Standards for Internal Control in the Federal Government

Standards for Internal Control in the Federal Government

Author: United States Government Accountability Office

Publisher: Lulu.com

Published: 2019-03-24

Total Pages: 88

ISBN-13: 0359541828

DOWNLOAD EBOOK

Policymakers and program managers are continually seeking ways to improve accountability in achieving an entity's mission. A key factor in improving accountability in achieving an entity's mission is to implement an effective internal control system. An effective internal control system helps an entity adapt to shifting environments, evolving demands, changing risks, and new priorities. As programs change and entities strive to improve operational processes and implement new technology, management continually evaluates its internal control system so that it is effective and updated when necessary. Section 3512 (c) and (d) of Title 31 of the United States Code (commonly known as the Federal Managers' Financial Integrity Act (FMFIA)) requires the Comptroller General to issue standards for internal control in the federal government.


Congressional Oversight

Congressional Oversight

Author: Walter J. Oleszek

Publisher: DIANE Publishing

Published: 2011

Total Pages: 20

ISBN-13: 143793059X

DOWNLOAD EBOOK

This is a print on demand edition of a hard to find publication. A fundamental objective of congressional oversight (CO) is to hold exec. officials accountable for the implementation of delegated authority. This objective is especially important given the huge expansion of executive influence in the modern era. Clearly, given the role and scope of the fed. establishment, the importance of Congress¿s review function looms large in checking and monitoring the delegated authority that it grants to fed. departments and agencies. This report: (1) highlights several reasons for the expansion of the fed. gov¿t.; (2) discusses a few definitions of CO; (3) spotlights 3 purposes of oversight; (4) comments upon CO laws and rules; (5) reviews CO techniques; and (6) identifies incentives and disincentives to CO. Illus.


Health Professions Education

Health Professions Education

Author: Institute of Medicine

Publisher: National Academies Press

Published: 2003-07-01

Total Pages: 191

ISBN-13: 030913319X

DOWNLOAD EBOOK

The Institute of Medicine study Crossing the Quality Chasm (2001) recommended that an interdisciplinary summit be held to further reform of health professions education in order to enhance quality and patient safety. Health Professions Education: A Bridge to Quality is the follow up to that summit, held in June 2002, where 150 participants across disciplines and occupations developed ideas about how to integrate a core set of competencies into health professions education. These core competencies include patient-centered care, interdisciplinary teams, evidence-based practice, quality improvement, and informatics. This book recommends a mix of approaches to health education improvement, including those related to oversight processes, the training environment, research, public reporting, and leadership. Educators, administrators, and health professionals can use this book to help achieve an approach to education that better prepares clinicians to meet both the needs of patients and the requirements of a changing health care system.


Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Author: National Research Council

Publisher: National Academies Press

Published: 2009-11-27

Total Pages: 391

ISBN-13: 0309138507

DOWNLOAD EBOOK

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.


Registries for Evaluating Patient Outcomes

Registries for Evaluating Patient Outcomes

Author: Agency for Healthcare Research and Quality/AHRQ

Publisher: Government Printing Office

Published: 2014-04-01

Total Pages: 385

ISBN-13: 1587634333

DOWNLOAD EBOOK

This User’s Guide is intended to support the design, implementation, analysis, interpretation, and quality evaluation of registries created to increase understanding of patient outcomes. For the purposes of this guide, a patient registry is an organized system that uses observational study methods to collect uniform data (clinical and other) to evaluate specified outcomes for a population defined by a particular disease, condition, or exposure, and that serves one or more predetermined scientific, clinical, or policy purposes. A registry database is a file (or files) derived from the registry. Although registries can serve many purposes, this guide focuses on registries created for one or more of the following purposes: to describe the natural history of disease, to determine clinical effectiveness or cost-effectiveness of health care products and services, to measure or monitor safety and harm, and/or to measure quality of care. Registries are classified according to how their populations are defined. For example, product registries include patients who have been exposed to biopharmaceutical products or medical devices. Health services registries consist of patients who have had a common procedure, clinical encounter, or hospitalization. Disease or condition registries are defined by patients having the same diagnosis, such as cystic fibrosis or heart failure. The User’s Guide was created by researchers affiliated with AHRQ’s Effective Health Care Program, particularly those who participated in AHRQ’s DEcIDE (Developing Evidence to Inform Decisions About Effectiveness) program. Chapters were subject to multiple internal and external independent reviews.


Global Intelligence Oversight

Global Intelligence Oversight

Author: Zachary K. Goldman

Publisher: Oxford University Press

Published: 2016-04-26

Total Pages: 393

ISBN-13: 0190458089

DOWNLOAD EBOOK

In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.