Author: U.s. Government Accountability Office
Publisher: Createspace Independent Publishing Platform
ISBN: 9781973922834
Category : Emigration and immigration
Languages : en
Pages : 128
Book Description
"Why GAO Did This Study Each year, USCIS processes millions of applications for persons seeking to study, work, visit, or live in the United States, and for persons seeking to become a U.S. citizen. In 2006, USCIS began the Transformation Program to enable electronic adjudication and case management tools that would allow users to apply and track their applications online. In 2012, to address performance concerns, USCIS changed its acquisition strategy to improve system development. In May 2015, GAO reported that USCIS expected the program to cost up to $3.1 billion and be fully operational by March 2019. This includes more than $475 million that was invested in the initial version of the program's key case management component, USCIS ELIS, which has since been decommissioned. This report evaluates the extent to which the program is using information technology program management leading practices. To perform this work, GAO identified agency policy and guidance and leading practices in, among other things, cost estimation, Agile software development, and systems integration and testing, and compared these with practices being used by the program.
Immigration Benefits System, U.s. Citizenship and Immigration Services Can Improve Program Management
Author: U.s. Government Accountability Office
Publisher: Createspace Independent Publishing Platform
ISBN: 9781973922834
Category : Emigration and immigration
Languages : en
Pages : 128
Book Description
"Why GAO Did This Study Each year, USCIS processes millions of applications for persons seeking to study, work, visit, or live in the United States, and for persons seeking to become a U.S. citizen. In 2006, USCIS began the Transformation Program to enable electronic adjudication and case management tools that would allow users to apply and track their applications online. In 2012, to address performance concerns, USCIS changed its acquisition strategy to improve system development. In May 2015, GAO reported that USCIS expected the program to cost up to $3.1 billion and be fully operational by March 2019. This includes more than $475 million that was invested in the initial version of the program's key case management component, USCIS ELIS, which has since been decommissioned. This report evaluates the extent to which the program is using information technology program management leading practices. To perform this work, GAO identified agency policy and guidance and leading practices in, among other things, cost estimation, Agile software development, and systems integration and testing, and compared these with practices being used by the program.
Publisher: Createspace Independent Publishing Platform
ISBN: 9781973922834
Category : Emigration and immigration
Languages : en
Pages : 128
Book Description
"Why GAO Did This Study Each year, USCIS processes millions of applications for persons seeking to study, work, visit, or live in the United States, and for persons seeking to become a U.S. citizen. In 2006, USCIS began the Transformation Program to enable electronic adjudication and case management tools that would allow users to apply and track their applications online. In 2012, to address performance concerns, USCIS changed its acquisition strategy to improve system development. In May 2015, GAO reported that USCIS expected the program to cost up to $3.1 billion and be fully operational by March 2019. This includes more than $475 million that was invested in the initial version of the program's key case management component, USCIS ELIS, which has since been decommissioned. This report evaluates the extent to which the program is using information technology program management leading practices. To perform this work, GAO identified agency policy and guidance and leading practices in, among other things, cost estimation, Agile software development, and systems integration and testing, and compared these with practices being used by the program.
Homeland Security: Recommendations to Improve Management of Key Border Security Program Need to be Implemented
Author: United States Government Accountability Office
Publisher: DIANE Publishing
ISBN: 9781422311714
Category :
Languages : en
Pages : 88
Book Description
Publisher: DIANE Publishing
ISBN: 9781422311714
Category :
Languages : en
Pages : 88
Book Description
Hosue Reports
Author:
Publisher: Government Printing Office
ISBN:
Category :
Languages : en
Pages : 1628
Book Description
Publisher: Government Printing Office
ISBN:
Category :
Languages : en
Pages : 1628
Book Description
Activities of the House Committee on Government Reform, One Hundred Ninth Congress, First and Second Sessions, 2005-2006
Author: United States. Congress. House. Committee on Government Reform
Publisher:
ISBN:
Category : Governmental investigations
Languages : en
Pages : 276
Book Description
Publisher:
ISBN:
Category : Governmental investigations
Languages : en
Pages : 276
Book Description
United States Congressional Serial Set, Serial No. 15066, House Reports Nos. 733-739
Author:
Publisher: Government Printing Office
ISBN:
Category :
Languages : en
Pages : 1208
Book Description
Publisher: Government Printing Office
ISBN:
Category :
Languages : en
Pages : 1208
Book Description
Oversight Plans for All House Committees
Author: United States. Congress. House. Committee on Government Reform
Publisher:
ISBN:
Category : Legislative oversight
Languages : en
Pages : 312
Book Description
Publisher:
ISBN:
Category : Legislative oversight
Languages : en
Pages : 312
Book Description
Activities of The House Committee on Government Reform, 109-1&2 Sessions..., December 29, 2006, 109-2 House Report 109-739, *
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 280
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 280
Book Description
Monthly Catalog of United States Government Publications
Author:
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 716
Book Description
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 716
Book Description
Monthly Catalogue, United States Public Documents
Author:
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 1508
Book Description
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 1508
Book Description
Protecting Individual Privacy in the Struggle Against Terrorists
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376
Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376
Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.