Territory Stories

February 2008 report to the Legislative Assembly



February 2008 report to the Legislative Assembly


Report to the Legislative Assembly; Reports; PublicationNT




Made available via the Publications (Legal Deposit) Act 2004 (NT).






Northern Territory. Auditor-General's Office -- Periodicals; Finance, Public -- Northern Territory -- Accounting -- Periodicals; Northern Territory -- Appropriations and expenditures -- Periodicals

Publisher name

Northern Territory Auditor-General's Office

Place of publication




Copyright owner

Check within Publication or with content Publisher.

Parent handle


Citation address


Page content

168 Auditor-General for the Northern Territory February 2008 Report Department of Health and Community Services cont The main reason for these perceptions appears to be due to a lack of visibility over the reasons for ITs challenges. The IT division, on the other hand, attribute these perceptions to limited understanding by the business units on the data they require and the purpose of the data warehouse (e.g. Business Intelligence tool) instead of ad hoc reporting. In some instances the business units have started to develop their own database reporting tools using excel and access databases. These in-house developments appear to be highly manual and may increase the inefficiency/inaccuracy of management reporting. In addition, in-house developments decrease the advantages of a single data source and standardised use of Business Objects for management reporting. The issues noted above have the following potential effects: Without a forum to discuss strategic objectives and changes in priorities there is an increased risk of: - inability by the business units to challenge the IT strategy or influence changes to the strategic direction of IT; and/or - key strategic IT projects that add value to the business not being identified or undertaken. Ineffective communication channels increases the lack of awareness as to the progress being made by IT. This can lead to misconceptions and foster a nonproductive working relationship between business units and IT. Inappropriate end user computing increases the risk of: - data inaccuracy, including due to the lack of security controls, inconsistent data definitions and counting rules, and design documentation associated with these developments; and - loss of knowledge in the event the developer leaves the agency.

Aboriginal and Torres Strait Islander people are advised that this website may contain the names, voices and images of people who have died, as well as other culturally sensitive content. Please be aware that some collection items may use outdated phrases or words which reflect the attitude of the creator at the time, and are now considered offensive.

We use temporary cookies on this site to provide functionality.
By continuing to use this site without changing your settings, you consent to our use of cookies.