An Garda Siochana Policing Plan, Systems Architecture, ICT

 Systems Architecture

An Garda Siochana Policing Plan, Systems Architecture, White Paper (1) by Vincent McKenna BSSc, PG Dip, MSc

See, Also:

Policing in the Cloud, An Garda Siochana, White Paper (2) by Vincent McKenna BSSc, PG Dip, MSc

Table of Contents

  1. 1.    Abstract
  2. 2.    Introduction
  3. 3.    Fig. 1 Strategic and Operational Objectives 2012
  4. 4.    Key themes/Strategic and Operational Objectives
  5. 5.    Fig. 2 Organisational Structure
  6. 6.    Culture of Change
  7. 7.    IT and Business Objectives
  8. 8.    Communication
  9. 9.    E-mail

10. Three key IT Operational Systems

11. Revenue Streams

12. Conclusions

13. Bibliography/References


This White Paper identifies the strategic and operational objectives of An Garda Siochana. It describes how IT systems, enable An Garda Siochana to meet these objectives. And it further describes specific IT systems with an overview of functionality, architecture used and highlights the objectives these IT systems support. The IT systems included are back office applications, front office applications and infrastructure. Continue reading

Software Project Management, Software Project Failure

Software Project Failure©


This White Paper discusses the influence of Software Project Failure on Project Management.

Keywords: Software Project Failure, Software Project Management


When we talk about Project Management in the post-WW11 epoch we are talking about a formal and codified method to achieve time, cash and scope tied undertakings (Morris, 1994/2011). Project Management in the pre-war epoch would have been focused mainly on construction and engineering style projects; however, in the 21st Century, Project Management, has become synonymous with Information Technology. The Project Management Institute states that, “Project management is the application of knowledge, skills, tools, and techniques to project activities to meet the project requirements” (Project Management Institute, 2008, p.6). This evolution of the project management genre is summed up in an article by John Favaro (2010) when he says: Continue reading

Data Protection and ICT Regulation


 “We operated mainly by persuasion. But we did not hesitate to use enforcement powers where there was evidence of rights being wilfully ignored”.(1)

Personal Data was traditionally thought of as paper files that were held in filing cabinets in businesses and Government offices relating to the personal information that they held about individual workers and citizens respectively, however, with the advent of new technologies people’s personal data is now flying through cyber space at unprecedented levels. Contrary to the general view that Data Protection is a new concept introduced to address security issues relating to the Internet, it was in Germany in 1970 that the first data protection laws were enacted, however it should be noted that data protection laws were not enacted for the mere protection of individual’s privacy in relation to their personal data, but rather to ensure that there were standard protocols in place to ensure that personal data could free-flow across the borders of Europe. Kelleher and Murray tell us that improved privacy standards are nothing more than a spin off from the European Communities desire to build an internal common market (Kelleher, D. Murray, K. 2007). However, Stewart Room states that, “The maintenance of free flows of personal data between countries is the second aim of data protection laws, with the first being the protection of privacy”.(2)
Continue reading