Tuesday, May 5, 2020

Risk Management and Control Measures

Question: Discuss about the Risk Management and Control Measures. Answer: The diagram above gives a clear review of the priority that is needed to be given to each risk that occurs unexpectedly. The risk manager then makes the appropriate decision of allocating the resources in these levels of risks hence for proper management of the risk the sufficient resources is required. The diagram of risk exposure has been structured in such a way that it has got four corners. The corners of the chart are divided into: Low impact and also reduced probability which is usually located at the left corner at the bottom, mostly these risks can be ignored since there occurrence has no negative impact to the government. The risk of low impact high probability is found at the top of the chart left corner where it is considered to be moderate in regarding to importance. If in any case this risk happens to occur an individual can overcome the situation and proceed. The manager responsible is mandated with the obligation of reducing the likelihood that the risk will occur. The risk of high impact low probability is concisely located at the right corner down the chart, the risks are to be considered and handled on top priority as they are detrimental and can cause significant interference with the system running. The nature of the risk being that there is unlikely factor of occurrence but an individual responsible to mitigate the risk should be on the look out to institute necessary measures and controls to reduce the magnitude of the damage that they will bring upon. There is need for backup plans for these risks just in case they do occur in order to be dealt with accordingly. The contingency plans ensure that there is sufficient controlling of the dangers associated with these risks. The risks of high impact and with high probability of occurrence are located in the diagram at the top right corner where there is first response and priority in consideration because they can have a big impact whenever the happens. These risks must be critically analyzed and sorted to reduce the effects on the Information communication and technology department. The risk manager is supposed to be aware of their vital importance and thus needed to pay a close attention which will enhance identification of the problems and underlying occurrences. The close attention is required for the very unlikely risks where the close attention is recommended for the purpose of evening the least risks to occur. The risks may involve loss of human life or even results to threats of death, in this circumstance there is need for paying the most adequate attention to these risks. Rationale diagram of risk in the case study The threat of fire is considered as a threat by the NSW government and this follows the establishment of the fire stations which are mandated with the duty of responding to the emergency cases and thus delivering services to the people for adequate mitigation of the threat. There is conducting of rescue missions in the areas which are vested with these natural disasters in order to save lives and property which could be lost through the fire if the services were to be haltered. The hazardous materials handling throughout the entire NSW are facilitated be existence of these rescue centers which are used to deal with the harmful substances that can cause damage to property and human beings. There are necessary equipment and protective gears that are provided by the government to enhance that the issue is dealt with appropriately There are cloud based services where the fire department uses with the existence of security and privacy assurance. The threat of prevailing crime rate in New South Wales by postcode, the suburbs, and age and rate maps is an issue which needs to be addressed by the government. The offenders can easily get away with the offences committed due to insufficient risk detection programs and failure on the part of the government to identify the risk. NSW has therefore launched the new crime tool which is to be used in accessing the data and maps of crime and thus use of graphs which meet the individual specifications. The most recent crime statistics can be accessed by any individual who are interested to survey the region all around the clock from the website known as Bocsar website. The threat of non-computerization in the state Parole Authority is a threat following that the activities were conducted manually. SPA collated the photocopy documents thus making illegal undertakings which are contrary to the law. Heath said that coherent measures of risk are necessary in consideration of the suitable mitigation procedure used (Phillis, 1999, p.189). The huge volumes of documentation were made to individuals who compromised the legitimacy of authority because the members were able to access the papers. The detectives are not in a position to see the crime scenes which makes it difficult to determine the cause of the problem. The third party interferes with the evidence that is available at the moment the crime takes place. The assigned individuals who are NSW officials and detectives are located in isolated areas which make it difficult to respond to the cases of the tragedy within a short time. There is tampering with the evidence by people willing to conceal the same for personal interests and motives. The criminals who participate in this action are mostly the initiators of the threat that first failed to be detected by the systems. Harrison said that testosterone and financial risk preferences. Journal of evolution and human behavior (Philip, 2007, p.455). The challenges that the NSW government is likely to face when deciding whether security management should be undertaken internally or be outsourced are: the department responsible in family and community services delivers the respective services to the most disadvantaged individuals in NSW. The families and communities are also found to be among those who are beneficiaries of the unwarranted services. There is confusion as to whether the government should adopt the initiative that will enhance protection of the domestic property and individuals. This arises due to the selfish nature of the leaders and officials who are given the responsibility of running this service delivery to the entire community. Mathew said that Initiation of the infrastructures repairs and emergency services Policy (Felix, 2005, p.111). The land and housing corporation was facing difficulty in keeping a good track record of its residents and the tenants that are found to be in a certain geographical location. The public property and asset management was difficult to be monitored since the assigned individuals did not allocate the resources adequately in accordance to the proportion and productivity. The infrastructure was out of date and thus it was depleted beyond the repairing period. The amount of capital that is currently available is not enough to undertake and cater for all the expenses of reconstructing and bring back into the current standards. Julian said that the uncertainty encountered in control of risks and security risk management body of knowledge (Alex, 2009, p.178). The other challenge that the government will encounter in the process of security management is the proximity of the public utility and resources that are to be utilized in providing the services to the citizens living in the locality. The distance factor is an issue which needs to be given first priority because the initiation of the program cannot take place way-out the NSW government allocating the funds and establishing systems of control. There is danger of lost confidentiality to the third party of confidential government information during outsourcing. The outsourced firma that is engaged in the process of managing and risk mitigation may use the position to the advantage and also compromise the process. There is conflict of interest where the managers engage in business with the contractors who are given the responsibility of instituting suitable measures. Jackson stated that Risk management and control measures that are applied to prevent damage (Herman, 1999, p.123). Risk is the potential which generally involves gaining something of value and it becomes a personal possession. It can also be seen as the likelihood of parting ways hence losing something that was of value and vital importance. It might entail the financial wealth and emotional health of and individual hence also an intentional interacting with unsuitable condition of uncertainty. Certainty is the existence of more than one occurrence of possibility hence the final result is not actually known; the level of predictability of the event is low given that there is defiance in the current process or as result of lost hope. The uncertainty is a result of negligent actions of the officials supposed to enhance adherence with the policies. There is a negative effect that occurs as a result of this situation which entails loss of reputation and degrading of the department faced with the uncertainty. Thomas said that Model policy preventing and responding to abuse of older people (Richard, 2002, p.344). Conclusion The approach of proprietary software license fees are reduced in activities such as logistics, staff fostering and computer aided dispatch. There is existence of the private cloud a browser which enhances in-house management of these functions. The device used by the NSW government for risk control and mitigation has no disc drives and hard disk which makes it impervious which is commonly in fire stations and is experienced in most often cases. There is a project that has been initiated which involves digitalization of the collections to permit a wide range of accessibility of the documents which are regarded as history and important in a significant way because of the iconic nature. There are upgrades to the system which has enhanced ten year collection digitalization plan. The infrastructure is also developed in such a way that the risks will be mitigated and prevented in due time before they even take place. Zingales said that Gender differences in financial risk aversion and career choices are affected by testosterone (Samuel, 2009, p.255). References Thomas, P. (2002). Model policy preventing and responding to abuse of older people. Hungary: Austria press, https://www.ageing.nsw.gov.au/__data/assets/pdf_file/0019/300466/Model-Abuse-of-Older-People-Policy.pdf Jackson, T. (1999). Risk management and control measures that are applied to prevent damage. Sydeny. Hungarian press. https://www.ageing.nsw.gov.au/__data/assets/pdf_file/0020/300467/Policy-Checklist.pdf Mathew, R. (2005). There is initiation of the infrastructures repairs and emergency services Policy. Wales: Herman press. Zingales, L., Maestripieri, D. (2009). Gender differences in financial risk aversion and career choices are affected by testosterone. NSW: Austria press. Harrison, L. (2007). Testosterone and financial risk preferences. Journal of Evolution and Human Behavior. vol 29. Issue 6. 384390.abstract. Heath, D. (1999). Coherent measures of risk. Journal of Finance, vol. 9, 203--228. Julian, T., Miles, J. (2009). The uncertainty encountered in control of risks and Security Risk Management Body of Knowledge. Sydney: Austria press.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.