Vulnerability to corruption assessment on Wasaeq registration / Independent Joint Anti-Corruption Monitoring & Evaluation Committee.

Material type: TextTextLanguage: English Publication details: Kabul : Independent Joint Anti-Corruption Monitoring & Evaluation Committee, 2015.Description: 11 pages ; 30 cmSubject(s): LOC classification:
  • Pamphlet JQ1765. A55.
Summary: Summary: “This Vulnerability to Corruption Assessment (VCA) examines the process of Wasaeq (certified or notarized documents) registration. The VCA team identified a range of vulnerabilities, many of which are due to a failure to observe laws and regulations, poor inter-institutional coordination among government stakeholders, and significant human-resource and technical-capacity deficiencies. These deficiencies combined with organizational structure issues, lengthy and overly complicated bureaucratic procedures, and overlapping responsibilities within different entities, all of which combine to create an environment conducive to a range of corruption vulnerabilities…”—(page 3).
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Monograph Monograph Afghanistan Centre at Kabul University Pamphlet JQ1765.A55.V855 2015 (Browse shelf(Opens below)) Available 3ACKU000546647
Total holds: 0

Cover title.
“Vulnerability to Corruption Assessment (VCA) Unit”—running caption.

Include bibliographical references.

Summary: “This Vulnerability to Corruption Assessment (VCA) examines the process of Wasaeq (certified or notarized documents) registration. The VCA team identified a range of vulnerabilities, many of which are due to a failure to observe laws and regulations, poor inter-institutional coordination among government stakeholders, and significant human-resource and technical-capacity deficiencies. These deficiencies combined with organizational structure issues, lengthy and overly complicated bureaucratic procedures, and overlapping responsibilities within different entities, all of which combine to create an environment conducive to a range of corruption vulnerabilities…”—(page 3).

English