enterprise risk management 78

3/4 page of matter for 3 topics below:


1)The incompetence of the IT personnel prompting IT failures Risk Identification.

2)Risk Responses Approaches

3)Risk Recognition: Ineffective management of the entry and leaving pots prompts losses and damages


References:

Bhoola V., Hiremath, S., Mallik, D. (2014). An Assessment of Risk Response Strategies Practiced In Software Project. Australasian Journal of Information Systems. Vol.18No.3

Dumbrava, V., and Jacob, V. (2013).Using Probability – Impact Matrix in Analysis and Risk Assessment Projects.Journal of Knowledge Management, Economics and Information Technology

Bonaventure, O. (2011). Computer Networking: Principles, Protocols, and Practice. The Saylor Foundation. Retrieved from https://resources.saylor.org/wwwresources/archived/site/wp-content/uploads/2012/02/Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf