3/4 page of matter for 3 topics below:
1)The incompetence of the IT personnel prompting IT failures Risk Identification.
2)Risk Responses Approaches
3)Risk Recognition: Ineffective management of the entry and leaving pots prompts losses and damages
Bhoola V., Hiremath, S., Mallik, D. (2014). An Assessment of Risk Response Strategies Practiced In Software Project. Australasian Journal of Information Systems. Vol.18No.3
Dumbrava, V., and Jacob, V. (2013).Using Probability â€“ Impact Matrix in Analysis and Risk Assessment Projects.Journal of Knowledge Management, Economics and Information Technology
Bonaventure, O. (2011). Computer Networking: Principles, Protocols, and Practice. The Saylor Foundation. Retrieved from https://resources.saylor.org/wwwresources/archived/site/wp-content/uploads/2012/02/Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf