit Questions For project A: How effective are agency Web sites in meeting the needs and requirements of the individual user? For project B: How effective are the Government and government agencies in developing good e-services? Methods Used For project A, we used several methods: a Web questionnaire sent to 92 government bodies, in-depth interviews with immigrants and elderly people and a test of 92 Web sites using national and international accessibility standards and our own criteria for special categories of users. For project B, we investigated all levels of the government: the demands, requirements, e-policies and strategies from the Parliament and the Government. We performed interviews focusing on the interaction between the Government and agency senior managers concerning the direction of the development of e-government, and the agency Senior We have not analysed risks from the Swedish Parliament’s point of view, for example, risks related to democracy. Manager’s strategic analysis and actions based on direction of Government. We did 10 case studies, divided among government agencies and related government departments. These case studies included in-depth study of Web sites (for incoming e-mail, information quality, and initiatives for new e-services). Audit Findings For project A, we found that the agencies’ Web sites and the e-services offered there did not promote an efficient dialogue between users and agencies. In particular, the Web sites failed to meet certain accessibility requirements for the disabled, immigrants, and the elderly. For project B, we found that the governance of the Government for investing in good e-services, including the types of e-services to which the agencies should give priority, was limited. Instead, the Government chose to exert governance mainly through its own support agencies and by means of rules, which were inadequate. In addition, the Government’s reports to the Swedish Parliament contained no information about the effects of e-government, including e-services. We also found that government agencies had difficulty in developing good e-services because they lacked government support. As a result, e-services have not been developed; do not meet user requirements; and are at risk of citizens’ mistrust, given that the agencies, as well as the Government, can not guarantee security, especially for e-mail to the agencies. In addition, at the agencies, narrow reasoning was allowed to govern investment. Agencies had to finance such investment entirely from their own resources. This created poor incentives to build eservices in collaboration with other agencies. Finally, certain legislation made it difficult to achieve an effective use of e-mail and Web sites. We found e-mail – a basic service of e-government and the most important route for citizens wishing to contact their government – a particular problem. Citizens demand to be able to use e-mails as a means of formal communication, but agencies are not legally bound to answer e-mail or attend to e-mail enclosures. Recommendations The Government should improve interagency collaboration, which requires more elaborate governance of communication among agencies. The Government should also appreciably improve its control of agency modernisation efforts, including the establishment of clearer rules and guidelines, so as to enable e-government for government agencies’ handling of e-mail. Audit area 3: Effective Security for Information Assets and especially for e-Services – Focus on the IT Security Governance of the Government and Agency senior managers In audit area 3, we audited IT governance of e-services security. As part of this audit area, in 2005-06, we initiated audit project C. In particular, we looked at whether senior managers systematically used internationally accepted standards for information and IT security. In 2007, we initiated audit project D, an analysis of the Government’s governance of the public administration’s field of actions in the area of information and IT security. In audit project C, we audited senior managers’ governance of information and IT security. The information and IT security is concerned with: ¬ protecting information assets against manipulation and destruction; ¬ preserving information assets availability; ¬ preserving information assets confidentiality; and ¬ preserving an audit trail concerning information assets used. This security is especially important now that e-government is opening up agencies to threats from the outside world. For this reason, we carried out audits in 2005 and 2006 of IT security at 10 major government agencies with significant information assets. In the audits, we focused on senior managers and their governance of IT security. This means that we studied senior managers’ IT governance of security, including: ¬ control environment; ¬ risk analysis; ¬ control functions and individual security measures; ¬ information and training; and ¬ follow-up, evaluation, and further development and administration. In audit project D, we audited the Government’s governance of information and IT security within the public administration. The audit was carried out in the light of the problems that have emerged in the SNAO’s audits of ten public agencies’ performance of their responsibilities for information security (audit area C). Audit Questions For project C: Considering the prevailing standards for information security management systems, is the government agencies’ IT security governance effective? Given the audit question, there were two possible areas to be audited: (1) actual security and (2) senior managers’ IT governance of security. We chose to focus our audits on senior managers’ IT governance of security. For project D: Is the Government taking its responsibility for making requirements of and following up the work of their agencies (the public administration) with respect to security of information and IT, and for taking the initiative for measures aimed at improving the conditions for the work of the public administration within this area? Methods Used For project C, we used several audit techniques: (1) a Web questionnaire to get agencies’ opinions about their IT security; (2) a request for formal documents showing the agencies’ security activities at all organisation levels (we received 50 to 100 different documents from each agency); (3) follow-up concerning the documents; (4) study of the questionnaire answers and the documents; and (5) 10 to 15 interviews, focusing on senior managers (interview questions were based on a special questionnaire, related to the COSOstructure). Finally, we drafted an audit report, letting each agency comment on the draft and informing the senior managers about our findings and recommendations. We took as our starting point an international standard (ISO 17799), and added components from Swedish legislation, as well as international experience. We then transferred the requirements for IT security to a COSO perspective which means that we examined senior agency management’s internal control and monitoring of information assets and IT security. For project D, we used several methods: we analysed the findings from the 10 audit projects in order to ask the Government if the common pattern of problems among the 10 audits was known or not, we gathered information concerning our pattern of problems from four agencies being expert and used by Government in the area of information and IT security, we analysed the Government’s written statements in official documents to the Parliament concerning the status of information security and what actions the Government had promised to take, we performed in-depth interviews (based on questionnaires) in the Government focusing on the information gathering and organising of matters concerning information and IT security. We also made a special analysis of shortcomings in the legislation in the area. 33 Audit Findings In project C, we found that government agencies were not working effectively because important parts of the information security management systems were missing or defective: ¬ Control environment—organisation of security work, policies, and reporting Senior managers’ attitudes (1) were not always favourable towards security investments, (2) did not show a keen understanding of today’s threats, and (3) did not always formulate clear security objectives. ¬ Risk analysis: Often patchy, seldom comprehensive. Following the implementation of investments in security measures, senior managers often did not demand an overview of important and residual risks. Responsibility often unclear, and methods for analysis not selected and decided. ¬ Training for skills: Priority was given to technical measures rather than training. Education seldom systematic, including that for staff who need refresher knowledge about (1) their responsibilities and (2) how, if there are problems, troubleshooting should be carried out. ¬ Chain of command: Reporting upwards was not well organised. ¬ Cost: No one senior manager had a clear picture of the costs of IT security. ¬ Senior managers’ responsibilities: Inadequate follow-up on the implementation and operation of security measures that had been decided earlier. Finally, the information security management systems are not comprehensive—that is, responsibilities, reporting, and follow-up are not integrated. Important objective data, with which senior managers make decisions, was missing. This made it hard for senior managers to exert effective IT governance of security. Therefore, the potential for investment in IT security is not well exploited. The amount of resources invested and the costs were most often not even known! 34 In project D, we stated that the problems on agency level described above were serious and that they imply a risk of significant negative consequences for government commitments such as electronic government and national emergency management. In the light of the above, the SNAO considers that the Government’s control of information security is of great importance. The SNAO’s overall assessment is that the Government has not followed up to ensure that the internal management and control of information security in the public administration is satisfactory. The Government has not taken sufficient initiative to improve the conditions for the administration’s work on information security. The SNAO has established that the Government has taken measures with respect to the technical conditions for agencies’ information security work, such as e-signatures, e-identification, secure Internet, etc. On the other hand, no measures have at the time of the audit been taken to support the agencies’ internal management and control of information security. The SNAO takes the view that an overhaul of the regulations is urgently needed, particularly against the background of the investment in e-government. The Government has not given the expert agencies a sufficiently explicit mandate, which has meant that they have had difficulties in giving the Government a complete picture of the information security problems at the agencies. An explicit mandate is also needed in order for the expert agencies to provide appropriate regulations detailing the Government’s requirements for the agencies’ work on information security. The audit shows that over the past ten years the Government has been broadly aware of certain management problems in the sphere of information security, but the picture has been unclear with respect to central government agencies and the Government has been unable to present any complete picture of the problems affecting the public administration. According to the SNAO, the Government’s organisation of the work done by the Government Offices on information security issues and the management of the expert agencies is together insufficient to handle the agencies’ problems with their information security. Recommendations For project C: Senior managers’ control in the field of IT security should be strengthened. This could be done using the standard SS-ISO/IEC 27001/17799 Information Security Management. One key activity is the risk analysis. This activity needs to be strengthened since it is the base for information security measures. For project D: The Government should focus more clearly on information security issues. Give the expert agencies an explicit mandate to follow up and report on the agencies’ work on information security. Give the agencies better conditions - set more explicit requirements for information security work. Lessons Learned As a result of the Government’s investment in electronic government, growing numbers of agency services are becoming available on the Internet, agencies are joining together to create co-ordinated e-services and there is a general increase in IT-based development work. In order for this reform of the public administration to succeed, citizens and businesses must have confidence in the e-services provided on the Internet. There is a risk of a lessening of confidence in the agencies’ e-services if the information cannot be protected. It may be a case of unauthorised persons gaining access to sensitive information or changing data or in some other way acting so that the services cannot be used. If that happens, there is a considerable risk of the entire investment in e-government being jeopardised. In the transition to e-government, in our opinion, there is an urgent need for stronger IT governance at both the levels of the Government and senior managers. Only such governance can ensure that good, secure IT services will be conceived, developed, and implemented, as well as meet all significant requirements for IT security. Since the audit projects been finalised in spring 2007 we have made some follow-ups. At the agency level we noticed some improvements of IT governance of information security in form of plan of actions, reviewing important documents, implementing information security standard and educating the staff. During autumn 2007 an expert agency published regulations stating that government agencies should implement an information security management system. At the Government level a plan of action to improve e-government recently (February 2008) has been taken. In this plan of action the need for stronger IT Governance is stated to ensure that good, secure IT service will be conceived. Several actions will be performed 2008 – 2009 in order to fulfil the Government’s goals. | References 1. SNAO. IT i verksamhetsutvecklingen: RRV 2002:30 2. SNAO. Webben 1: 2003. 3. SNAO. Vem styr den elektroniska förvaltningen: 2004:19. 4. SNAO. Project Auditing Information Security (ten different audit reports): 2005– 2006. 5. SNAO. Government control of information security work within the public administration: 2007:10 6. Undall, Bjorn, and Bengt E W Andersson. ”Better managed investment in IT-based business development,” IntoIT, no. 18 (June 2003). Bengt E. W. Andersson Bjorn Undall Bengt E W Andersson specialises in auditing the use of IT and information exchange between Public Administration bodies. Within the office he has also been involved in quality assurance and IT support. He holds a Licentiate of Philosophy in Information Systems. Björn Undall’s main audit responsibility is the effective use of IT in Public Administration. Recently he has specialised in auditing Information Security issues. He holds an MBA from the University of Lund, and has (alas!) unfinished doctoral studies. 35 Dan AUSTRIA S OVENI SL O A SLOVENIA CROA OATI A A CROATIA SLOVENIA An English summary of this report will be published on the EUROSAI IT Working Group members website, but readers can also contact the Court of Audit on [email protected] for a copy. Audit of IT system of the Tax Administration of the Republic of Slovenia Reasons for the introduction of the audit The Tax Administration of the Republic of Slovenia (TARS) in common with other modern Tax and Revenue Administrations heavily relies on IT support. The Court of Audit of the Republic of Slovenia (CoA) has previously audited TARS and on both occasions made same request for action, which has not yet been fulfilled. Another good reason was that TARS new leadership indicated willingness to be audited externally. Audit approach Our audit approach was divided into two main parts. The efficiency part consisted mainly of an Assessment of efficiency of TARS IT systems according to version 4 of CobiT. On the efficiency part, the CoA has also performed an assessment of the quality of the information stored in three of TARS most important IT subsystems (1 Eppler model). We have tried to evaluate mainly user experience variables such as speed, availability, usability and so forth. The second part – Regularity of TARS IT system – was quite narrow and only consisted of compliance and error checking. 36 1 The findings Our auditors have, together with auditees staff, performed an evaluation of all 34 IT processes across four domains. The target for average grade of all 34 processes that we agreed with the auditee was to be three. This desired level was missed by 0.7 with only two processes reaching a score above 3 and additional five with a grade 3. CoA has made several recommendations for the most critical processes. The assessment of the quality of the information in three most important applications (individual and businesses tax, VAT system, Taxation register) was less harsh but also in that area CoA agreed several less formal recommendations with the auditee. The absence of central and integral bookkeeping evidence, significant number of errors in Income tax calculations as well as absence of controls for its detection and correction were the reasons for a negative opinion on the regularity part of the audit. Development after the publication of the report Our report has gained significant public attention and was quite favourably accepted by the auditee as well as by the Public Accounts Committee of the Slovenian Parliament. The response report issued by auditee was encouraging. TARS has introduced significant changes in its operations, their budget and plans were amended and public procurement process for new IT system is already in progress. Eppler Martin J.: Managing Information Quality, Springer-Verlag Berlin, Heideberg, 2003 Conclusion The Court of Audit of the Republic of Slovenia intends to continue this type of measuring of performance of major public IT systems. Our goal is to be able to benchmark different auditees and to be able to show to the public and to the parliament how good is the service that our publicly financed IT systems are providing. With this in mind, we are striving to do our part in achieving our mission goal – Watching over Public Money. For more information please visit our website: http://www.rs-rs.si. Some material is also available in English at http://www. rs-rs.si/rsrs/rsrseng.nsf. | In accordance with the Slovenian Constitution the Court of Audit of the Republic of Slovenia is the highest body for supervising state accounts, the state budget and all public spending in Slovenia. The Constitution further provides that the Court of Audit is independent in the performance of its duties and bound by the Constitution and law. The Court of Audit Act also defines that the acts with which Court of Audit exercises its powers of audit cannot be challenged before the courts or other state bodies. 37 North S Amsterdam SWE ETH. Copenhagen Gulf of Bothnia ERMA ERMANY Stockholm hol ollm Berlin D OLAND Baltic Sea Tallinn Tal Ta l Rigaa R ingrad Kaliningrad aliningr LITH ANIA LITHU LITHUANIA A Vilniuss Minsk BELARUS Smolensk Smo molens mo nsk NE UKRAINE Kiev OMANI A A uchares charestt Helsinki EST. St. Petersb g LA LAT. AT rsaw M Murm FINLAND Pskov P skov sk Novgorod Lake Onega ega Shall be blessed? Arkhang Konosha osh Tver' Vologda Yarosla aY ros ' roslavl Moscow Mosco ow Kostroma Bry Br B Brya ryans y k Kaluga Ive Ivenovo ven ve T laa Tu Vladimi V l im r Orel Nizhn Nizhniyyaazan' R N LLip ip ies k Kursk ur K rkiv Kharkiv TTambo b Kotlas Kirov LITHUANIA Blessed IS Audit in Valstybės kontrolė, the National Audit Office of Lithuania “Hey you, you’re a child in my head You haven’t walked yet Your first words have yet to be said But I swear you’ll be blessed” Recording facts or events, especially when they are recent, is an unrewarding task. Firstly, we unconsciously try to determine that something important happened much earlier than it actually did. Secondly, we over-estimate those important facts or events which may be witnessed by others. That’s why such stories often reach prehistoric times, enhancing today’s deeds with a patina of antiquity, and awarding us the status of observers, sometimes even the status of actors of such events. And more – it’s very difficult to play the role of objective bystander when you are stirred up by the events which are sometimes, somehow related to you. by Elton John & Bernie Taupin Therefore – if no one says otherwise – 1997 shall be remembered as the start year of information systems audit at the National Audit Office of Lithuania. In any case, this was the year when we first uttered the words “informacinių sistemų auditas”. We did not know then what we wanted, but we knew that “we want”. The first VFM report (value-for-money audit as a separate audit area was recognised by the National Audit Office of Lithuania only in 2001) was titled “Regarding results of assessment of activities of establishing and development information systems in terms of economy, efficiency, and effectiveness”. The report recommended: ¬ better coordination between IT strategic plans of ministries and agencies with the strategic plan of information society development for Lithuania; ¬ better coordination and control of IT projects and initiatives, and; ¬ improvement of data exchange between state institutions. we want Audit of Information Technology. Someone should be the first to say those words which are a lovely combination to listen to, to say nothing of their meaning. There is a possibility (or a privilege?) to control (or to be responsible for) something which is important and meaningful. Looking for the origins, one may recall the year of 1997 when the INTOSAI information systems audit material had been translated into Lithuanian. Today we can no longer find anyone at the National Audit Office of Lithuania who can witness why and how this material appeared, and why it was translated into Lithuanian; but we believe that 1997 marked the beginning of information systems audit. Reasons, however, are much more instinctive rather than consciously recognised. 38 2001 was probably the year when we already knew what we wanted but did not know how to achieve it. Luckily (although someone has said that luck is no more than a result of your own efforts…) this year heralded a slow but targeted and sustainable enforcement of IS audit function. We must pay tribute to those who were our patient but strict teachers. In 2001 and 2002, a joint project with the Swedish International Development Cooperation Agency (SIDA) allowed us to organise two IT audit seminars at the National Audit Office of Lithuania, led by specialists from the Swedish Riksrevisionen (the Swedish National Audit Office). Figure 1: Types of IS audit Information Systems Audit Evaluation of Internal Control Evaluation in terms of 3Es existing standards has become obvious. Such a need was not only an external, but also an internal factor, conditioned by growth of complex information systems in the public sector and – subsequently – by an increase of finance for such systems. The need to design one’s own IS audit methodology and to institutionalise the IS audit function has become stronger. we can General Controls Application Controls System development The years of 2002-2005 were also a successful learning time. This period saw the First and the Second PHARE projects, when our experience was shared with the National Audit Office of the United Kingdom, and Danish Rigsrevisionen (the National Audit Office of Denmark). And of course, we benefited from training at the International Centre for Information Systems and Audit offered by the Supreme Audit Institution of India. Even minor efforts, provided they are persistent and targeted, sooner or later will bring the desired result. One of the wins worth acknowledging is that the first auditor of the National Audit Office of Lithuania has become CISA certified. The first such in the Lithuanian public sector. Sometimes small rivers, being close each to the other, but separated by hills, have to make a long journey before they come together. In the same way, the functions of information technology governance and information systems audit have risen from IS Performance Audit different springs. Despite bringing their competencies separately, they, against all the odds, inevitably approached each other. From our start in 2002, the functions of information technology governance and information systems audit were separate. But, over time, they grew towards each other. No-one can say if the CobiT methodologies (or good practices) for IT governance and audit were firstly applied to IT governance or IS audit. The EUROSAI Information Technology Working Group project “Information technology self-assessment for supreme audit institutions” started in autumn of 2002 and the first IT selfassessment seminar happened on 13-17 October 2003, moderated by representatives of the Court of Audit of the Netherlands. This was an important event both for information technology governance and for information systems audit. Lithuania joined the European Union in 2004, and the need to carry out specialised information system audits according the In February 2006 the IS audit function became part of the newly established Department of Information Technology Management and Audit, and in October 2007 the function was entrusted to the Division of Information Systems Audit, within the same department. This is a compact unit of a head and four state auditors, a good place to grow together and to become stronger, and a good way to help a lot of financial auditors to become more competent in auditing the general controls of straightforward information systems. In April 2006, the Methodical Recommendations for Information Systems Audit, based on INTOSAI Auditing Standards, and European Implementing Guidelines for the INTOSAI Auditing Standards (Guideline No. 22) were approved. Methodological Recommendations defines the place of IS audit, as well as its types, relation with financial and value-formoney audit, scope and methods. Methodical Recommendations is an important document, therefore we will focus on some of its basic principles. Those who are interested can find the document on our web site at http://www.vkontrole.lt/en/docs/ IS_Audit_Methodical_Recommendations_ EN.pdf. We hope this material will be useful. 39 Methodical Recommendations gives the following definition of Information Systems Audit: ¬ Audit of Information System general controls ¬ Audit of application controls ¬ Audit of Information System development controls ¬ Distribution of tasks between different levels of auditors are as follows: ¬ IS audits performed by generalist auditors are limited to medium complexity evaluation of IS general control and accounting programmes (e.g., Navision Financials, LABBIS etc.); ¬ IS auditors perform audits of general control of complex IS (e.g., IS of the State Social Insurance Fund Board of the Republic of Lithuania, Customs‘ IS etc.), IS development audits, and IS performance audits; ¬ IS/IT specialists provide specialised guidance on particular issues. Information System performance audit. The objectives of the different IS audit types are as follows: ¬ Audit of IS general controls. Evaluate internal control which covers all information systems of an organisation. ¬ Audit of application controls. Evaluate a control related to data input, processing, protection, and obtaining in the specific applications (e.g., Navision Financials or LABBIS). ¬ Audit of IS development controls. Evaluate management and control of IS development from conception to live running; covering IS change management; ¬ Objective of IS performance audit. Evaluate issues related to IS in terms of efficiency, economy, and effectiveness. In terms of IS audit, INTOSAI distinguishes three levels of auditors (implementation of these levels in the National Audit Office of Lithuania is presented in Figure 2.): ¬ Public auditors conducting financial and performance audits (hereinafter – generalist auditors), ¬ IS auditors, ¬ IS/IT specialists. During financial or performance audits generalist auditors may ask for help from IS auditors or IS/IT specialists. In such cases the Audit Department Director (Deputy Director) applies to the Head of the structural unit of the NAOL which performs IS audits. If necessary, an external IT/IS specialist can be brought in. Having performed IS audits, generalist auditors present their evaluation of IS general controls to the structural unit of the NAOL which performs IS audits. Two illustrious value-for-money audits were carried out in 2006 and 2007, aimed at IT governance in governmental (supra-ministerial) institutions which made many recommendations for the government to assure proper governance of the IT function. Among them, recommendations on improvement of management structures of e-government projects as well as on their comprehensive quality control in terms of efficiency, economy, and effectiveness. We are active participants in the project “Information technology audit function self-assessment for supreme audit institutions” and the first pilot seminar in Vilnius on May 22-23, 2007, launched by the EUROSAI Information Technology Working Group project. A good basis for future action, “we shall do” indeed! | we shall The existence of Methodical Recommendations, and the distribution of tasks between IS auditors and generalist auditors have allowed the last-mentioned to perform 76 general control evaluations of simple information systems in 2006. At the same time, IS auditors carried out six general control evaluations of complex information systems, a good distribution of tasks and a good use of IS auditors’ potential. Figure 2: Division of functions when performing IS audit IT/IS Specialist IS Auditor Specialists from internal IT Department Helps to transfer data from the IS of audited entity to computerised audit tools External IS/IT Specialists 40 Generalist Auditor Financial auditors use computerised audit tools, carry out risk evaluation in non-complicated IS, Evaluates general controls having encountered of information system problems relating to clients Helps to perform audits of IS, consult IS auditors for application software for financial more detailed analysis and performance auditors Performance auditors use Participates in evaluating computerised audit tools, of IS from the point of view participate in analysing of economy, effectiveness correctness, reliability and and efficiency comprehensiveness of Prepares IS methodologies management information and provides training and evaluate IS from the Provides information to point of view of economy, IT Department about effectiveness and efficiency good IT governance / management practice Dainius Jakimavičius Dainius Jakimavičius graduated from Vilnius University in 1983. He became a Doctor of Mathematics in 1993. He has worked in the Lithuanian National Audit Office since 2001. He has been successively Head of Information Technology Division (2001-2002), Director of Information Management Department (2002-2004), Director of Information Technology Department (2004-2006) and currently Director of Information Technology Management and Audit Department. 41 mu Juzno Sac a s O C E A N sk S Sapporo Sea of Japan n S Sendai (East Sea) n H NORTH A KOREA yo Tokyo JAPAN Pyongyang Fu eoul SOUTH KOREA Yellow Sea SShanghai st China JAPAN Auditees The auditees were: Cabinet; Cabinet Office; Ministry of Internal Affairs and Communications; Ministry of Justice; Ministry of Foreign Affairs; Ministry of Finance; Ministry of Education, Culture, Sports, Science and Technology; Ministry of Health, Labour and Welfare; Ministry of Agriculture, Forestry and Fisheries; Ministry of Economy, Trade and Industry; Ministry of Land, Infrastructure and Transport; Ministry of the Environment; the Diet; Courts; and the Board of Audit of Japan r ce n Ca of c i op Tr Audit of Computer Systems used by the Japanese Government Topics Covered 1. Outsourcing contracts concluded by the Cabinet Office and Ministries with system integrators (SI) including NTT Data Corporation. 2. Competitiveness and economy of maintenance and operation contracts. 3. Use of major systems. 4. Management of information security. 5. Present situation of the systems (including legacy systems) for which operation and system optimisation plans are to be made, based on the Programme for Building e-Government and the measures being implemented towards the optimisation. 6. Verification of the final accounts in consideration of the above. Results of the Audit Outsourcing contracts concluded by the Cabinet Office and Ministries with System Integrators including NTT Data Corporation a. Outline of information systemrelated contracts concluded by the national government The Board of Audit of Japan analysed the national government’s information system-related payment in the fiscal year 2004. There were 6,475 contracts and 477.3 billion yen concerning 77 operations and systems covered by the optimisation plans in the administrative agencies and the Diet, Courts, and the Board of Audit of Japan itself, for which the payment amount exceeded 1 million yen. b. Contracting parties As for the payment to the contracting parties of the 6,475 contracts, the payment to NTT Data Corporation was the largest, amounting to 173 billion yen and accounting 42 for 36.2% of the total. The payment to the top five contractors accounted for 65.4% of the total payment amount. c. Tendering procedures Of the 6,475 contracts, the tendering procedures for 2,873 contracts for each of which 3 million or more was paid (amounting to 473.2 billion yen in total) are that 80.8% of the contracts and 96.3% of the total payment were single tendered. Most of the national government’s information system-related contracts are awarded using single tendering procedures. Competitiveness and economy of the maintenance and management contracts Of the 2,873 contracts worth three million yen or more, the Board of Audit of Japan examined the competitiveness and economic efficiency of 492 maintenance and management contracts (worth 36.6 billion yen) concluded by the internal departments of the Ministries and Agencies. a. Competitiveness for maintenance and management contracts Of the 492 contracts, those awarded by competitive tendering procedures accounted for 8.1% by number and 3.9% by value, while those awarded by single tendering procedures accounted for 91.8% by number and 96.0% by value. Thus the percentage of contracts awarded by competitive tendering procedures is low. For 458 contracts (excluding unit-price contracts from the 492 contracts), the average ratios of the successful bid price to the planned price by type of tendering procedures were 81.9% of competitive tendering (94.3% of one bidder and 60.9% of multiple bidders) and 97.4% of single tendering. For 168 contracts (30 contracts of competitive tendering and 138 contracts of single tendering) selected from the 492 contracts, the following items of written specifications, which would be important to increase competitiveness in tendering, were more frequently described in competitive tendering than in single tendering: [1] work amount by work item and data on the occurrence of troubles; [2] scope of responsibility; and [3] system component items. b. Calculation of the planned prices for maintenance and management contracts From the 492 maintenance and management contracts, the Board of Audit of Japan first selected the contracts under common operational items ([1] system monitoring; [2] preventive maintenance; [3] responses to inquiries from the officials in charge of the system; [4] troubleshooting; and [5] system operation). Then the Board extracted 112 contracts. As for the calculation methods of the planned prices, 26 Ministries and Agencies that awarded these 112 contracts have no manuals based on which their planned prices shall be calculated. For the unit personnel cost (man-months cost in yen) of system engineers (SE) and others, as for the materials based on which the unit cost was determined for the 112 contracts, the documents most frequently referred to are the written estimates submitted by system integrators. Also, the unit personnel cost paid for the same operation based on the same reference material varies by contract. 43 As for the verification of the appropriateness of the SE-related price estimates in the planned prices, the appropriateness was not specially verified for 29 contracts (25.8%) among the 112 contracts and the appropriateness was verified for 59 contracts (52.6%) by service reports. (The appropriateness was verified for 14 of 59 contracts by calculation of the unit hours required for each operation.) Use of major systems a. Use of electronic application systems The Board of Audit of Japan conducted audits on the following electronic application systems managed and operated by the internal departments of the Ministries and Agencies: 16 general-purpose systems of 16 Ministries and Agencies; 25 special-purpose systems of 12 Ministries and Agencies. Thus the Board examined a total of 41 systems of 20 Ministries and Agencies, for which they had paid a total of 32.9 billion yen in fiscal years 2003 and 2004. As at the end of September 2005, electronic applications can be made for as many as 14,354 procedures. General-purpose systems were used for 12,899 procedures and special-purpose ones for 1,455. Of the procedures for which electronic applications are possible as of the end of fiscal 2004, the percentage of procedures for which the total number of applications (number of electronic applications + number of written applications) was zero account for 52.4% of the procedures to be processed by general-purpose systems and 23.7% of the procedures to be processed by specialpurpose systems. The percentage of electronic applications processed by the general-purpose was 0.02% and the percentage of electronic application processed by special-purpose systems was 5.57%. 0.94% is in the total number of applications in fiscal 2004. b. Use of electronic bidding systems The Board of Audit of Japan conducted audits on 12 electronic bidding systems managed and operated by the internal departments of 12 Ministries and Agencies. The payment made in relation to these systems in fiscal years 2003 and 2004 amounted to 4.6 billion yen. For the use of electronic bidding systems from fiscal year 2003 to fiscal year 2005 (to September 2005), the percentage of electronic bidding (number of contracts for which whole or part of applicants made a bid through the electronic biding systems divided by the number of contracts for which electronic applications could be made) remained relatively lower for goods and services than for construction. 44 Management system for information security a. Information security measures The Audit Board examined the information security measures implemented by the internal departments of Ministries and Agencies as of the end of October 2005. As for the procedures to enter and exit the server room, 10.8% of the departments “have no application procedures and do not keep the entry/exit records at all.” As for the monitoring of LAN devices by the use of network monitoring equipment, 6.8% of the departments do not conduct monitoring on any possible attacks to the LAN. For the backup of data stored in a variety of systems installed at the server room, there is no backup data or the backup data is stored only in the server room for nearly half of the data (45.7%). As for the accessibility to data folders of the divisions of the internal departments, they are “readable” at 5.7% of the departments. 3.4% of the departments have virus definition files updated by users manually. As for the use of privately owned PCs at offices, 59.3% of the departments “do not prohibit the use.” Regarding the connection of privately owned PCs to the LAN, many of the departments “prohibit the connection”, but at many of these departments, “users can connect their private PCs to the LAN if they configure some settings”. b. Management System for Information Security Of 25 Ministries and Agencies (those excluding the eternal organs under control of the Ministries and others from the Ministries and Agencies), 23 had formulated information security policies but only seven of them conducted risk assessment when they formulated their initial policies. Only 12 Ministries and Agencies had provisions for the establishment of audit teams, of which only four actually had those teams in place. As for written procedures to implement information security, three had not created any such manuals. One of the Ministries and Agencies had its audit team “check the compliance with the Policies,” four conducted “self-examination,” eight conducted “information security audits,” and 17 conducted “vulnerability assessments”. Present situation of the systems (including legacy systems) for which operation and system optimisation plans are to be made based on the Programme for Building e-Government and the measures being implemented towards the optimisation a. Present situation concerning the systems for which operation and system optimisation plans are to be made As of the end of June 2005, a total of 77 operations and systems in the Ministries and Agencies were included in the target of optimisation plans. Their management cost came to 465.3 billion yen in fiscal year 2004. Of the 77 operations and systems, 36 are legacy systems used at 16 Ministries and Agencies. For the management of these legacy systems, the Ministries and Agencies paid the contract amount of 345.8 billion yen in fiscal year 2004, which accounts for 74.3% of the amount paid related to the 77 operations and systems. Of data communications service contracts, the service fees reached or exceeded 100 million yen for nine contracts in fiscal year 2004 and a total of 157.6 billion yen was paid for these contracts. As of the end of fiscal 2004, the Remaining Debt concerning the nine data communication services contracts totalled 164.2 billion yen. b. Formulation of the operation and system optimisation plans For the 77 operations and systems for which optimisation plans were to be made by the end of fiscal year 2005, a total of 7.8 billion yen was paid as expense for commission. c. Cost reduction effect and problems described in the optimisation plans The Board of Audit of Japan estimated the development cost. Some operations and systems of the development cost will be recovered as a result of reduced management cost within four years, but the others will not be recovered within four years. d. Problems to solve to ensure the appropriateness of the optimisation plans One of the outcomes of the optimisation plans is DFDs (standard document formats are created based on data flow diagrams). There were as many as 831 inconsistencies found in the description of information flow in 47 of 66 optimisation plans. Some of common operations and systems still need to be coordinated. Verification of the final accounts based in consideration of the above (i) The Board of Audit of Japan checked the contracts for 77 operations and systems of the administrative agencies for which optimisation plans were to be made and which accounted for most part of their information system-related budget as well as the contracts worth of 1 million yen or more concluded by the Diet, courts and the Board of Audit of Japan itself. As a result, it was revealed that the information system-related payment made in fiscal year 2004 totalled as much as 477.3 billion yen. As for the contracting parties, payments to the top five companies accounted for 65.4% of the total. For tendering procedures, the percentage of competitive tendering was low. (ii) As for maintenance and management contracts, those awarded by single tendering procedures accounted for 91.8% in the number and 96.0% in the amount, demonstrating low competitiveness in tendering. The rate of the Successful Bid Price was higher for contracts awarded by single tendering than for those awarded by competitive tendering, in particular by multiple bidding. The planned unit personnel cost greatly varies by contract. Such verification and reflection of the results were not sufficiently conducted. (iii) As for the procedures for which electronic applications can be made through electronic application-related systems, there were no online or written applications filed in fiscal year 2004 for 52.4% and 23.7% of such procedures for general-purpose systems and specialpurpose systems, respectively. The total percentage of electronic applications was low as 0.94% for the general-purpose and special-purpose systems. (iv) For the information security measures implemented by the internal departments of the Ministries and Agencies as of the end of October 2005, there are the deficiency of data-and privately owned PC-related security measures. The management of information security is inadequate. | (v) The cost of managing 77 operations and systems for which optimisation plans would be formulated came to 465.3 billion yen in fiscal year 2004 which the cost of managing the 36 legacy systems amounted to 345.8 billion yen (74.3%). As for the cost reduction effect estimated in the optimisation plans, they need to be improved and reviewed to attend the effect. The Board of Audit of Japan found a lot of inconsistencies in the DFDs to be included in the optimisation plans. Opinions about the Audit Results The following measures should be implemented to ensure the economical, efficient, and effective implementation of the national government’s information system-related budget. 1. to improve the competitiveness and transparency of the contracts and to improve the rationality of the calculation of planned prices 2. to promote the use of the electronic application-related systems and thereby increasing the convenience of people 3. to enhance the security measures and to improve the management system for information security 4. to implement their operation and system optimisation plans while to ensure that the plans respond to the changes of the situation. The Board of Audit of Japan will keep its eyes on the movement of the government towards the implementation of the optimisation plans and conduct multifaceted audits on the government’s computer systems. 45 Ulaangom Amur Hailar Hulun Nur Ulaanbaatar Hovd Choybalsan Irtysh Qiqihar Bayanhongor Altay Jixi Harbin M O N G O L I A y Jilin Changchun Urumqi Vladivosto Dalandzadagad Hami Fuxin Baotou Huang Ha Yumen Zhangjiakou Datong Beijing Tangshan Hu Xian Shiquan Jinsha R. Hefei Yangtze Huangshi Nanchang Str . Shaoguan Xiamen Guangzhou Nanning Chittagong Sittwe MYANMAR VIETNAM LAOS Taipei y u k y Taiwan Shantou Kaohsiung Zhanjiang Hai Phong Gulf of Tonkin Chiang Mai o f Salween R. B a y m Vinh Vientiane Nong Khai S o u t h C h i n a S e a Laoag s l a n Kume u Shima d s Tokuno Shima kino Erabu Shima O kinawa O Miyako Retto Ishigaki Shima Iriomote Jima R Hong Kong Hanoi Mekong Amami OShim a I Kunming Mandalay S e a Wenzhou Fuzhou Dhaka Monywa C h i n a Pingxiang Khulna kata E a s t Shanghai osa Imphal Yueyang Kyus Wuxi Wuhu Huzhou Jiaxing Hangzhou Ningbo Jingdezhen Shang Rao Fo rm Salween R. es Pusan Changsha Guiyang Dukou Mekong maputra Brah Taegu Kita-kyushu Fukuoka tze ng Ya Wuhan Chongqing Jin sh a R. Zigong Qingdao Huainan Nanjing Mianyang Chengdu SOUTH KOREA Taejeon Incheon Yellow Sea Zaozhuang Kaifeng Xuzhou Huaibei Luoyang Thimphu Ha Taian Lanzhou Lhasa Seoul ang Jinan Golmud BHUTAN Dalian Shijiazhuang Handan Hu an g Ha Benxi NORTH Yingkou Feng Cheng KOREA Dandong Pyongyang Tianjin Taiyuan Xining Salween Jinzhou Hohhot Yinchuan C H I N A BANGLADESH Liaoyuan Fushun PHILIPPINES LIPPINESS THAILAND on CHINA In December 2007 the National Audit Office of China formulated a pre-audit investigation guideline for IT audit, as one part of the Chinese Government Auditing Standards System. P a i f i c O e a n CNAO’s Pre-audit Investigation Guideline for IT Audit The National Audit Office of the People’s Republic of China (CNAO) attaches great importance to the pre-audit investigations of IT audit projects. Prior to preparing audit implementation programmes, according to the nature and scale of the audit project, the audit team is required to arrange competent staff to know about the information of auditees. Therefore CNAO has formulated this Pre-audit Investigation Guideline for IT Audit. This Guideline can be used in pre-audit investigations where: ¬ The auditee has computerised its accounting or other main business systems; ¬ The audit team are carrying out an Information Systems, E-Governance or IT performance audit. The CNAO requires auditors to pay attention to the substantial changes brought to the audit institutions and the auditees by the application of information technologies. So the target of the pre-audit investigations on IT Audit is to make the audit implementation programs prepared by the audit teams and audit institutions meet the needs of audit in an IT environment. According to the Guideline, auditors involved in the pre-audit investigations should have appropriate IT knowledge and skills. If necessary, professional IT staff from CNAO’s IT Centre or external IT specialists could be invited to join the audit team. Pre-audit investigations can be implemented through consultation, group interview, questionnaires and surveys, information/data inquiry, on-the-spot inspection and visiting related organisations. 46 Through the pre-audit investigations, auditors should obtain basic information as follows: Firstly, the information systems used by auditees, including: the method and time of acquisition, operating system, database management system, application software versions, hardware configuration, data processing flow, interaction with other information systems, data output type and format, system controls and security policies. Tests could be carried out in the Auditee’s information system during the pre-audit investigation, only when the normal operation of the target information system is ensured. Secondly, Auditee’s electronic data, including: data storage medium; data volume measured by gigabyte (GB); the compliance level of output data to the Chinese National Standard, whether the data could be collected successfully by audit software such as Auditor Office (AO); the capability of auditees to support the auditors’ data-collecting processes; the preliminary check for the authenticity and applicability of the data during the pre-audit investigation. Thirdly, the dependence of auditees’ business flow on information technologies, including the degree of impact on the continual operation of auditees; the popularity of information systems. Auditors can review the dependence indicators by sampling during the pre-audit investigation. Fourthly, IS management and management styles, including: the legal requirements for the IS in use; the position of the IT Centre in the organisation chart; segregation of duties between IS managers and users; the setting of major control points and posts. Auditors can review the management structures by sampling during pre-audit investigation. Fifthly, the environment under which the IT audit is carried out, including: the facilities and network environment provided by auditees, the equipment and facilities that audit teams should prepare; the software supplied by auditees, the software to be prepared by the audit teams; assessment of the security impact to both auditors and auditees under the IT environment of auditees. The process of pre-audit investigations and information collected should inform: ¬ Audit objectives; ¬ Audit contents and priorities; ¬ Audit items, which could have significant influence on audit objectives; ¬ Significance level and audit risks; ¬ Organisational manners and working methods under IT environment; ¬ Computer equipment and environment necessary for audit and their solutions; ¬ The number and skills of IT professional staff needed in the audit team; ¬ Estimated audit working time span and budget. If, based on the preliminary result of pre-audit investigation, the audit team believes auditee’s information system has weakness and may significantly influence the authenticity and integrity of the electronic data, the team can recommend that an information system review be added to the audit implementation programmes. | Wang Zhiyu, Director General, IT Centre of CNAO Wang graduated from Zhengzhou University of China and was awarded a Bachelor degree in Economics in 1981. He was appointed as the Director General of CNAO’s IT Centre in 1999. As a CIO, at present he is responsible for the implementation of Golden Auditing Project. Because of his excellent work, he was awarded the Prize of Outstanding Contributor for Promoting IT Application in China in 2004. 47 The INTOSAI information technology journal it © National Audit Office 2008 | Design and production by NAO Marketing & Communications Centre | DG Ref: 8266RD | Printed by Heronsgate Printed on Greencoat paper. Greencoat is produced using 80% recycled fibre and 20% virgin TCF pulp from sustainable forests. www.intosaiitaudit.org
© Copyright 2024