recommended reading

Agencies not taking steps to avoid redundant IT spending, report finds

Mikael Damkier/

Federal agencies are not taking full advantage of technology spending plans that can reduce duplication in government programs, a new study finds.

The Government Accountability Office report recommends agencies utilize “enterprise architecture,” which GAO defines as “a blueprint that describes how an organization operates in terms of business processes and technology, how it intends to operate in the future, and how it plans to transition to the future state.”

In an earlier report from March 2011, GAO highlighted enterprise architectures as a key mechanism in mitigating duplication in government, especially in the $75 billion in information technology spending the government makes annually.

To get the most from the blueprints, GAO said in its new report that agencies must not only create their plans but also report on the “outcomes and benefits” of using them. Of the 27 agencies that GAO audited, only five -- the International Development Agency and the Education, Health and Human Services, Housing and Urban Development, Interior and Treasury departments -- had fully or partially reported on the results of their enterprise architectures.

“The majority of the agencies do not know the extent to which they are realizing benefits that they have set out to achieve, such as cost savings or avoidance through eliminating duplicative investments,” GAO wrote in the report. Without the information “senior agency executives may not have the information needed to determine whether to invest additional resources or make changes to [a] program.”

The auditors cited the Office of Management and Budget for providing insufficient details on the methods and metrics agencies could use to assess their architecture programs. 

(Image via Mikael Damkier/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.