SlideShare a Scribd company logo
Reducing Opportunities for Fraud in Aid Delivery
                                      Programs
The World
spends up to
$300 billion
each year on aid
& development
Reports indicate up
to15% can be lost due
    to fraud and
  misappropriation
     (that is almost $50 billion)
Almost every report on fraud
agrees that the problem is in
  the management system
Who reads and writes the data in
          the system
       Coordination
                       The deeper you
         Donors
                       drill down in
       Head Office     an aid delivery
      Country Office   supply chain,
        Operations
                       the greater the
                       number of
      Program Team
                       people that are
        Suppliers      involved in the
        Field Staff    processing of
       Contractors     information
       Beneficiaries
Information Management Systems
                      File Sharing Websites
The further up
the supply chain
you move, the                Internal
                            Networks
more
sophisticated the
                           Proprietary
Information               Management
Management                  Software
Systems (MIS)
typically is.
The relationship between Data Entry &
 the Information Management System
    Coordination                      File Sharing Websites

      Donors
    Head Office     The MIS                  Internal
                    sophistication          Networks
   Country Office   typically is
     Operations     inversely
                    proportional to        Proprietory
   Program Team     the number of         Management
                    people                  Software
     Suppliers
                    involved
     Field Staff

    Contractors
    Beneficiaries
Opportunities for Fraud exist
where the MIS Control is weakest
        Coordination                            File Sharing Websites

           Donors
        Head Office           Typically, the           Internal
                              majority of             Networks
       Country Office         fraud and
         Operations           theft incidents
                              occurs in this         Proprietary
       Program Team           area of the           Management
                              supply chain            Software
          Suppliers

         Field Staff

         Contractors
        Beneficiaries

  Data Read/Write Hierarchy             Information Management
                                        System
In general, fraud prevention is too little, too late
The Aidwork Platform will invert the
  Information Management System
                                         All transaction and
                                         program data will be
                                         directly entered into a
 Audit capacity         Reporting        secure web platform in
of process and                           real time using
      each                               authorized procurement
  transaction                            processes.
 recorded and
available in real                        Primary data entered by
                         Data
      time.                              each operator is not
                      Management
                                         able to be edited,
                                         omitted or altered
                                         without approval and a
                                         logged record of the
                    Primary Data Entry   change.
Sometimes one pays most for the
  things one gets for nothing.
The Major Components of a typical
            Aid Program
                                      Program Data

                          Overheads                   Finance                 Each
                                                                              Program
                                                                              Information
            Administration                                      Procurement
                                                                              Data
                                                                              Component
                                                                              has multiple
              Logistics                                           Contracts   sub-
Comms                                                                         components
Housing
                                                       Assets
Security                     Travel
                                                     Management
                                        Human
Transport                              Resources
Disaster recovery needs a rapid response
to spend hundreds of millions of dollars
Elements of a Disaster Response

                            No Supplier
                              History
               Large sums                 Short time
                of money                    frame



      Poor                                              Limited
     Systems                                           Resources




 Temporary                     Aid                        Opportunity
   Staff                    Program                        for fraud
Some Informal Management
        Systems in a Program
      HR          Logistic         Program         Contracts      Purchases

• Staff       • Comms           • Schedules      • Spec’s       • Suppliers
• CV’s        • Security        • Client Lists   • Adverts      • Adverts
• Timesheet   • Housing         • Health         • Bids         • Bids
• Salaries    • Transport       • Shelter        • Analysis     • Specs
• Holidays    • Stores          • Protection     • Contracts
• Recruit     • IT              • Gender         • Variations
• Adverts     • Fuel            • Food
              • Repairs         • Livelihoods
                                • Management




    Finance     Overheads            Admin           Travel         Assets

• Bank        • Insurances      • Bank           • Vendors      • Furniture
• Bills Due   • Subscriptions   • Stationary     • Airlines     • Cars
• Cash        • Legal           • Postage        • Schedules    • Computers
The Budget is at the Core of each
            Program
                              Program Data

                 Overheads                    Finance
                                                                      Each budget
                                                                      line item
                             Budget                                   directly
   Administration                                       Procurement
                             Line 1
                             Line 2
                                                                      relates to
                             Line 3                                   some aspect
                             Line 4
                             …                                        of the aid
                             …
     Logistics                                            Contracts   program.

                                               Assets
                    Travel
                                             Management
                                Human
                               Resources
Component data and MIS are typically
    independent of each other
                                                      MIS
                                       Program Data                                   Each Program
          MIS                                                         MIS
                     Overheads                          Finance                       function will
                                                                                      typically
                                   Budget                                       MIS   maintain its
       Administration
                                   Line 1
                                                                  Procurement
                                                                                      own local
                                   Line 2
 MIS
                                   Line 3                                             MIS, usually
                                   Line 4
                                   …
                                                                                      in the form of
         Logistics                 …                                Contracts         Microsoft
 MIS                                                                            MIS   spreadsheets
                                                                                      and data is
                                                         Assets
                        Travel
                                                       Management                     entered into
                                         Human
           MIS                          Resources                    MIS              report as last
                                 MIS                                                  resort.
Component data and MIS are typically
    independent of each other
                                                      MIS
                                       Program Data                                   Each Program
          MIS                                                         MIS
                     Overheads                          Finance                       function will
                                                                                      typically
                                   Budget                                       MIS   maintain its
       Administration
                                   Line 1
                                                                  Procurement
                                                                                      own local
                                   Line 2
 MIS
                                   Line 3                                             MIS, usually
                                   Line 4
                                   …
                                                                                      in the form of
         Logistics                 …                                Contracts         Microsoft
 MIS                                                                            MIS   spreadsheets
                                                                                      and data is
                                                         Assets
                        Travel
                                                       Management                     entered into
                                         Human
           MIS                          Resources                    MIS              report as last
                                 MIS                                                  resort.
Program Data                            The Aidwork
              Overheads                    Finance
                                                                   platform integrates
                                   MIS                             all the informal
                    MIS                     MIS
                                                                   management
                          Budget
Administration
                          Line 1
                                                     Procurement   systems in a single
                  MIS     Line 2
                          Line 3
                                           MIS                     web based data
                          Line 4                                   collection system.
                          …
  Logistics               …                            Contracts
                  MIS                      MIS
                                                                   All transactions are
                    MIS       MIS          MIS                     linked and recorded
                                            Assets
                 Travel
                                          Management
                             Human
                            Resources
Functional Steps in the Process
  1.      Create a new program
  2.      Draw modules from menu
  3.      Recruit staff from network and assign read/write access
  4.      Program is operational
                                                                                                             Program Field
                                                                                                                 Data

                                                                                                Overheads                     Finance
       HR          Logistic         Program          Contracts     Purchases

 • Staff       • Comms           • Schedules      • Spec’s       • Suppliers
 • CV’s        • Security        • Client Lists   • Adverts      • Adverts
 • Timesheet   • Housing         • Health         • Bids         • Bids
 • Salaries    • Transport       • Shelter        • Analysis     • Specs       Administration                                           Procurement
 • Holidays    • Stores          • Protection     • Contracts
 • Recruit     • IT              • Gender         • Variations                                              Program
 • Adverts     • Fuel            • Food
               • Repairs         • Livelihoods
                                 • Management

                                                                                 Logistics                                                Contracts


     Finance     Overheads            Admin            Travel        Assets

 • Bank        • Insurances      • Bank           • Vendors      • Furniture
 • Bills Due   • Subscriptions   • Stationary     • Airlines     • Cars                                                        Assets
                                                                                                 Travel
 • Cash        • Legal           • Postage        • Schedules    • Computers                                                 Management
                                                                                                               Human
                                                                                                              Resources




                             Module Menu
The social network links all data
contributors and recipients to a
single MIS system
                                                               Program Field
                                                                   Data

                                                   Overheads                    Finance
               Staff


     Coord.             Contract
                                     Administration                                       Procurement


               Social                                          Program
              network        Secure link
                                       Logistics                                           Contracts
      HQ                Supply


              Donors                                                             Assets
                                                      Travel
                                                                               Management
                                                                 Human
                                                                Resources
Fraud prevention needs more than just good intentions
It needs a purpose
    built system
The Aidwork Platform is being built
   on years of field development
experience in managing programs &
         combating fraud
Steve Hutcheson CEO
Recovery Development Group Sdn Bhd
27 Jalan Phuah Hin Leong
Georgetown, 10050 Pulau Pinang
Malaysia
+60 164909425
stevehutcheson@aidwork.net

More Related Content

What's hot

Brochure Juni
Brochure JuniBrochure Juni
Brochure Juni
Paul Mees
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
Capgemini
 
Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
Jeff Danielson
 
Latest news phoenix
Latest news phoenixLatest news phoenix
Latest news phoenix
Jeff Pearce
 
Smarter lending leads to Business Agility
Smarter lending leads to Business AgilitySmarter lending leads to Business Agility
Smarter lending leads to Business Agility
IBM WebSphereIndia
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
Andris Soroka
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
DFLABS SRL
 
Risk Management
Risk ManagementRisk Management
Exterro Fusion Enterprise Suite Product Overview
Exterro  Fusion  Enterprise  Suite  Product  OverviewExterro  Fusion  Enterprise  Suite  Product  Overview
Exterro Fusion Enterprise Suite Product Overview
Exterro
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Digicomp Academy AG
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
DFLABS SRL
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
HyTrust
 
Oracle erf overview v4
Oracle erf overview v4Oracle erf overview v4
Oracle erf overview v4
David Clement
 
Your Firm In The Cloud
Your Firm In The CloudYour Firm In The Cloud
Your Firm In The Cloud
BCS ProSoft
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
Khazret Sapenov
 
Systar - US ACH Credit Risk Decisioning
Systar - US ACH Credit Risk DecisioningSystar - US ACH Credit Risk Decisioning
Systar - US ACH Credit Risk Decisioning
Vivastream
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Brief
wdjohnson1
 
Financial management
Financial managementFinancial management
Financial management
Ashish Patel
 

What's hot (18)

Brochure Juni
Brochure JuniBrochure Juni
Brochure Juni
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
 
Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
 
Latest news phoenix
Latest news phoenixLatest news phoenix
Latest news phoenix
 
Smarter lending leads to Business Agility
Smarter lending leads to Business AgilitySmarter lending leads to Business Agility
Smarter lending leads to Business Agility
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Exterro Fusion Enterprise Suite Product Overview
Exterro  Fusion  Enterprise  Suite  Product  OverviewExterro  Fusion  Enterprise  Suite  Product  Overview
Exterro Fusion Enterprise Suite Product Overview
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Oracle erf overview v4
Oracle erf overview v4Oracle erf overview v4
Oracle erf overview v4
 
Your Firm In The Cloud
Your Firm In The CloudYour Firm In The Cloud
Your Firm In The Cloud
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Systar - US ACH Credit Risk Decisioning
Systar - US ACH Credit Risk DecisioningSystar - US ACH Credit Risk Decisioning
Systar - US ACH Credit Risk Decisioning
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Brief
 
Financial management
Financial managementFinancial management
Financial management
 

Viewers also liked

Classroom expectations
Classroom expectationsClassroom expectations
Classroom expectations
Ratna Vvss
 
Suuri kokouskysely - elokuu 2012
Suuri kokouskysely - elokuu 2012Suuri kokouskysely - elokuu 2012
Suuri kokouskysely - elokuu 2012
Aronet-Esitysyhtiö Oy
 
Presentation1 power point
Presentation1 power pointPresentation1 power point
Presentation1 power point
ashliemanzi2010
 
Jugas scholarships 2012
Jugas scholarships 2012Jugas scholarships 2012
Jugas scholarships 2012
Jenn En Yee
 
Ilyse.angst presentation
Ilyse.angst presentationIlyse.angst presentation
Ilyse.angst presentation
inangst
 
Sync mobile 9 (what is happening)
Sync mobile 9 (what is happening)Sync mobile 9 (what is happening)
Sync mobile 9 (what is happening)
Odecee
 
Simplification of switching functions
Simplification of switching functionsSimplification of switching functions
Simplification of switching functions
saanavi
 
Ilyse.angst presentation
Ilyse.angst presentationIlyse.angst presentation
Ilyse.angst presentationinangst
 

Viewers also liked (8)

Classroom expectations
Classroom expectationsClassroom expectations
Classroom expectations
 
Suuri kokouskysely - elokuu 2012
Suuri kokouskysely - elokuu 2012Suuri kokouskysely - elokuu 2012
Suuri kokouskysely - elokuu 2012
 
Presentation1 power point
Presentation1 power pointPresentation1 power point
Presentation1 power point
 
Jugas scholarships 2012
Jugas scholarships 2012Jugas scholarships 2012
Jugas scholarships 2012
 
Ilyse.angst presentation
Ilyse.angst presentationIlyse.angst presentation
Ilyse.angst presentation
 
Sync mobile 9 (what is happening)
Sync mobile 9 (what is happening)Sync mobile 9 (what is happening)
Sync mobile 9 (what is happening)
 
Simplification of switching functions
Simplification of switching functionsSimplification of switching functions
Simplification of switching functions
 
Ilyse.angst presentation
Ilyse.angst presentationIlyse.angst presentation
Ilyse.angst presentation
 

Similar to The aidwork platform

IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureData
IBM Sverige
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking
 
Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney Davis
Cydney Davis
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
sonnysonare
 
IBM Web Sphere Portal References Government March 2009
IBM Web Sphere Portal References   Government   March 2009IBM Web Sphere Portal References   Government   March 2009
IBM Web Sphere Portal References Government March 2009
Dvir Reznik
 
Complexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through IntegrationComplexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through Integration
jgatrell
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
finance40
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
Plante & Moran
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging times
Global Business Events
 
European Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule StandardsEuropean Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule Standards
Dan Selman
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
Bimbashree K.G
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
Lumension
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
Raleigh ISSA
 
Introduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.comIntroduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.com
Aptly GmbH
 
How to Build a World-Class Back Office
How to Build a World-Class Back OfficeHow to Build a World-Class Back Office
How to Build a World-Class Back Office
Bay Bridge Decision Technologies
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologies
doan_slideshares
 
Argyle Presentation - CFO Club
Argyle Presentation - CFO ClubArgyle Presentation - CFO Club
Argyle Presentation - CFO Club
Coupa Software
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroads
Mukesh Gupta
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 
Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406
Peter Coffee
 

Similar to The aidwork platform (20)

IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureData
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney Davis
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
IBM Web Sphere Portal References Government March 2009
IBM Web Sphere Portal References   Government   March 2009IBM Web Sphere Portal References   Government   March 2009
IBM Web Sphere Portal References Government March 2009
 
Complexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through IntegrationComplexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through Integration
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging times
 
European Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule StandardsEuropean Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule Standards
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Introduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.comIntroduction Force.com-Platform / Salesforce.com
Introduction Force.com-Platform / Salesforce.com
 
How to Build a World-Class Back Office
How to Build a World-Class Back OfficeHow to Build a World-Class Back Office
How to Build a World-Class Back Office
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologies
 
Argyle Presentation - CFO Club
Argyle Presentation - CFO ClubArgyle Presentation - CFO Club
Argyle Presentation - CFO Club
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroads
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406
 

The aidwork platform

  • 1. Reducing Opportunities for Fraud in Aid Delivery Programs
  • 2. The World spends up to $300 billion each year on aid & development
  • 3. Reports indicate up to15% can be lost due to fraud and misappropriation (that is almost $50 billion)
  • 4. Almost every report on fraud agrees that the problem is in the management system
  • 5. Who reads and writes the data in the system Coordination The deeper you Donors drill down in Head Office an aid delivery Country Office supply chain, Operations the greater the number of Program Team people that are Suppliers involved in the Field Staff processing of Contractors information Beneficiaries
  • 6. Information Management Systems File Sharing Websites The further up the supply chain you move, the Internal Networks more sophisticated the Proprietary Information Management Management Software Systems (MIS) typically is.
  • 7. The relationship between Data Entry & the Information Management System Coordination File Sharing Websites Donors Head Office The MIS Internal sophistication Networks Country Office typically is Operations inversely proportional to Proprietory Program Team the number of Management people Software Suppliers involved Field Staff Contractors Beneficiaries
  • 8. Opportunities for Fraud exist where the MIS Control is weakest Coordination File Sharing Websites Donors Head Office Typically, the Internal majority of Networks Country Office fraud and Operations theft incidents occurs in this Proprietary Program Team area of the Management supply chain Software Suppliers Field Staff Contractors Beneficiaries Data Read/Write Hierarchy Information Management System
  • 9. In general, fraud prevention is too little, too late
  • 10.
  • 11. The Aidwork Platform will invert the Information Management System All transaction and program data will be directly entered into a Audit capacity Reporting secure web platform in of process and real time using each authorized procurement transaction processes. recorded and available in real Primary data entered by Data time. each operator is not Management able to be edited, omitted or altered without approval and a logged record of the Primary Data Entry change.
  • 12. Sometimes one pays most for the things one gets for nothing.
  • 13. The Major Components of a typical Aid Program Program Data Overheads Finance Each Program Information Administration Procurement Data Component has multiple Logistics Contracts sub- Comms components Housing Assets Security Travel Management Human Transport Resources
  • 14. Disaster recovery needs a rapid response to spend hundreds of millions of dollars
  • 15. Elements of a Disaster Response No Supplier History Large sums Short time of money frame Poor Limited Systems Resources Temporary Aid Opportunity Staff Program for fraud
  • 16. Some Informal Management Systems in a Program HR Logistic Program Contracts Purchases • Staff • Comms • Schedules • Spec’s • Suppliers • CV’s • Security • Client Lists • Adverts • Adverts • Timesheet • Housing • Health • Bids • Bids • Salaries • Transport • Shelter • Analysis • Specs • Holidays • Stores • Protection • Contracts • Recruit • IT • Gender • Variations • Adverts • Fuel • Food • Repairs • Livelihoods • Management Finance Overheads Admin Travel Assets • Bank • Insurances • Bank • Vendors • Furniture • Bills Due • Subscriptions • Stationary • Airlines • Cars • Cash • Legal • Postage • Schedules • Computers
  • 17. The Budget is at the Core of each Program Program Data Overheads Finance Each budget line item Budget directly Administration Procurement Line 1 Line 2 relates to Line 3 some aspect Line 4 … of the aid … Logistics Contracts program. Assets Travel Management Human Resources
  • 18. Component data and MIS are typically independent of each other MIS Program Data Each Program MIS MIS Overheads Finance function will typically Budget MIS maintain its Administration Line 1 Procurement own local Line 2 MIS Line 3 MIS, usually Line 4 … in the form of Logistics … Contracts Microsoft MIS MIS spreadsheets and data is Assets Travel Management entered into Human MIS Resources MIS report as last MIS resort.
  • 19. Component data and MIS are typically independent of each other MIS Program Data Each Program MIS MIS Overheads Finance function will typically Budget MIS maintain its Administration Line 1 Procurement own local Line 2 MIS Line 3 MIS, usually Line 4 … in the form of Logistics … Contracts Microsoft MIS MIS spreadsheets and data is Assets Travel Management entered into Human MIS Resources MIS report as last MIS resort.
  • 20. Program Data The Aidwork Overheads Finance platform integrates MIS all the informal MIS MIS management Budget Administration Line 1 Procurement systems in a single MIS Line 2 Line 3 MIS web based data Line 4 collection system. … Logistics … Contracts MIS MIS All transactions are MIS MIS MIS linked and recorded Assets Travel Management Human Resources
  • 21.
  • 22. Functional Steps in the Process 1. Create a new program 2. Draw modules from menu 3. Recruit staff from network and assign read/write access 4. Program is operational Program Field Data Overheads Finance HR Logistic Program Contracts Purchases • Staff • Comms • Schedules • Spec’s • Suppliers • CV’s • Security • Client Lists • Adverts • Adverts • Timesheet • Housing • Health • Bids • Bids • Salaries • Transport • Shelter • Analysis • Specs Administration Procurement • Holidays • Stores • Protection • Contracts • Recruit • IT • Gender • Variations Program • Adverts • Fuel • Food • Repairs • Livelihoods • Management Logistics Contracts Finance Overheads Admin Travel Assets • Bank • Insurances • Bank • Vendors • Furniture • Bills Due • Subscriptions • Stationary • Airlines • Cars Assets Travel • Cash • Legal • Postage • Schedules • Computers Management Human Resources Module Menu
  • 23. The social network links all data contributors and recipients to a single MIS system Program Field Data Overheads Finance Staff Coord. Contract Administration Procurement Social Program network Secure link Logistics Contracts HQ Supply Donors Assets Travel Management Human Resources
  • 24. Fraud prevention needs more than just good intentions
  • 25. It needs a purpose built system
  • 26. The Aidwork Platform is being built on years of field development experience in managing programs & combating fraud
  • 27. Steve Hutcheson CEO Recovery Development Group Sdn Bhd 27 Jalan Phuah Hin Leong Georgetown, 10050 Pulau Pinang Malaysia +60 164909425 stevehutcheson@aidwork.net