Saturday, December 28, 2019

The Center For Disease Control And Prevention - 1506 Words

Project Proposal Description I will be evaluating the Center for Disease Control and Prevention’s (CDC’s) One Only Campaign. This educational public health campaign has been led by the CDC in partnership with the Safe Injection Practices Coalition (SIPC) (CDC, 2015). Evaluating the Channels and Messages I will utilize the Theory of Reasoned Action and the Framework for Effective Campaigns to evaluate this public health educational campaign (Valente, 2001). I will apply course concepts to analyze the Safe Injection Practices How to do it Right video and investigate the audio PSA for injection safety called, ‘Protect Patients by Using Single- and Multi-Dose Vials Correctly’ which has been aired on the radio (CDC, 2015). Following my analysis of these two campaign messages, I will offer my views of issues that the sponsors of this campaign may have overlooked and what unintended effect may occur in response to this public health message. Message Source and Target Audience The Safe Injection Practices Coalition (SIPC) is a CDC-led partnership that is comprised of healthcare-related organizations, patient advocacy groups, healthcare industry partners, and other public health entities which was established in 2009 and is responsible for developing the ‘One Only’ campaign (CDC, 2015). The SIPC devised the ‘One Only’ campaign with the goals of improving education and awareness to empower healthcare providers and patients and encourage them to mandate safe methodsShow MoreRelatedCenters for Disease Control and Prevention629 Words   |  3 PagesCDC Centers for Disease Control and Prevention Weam Khadim PBHE501-American Public University May 21, 2013 Dr. Shalah Watkins-Bailey Centers for Disease Control and Prevention Center for Disease Control and Prevention is a national public health federal agency under Department of Health and Human Services headquartered in Atlanta, Georgia. It is division of Department of Health and Human Services responsible for managing national programs for control and prevention of communicable diseasesRead MoreThe Center For Disease Control And Prevention1467 Words   |  6 PagesProject Proposal Description I will be evaluating the Center for Disease Control and Prevention’s (CDC’s) One Only Campaign. This public health educational campaign has been led by the CDC in partnership with the Safe Injection Practices Coalition (SIPC). Evaluating the Channels and Messages I will utilize the Theory of Reasoned Action and the Framework for Effective Campaigns to evaluate this public health educational campaign (Valente, 2001). I will utilize course concepts to analyze theRead MoreCenters For Disease Control And Prevention Essay735 Words   |  3 PagesCenters for Disease Control and Prevention. CDC-Funded HIV Testing: United, States, Puerto Rico and the U.S. Virgin Islands. Atlanta, Georgia 2014. An 85-page HIV funding and testing guideline issued by the Center for Disease Control and Prevention (CDC) in 2014. The document highlights the steps that organizations providing HIV testing and services must follow, upon receiving a HIV positive test result. This process includes uniting the medical and social aspects of HIV care for patients. The documentRead MoreCenters For Disease Control And Prevention Essay753 Words   |  4 Pages1. Centers for Disease Control and Prevention. CDC-Funded HIV Testing: United, States, Puerto Rico and the U.S. Virgin Islands. Atlanta, Georgia 2014. An 85-page, 2014, Center for Disease Control (CDC) issued guidelines for HIV funding and testing. The document highlights the steps that organizations proving HIV testing and services must follow, upon receiving a positive HIV test results. This process includes uniting medical and social aspects of HIV care for the patient by providing referrals toRead MoreThe Center For Disease Control And Prevention1218 Words   |  5 Pages Sharp Safety Procedures and Guidelines Kelli Bauman Bake University School of Nursing NU332: Foundations of Nursing November 11, 2015 Sharps Safety Procedure and Guidelines The Center for Disease Control and Prevention (2011, para. 2) defines a sharps injury as, â€Å"a penetrating stab wound from a needle, scalpel, or other sharp object that may result in exposure to blood or other body fluids.† Different types of sharps include intravenous cannulas, butterfly needles, hypodermicRead MoreThe Center For Disease Control And Prevention1562 Words   |  7 PagesFindings Furthermore, the Center for Disease Control and Prevention (CDC) reported that studies, as noted before, have shown PrEP reduces the risk of getting HIV through sexual intercourse by more than 90% and by more than 70% among populations who inject drugs when taken regularly. Gay or bisexual men increase their chance of being exposed to the virus if they have had anal sex without a condom, been diagnosed with an STD during the past 6 months or are in a relationship with an HIV-positive partnerRead MoreThe Center For Disease Control And Prevention1497 Words   |  6 Pages1. The Center for Disease Control and Prevention (CDC) had many key audiences it was required to communicate with during the Ebola outbreak. Most importantly, the CDC needed to be communicating with employees within the CDC. They needed to be on the same page as to how messages were being released and controlled, as this was a very sensitive subject. Furthermore, it was imperative that heath care providers around the world were receiving appropriate information. U.S. government agencies, the WorldRead MoreThe Centers Of Disease Control And Prevention856 Words   |  4 PagesThe Centers of Disease Control and Prevention also known as the CDC is the leading federal agency that provides information in all areas of health and safety. The CDC has been at the forefront in numerous areas of medical research and has now taking on the role of providing information about Attention Deficit Hyper Activity Disorder commonly known as ADHD. There are a variety of neurodevelopment disorders, and ADHD is considered to be the most common even though it was first documented in 1902. TheRead MoreThe Centers For Disease Control And Prevention1783 Words   |  8 PagesThe Centers for Disease Control and Prevention (CDC) reports, the cause of death to be roughly 720,000 citizens in the United States die from cardiovascular disease each year (Centers for Disease Control and Prevention, 2014.) Deaths’ relating to cardiovascular disease have slightly dropped annually since the 1980’s. Coronary artery disease is the most prevalent type of cardiovascular disease in the U.S. and it kills around 400,000 Americans annually (Murphy, Xu, Kochanek, 2013.) Statistics likeRead MoreThe Centers For Disease Control And Prevention2870 Words   |  12 PagesProgram Description The Centers for Disease Control and Prevention (CDC) is an organization that was created to protect America from health threats both foreign and domestic. This organization fights diseases, educates citizens and provides care. The Centers for Disease Control and Prevention is funded by the CDC’s Procurement and Grants Office (PGO) that receives it budgets through contracts, contributions and cooperative agreements. One of the programs that the CDC has developed through its funding

Friday, December 20, 2019

Security Policies And The Security Plan - 1441 Words

Security Policies The critical factor of network development is security planning. Without doing a full hazard appraisal, it is unrealistic to get ready for security. This security arranging includes creating security policies and executing controls to keep PC dangers from getting to be reality. Figure 7 : Security Plan Every organization is distinctive and should arrange and make policies based upon its individual security objectives and requirements. The danger assessment gives a baseline to implementing security arrangements to ensure resources against different dangers. There are three essential inquiries one needs to request that all together enhance the security of a system. †¢ What resources inside of the organization needs protection †¢ What are the dangers to each of these assets †¢ How much time period, expenditure and effort is the organization willing to consume to update or get new sufficient security against these dangers. Creating Security Polices and Controls An organization s security plan comprises of security approaches. Security approaches give particular rules for ranges of obligation, and comprise of arrangements that give steps to take and standards to take after to implement the policies. Policies must be in such away that which we consider more important and what are the steps we are going to take to safe guard them. Different types ofShow MoreRelatedA Security Plan Policy For An Dod Information Protection From Loss Of Confidentiality, Integrity, And Availability1246 Words   |  5 Pagesforces, and 718,000 civilian personnel. With such a huge organization does come with a huge network, and security infrastructure network, and the burden to protect the information transferred or stored on that network. This means information is a strategic asset to the Department of Defense; it’s therefor the goal of this security policy to provide guidelines of implementing information security and awareness to insure that information transferred or stored over the DoD network is appropriately protectedRead MorePlan And Implement A Security Policy For Protect Our Financial, Intellectual And Customer Data From External Threats799 Words   |  4 PagesRecommendation to plan and implement a security policy in order to protect our financial, intellectual and customer data from external threats. The rising number of cyber security attacks is a problem that is growing more advanced everyday. In 2014 cyber attacks against large corporation increase 40 percent from the previous year (Carey, 2015). Due to these threats small businesses through large multi-national corporations are under immense scrutiny as to how they are dealing with protecting theirRead MoreU.s. Department Of Homeland Security1668 Words   |  7 Pages1. Purpose Among one of the missions of The U.S. Department of Homeland Security is to protect and preserve the security of the Cyberspace in the country. The principal objective of this Security Plan is to give instructions and direction for the Department’s workers and help the Homeland Security to create best practices and strategies in the IT security system. 2. Scope This policy needs to be applied to all users, employees, contractors, suppliers and to all IT resources such as e-mails, filesRead MoreInformation Systems Security Survey Essay1206 Words   |  5 Pages Information Systems Security Survey CSIA 303 Assignment 1 University of Maryland University College October 10, 2014 Information Systems Security Survey The University of Nebraska Medical Center (UNMC) is an institution that was built back in the 19th century. UNMC’s mission is to improve the health of Nebraska through premier educational programs, innovative research, the highest quality patient care, and outreach to underserved populations (UNMC, 2004). As an institution withRead MoreBusiness Continuity Planning And Disaster Recovery1359 Words   |  6 Pagessurvive on log run, executives must give priority to Disaster recovery (DR) and Business continuity (BC) plan during budget allocations and never see a payback from those investments. Disasters won t happen daily, they rarely occur. But when it happens and if the company doesn t have a Plan or mechanism to fast recover, then that company loses its customer to its competitors. Business continuity plan includes steps company must take to minimize the service outages. Organizations must have a system inRead MoreThe Ethics And Ethics, Prevention And Protection1459 Words   |  6 PagesThe Security professional is a must to understand the law and ethics, prevention and protection, security issues and controlling the risk associated with the programs. The report would present the governance, policies, the implementation and procedures and the standards ensures the security of the organization. The main aim is to control the risk to an extent, so the organization can withstand and protect the organization assets from being attacked are very crucial and while working with the sensitiveRead MoreImplementing A Company s Security Plan Essay1089 Words   |  5 PagesAssignment- Security Jean Robert Robillard BUSN624: Principles of E-Commerce APUS Professor: Alex Lazio 11/27/16 Weekly Assignment-Security 1. Identify and describe the five main steps in establishing a company’s security plan? The IT department of e-commerce firms must have a security plan to protect the technologies and assess the risks. Laudon and Traver identify five steps in establishing and assessing the company’s security plan. The followings are the steps: risk assessment, security policyRead MoreThe Security And Security Policy Essay791 Words   |  4 PagesThe purpose for an IT security policy is to provide â€Å"strategy, policy, and standards regarding the security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of theRead MoreEffective Information Security Policy Elements864 Words   |  4 PagesEffective Information Security Policy Elements In the world today technology is used everywhere, no matter if it is personal or business. Although technology has become important for so many reasons, there is also a measure of security that must be taken for protection. Policies are put into place for protection the organization from fall into a pitfall. It has also helped the organization to build better relations with personals, and build growth within the cooperate industry. There a several waysRead MoreA Plan For Reactive And Proactive Security Planning1173 Words   |  5 Pages Policy Implementation Student : Andre Ealy Instructor : Steve Powelson University of Phoenix CMGT / 582 June 29, 2015 Security Planning After assessing the risk invovled with the organization infrastructure. The next step is security planning which involves developing controls and policies with techniques to help with security. The security strategies will define a plan for reactive and proactive security planning. The planning is developed to protect the company assets. Reactivly

Thursday, December 12, 2019

The Theme Of Corruption In Shakespeare’s Hamlet Essay Sample free essay sample

Introduction Corruptness can be seen in different signifiers. given to deliver by different writers and played to perfection by assorted characters. This is the instance in William Shakespeare’sHamlet. The play’s cardinal premiss is that corruptness permeates the lives of people who are near to it. It can be easy seen in the drama as it unfolds scene by scene and can be witnessed even until the terminal of the drama wherein the corruptness of the characters. the land and the existences of the people reach their pinnacle. In the drama. Hamlet. it starts with Horatio and the other guards witnessing the shade of their male monarch who has late passed off. This troubled male monarch left his lone boy. Hamlet who so finds himself seeking to pass on with the shade. He follows the shade and so learns that his father’s decease was a planned slaying. Because of this Hamelet seeks retaliation and begins to move queerly in the presence of his people. Rosencratz and Guildenstern are Hamlet’s friends from his instruction and they spy on Hamlet consequently. Meanwhile. Hamlet finds that he would travel about exposing the slaying to the male monarch by composing a drama similar to the fortunes environing the slaying. The drama is acted out in forepart of the male monarch and when he notices the similarity. he bolts out of the room. Gertrude negotiations to Hamlet in her room in order to hold Hamlet open up about his actions. Meanwhile Polonius fells in the room with the motivation of listen ining on Hamlet. Hamlet on the other manus decides to slay the male monarch but delaies when he sees the male monarch praying. Hamlet. being called upon by his female parent senses that there is an eavesdropper in the room stabs the concealment figure and so manages to kill Polonius. Hamlet unsuccessful at his purpose to convert his female parent that the male monarch is huffy so learns about the male monarchs orders to set him to his decease. Because of this. Hamlet so writes a missive that would set his bodyguards to decease. Hamlet learns that Ophelia committed self-destruction because of the decease of her male parent. He so stumbles upon Laertes. who is Ophelia’s brother and the king’s boy in the entombment. One of the efforts to kill Hamlet goes to Gertrude. which is a poisoned drink. While Laertes uses a blade with a poisoned tip. Hamlet manages to kill Laertes and lets him complete the drink. In the terminal. no 1 is left and all who have been corrupted dice. The cardinal subject of the drama is all about corruptness. You will be able to see it through the different lives that have been intertwined in the drama. It can be seen that the assorted characters who are involved in the drama seem to hold one thing in common—they have all been corrupted in one manner or another. If one looks at the different waies that these people have gone through. one will detect that there is more to the superficial motivations of the people. If one looks at Hamlet from a really personal position. if you did non cognize the different fortunes was playing around him. you would likely believe that he has gone huffy. That is in fact. what other people thought about him. Claudius There are so many degrees of corruptness that one can happen in the drama. One of that is the mental type of corruptness. Cladius really articulately puts it when he says. â€Å"Through disposition disposition be crisp as will: my stronger guilt lickings my strong purpose ; and like a adult male to duplicate bussiness bound. I stand in intermission where I foremost Begin and both neglect` ( Act 111. scene 11 ) He seems to happen himself corrupted in a manner that he has no control over it. This is why he was able to slay the male monarch himself through the secret plan that was given to Hamlet by his father’s shade. This is a testament to the fact that people can be corrupted in ways that they don’t know about. Wormald references that there is a corruptness of both human and natural orders in this drama merely because of the despicable nature of the workss that the narrative perpetuates. ( Wormald. 2002 ) Because of this. the character of Claudius can be considered as a really astute and cagey individual. In the drama. he is known to be person manipulates different events every bit good as people for the exclusive intent of staying inexperienced person. However. he is every bit guilty as any liquidator who kills a individual firsthand. The difference with Claudius is that he becomes really manipulative and with the corruptness inside of him. he so proceeds to pervert other people as good. Claudius’s accomplishment at fraudulence frequently hides his true purpose. One of the illustrations of this sort of action can be seen when he incites Laertes to kill Hamlet when he says. â€Å"Laertes. was your male parent beloved to you? Or are you like the picture of a sorrow. a face without a bosom? † ( Act 4. scene 7 ) The Kingdom of Denmark The Kingdom of Denmark is a land that can be described as being drowned in corruptness. Because of the assorted corruptness being portrayed in the drama. it is. no uncertainty. one of the beginnings of corruptness for the full drama. Hunt describes this universe as â€Å"a universe that has undergone a extremist autumn or transmutation into an ‘unweeded garden’ overwhelmed with corruptness. † ( Hunt. 2004 ) One could even overlook that the queen so fleetly married the uncle of Hamlet and merely concentrate on the fact that the queen even married Hamlet’s uncle after the decease of the former male monarch. This peculiar case frowned upon by Parker when he mentions that the really act of the queen and the new male monarch yoke in bed is as if the act is â€Å"stewed in corruption† ( Parker. 2003 ) Another thing that could be seen as corrupted in the land is the manner that the King plotted to kill Hamlet by the offering of a drink with toxicant. This i s one of the cases that the corruptness within the political model of a land is highlighted. ( Alexander. 1972 ) Queen Gertrude One of the corruptnesss that can be seen in this character is the corruptness in her morality. It is rather obvious that there was something incorrect with the manner that everything was orchestrated merely because of one of Hamlet’s remarks about how fast her female parent married Claudius. Hamlet says â€Å"a small month. or ere those places were old. with which she followed my hapless male parents body. like Niobe. all tears-why she even she†¦married with my uncle† ( Act 1. cene 11 ) The manner Hamlet phrased it is in a manner speculative and at the same clip reminiscent of an immoral behaviour. Even though one could reason the hurting that being left with no 1 to soothe her in all sorts of ways. the fact remains that the queen did non even sorrow his father’s absence. It could be gleaned from the confession of the Ghost when he called Claudius as â€Å"that incestuous. that debased animal. † Because of this. the corruptness that was present at the clip was really important because it shed visible radiation on the character of Claudius even before the decease of the male monarch. Because the shade called the king an fornicator. it hence follows that the male monarch. while he was alive. knew of what was go oning between her married woman and Claudius. This now sheds new information on how moral corruptness has permeated even the queen. Ophelia With respect to Hamlet’s merely love. Ophelia. her corruptness could be classified as holding no right thought when she committed self-destruction. Even in the face of decease. it would take person who is non sane to take her ain life. Although one could merely reason that the heartache that Ophelia was so great because her male parent was apparently murdered. it would still take some kind of corruptness for Ophelia to be able to perpetrate self-destruction. Because of the corruptness that rubbed off Ophelia. all the prevarications and the fraudulence around her began to take its toll and what was planted in her head finally began to unknot. Decision The land. the demoiselle. the queen and the king—all of them are finally caught and consumed in this intricate spider’s web of prevarications. fraudulence and corruptness in the latter phase of the drama. In the centre of all of the corruptness is Hamlet. He sees the fornicator. he manages to by chance kill person and finally he is consumed by the corruptness with his decease. All of the things. topographic points and people that are in the drama Hamlet all go about portraying about a universe gone incorrect because of corruptness. With that being said. it should be surmised that corruptness can non be contained in oneself. It will finally distribute throughout the different countries of one’s immediate milieus. All of the darkness that resides in a individual will distribute to others if it is non stopped early on. Ultimately. all of the corruptness in the lives of the characters in the drama consumed them wholly. either on intent or otherwise. It is an often-used cliche when people say that absolute power corrupts perfectly. In the instance of Hamlet and the other characters. they served as first-class illustrations of the result of corruptness. Bibliography Wormald. Mark. ( 2002 ) .Hopkins. Hamlet. and the Victorians: Carrion Comfort.Victorian Poetry. Vol. 40. Hunt. Maurice. ( 2004 ) .â€Å"Forward Backward† Time and the Apocalypse in Hamlet. Comparative Drama. Vol. 38. Alexander. Nigel. ( 1972 ) .Poison. Play. and Duel: A Study in Hamlet. Renaissance Quarterly. Vol. 25. No. 4 Thomson. Ann. ( 2006 ) .Hamlet Arden Shakespeare: Third Seriess. Arden. Wales.

Wednesday, December 4, 2019

ICT Project Management and Methodology

Question: Discuss about the ICT Project Management and Methodology. Answer: Project methodology and its role in project management According to Kerzner (2013), a project is defined as a planned set of interrelated tasks that is used to accomplish a common goal over a fixed period and within certain cost and other limitations. However, these projects have to be managed throughout their life cycle from initiation stage to the closing state. Thus, according to Schwalbe (2015) project methodologies are used to manage these projects through the application of knowledge, skills, tools, and techniquesin order to meet theprojectrequirements and are considered as a guiding process for project managers. Image1: Project Life Cycle (Source: Kerzner 2013) A project methodology is a model that is used for design, planning, implementation and achievement of their project objectives. Burke (2013) depicts that selection of an appropriate methodology will benefit the project to accept and resolve the evolved risk with high proficiency. Moreover, Tomanek and Juricek (2015) portrays that project methodologies provide strategic benefits, tactical benefits and operational benefits to the project. Strategic benefits signify the ability to assess the risks that large projects encompass and apply relevant strategies to overcome those risks. Tactical benefits resemble the situation to evaluate the validity of status assessments and ensure early recognition and correction of the risk for a project; whereas, operational benefits allows a project manager to deliver cost-effective, schedule-compressed solutions by empowering the team members to accomplish the project in a correct way (Cooke, 2016). PRINCE2 and Agile project methodology Compare and Contrast Image2: PRINCE2 project methodology for project development cycle (Source: Cooke, 2016) PRINCE2 concentrates on controlling the delivery of products and not emphasize on the quality of the project while agile project methodology provides a flexible approach for building the projects with required quality for every phase of the project life cycle. Moreover, Tomanek and Juricek (2015) portrays that the PRINCE2 is a project methodology for designing a project and Agile is the development tools for making the software better. Image3: Agile project methodology for project development cycle (Source: Thiemich and Puhlmann, 2013) Thiemich and Puhlmann (2013) illustrated that Agile project methodology focuses on collaboration for developing software along with the client and this is done by defining and prioritizing requirements, developing, evaluating and considering feedback from customers for every cycle of iterations. On the other hand, PRINCE2 defines the interface between the project and skilled team members project manager, team manager and project board. Similarities and differences PRINCE2 and Agile project methodology that is used for developing software for accomplishing certain business objective or purpose. These project methodologies have the similarity to provide significant flexibility and speed that result in increased customer satisfaction, effective cost control, improved communication and efficient decision-making (Antunes et al., 2015). PRINCE2 project methodology Agile project methodology Principle The business case for the project has to be present during the life cycle of the project. Revisiting of the project owner for assessing the backlog of the project Learning aspect The development of software using PRINCE2 needs previous experience of the project manager. The entire project is developed in modules and after accomplishments of each module; the team members revised the sprint for making it better (Antunes et al., 2015). Documentation PRINCE2 is documented in product based planning and focussed on products and their quality The team member notes the project requirements and criteria and these criteria are used for developing projects whose quality will be judged on the quality of each sprint. Requirement Change The project have to be tightly controlled The project does not have to be tightly schedule and can be changed according to the client's requirements at any time. Scope PRINCE2 accurately predicts the project requirements and the future demands Agile methodology is used for formulating perfect software to capture as much as efficiency in giving time and budget. Used techniques PRINCE2 uses business case; change control, quality review and product based planning (Tomanek Juricek, 2015). The agile methodology uses Timeboxing, prototyping, agile modeling, prioritize requirement list and MoSCoW prioritization (Cooke, 2016). Table 1: Difference between PRINCE2 and Agile project methodology (Source: Created by Author) Relation of PRINCE2 and Agile project methodology with project life cycle (PLC) Saad et al. (2014) portrays that PRINCE2 (PRojects IN Controlled Environments) offers guidelines, recommendations, and processes for planning the formulation of the software. PRINCE2 helps the project managers to reach project goals with an optimal use of resources. During the project life cycle, PRINCE2 helps the formulation of the software manage by stages and majorly emphasizes on three processes of the project life cycle- "initiating a project", "managing a stage boundary", and "starting up a project". In project life cycle, there are four stages- initiation, planning, execution/monitoring and termination of a project. Agile project methodology provides flexibility to make changes in the module of a software development and the testing of each module can be integrated from initiation point to termination point at the end of developing the entire software (Thiemich Puhlmann, 2013). This methodology also emphasizes more on the regular communicationapproach with the customers so that they can evaluate whether all their criteria will be fulfilled or not. Reference List Antunes, B., Santos, D., Lopes, E., Fidalgo, F., Alves, P. (2015). Blisstrail: An Agile Project Business Case Study.Procedia Computer Science,64, 529-536. Burke, R. (2013). Project management: planning and control techniques.New Jersey, USA. Cooke, J. L. (2016). PRINCE2 Agile. Kerzner, H. R. (2013).Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Saad, S., Ibrahim, A., Asma, O., Khan, M. S., Akhter, J. (2014). PRINCE2 MEthodology: AN INNovAtIvE WAy foR IMPRovINg PERfoRMANCE of MAlAysIAN AutoMotIvE INdustRy.The Journal of Technology Management and Technopreneurship (JTMT),1(1). Schwalbe, K. (2015).Information technology project management. Cengage Learning. Thiemich, C., Puhlmann, F. (2013). An agile BPM project methodology. InBusiness Process Management(pp. 291-306). Springer Berlin Heidelberg. Tomanek, M., Juricek, J. (2015). Project risk management model based on PRINCE2 and SCRUM frameworks.arXiv preprint arXiv:1502.03595.