Tuesday, December 24, 2019

Reflection About Media Literacy Reflection - 1416 Words

Media Literacy Reflection What was the most useful part of the week for you? Media education is an important aptitude for anybody today, particularly for more youthful ages, who are investing increasingly energy devouring the media. The Kaiser Family Foundation as of late found that people going from 8 to 18 years of age spend a normal of 7 hours and 38 minutes expending media. This is a hour and seventeen minutes longer daily than five years prior, a hop which the Kaiser Family Foundation puts down to more access to portable and tablet gadgets. With so much time spent devouring the media it appears to be just legitimate to incorporate media proficiency into training. In any case, thinks about have discovered that Millennials in the United†¦show more content†¦There is additionally a broad rundown of accomplices partaking in Media Literacy Week, demonstrating what number of associations see the significance in media education. Enormous media associations, for example, The New York Time and AJ+, the video content maker branch of Al Jazeera, are partic ipating in Media Literacy Week, to give some examples. What events should happen again? The topic of the Media Literacy gathering this year was Consideration In A Connected World: A Place And Voice For Everyone. The occasion I need to happen again is Appearing Of Screenagers And Media Literacy Discussion. Our kids live in the advanced world and need our assistance arranging the difficulties. As the speed and amount of data develop exponentially, we have to basically consider the part media play in our lives, our general public, and our reality. Isidore Newman is partaking in national Media Literacy Week occasions across the nation by facilitating a screening of the honor winning narrative, Screenagers. The movie tests into the helpless corners of family life, including the executives own, and delineates untidy battles over web-based social networking, computer games, scholastics, and Internet compulsion. Through astonishing bits of knowledge from creators and cerebrum researchers, arrangements rise on how we can start to engage kids about how to best explore and comprehend the inescapable effects of theShow MoreRelatedEssay on Technology Is Changing the Mind1421 Words   |  6 Pagesdrags one’s attention away from the task at hand (Carr). In addition, Internet sites seeks to grab our attention, and by shortening passages into quickly glanced at snippets of information, Carr believes that our increased dependency in that form of media and style of skim reading is adversely affecting the way we read printed material. As a result, it becomes much more difficult to sustain focus on reading prose that is long and takes more effort to absorb. Further neuroscience research shows thatRead MoreEssay about The Negative Effect of Television on American Children988 Words   |  4 PagesDuring the 20th century, the literacy rate in America has begun to fall at an alarming rate. A factor contributing to the problems in the literacy rate includes children’s exposure to television which has resulted in a shortened attention span during other activities. Today, children are less active because of technology such as television and video gaming and, as a result more children are suffering from obesity. Television has been in American Society since 1920’s and has gradually been spreadingRead MoreNational Levels Of Literacy And Numeracy1149 Words   |  5 Pagesstance on a particular topic. The academic register is evidently clear in the text. In particular, there are multiple discourse participants to strongly support the main argument. Register comes together in this article to fight for the equality of literacy and numeracy across all countries. Australia has always held high standards within education, however, recent studies show these standards are declining compared to other countries. Due to a number of reasons, it has been found that we may need toRead MoreApplication Of An Information Literacy Program1735 Words   |  7 Pagesstrong information literacy program is essential when it comes to helping students be able to use information effectively throughout their life. The focus of an information literacy program is not merely to distribute information but should focus on the process of learning. In order to determine if a program will help increase information literacy it is important that we are familiar with the AASL Standards and the State Standards since they are the scope of an information literacy program. TheRead MoreThe Problem Of Fast Food Restaurant1309 Words   |  6 Pagesfood chains and at popular food chains. â€Å"But where, exactly, are consumers- particularly teenagers supposed to find alternatives?† Teenagers in this century are heavily controlled and impacted by media. They are easily able to find out what is in there food with a quick google search. Videos on social media on what is in our foods are easily shared and retweeted by millions of teenagers. Most teenagers are aware that McDonalds and Burger King are not the only sources of fast food.† I was fully ableRead MoreTechnology And The 21st Century1204 Words   |  5 Pagesresult of the television, technology that was used at home slowly begin to be adapted for educational purposes a nd applied to educational settings. Learners like their Saturday morning cartoons, so why not create educational shows similar to that media that captures a learners attention for hours a day. Sounds great, however when creating educational curriculum many unforeseen issues and challenges arise. Today, we find our classrooms once again in a technological arms race, similar to the timesRead MoreFahrenheit 4511651 Words   |  7 Pagesknowledge, thus freedom. This society, based in ‘fiction’, echoes many of the same values encouraged by the American Dream. By considering the values of media influence, ideal appearance and importance of the nature, it is clear that the American Dream in Bradbury’s Fahrenheit 451 makes its occupants ignorant and selfish. . Within Bradbury’s Fahrenheit, media is used as tool to eliminate a thoughtful society. The government creates ignorance through the empty television programming the citizens are exposedRead MoreThe Benefits of Teaching Critical Media Literacy Essay examples2175 Words   |  9 Pageslive in an ever-changing world. Our society evolves each day, and in doing so renders certain standards and paradigms obsolete. The field of communications serves as an example of this evolution. For a long time, this sector was dominated by print media. Newspapers, magazines, and letters functioned as the primary methods of information delivery. Within recent years, however, the field of communications has experienced the emergence of a new phenomenon: the internet. The internet has altered greatlyRead MoreThe Importance Of Media Literacy1737 Words   |  7 PagesIndeed, the pervasiveness of media in its abundant forms in contemporary US culture is undeniable. Almost everywhere one looks, one can find forms of media; a magazine at a doctor’s office, a billboard alongside a freeway, a painting at an art gallery, a performance on television or on stage. Media, undeniably, is ubiquitous. However, in all the innumerous forms media comes to us in, every one of these forms is created for a single purpose; to communicate an idea or message. Thus, it the individual’sRead MoreHow Does Social Media Affect The Fashion Industry?1403 Words   |  6 PagesTO WHAT EXTENT DOES SOCIAL MEDIA AFFECT THE FASHION INDUSTRY? Summary: The essence of my Research Project was to determine the effectiveness of using social media in the fashion industry. It was informed by my interest in social media and fashion. It attempts to analyze the success of social media for emerging brands. The focus of this investigation was further refined by an analysis of the current success of fashion across a range of social media sites. I recognized that my main research would

Sunday, December 15, 2019

The Forgotten Group Member Free Essays

Case Study 7: The Forgotten Group Member Developed by Franklin Ramsoomair, Wilfred Laurier University The group is in storming stage right now. Every member of the group is in tension. Unannounced meeting shows that they are forming cliques. We will write a custom essay sample on The Forgotten Group Member or any similar topic only for you Order Now They could have easily informed every member of the group to discuss the project. Christine, the leader of the group could have managed the team in a better way. Group in this stage need more communication, training, supervision, and controlling. But she did not provide any of it. Knowing the stages of group development was also an issue within Christine’s team. The team never went through the forming stage. They never got to know one another. Clear expectations were not set amongst the group. Frankly, Christine probably wasn’t a good pick for the team lead because of the ongoing distractions she was experiencing with her grades in school. That was more important to her, not the team’s success. Janet or Steve would have been a better choice for the team’s leader. Basically, this group never got passed the storming stage. Christine never took the time to evaluate the situation. She just preceded status quo. The group is facing many problems. The main problem is, Christine is not an effective leader for the group. She didn’t assign work to the team or we can say the team never went through the forming stage. They never got to know each other. Even Christine did not know her team very well and did not take any steps to improve it. No clear work was assigned to the team members, no meeting were set in advance. Christine failed to cater to everyone’s need within the group which was evident because necessary steps weren’t taken to ensure Mike would be able to join the team for meetings. Christine failed to pack them in. Had she paired Mike up with Janet whose more reliable and always over achieve when it comes to the group Mike would not have felt excluded from the group. She could have even paired Mike with Steve who’s more businesslike being that he ensures that things are on point and according to plan for the teams meetings. She failed to promote creativity and definitely lacked communication within the group. With the latest technology, other means of communication should have been used as a resource. She could have suggested or used video conferencing, teleconference, or simply resulted to a simple email or chat to delegate tasks for the group’s project which ties into the constant communication with the group. Communication can make or break any relationship, especially in the workplace. The failed communication was evident when members didn’t know the team was meeting. Everyone should have been informed of all upcoming meetings well in advance so they would have been prepared to be in attendance and effectively contribute to the team’s project during the meetings. This could have promoted creativity, innovation, and initiative amongst all group members which would have resulted in group motivation. Christine did more managing tasks and not leading the group. A good leader would do things somewhat differently when compared to a manager. I’d prefer a leader when picking someone to build a team for this task based on my thread earlier. I personally think that leaders have more motivational traits versus managers. I have been in both shoes. To summarize the difference between Christine’s traits versus that of an effective leader I have provided a useful table that will help summarize the differences and really drive home what it takes to be an effective leader. Upon reviewing the characteristics below of a leader versus a manager by subject matter you will get a clearer picture. This is a very useful table that I came across while researching this topic for our class discussion threads. Based on this information, managers tend to have more demotivating traits while leaders have more motivating traits. I would rather have a leader! How to cite The Forgotten Group Member, Papers The Forgotten Group Member Free Essays How could an understanding of the stages of group development assist Christine in leadership situations such as this one? Christine’s leadership abilities could benefit by having knowledge of the stages of group development. Even though for the first meeting Mike was not able to be present and participate with the other group members. As a leader, Christine could have motivated Mike should have told him the importance of being present for all the group meetings so he can be part of the team. We will write a custom essay sample on The Forgotten Group Member or any similar topic only for you Order Now For example, at the lunch room incident when Mike walked away, she could have talked with him individually and explained to him that she perceives that he does not feel welcome and has been avoiding team meetings, instead of saying that they just happened to run into each others. Christine should have told him the importance of attending on a meeting and the benefits of him putting more effort and enthusiastic to the group meetings. Christine should also let him know that all his contributions and all his ideas could contribute and add value to the team. She could also indicate that the team’s success will only be possible when every member gives support and contributes. If Christine follows those steps she could push Mike to be more secure and be able to join the group during the forming stage and hopefully move quickly to the norming and then performing stages. What should Christine understand about individual membership in group in order to build group processes that are supportive of her work group’s performance? Christine as group leader should understand that the every person has different personalities and that people need to blend in the group by putting effort to combine their needs and the group could shine to express and receive feelings of inclusion, control and affection because those points are important to the success of the team. Christine should focus more motivation. In this way the group members can emphasis more on their skills and task assigned for the project motivation by this we mean their inclination or motivation to do their jobs earning a good great and importantly to add value to whatever it is that the group does. Motivation is a key factor for making people’s success. Christine can build group process addressing those needs. For example, since Mike initially revealed himself as a class clown, she could ask Mike to be creative and contribute his sense of humor to the project at the time of the presentation of the  case. 3. Is Christine and effective group leader in this case? Why or Why not? I think Christine it is a good leader because she pushed the group to do the work and to get together, even though I think every member should put their own motivation and effort to get together because they are adult enough and mature to see what should be a priority in their life. Christine should organized the tine for them to get together and organized the group project not to be in their behind like if she was their mother. I think Mike it is he problem in the group because he does not show any responsibility for the other group members. Mike looks like if he does not care. I think when people sing in for a class should show more responsibilities and should leave their personal life aside when it comes to school projects and assignments. However, I think Christine should push the group members to put more motivation and get more time to organize the project. Also, Christine should communicate in a better way by give a deadline to turn in their part of the assignment to her the group leader. How to cite The Forgotten Group Member, Papers

Saturday, December 7, 2019

Government Risk Management Framework

Question: Discuss about the Government Risk Management Framework. Answer: Introduction: The Victorian government wants to establish a monitoring system to provide security to the confidential information. The objective is to determine the ownership for identifying the information, assessment of the information value, identification and management of the data security risks, application of the security measures, creating the positive organization culture for imposing security, and increasing the methods for providing data security. The company is working hard to provide the assurance actions for mitigating from the associated security risks (Venkatesh, 2015). The Victorian government requires a protective security policy framework to enhance the working of the government in national interest. The information security procedures should be created to cope up with the new threats, updated threats, and the occurrence of vulnerabilities. The management of the information helps in overcoming the problem seen in the disruption occurs in the business objectives. The positive sec urity culture in the organization helps in the deployment of continuous improvement plan which helps in enhancing the functions performed by the Victorian government for the betterment of the nation. The application of the Victorian government depends on the value of the information (Lebanidze, 2014)). The proper security procedures should be indulge to create the positive information value for the good will of the nation. The analysis of the risks associated with the working of the government helps in enhancing the decision making capability and providing priority to the security efforts which are undertaken by the government (Brezeanu, 2011). The government is working in the direction to protect the domains which are named as security to governance, security to information, security to personnel, security to information and communication technology, and provides physical security. The current working of the Victorian government is equipped with the risks equipped in the information sharing, assessment of information, management of information, inclusion of personal life cycle, security plans, business continuity plan, and information values. Identification of the areas of risks exposure: Risks Description Policies and operational responsibilities The associated person does not look on the policies and operational responsibilities provided to him Understanding of the information value The confidentiality, integrity, and availability of the information is not well-managed Security culture and monitoring system The risks associated with the system does not given consideration (Brown, 2016) Cost associated with the project The project can go above the allocated budget Security in governance The risks are not properly managed by the executives Security of information The lifecycle of the information should maintains the confidentiality, availability, and integrity of the project (Thomsons, 2011) Security of personal No un-authorised person should be able to access the confidential information of the government ICT security The risks are associated with the storage of information Physical security The security should be provided to the risks associated with the availability of resources, facilities, services, and equipment (Victorian managed insurance authority, 2016). Comparison between Deliberate and accidental threats exposure: The deliberate threat is the result of ignorance of the risks. The risks ignorance results into the occurrence of errors and irrelevancy. The occurrence of error can result into distortion and incompleteness of deploying the security framework in the working culture of the Victorian government (Perkins, 2014). The major impact of ignorance can be seen in the working of the Victorian government to take initatives for securing the information in terms of confusion, uncertainty, inaccuracy, unavailability, loss of confidential information, and fuzziness. The accidental threats are not known in advance. They can occur by chance (Wuest, 2013). The complete working of the Victorian government can get affected with the exposure of accidental threats because the government is not proactive to face such a situation which can change the current scenario of the government. The accidental threats can be categorised as non-availability of resources, flow of communication breakdown, and etc. (Stoneburner, 2014). In managing the security of the information, the Victorian government has to face many challenges and have to developed many mitigation programs to cope up with the challenges and issues in managing confidentiality and integrity of the information. The Victorian government facing problems in managing value of the information, in the application of the security framework, selecting and certifying security measures which should be specified for developing the framework, management of response associated with the security incident, monitoring and reviewing of implementing security framework, updating of security working programs, reflecting changing in the business operations, conducting external monitoring of activities, and others. The risks can be defined as the probability of losing or gaining something in carrying out the procedures of the Victorian government (Bansal, 2013). The uncertainty can be defined as the situation arises when the Victorian government have to take instant steps to face the situation for the betterment of the nation. The situation is not known before its existence. The risks associated with the securing the information of the Victorian government can be identified and managed (Bemile, 2012). The risks associated with the project can be measured. The uncertainty arises for managing the information of the Victorian government to prevent its confidentiality, integrity, and availability. The uncertainty cannot be measured before its occurrence. The outcome of the risks identification and management process is known before its existence whereas the outcome of the uncertainty cannot be predicted before its existence. The risks can be minimized by deploying the risks mitigation policies but the uncertainty cannot be reduced because it is an instant action. The probabilities of risks occurrence can be assigned but the probabilities of uncertainty cannot be predicted. The priority of risks management can be assigned with the prediction of the risks but the same is not applicable for uncertainty because it is uncontrollable. Approaches for risk control and mitigation: Particular Standard Objectives Control Security management framework It is the framework which is used for implementing and maintaining the risks associated with the size, risk posture, and resources (European commission, 2016) It helps in managing the security risks by providing: Security management framework to the organization for the arrangement of governance The security framework is used for monitoring and reviewing the arrangement for organization governance It helps in managing risks by promoting security protocols for overcoming risks environment The information security management framework is required by the organization to manage the risks associated with the resources and other equipment. Security risks management The risks management framework is used for managing security risks associated with the government The effective and efficient management schemes should be used for providing security mechanism to manage the security domains. The risk management framework is used for managing executive sponsorship It is used for identifying and recording of the risk register Monitoring and reviewing of the risks registered Updating the records of the risk registers periodically The security management framework used by the victorian government is named as Victorian government risk management framework. It is used for providing principles and guidelines to provide risks management security procedures It helps in managing the confidentiality, integrity and availability of information. Security policies and procedures The security policies and procedures are used for managing the risks associated with the size of the project, resources used, and associated risks posture The policies and procedure helps in providing strategic direction for managing the risks effectively. It helps in fulfilling the security requirement of the government The security framework is used for monitoring and reviewing the arrangement for organization governance It helps in managing risks by promoting security protocols for overcoming risks environment The protective security policies framework has been developed for overcoming risks by utilizing the policies and procedures used by the government for risk management. Accessing of the information The standard risks security procedures should be used for defining the risks management plan for public data. The executive sponsorships should be maintained for deploying the access management schemes. The security framework is used for monitoring and reviewing the arrangement for organization governance It helps in managing risks by promoting security protocols for overcoming risks environment. Code of information security controls should be deployed for resolving the issues related to risks management of the enterprise. The activities of the organization should be aligned with the access management using the standard code of information security controls. Security Obligations The security obligations should be reviewed by the organization by using the documentation and communication schemes for accessing public data The security obligations are used for personal management program. It is used for embedding the daily functions and activities for the reflection of personal management. The protective security policies framework has been developed for overcoming risks by utilizing the policies and procedures used by the government for risk management. The protective security guidelines should be used for managing the security responsibility of personal management Security training and awareness The training and development program should be organized for ensuring the security procedures for public data management. The personal management can be exploring by deploying the training and development program. Monitoring and reviewing of the personal management program. The procedures should be undertaken for developing the security risks environments (Walker, 2011). The protective security policies framework is used for providing the guidelines for securing the guidelines of personal security. Security incident management The security policies and procedures are used for managing the risks associated with the size of the project, resources used, and associated risks posture. The security risks environment is used for managing activities for securing incident management. The security incident management activities are used for improving the incident management of the organization The investigation techniques are used for reporting and providing security guidelines to evolve security associated with risk environment. Business Continuity management The business continuity management program used for addressing the security procedures for public data. The capability of the organization can be enhanced by managing confidentiality, integrity, and availability of public data. The executive sponsorship should be managed for providing security requirement to develop business continuity management program. Monitoring and reviewing of security procedures should be done periodically. The security risks environment should be evolved by deploying the business continuity management program The business continuity management program has three sectors to be undertaken which are categorised as continuity of the business, disruption in the management, and related risks (Kutsch, 2010). Contracted service providers The Victorian protective data security standards are used for ensuring the public data accessed by contracted service providers. The security domains which are analysed by the Victorian government are development and planning phase, arrangements of contracted service providers, monitoring and reviewing of security requirements, and evolving risks environment The outsource service and functions should be incorporated in the protective security policy framework. Developing and managing contracts should be signed for getting better security mechanism. Government services The Victorian government provides data security standards for ensuring disclosure, transfer, management, and collection of data. The service level agreements should be signed for ensuring the planning and development phase. The service level agreements should be monitored and reviewed periodically to give best practices Protective security policy framework is used Security plans The security risks can be managed by implementing and maintaining data security procedures (Vassileios, 2011). It is used for identifying decision which are cost effective and capable of securing private dat. Identification, assessment, and recording of the risks are used for managing the risks in the organization. The privacy and data protection act is used for ensuring security ot data. The business planning process should be monitored and reviewed periodically. The compliance management system is used for aligning the compliance security activities. Information value The integrity, confidentiality, and availability of the data should be managed The executive sponsorship should be managed for developing information management framework The information security guidelines should be incorporated in the security framework. Information management The information management framework is used for maintaining the security of the information (Nia, 2017). The security controls and procedures should be monitored and reviewed periodically (Ormrod, 2013). The information management principles should be incorporated with the security framework developed for the Victorian government. The data validation and security act should be undertaken Information sharing The security controls should be used for ensuring security of the public sector data (Tara, 2015) The information management framework is used for securing information (Steen, 2013). The risks associated with the sharing of data should be periodically reviewed and updated. The code of information security controls are used for transferring and sharing of information between different sectors. Personal Life cycle The security controls should be given privilege to ensures implementation and maintenance of personal security The personal security controls are used for implementing organization personal management. It is used for monitoring and reviewing of the organization personal management. The personal security management programs should be used in the security framework Information communication technology life cycle The ICT security controls should be used for securing the activities related to information communication technology. The executives sponsorship should be used for providing ICT security controls. The reviewing and monitoring of information technology and security controls. Information security manuals should be incorporated with the security framework of the organization. Conclusion: The Victorian government is looking forward to drive a set of risks management program which helps in smooth functioning of the activities. The management schemes helps in maintaining information confidentiality, integrity, and availability throughout the project life cycle. The development of the security domains help in analysing the information security management schemes. The unauthorised accessing of information should be completely restricted. The security mechanism should be employed for managing the accidental loss of information. The risk management plan helps in retaining the information value which is classified as confidentiality, integrity, and availability. The value of the information can be improved by securing the information from losing its confidentiality and integrity. References Bansal, B. (2014).Corporate governance and risk management in insurance sector: A review of literature. Retrieved from https://www.ijsrp.org/research-paper-1014/ijsrp-p3407.pdf Bemile, R. (2012).Guide to risk assessment and response. Retrieved from https://www.uvm.edu/~erm/RiskAssessmentGuide.pdf Brezeanu, P. (2011).Does corporate governance impact risk management system. Retrieved from https://store.ectap.ro/articole/580.pdf Brown, R. (2016).Victorian Government risk management framework: Practice notes. Retrieved from https://www.google.co.in/url?sa=trct=jq=Research%20paper%20pdf%20on%20Victorian%20government%20risk%20managementsource=webcd=2cad=rjauact=8ved=0ahUKEwiqj-fn1ezVAhWLwI8KHW5OCOcQFggqMAEurl=https://www.vmia.vic.gov.au/~/media/internet/content-documents/risk/vgrmf/vgrmf-practice-notes-risk-culture.pdfusg=AFQjCNGI9XM3W3ZDFt2KpQT1EZ_3F-NbOA European Commission. (2013).Risk management in the procurement of innovation. Retrieved from https://ec.europa.eu/invest-in-research/pdf/download_en/risk_management.pdf Kutsch, E. (2010).Deliberate ignorance in project risk management. Retrieved from https://dspace.lib.cranfield.ac.uk/bitstream/1826/5114/1/Deliberate_ignorance_in_project_risk_management.pdf Lebanidze, E. (2014).Guide to develop a risk mitigation plans. Retrieved from https://www.smartgrid.gov/files/CyberSecurityGuideforanElectricCooperativeV11-21.pdf Nia, S. (2017).Effects of corporate governance structures on enterprise risks management practice in Malaysia. Retrieved from https://www.econjournals.com/index.php/ijefi/article/viewFile/2570/pdf Ormrod, P. (2013).Corporate governance and Risks: A study of board structure process. Retrieved from https://www.accaglobal.com/content/dam/acca/global/PDF-technical/corporate-governance/rr-129-001.pdf Perkins, R. (2014).The role of risk management in data protection. Retrieved from https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/white_paper_2-the_role_of_risk_management_in_data_protection-c.pdf Steen, A. (2013).Risk management in corporate governance: A review and proposal. Retrieved from https://onlinelibrary.wiley.com/doi/10.1111/j.1467-8683.2009.00763.x/abstract Stoneburner, G. (2014).Risk management guide for information technology system. Retrieved from https://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf Tara, S. (2015). Corporate governance and Risk management: An Indian perspective. Retrieved from https://researchleap.com/wp-content/uploads/2015/08/3.-Corporate-Governance-and-Risk-Management-An-Indian-Perspective.pdf Thomson, R. (2011).Victorian government risk management framework. Retrieved from https://www.google.co.in/url?sa=trct=jq=Research%20paper%20pdf%20on%20Victorian%20government%20risk%20managementsource=webcd=5cad=rjauact=8ved=0ahUKEwiqj-fn1ezVAhWLwI8KHW5OCOcQFgg7MAQurl=https://www.dtf.vic.gov.au/files/26637dd0-0933-41f7-9564-a6f200b16c9b/Victorian-Government-Risk-Management-Framework-December-2016.pdfusg=AFQjCNEQWVIJAdpC_saLQvI93OoYi2F7mA Vassileios, K. (2011).Relation between corporate governance and risk management during the credit crisis. Retrieved from https://mibes.teilar.gr/proceedings/2011/oral/12.pdf Venkatesh, R. (2015).An introduction to information system risks management. Retrieved from https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204 Victorian managed insurance authority. (2016).Victorian Government risk management framework. Retrieved from https://www.google.co.in/url?sa=trct=jq=Research%20paper%20pdf%20on%20Victorian%20government%20risk%20managementsource=webcd=1cad=rjauact=8ved=0ahUKEwiqj-fn1ezVAhWLwI8KHW5OCOcQFgglMAAurl=https://www.vmia.vic.gov.au/~/media/internet/content-documents/risk/risk-tools/risk-management-guide/vmia-practice-guide.pdfusg=AFQjCNE_MnkXzbiNFfa7VI4STur2sRJTNQ Walker, M. (2011).Public services: Inter-agency risks. Retrieved from https://mams.rmit.edu.au/0wqb9pk1hn2pz.pdf Wuest, W. (2013).Risk management and corporate governance. Retrieved from https://www.oecd.org/daf/ca/risk-management-corporate-governance.pdf