1 / 5

Transparency International Defence and Security Program

Transparency International Defence and Security Program Vulnerability to Corruption Assessment Training Session 1.3 Vulnerability to Corruption Assessment Methodology By Donald Bowser January 27, 2017. VCA Methodology.

ruthiea
Download Presentation

Transparency International Defence and Security Program

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Transparency International Defence and Security Program Vulnerability to Corruption Assessment Training Session 1.3 Vulnerability to Corruption Assessment Methodology By Donald Bowser January 27, 2017

  2. VCA Methodology • Examine the steps that occur within the operations or business processes (value-added chains) within those institutions or sectors. This serves to divide up the areas of vulnerabilities into manageable components and provides an entry point for types of vulnerabilities to be identified. • Conduct an analysis (desk review) of the legislative and regulatory framework as well as previous reports in the institution/sector that provide a secondary basis for identifying corruption vulnerabilities. • Conduct a series of individual semi-structured key informant (expert) interviews (KIIs) with practitioners and specialists in the institutions/sectors (coming from governmental, non-governmental (including private sector actors and international agencies) that will identify where the possibilities for corruption and other bad practices exist within their institution/sector. This result in a Vulnerability to Corruption Matrix.

  3. VCA Methodology • Conduct a group discussion with interviewees and other stakeholders to verify, rank and assess the levels of vulnerabilities based on priorities of reform and resources needed to mitigate the vulnerabilities. In prioritizing the vulnerabilities it is necessary to consider: • what damage to the public and public finances will the vulnerability cause to the operations in the institution or , • how likely is it and how often does it occur, • what are the chances of detection, and what mechanisms/strategies are used to avoid detection, • what needs to be done to mitigate it. • The vulnerabilities can also be ‘weighted’ through the use of a mathematical formula that would assign a number from 1- 10 to the above factors. • Produce a mitigation plan that closes these opportunities and a resulting self-assessment checklist for monitoring of what vulnerabilities have been mitigated

  4. VCA Methodology Key Informant Interviews • The VCA methodology relies on conducting face-to-face semi-structured interviews with experienced practitioners/experts or Key Informant Interviews (KIIs). By interviewing individual experts the methodology elicits responses that focus on how the integrity system in the sector contains opportunities for either corruption or perceptions of corruption based on inefficiencies and insufficiencies. Information from KIIs will be reviewed and verified through comparison with secondary sources (desk review) and comparison to the other vulnerabilities identified by previous or follow on KIIs.

  5. Vulnerability to Corruption Assessments

More Related