Access over 20 million homework & study documents

search

risk assessment (10pgs)

Rating

Showing Page:
1/14
Running head: RISK ASSESSMENT 1
Risk Assessment
Name
Institution

Sign up to view the full document!

lock_open Sign Up
RISK ASSESSMENT 2
Introduction
Event management requires the use of various information technology systems to
organize events and tasks in order to avoid mishaps and poor time management. Often,
applications are designed in order to manage the smooth transition of events and efficient
conduction of activities within a firm, whereby the actor introduces an argument into the system
before the activation of the process. The use of risk assessment techniques is crucial to event
management systems in order to evaluate the probable outcomes of an event. In this paper, a risk
assessment table has been designed for the purpose of proper management of a music festival
event.
Event Table
This table documents the activities expected during the preparation phase and through the
entire event. The event table illustrates the set up cost, precursor activities leading to other
subsequent activities scheduled for the successful hosting of the event. Risk evaluation has been
conducted in terms of activity cost or expenses. The event is the matter in question, while the
trigger stands for the external event that sets the process in motion, and the source and
destination represent the major players and respondents in the process. The response represents
the output expected from the exercise upon activating the trigger (Whitten, 2007).
The event table is often described as a table of information or data that is usually
compiled to a log file whereby for every possible and probable situation, there is a set of
procedures to be followed and the outcome or the process followed appears in an Analysis
window. In the event table illustrated below, one can view timing information regarding a
specific event or events that are expected to take place during the scenario introduced. Often,

Sign up to view the full document!

lock_open Sign Up
RISK ASSESSMENT 3
only stimulus procedures bearing significance appear in an event table. Additionally, for
advanced risk assessment methods that utilize IT, the event table is designed such that the
resolution of the given times lasts for about 0.1 milliseconds (Shelly, 2010), while events
introduced in the advanced assessment table bear event codes to ease tracking. The event table’s
uncertainties act as the upper limit such that the outcome uncertainty value becomes the extreme
value beyond which the computer cannot go.
The following is an event table for music festival management.
Event
Event
Type
Trigger
Source
Use Case
Response
Destination
Shares
Purchase
Share
enquiry
Shareholder
Share
availability
Share
availability
details
Firm
Shares
Sale
Shareholder’s
enquiry
Firm
Share
pricing
Share
pricing
details
Shareholder

Sign up to view the full document!

lock_open Sign Up

Unformatted Attachment Preview

Risk AssessmentNameInstitutionIntroduction Event management requires the use of various information technology systems to organize events and tasks in order to avoid mishaps and poor time management. Often, applications are designed in order to manage the smooth transition of events and efficient conduction of activities within a firm, whereby the actor introduces an argument into the system before the activation of the process. The use of risk assessment techniques is crucial to event management systems in order to evaluate the probable outcomes of an event. In this paper, a risk assessment table has been designed for the purpose of proper management of a music festival event.Event TableThis table documents the activities expected during the preparation phase and through the entire event. The event table illustrates the set up cost, precursor activities leading to other subsequent activities scheduled for the successful hosting of the event. Risk evaluation has been conducted in terms of activity cost or expenses. The event is the matter in question, while the trigger stands for the external event that sets the process in motion, and the source and destination represent the major players and respondents in the process. The response represents the output expected from the exercise upon activating the trigger (Whitten, 2007). The event table is often described as a table of information or data that is usually compiled to a log file whereby for every possible ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4