Author Question: How can the risk of technological change be managed? What will be an ideal ... (Read 38 times)

viki

  • Hero Member
  • *****
  • Posts: 525
How can the risk of technological change be managed?
 
  What will be an ideal response?

Question 2

The three steps for IT security management controls and implementation are: prioritize risks, respond to risks, and __________ .
 
  What will be an ideal response?



elizabethrperez

  • Sr. Member
  • ****
  • Posts: 344
Answer to Question 1

First, an evaluation of the scope of the change, the sponsor's commitment to the change, the change agent's skills, and the expected support or resistance must be performed. This assessment will help determine if the scope of the change is doable; whether the sponsors are strongly enough committed to push the change through; whether the change agents have the skills required to implement the change; and the strength of the resistance of the change targets. By attending to these issues, technological change can be implemented more successfully.

Answer to Question 2

monitor risks



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Drying your hands with a paper towel will reduce the bacterial count on your hands by 45–60%.

Did you know?

Only one in 10 cancer deaths is caused by the primary tumor. The vast majority of cancer mortality is caused by cells breaking away from the main tumor and metastasizing to other parts of the body, such as the brain, bones, or liver.

Did you know?

Bacteria have flourished on the earth for over three billion years. They were the first life forms on the planet.

Did you know?

If all the neurons in the human body were lined up, they would stretch more than 600 miles.

Did you know?

Parkinson's disease is both chronic and progressive. This means that it persists over a long period of time and that its symptoms grow worse over time.

For a complete list of videos, visit our video library