50 likes | 68 Views
Transparency International Defence and Security Program Vulnerability to Corruption Assessment Training Session 1.3 Vulnerability to Corruption Assessment Methodology By Donald Bowser January 27, 2017. VCA Methodology.
E N D
Transparency International Defence and Security Program Vulnerability to Corruption Assessment Training Session 1.3 Vulnerability to Corruption Assessment Methodology By Donald Bowser January 27, 2017
VCA Methodology • Examine the steps that occur within the operations or business processes (value-added chains) within those institutions or sectors. This serves to divide up the areas of vulnerabilities into manageable components and provides an entry point for types of vulnerabilities to be identified. • Conduct an analysis (desk review) of the legislative and regulatory framework as well as previous reports in the institution/sector that provide a secondary basis for identifying corruption vulnerabilities. • Conduct a series of individual semi-structured key informant (expert) interviews (KIIs) with practitioners and specialists in the institutions/sectors (coming from governmental, non-governmental (including private sector actors and international agencies) that will identify where the possibilities for corruption and other bad practices exist within their institution/sector. This result in a Vulnerability to Corruption Matrix.
VCA Methodology • Conduct a group discussion with interviewees and other stakeholders to verify, rank and assess the levels of vulnerabilities based on priorities of reform and resources needed to mitigate the vulnerabilities. In prioritizing the vulnerabilities it is necessary to consider: • what damage to the public and public finances will the vulnerability cause to the operations in the institution or , • how likely is it and how often does it occur, • what are the chances of detection, and what mechanisms/strategies are used to avoid detection, • what needs to be done to mitigate it. • The vulnerabilities can also be ‘weighted’ through the use of a mathematical formula that would assign a number from 1- 10 to the above factors. • Produce a mitigation plan that closes these opportunities and a resulting self-assessment checklist for monitoring of what vulnerabilities have been mitigated
VCA Methodology Key Informant Interviews • The VCA methodology relies on conducting face-to-face semi-structured interviews with experienced practitioners/experts or Key Informant Interviews (KIIs). By interviewing individual experts the methodology elicits responses that focus on how the integrity system in the sector contains opportunities for either corruption or perceptions of corruption based on inefficiencies and insufficiencies. Information from KIIs will be reviewed and verified through comparison with secondary sources (desk review) and comparison to the other vulnerabilities identified by previous or follow on KIIs.