Portfolio approach to information technology security resource allocation decisions

Size: px
Start display at page:

Download "Portfolio approach to information technology security resource allocation decisions"

Transcription

1 Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC Abstrct This pper presents portfolio optimiztion pproch to informtion technology (IT) security investment decisions in n orgniztion. This pproch hs been motivted by the extreme vritions tht re found in IT security requirements for orgniztions in ddition to the diversity of strting conditions found in orgniztions tht choose to embrk on forml pproch to mnging their security. Often, budgetry lloction is mde for IT security nd IT mngers nd mngement re fced with the problem of how to llocte these monies or resources cross competing projects nd products tht cn potentilly improve or enhnce IT security in n orgniztion. Insted of rnking or rting the vrious lterntives bsed on their benefits only, it is demonstrted how, by identifying orgniztionl objectives, nd then ligning the decisions with the objectives, one cn optimlly llocte resources cross the IT security portfolio. The pproch in this pper hs been to provide generic decision frmework tht cn be customized by prctitioners nd fine-tuned by other reserchers. The pproch is explined nd then the results re discussed using cse study. Both the strengths nd weknesses of this pproch re highlighted nd suggestions for how this pproch cn be deployed nd enhnced re provided. Keywords: IT security, resource lloction, decision theory, nlytic hierrchy process, optimiztion Introduction Spending on IT security is projected to grow by 24 percent (compounded nnully) between 2001 nd 2006 (Roberts 2003). Orgniztions re spending hevily not only on IT security but lso on security in generl. As the IS function mtures, mny orgniztions hve forml informtion system pln (which my include n IT pln lso). This implies tht there exists forml IS strtegy tht is ligned with the orgniztionl strtegy. In such cses, we cn ssume tht the informtion security pln would be prt of the lrger IS pln. By impliction, since the informtion security pln would be derived from, nd consistent with, the IS pln, it would lso be ligned with the orgniztionl strtegy. The issue of spending on IT security is well summed up by Levinson (2002) who quotes n IT professionl, we hve no fer of spending money, but we hve to do it wisely. 286

2 According to Swnson et l. (2003), resource lloction responsibilities, in vrious forms, reside with the hed of the orgniztion, the CIO, the security progrm mnger nd the progrm mnger or the system owner. The ultimte responsibility, however, resides with the hed of the orgniztion. While Swnson et l. (2003) refer to federl government gencies, this distribution of responsibility holds for ny orgniztion in generl. The impliction of such shred nd ultimte responsibility is tht every decision mker nd (preferbly) every orgniztionl stkeholder needs to understnd why certin decisions were tken, how they were tken nd the implictions of such decisions going wrong. The problem for ny mnger requesting funds is to convince budgetry uthorities to llocte the requisite resources (most typiclly, funds). The problem for the individul(s) who mke the lloction decision is to understnd the need for such funds nd then mke decisions well wre of the trdeoffs tht my ensue. In essence, informtion security decisions, like mny decisions, need first, trnsprent decision process nd second, prsimonious wy of communicting the decision frmework. In essence, IT security resource lloction decisions require significnt orgniztionl investments. The gol of such decisions is to mximize the vlue of such investments (whether one time or ongoing). The objective of this pper is to present one such decision mking frmework tht helps orgniztions nlyze nd understnd their security concerns in ddition to helping them leverge their investments in informtion security. The pper is presented s follows. First the IT security investment problem is described nd definitions of key terms re provided. Then portfolio optimiztion pproch to the problem is proposed. Such nd pproch is justified primrily by invoking the contextul nd unique nture of IT security needs of n orgniztion. Then the ppliction of this pproch is presented using rel life cse study to explin how the model ws developed nd how the results cn be interpreted. The pper is concluded by pointing out some weknesses of this pproch s lso highlighting the strengths. In ddition suggestions for improving this frmework re lso mde. Problem description In n orgniztion, informtion security or informtion technology security often rers itself s criticl issue. This mens tht orgniztions often wke up to security problems when they ctully encounter (or expect to encounter) security-relted incident or when security incident hs occurred in nother orgniztion tht this proximl to itself incresing the likelihood of its hppening in tht orgniztion. Alterntively, orgniztions cn be mndted by regultory bodies to meet minimum security stndrds. Budgetry processes re instrumentl in driving most investment decisions in orgniztions (OMB 2005). Given tht IT security-relted decisions fll into the criticl ctegory nd tht there is often regultory dedline or high opportunity cost ssocited with mking mistkes with such decisions, there re two, often, conflicting gols in this decision-mking sitution () tke decision expeditiously nd, t the sme time, (b) exercise due diligence. 28

3 The decision is often compounded by the fct tht there lwys so much to do when it comes to IT security simply becuse there re so mny potentil vulnerbilities in ny orgniztionl system (not just the informtion system). Aprt from the informtion technology infrstructure (tht, mong other things, includes networks, dtbses nd pplictions), orgniztionl processes hve to be mde secure just s people hve to be trined to chnge their security relted behviors. Not only does this tke high initil investment, it lso requires continuous strem of recurrent investments to reinforce nd sustin the existing stndrds of IT security. As result, the IT security investment decision is one tht needs to be mde every yer in order to ressess the IT security gols nd relign investments (or spending) with those gols. The nture of orgniztionl decision-mking is not perfect. Previling orgniztionl bises nd tensions due to competing demnds for the sme set of resources nd the lck of perfect informtion require tht trdeoffs be mde nd in doing so judgments be used. Judgments re subjective nd we need to encpsulte such subjectivity in meningful wy. For instnce, when compring two security products (sy, firewll), regrdless of how crefully we develop criteri to compre them, there will eventully remin level of subjectivity when we compre these products bsed on those criteri. More importntly, when we ttempt to evlute the vlue of n investment in IT security such n evlution is necessrily multifceted nd complex. The reserch motivtion for this pper ws provided by Bodin et l. (2005) who hve identified the need for using quntittive mesures (like NPV) nd Gordon nd Loeb (2006) who hve identified AHP s one of the pproches to resource lloction in IT security decisions. While both ppers ttempt to provide bsis to mke meningful investments for IT security, there gps tht cn be ddressed. For instnce, Gordon nd Loeb (2006) cknowledge tht the bility to ccurtely estimte benefits is key fctor in using NPV effectively. However, s Rodewld (2005) hs observed ROI is poor metric to use when compring IT security investments to investments tht yield tngible return. So, in this pper, multi-ttribute mesure to evlute IT security benefits is suggested. Secondly, Bodin et l. (2005) hve suggested tht the rtio of benefits to costs my be better metric to employ when mking resource lloction decisions in the context of IT security. It is shown tht such n pproch my not be indeed so nd tht focusing on benefits is the most optiml pproch. Methodology Liner progrmming pproch is combined with the nlyticl hierrchy process to demonstrte how IT security investments cn be effectively leverged by n orgniztion. While every orgniztion hs its own specific gols IT-security relted objectives, we present somewht generic pproch (tht cn be customized by other users) by identifying three brod objectives (G1, G2 nd G3) bsed on security service ctegories shown in Tble 1. Security service Ctegory Description Security Progrm (C11) Mngement Mngement objectives: re those tht hve to do with Security Policy (C12) (G1) the orgniztion s overll computer security progrm. 288

4 Risk Mngement (C13) Security Architecture (C14) Certifiction nd Accredittion (C15) Security Evlution of IT Products (C16) Contingency Plnning (C21) Incident Hndling (C22) Testing (C23) Trining (C24) Firewlls (C31) Intrusion Detection (C32) Public Key Infrstructure (C33) Opertionl (G2) Technicl (G3) These gols re met bsed on how well the computer security progrm nd risk re mnged within the orgniztion. These could include meeting regultory complince nd minimize enterprise-wide disruptions. Opertionl objectives: re focused on controls implemented nd executed by people (s opposed to systems). For these gols to be met technicl or specilized expertise tht rely on mngement ctivities nd technicl controls need to be in plce. These gols could include meeting certin level of diffusion of personl firewlls in the orgniztion nd ensuring certin cycle time for recovering from virus ttck. Technicl objectives: hve to do with security controls involving computer system. These gols depend on the proper functioning of the system. These gols could include n upper bound on the number of successful virus ttcks or ensuring tht certin minimum number of computers re prt of third-prty uthentiction frmework. Tble 1. Security services nd gols (Adpted from Grnce et l., 2003, p. 5-1) The logic of the pproch is tht the resources being invested in IT security hve to be ligned with the IT security gols. Once the objectives re identified nd the lterntives identified (these re projects or inititives tht re shown in Appendix A), the criteri re estblished to evlute how well certin lterntives meets prticulr spect of gol. These re shown in Tble 1 in the first column. For instnce the mngement objective hs six components. For instnce C23 is the third criterion for the second gol. An lterntive is evluted on how importnt it is to meeting the requirements of ech component. Bsed on this the decision hierrchy tht we develop is shown in Figure 1. The 8 lterntives (A1 through ) re shown hnging from ech of the criteri tht hve been identified. The decision hierrchy lso shows tht t ech node we hve comprison mtrix, the order of which is the number of elements being compred. For instnce, t the gol node, the comprison mtrix is of order 3, since there re three gols being compred. 289

5 Gol G1 G2 G C11 C12 C13 C14 C15 C16 C21 C22 C23 C24 C31 C32 C33 A A A A A A Figure 1. The AHP hierrchy used to generte priorities for the eight projects shown in Appendix A The pproch to constructing the AHP hierrchy in this pper deprts from tht dopted by Gordon nd Loeb (2005) in tht the gol of IT security is designed to be mximlly ligned with tht of the orgniztionl gols. Hence, one does not necessrily hve to limit themselves to technicl criteri. Using this pproch llows n orgniztion to dopt more integrtive pproch towrd conceptulizing nd budgeting for IT security. Using this tree, reltive importnce of the gols is mesured using pir-wise comprison. This step is repeted for the criteri to evlute ech lterntive. After prioritizing the objectives, the IT security lterntives re scored, using either pir-wise comprisons (which cn be tedious) or bsolute rting scles nd utility curves (typiclly non-liner). Once the finl priorities for the lterntives re obtined, they re subjected to sensitivity nlysis to ensure tht the judgments re vlid. The complete set of results re shown in Appendix B. Following this, the portfolio for benefits subject to funding is optimized bsed on dependency nd other constrints. The typicl form for this optimiztion would be n Mximize Expected vlue of IT security Benefits = B i Subject to 1. Budget constrint 2. Dependency constrint (if x is funded, then y hs to be funded or not funded) 3. Some projects cn be prtilly funded while other cn not be 4. Specific constrints Where B i is the benefit ssocited with the i th project. B i s cn be generted s AHP priorities (since they re generlly qulittive) or by some other method. In this study ExpertChoice version ws used to generte benefit priorities using the AHP hierrchy shown in Figure 1. These computtions cn lso be ccomplished using Microsoft Excel nd the built-in optimizer (the Solver Addin). A i= 1 A A A A A A 290

6 Dt nd Anlysis In this section the dt re presented tht were be used to llocte resources mong IT security lterntives. Issues such s which projects re funded nd why, wht the trdeoffs re, wht the nture of those trdeoffs re, nd wht re the implictions of using different pproches to llocting resources for IT security inititives re scrutinized. Tble 2 shows the benefits derived using the AHP structure shown in Figure 1 (See Appendix B). A1 through re the lef nodes for the tree shown in Figure 1. The vilble budget is tken to be $200,000 (See Appendix A). Project Id A1 Project definition End user trining (trining progrms nd online mteril development) Benefit Cost ($) End user support (firewll nd nti virus softwre) A3 Upgrde nd mintin server for firewll A4 A5 A6 Revise nd improve security process udit nd qulity office process Estblish IT security tsk force (for security plnning nd coordintion) Estblish seprte security progrm office (for SOX nd regultory complince reporting) A Security opertions group trining (5 progrms per yer) Emil spm filter enhncement Tble 2. List of ll the projects, their benefits nd the ssocited costs Three pproches re presented to llocted resources cross IT security projects. They include benefit mximiztion, benefit to cost rtion mximiztion nd mximiztion of benefits using liner progrmming. Benefit mximiztion When ttempting to mximize benefits the project tht provides the mximum benefit is chosen nd selected to be funded. Then the project with the next highest benefit is picked select to be funded nd this process continues till the budget is exhusted or the next project to be funded mkes the totl cost exceed the vilble budget. Tble 3 shows tht if project A4 is funded the totl lloction exceeds the budgeted mount of $200,000. Project Cumultive Benefit Cost Id cost A A

7 A A A A Tble 3. Benefits, costs nd cumultive costs for the projects sorted by benefits Totl benefits dd up to nd the ctul benefits (from the projects tht were funded) dd up to Similrly ll the benefits to cost rtios dd up to 2.218E-05 nd the totl of benefits to cost rtios of projects tht were ctully funded dd up to 1.259E Hence the effectiveness of this lloction from benefit mximiztion perspective is 63.0% 2. Similrly, the effectiveness of this lloction from benefit to cost mximiztion stndpoint is 56.8%. Benefit/cost rtio mximiztion The pproch to mximizing the totl of benefit to cost rtios is identicl to the pproch for mximizing benefits. The primry difference is tht insted of using benefits to select projects, benefits to cost rtios re used to mke the selection. Tble 4 shows the projects sorted in descending order bsed on the benefit/cost rtio. The project with the highest benefit to cost rtio (in this cse project A1) is chosen to be funded, followed by the project with the next highest benefit to cost rtio nd this process continues till the budget is exhusted or till the next project to be funded mkes the totl lloction overshoot the vilble budget. Note tht by employing this pproch one is ble to fit in one more projects into the vilble budget. While, budget utiliztion ws not n explicit gol, this pproch hs been ble to increse benefits in such s wy tht more projects re funded. Project Benefit / Cumultive Benefit Cost Id cost cost A E E A E A E A E E A E A E Tble 4. Benefits, costs, benefits/costs nd cumultive costs for the projects sorted by benefits/costs 1 Actul totl benefits re composed of ll the benefits bove the dshed line in Tble 3. Similrly ctul totl benefits to cost rtios re computed from the sme set of projects tht re bove the dotted line. 2 (0.43/0.694)*100 = 63.0% 292

8 Using this pproch nd s shown in section 4.1, the effectiveness of lloction from benefit mximiztion stndpoint is 59.9% nd from benefit to cost mximiztion stndpoint is 80.4%. Benefit mximiztion with budget constrints In this pproch liner progrmming (LP) is used to mximize benefits subject to budget constrints. The cnonicl form of the generlized LP formultion becomes Mximize IT security benefits = B i F i Subject to the following constrints n i=1 C F Budget i i n i= 1 All F i s re integers tht cn tke vlue 0 or 1 Where B i = benefit ssocited with lterntive i C i = cost ssocited with lterntive i F i = decision vrible ssocited with lterntive i For this problem, B i s nd C i s re obtined from the benefits nd cost columns respectively in Tble 2. Solving for F i s, we obtin the following solution: F 1 = F 3 = F 4 = F 5 = F = F 8 = 1 nd F 2 = F 6 = 0. This implies tht projects/inititives 2 nd 6 re not funded; everything else is. Using this pproch the effectiveness of lloction from benefit mximiztion perspective is 1.6% nd from the benefits to costs rtio stndpoint is 8.03%. Tble 5 summrizes the results. Effectiveness of lloction with respect to Approch Benefits/Costs Benefits Rtio Benefit mximiztion 63.0% 56.8% Benefit to cost mximiztion 59.9% 80.4% Liner Optimiztion 1.6% 8.03% Tble 5. Effectiveness of three resource lloction pproches from the benefits nd benefits/costs rtio perspectives. Tble 5 clerly shows tht the optimiztion pproch is much more effective thn the either the benefit mximiztion or the benefits/costs mximiztion pproch. 293

9 Discussion The issues of how nd why one obtins better resource lloction effectiveness when we one uses LP nd why it mkes sense in the context of IT security investments is tken up for discussion. Subsequently, how this pproch hs been ble to meet the two decision objective tht hd identified in the beginning of the pper is tken up for discussion. In terms of IT security portfolio decision effectiveness, it is cler from Tble 5 tht singulr focus on IT security benefits fils to provide the most effective lloction policy for IT security resources. Figure 2 shows comprison of IT security resource lloction pproches by using three efficient frontiers for ech of the lloction pproches. The numbers bove the rrows show the number of projects tht cn be funded using prticulr pproch. For instnce using the benefits only pproch (Section 4.1) we cn only fund four projects Figure 2. Comprtive effectiveness for resource lloction strtegies. Interestingly, the pproch tht hs been dvnced by Bodin et l. (2005) is shown to be the lest effective. They propose tht the rtio of benefits to costs cn be used to provide more bng for the buck. However, s the second efficient frontier (bsed on the benefits/costs rtio) shows, the efficiency, in terms of mximizing benefits, is consistently lower thn the other two pproches. So, while the effectiveness of this pproch is more thn tht of relying purely on benefits to llocte resources, it is less effective thn the LP-bsed resource lloction pproch. While this my not lwys be so (Formn 2001), the LP-bsed benefit mximiztion pproch mkes sense becuse our im is to mximize the benefits ssocited with IT security. The gol in the pproch dopted in this pper is not to spend s much of the budgeted mount s possible. While the ltter my be relistic orgniztionl gol (to void budget reductions in subsequent budgeting cycles, especilly in orgniztions tht prctice zero-bsed budgeting), it is fr 294

10 more importnt to spred the investment. From n IT security perspective it is more importnt to provide coverge for ll identified res of vulnerbilities thn to optimize one or two selected res. Therefore, it is more effective to fund two smller IT security projects, the combined vlue for which my be (mrginlly) more thn one lrge project tht my send the cumultive cost over budget. It hs been shown tht the proposed method for mking IT security portfolio decisions is prsimonious. This shows tht one of the gols of decision-mking in the context of IT security hs been met. As mentioned in the beginning of this pper, one of the gols of decision mking in the context of IT security is to tke decisions expeditiously. This implies tht prsimonious decision mking frmework is needed one tht helps decision mkers tke the best decision without investing unresonble time nd resources. While there re lterntive pproches s those suggested by Butler (2002), Gordon nd Loeb (2006) nd Cvusoglu et l. (2004), they re encumbered by the need to collect lrge body of informtion tht is either composed of rre events (IT security filures nd ssocited estimtes of costs tht cn be ttributed to such filures) or series of estimtes. The suggested pproch is lso extensible in tht if, the gol ws to minimize risk, then insted of ssessing benefits, risks could be expressly ddressed. In ddition, if benefits re combined with risks, one could compute expected benefits. This could done so by computing risks for ech lterntive using seprte AHP model nd use the priorities tht re generted s probbilities of filure (p) ssocited with the different project. The expected vlue of ech of the lterntives could then be obtined by multiplying benefits by (1-p,) the probbility of success. The pproch to IT security decisions presented in this pper lso meets the objective of ensuring due diligence. Identifying the orgniztionl IT security gols nd further by identifying the criteri tht re used to evlute how these orgniztionl security gols re met, not only ensures tht the decision problem is fully enumerted (from completeness perspective), but lso ensures tht n orgniztion responds to IT security issues tht re specific to its context nd not generic security tht form prt of the best prctices pproch. Neubuer et l. (2005) hve identified the criticlity of orgniztionspecificity in the context of IT security relted investment decisions. Conclusion This pper hs shown how to formulte the IT security portfolio decision s one where multiple lterntives (inititives or projects) cn to be evluted bsed on multiple criteri (some of which my be subjective) in order to meet multiple gols (mny of which my conflict with ech other). A generic pproch to IT security resource lloction hs been provided tht is flexible nd cn be customized for ny orgniztion. In doing so, it hs been demonstrted how IT security investments decisions cn be mximlly ligned with the orgniztionl security gols. In ddition, given the bsence of normtive bsis to judge how good decision is, it hs been shown how to optimize IT security resource lloction decisions keeping in mind the orgniztionl context nd other singulrities tht re specific to the decision t hnd. This work cn be extended nd enriched by 295

11 incorporting constrints tht re not budgetry. These include those constrints tht involve must fund projects, dependency constrints (if project A is funded then project B hs to be funded or if project A is funded then project B cn not be funded) nd constrints tht llow projects to be prtilly funded. In summry, it is believed tht the proposed pproch to IT security resource lloction will llow n orgniztion to mximize the vlue of its IT security investments, improve communiction nd lignment between IT groups, user nd mngers nd llow It security plnners to schedule resources more efficiently. References Bodin, L. D.; Gordon, L. A. nd Loeb, M. P. Evlution informtion Security investments using the Anlytic Hierrchy Process, Communictions of the ACM, (48:2), 2005, pp Butler, S. A. Security Attribute Evlution Method: A Cost-Benefit Approch, Proceedings of the 24th Interntionl Conference on Softwre Engineering (ICSE 2002), Orlndo, FL, 2002, pp Formn, E. H. nd Selly, M., A. Decision by Objectives, World Scientific Publishing Co: River Edge, NJ, Gordon, L. A. nd Loeb, M. P. Budgeting Process for informtion security expenditures, Communictions of the ACM, (49:1), 2006, pp Grnce, T.; Hsh, J.; Stevens, M.; O Nel, K.; nd Brtol, N. Guide to Informtion Technology Security Services Recommendtions of the Ntionl Institute of Stndrds nd Technology, NIST Specil Publiction , 2003, (lst ccessed on Mrch 22, 2006). Neubuer, T.; Klemen, M. nd Biffl, S. Business process-bsed vlution of ITsecurity, ACM SIGSOFT Softwre Engineering Notes, 2005, (30:4), pp OMB Circulr No. A 11. Informtion technology nd e-government, 2005, (lst ccessed on Mrch 22, 2006). Roberts, P. Security Spending Swells, IDG News Service (PC World), 2003, (lst ccessed on Mrch 22, 2006). Swnson, M.; Brtol, N.; Sbto, J.; Hsh, J. nd Grffo, L. Security Metrics Guide for Informtion Technology Systems, NIST Specil Publiction , 2003, (lst ccessed on Mrch 22, 2006). Whetmn. V.; Smith, B.; Schroder, N.; Pesctore, J.; Nicolett, M.; Alln, A. nd Mogull, R. Wht Your Orgniztion Should Be Spending for Informtion Security, The Grtner Group, Mrch 2005, 296

12 (lst ccessed on Mrch 22, 2006). Appendix A: The security projects or inititives The eight security projects of inititives re shown below for n operting division of n orgniztion tht hs mture IT setup nd hs been ccording the highest importnce to IT security s prt of its lrger security nd IT inititive. Since it is finncil institution in lrge urbn setting on the est cost in the US, the $200,000 IT security budget for recurring expenditure items is considered verge 3. Inititive project or End user trining (trining progrms nd online mteril development) End user support (firewll nd nti virus softwre) Upgrde nd mintin server for firewll Revise nd improve security process udit nd qulity office process Estblish IT security tsk force (for security plnning nd coordintion) Estblish seprte security progrm office (for SOX nd regultory complince reporting) Description In-house nd outsourced trining progrms for selected end-users nd their representtives. This is n recurring ctivity tht needs to tke plce every yer. The intent is to ensure tht ll end users re exposed to t lest one such trining progrm every two yers. This is prt of the overll help desk support system. This is n outsourced ctivity nd 2 FTEs (full time equivlent) re budgeted for this ctivity. The bundled cost for the server, instlltion nd testing long with the nnul cost of mintining it is reflected. Security processes need to be revised constntly. One hlf FTE (internl) is budgeted for this ctivity. The IT security tsk force needs to meet every month nd tke decisions on the direction of IT security nd liise with externl bodies like regultory gencies, stndrds bodies nd key business prtners. The cost reflects coordintion, dministrtive nd meeting costs. This requires specific ttention to IT security from the stndpoint of Srbnes-Oxley Act. This office will form the interfce between IT security, internl udit nd the qulity group. One FTE nd office nd dministrtive expenses re budgeted. ($) Budget In generl, orgniztions tend to spend 3 percent to 6 percent of totl IT spending on IT security (Whetmn et l., 2005). 29

13 Security opertions group trining (5 progrms per yer) Emil spm filter enhncement. This is the set of nnul trining progrm for the internl IT security group professionls. Five progrms ttended by five persons ech nd their trvel nd expenses re budgeted for. Emil spm hs been source of constnt problems. Enhncements of the softwre nd prt- mnpower re reflected in this budgeted figure Appendix B: Screenshots for computing smple priorities Figure B2.1. Screen showing the gol, objectives, criteri nd lterntives Figure B2.1 shows how priorities (benefits) ssocited with lterntives were computed. The screenshot shows specific scenrio (not the one used for computtions in the body of the pper). The gol is shown s Mximize IT security Portfolio. The three objectives hve to do with meeting mngement, opertionl nd technicl benefits. The criteri used to ssess the extent to which requirements re met (nd benefits cptured) re shown s the lef nodes on the tree on the left. The number longside ech of the elements shows the importnce of the elements. For instnce, in this cse, the opertionl objectives re rted s.62 while the mngement nd technicl objectives re rted s.063 nd.265 respectively. The dvntge of these rtio scles is tht we cn sy the 298

14 opertion objective is 2.5 (.62/.265 = 2.54) times more importnt thn the technicl objective nd the technicl objectives re four times (.265/.063 = 4.21) more importnt thn the mngement objectives. The criteri for ech of the objectives re interpreted the sme wy. For instnce, from mngement perspective, certifiction nd ccredittion is 1.2 (.201/.163 = 1.23) times more importnt thn the security rchitecture; or from technicl perspective, the benefits of intrusion detection (in generl) is computed to be one-third (.230/.62 =.342) s importnt s firewlls. In the sme wy, the items on the right side of the screenshot in Figure B2.1 show the lterntives nd their priorities (benefits). The most importnt project (i.e. the one with the highest reltive benefits is Revise nd improve security process udit nd qulity office process followed by Upgrde nd mintin server for firewll. These finl rtings for benefits were produced by providing rtings for ech of the lterntives bsed on ech of the criteri s shown in Figure B2.2. Figure B2.2. Screen showing the lterntives nd how they were rted bsed on ech criterion 299

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Application of Analytical Hierarchy Process (AHP) Technique To Evaluate and Selecting Suppliers in an Effective Supply Chain

Application of Analytical Hierarchy Process (AHP) Technique To Evaluate and Selecting Suppliers in an Effective Supply Chain Appliction of Anlyticl Hierrchy Process (AHP) Technique To Evlute nd Selecting Suppliers in n Effective Supply Chin Shhroodi 1*, Kmbiz, Industril Mngement Deprtment, Islmic Azd University (Rsht Brnch),

More information

Assessing authentically in the Graduate Diploma of Education

Assessing authentically in the Graduate Diploma of Education Assessing uthenticlly in the Grdute Diplom of Eduction Dr Mree DinnThompson Dr Ruth Hickey Dr Michelle Lsen WIL Seminr JCU Nov 12 2009 Key ides plnning process tht embeds uthentic ssessment, workintegrted

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors Journl of Technology Reserch Dt qulity issues for ccounting informtion systems implementtion: Systems, stkeholders, nd orgniztionl fctors ABSTRACT Hongjing Xu Butler University Qulity informtion is one

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF) ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2 Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Protection of Critical Information Infrastructure in Korea

Protection of Critical Information Infrastructure in Korea Protection of Criticl Informtion Infrstructure in Kore Kim, Woonyon 2005. 10 Ntionl Security Reserch Institute Contents Ntionl Cyber Security Mngement System Criticl Informtion Infrstructure (CII) Mngement

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Long Term Financial Planning

Long Term Financial Planning Long Term Finncil Plnning Overview of New Pltform City of Knss City, Missouri 2013 2018 Long term finncil plnning combines finncil forecsting with finncil strtegizing to identify future chllenges nd opportunities

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

Why is the NSW prison population falling?

Why is the NSW prison population falling? NSW Bureu of Crime Sttistics nd Reserch Bureu Brief Issue pper no. 80 September 2012 Why is the NSW prison popultion flling? Jcqueline Fitzgerld & Simon Corben 1 Aim: After stedily incresing for more thn

More information

Lump-Sum Distributions at Job Change, p. 2

Lump-Sum Distributions at Job Change, p. 2 Jnury 2009 Vol. 30, No. 1 Lump-Sum Distributions t Job Chnge, p. 2 E X E C U T I V E S U M M A R Y Lump-Sum Distributions t Job Chnge GROWING NUMBER OF WORKERS FACED WITH ASSET DECISIONS AT JOB CHANGE:

More information

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 - A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Performance Evaluation of Academic Libraries Implementation Model

Performance Evaluation of Academic Libraries Implementation Model Performnce Evlution of Acdemic Librries Implementtion Model Luiz Bptist Melo CIDEHUS UE nd Librries of the Fculty of Science, University of Porto (Applied Mthemtics nd Botnicl Deprtments) Ru do Cmpo Alegre,

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion

More information

Health Information Systems: evaluation and performance of a Help Desk

Health Information Systems: evaluation and performance of a Help Desk 536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

2015 EDITION. AVMA Report on Veterinary Compensation

2015 EDITION. AVMA Report on Veterinary Compensation 2015 EDITION AVMA Report on Veterinry Compenstion AVMA Report on Veterinry Compenstion 2015 EDITION Copyright 2015 by the All rights reserved. ISBN-13: 978-1-882691-31-9 AVMA Report on Veterinry Compenstion

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

Understanding Life Cycle Costs How a Northern Pump Saves You Money

Understanding Life Cycle Costs How a Northern Pump Saves You Money Understnding Life Cycle Costs How Nrn Pump Sves You Money Reference: Hydrulic Institute (www.s.g) Introduction Wht Life Cycle Cost (LCC) Clculting Totl LCC LCC Components Wht Life Cycle Cost Life Cycle

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

Improving Library Users' Perceived Quality, Satisfaction and Loyalty: An Integrated Measurement and Management System

Improving Library Users' Perceived Quality, Satisfaction and Loyalty: An Integrated Measurement and Management System Improving Librry Users' Perceived Qulity, Stisfction nd Loylty: An Integrted Mesurement nd Mngement System by Anne Mrtensen nd Lrs Gr0nholdt This rticle describes the development nd ppliction of structurl

More information

FDIC Study of Bank Overdraft Programs

FDIC Study of Bank Overdraft Programs FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- - rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

How To Study The Effects Of Music Composition On Children

How To Study The Effects Of Music Composition On Children C-crcs Cognitive - Counselling Reserch & Conference Services (eissn: 2301-2358) Volume I Effects of Music Composition Intervention on Elementry School Children b M. Hogenes, B. Vn Oers, R. F. W. Diekstr,

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

Combined Liability Insurance. Information and Communication Technology Proposal form

Combined Liability Insurance. Information and Communication Technology Proposal form Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

D T IC. 052 Research Laboratory D A 0 05

D T IC. 052 Research Laboratory D A 0 05 I JI Iw I1m I@ US Army Corps of Engineers Construction Engineering,s o,,ad-a205 :,Lo 052 Reserch Lbortory D A 0 05 USA-CERL TECHNICAL REPORT P-89/09 December 1988 Dt Envelopment Anlysis s Tool To Evlute

More information

Anthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20%

Anthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20% Anthem Blue Cross Life nd Helth Insurnce Compny University of Southern Cliforni Custom Premier 800/20%/20% Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge Period: 01/01/2015-12/31/2015

More information

The mean-variance optimal portfolio

The mean-variance optimal portfolio ALEXANDRE S. DA SILVA is vice president in the Quntittive Investment Group t Neuberger ermn in New York, NY. lexndre.dsilv@nb.com WAI LEE is the chief investment officer nd hed of the Quntittive Investment

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014

Note: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014 Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

Current Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015

Current Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015 Current Topics Implictions for Complince Orgniztions Presenttion to the IIB October, 2015 This presenttion contins generl informtion only nd Deloitte is not, by mens of this presenttion, rendering ccounting,

More information