• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Process Errors Analysis. Corruption Vulnerability Identification

Student: Pozdnyakova Anastasiya

Supervisor: Julia Bilinkis (Stavenko)

Faculty: Faculty of Business Informatics

Educational Programme: Master

Year of Graduation: 2014

<p>Corruption vulnerability is the most discussed and researched topic of the last few years worldwide . In this research paper possible reasons (including psychological) of the high prevalence of corruption in government and commercial enterprises are analyzed as well as methods to identify and control corruption through information and communication technologies. In order to understand how information technology can help to control this problem, a new classification of corruption risks was developed, which divides this risks into two groups: normative and operational. On this basis we can distinguish different functionality which system have to have to monitor the appearance of corruption vulnerability in a process. This classification was developed based on data obtained after the logical analysis of the process of customs control. Identified risks have been considered from the point of view of strategic management, including strategies for their future management and development of a balanced scorecard for the customs authorities of the Russian Federation, which showed that at the moment Russian Customs has all chances for successful achievement of goals, including the anti-corruption policy. Analysis of global practices of information and communication technologies in the fight against corruption, presented in the last chapter of this thesis showed, that information technology serve as a means of anti-corruption campaigns worldwide. &nbsp;But despite the most successful results they can also increase the probability of vulnerabilities, if the security policy and responsibility are not detailed enough. Using the results of this final qualifying work we have the opportunity to develop a specification for the information system functionality to corruption risks control. &nbsp;&nbsp;</p>

Student Theses at HSE must be completed in accordance with the University Rules and regulations specified by each educational programme.

Summaries of all theses must be published and made freely available on the HSE website.

The full text of a thesis can be published in open access on the HSE website only if the authoring student (copyright holder) agrees, or, if the thesis was written by a team of students, if all the co-authors (copyright holders) agree. After a thesis is published on the HSE website, it obtains the status of an online publication.

Student theses are objects of copyright and their use is subject to limitations in accordance with the Russian Federation’s law on intellectual property.

In the event that a thesis is quoted or otherwise used, reference to the author’s name and the source of quotation is required.

Search all student theses