Justifying Spam and Virus Security Investments: A Case Study. Hemantha Herath 1 and Tejaswini Herath 2

Size: px
Start display at page:

Download "Justifying Spam and E-mail Virus Security Investments: A Case Study. Hemantha Herath 1 and Tejaswini Herath 2"

Transcription

1 Justfyng Spam and E-mal Vrus Securty Investments: A Case Study Hemantha Herath 1 and Tejaswn Herath 2 Abstract: Our paper nvestgates the problem of justfyng securty nvestments concernng spam and emal vrus usng real lfe data from a mdsze North Amercan unversty. We formulate the spam and emal vrus securty problem as a captal budgetng problem usng operatng characterstc (ROC) curves n a decson theoretc framework. Pror research has nvestgated the optmal confguraton n a detecton system focusng on hackng. In a corporate settng when makng the case for nformaton securty not only the technology specfc detecton costs but other costs (captal expendtures, operatng costs and opportunty costs) have to be consdered. We contrbute to the current lterature by nvestgatng the spam emal and vrus problem and demonstratng how theoretcal research can really be appled n practce through a real lfe case study. 1. Introducton Investments n nformaton securty have been recognzed as an mportant ssue by both practtoners and academcs alke. However, what should be the Return on Securty Investments (ROSI) and the approprate level of nvestments has been a controversal topc (Cavusoglu et. al. 2004). The return on securty nvestment or the loss wthout securty nvestments s hard to quantfy due to dffculty n defnng and measurng the full array of benefts. The mpact of nformaton securty breach may well be fnancal, n the form of costs (ncreased nsurance costs, equpment rental/purchase for recovery, overtme costs, etc.), loss of productvty, revenue (drect loss of 1 Correspondng author, Assocate Professor of Manageral Accountng, epartment of Accountng, Faculty of Busness, Taro Hall 240, 500 Glenrdge Avenue, St. Catharnes, Ontaro, Canada L2S 3A1.; Tel: (905) Ext. 3519; Fax: (905) ; E-mal: [email protected] 2 octoral student, epartment of MIS, State Unversty of New York at Buffalo, NY, USA 1

2 downtme, lost future revenues), and fnancal performance (credt ratng, stock prce). However, more serous are the dffcult to quantfy or the hdden costs such as damaged reputaton that may have a negatve mpact on customer, suppler, fnancal market, banks and busness allance relatonshps (Camp and Wolfram 2004). espte of the controversy surroundng ROSI, t s wdely recognzed that organzatons have become so dependant on computer based and telecommuncaton ntensve nformaton systems that dsrupton of ether may cause outcomes rangng from nconvenence to catastrophe. As e-commerce contnues to grow, so wll cyber crme and the need for IT securty. Informaton securty whch once was consdered as just overhead costs s now wdely recognzed as an mportant nvestment of busness operatons (Cagnem, 2001). Corporate spendng on nformaton securty contnues to grow sgnfcantly. Ths has resulted n a growng stream of research n nformaton securty. Gordon and Loeb ( 2002) however, pont out that much of nformaton securty research has focused on techncal aspects of nformaton securty (such as encrypton, bandwdth, ntruson detecton software and securty archtecture) or behavoral aspects of reducng nformaton securty breaches whle there has been very lttle research devoted to the economc aspects of nformaton securty. Along wth the tradtonal approaches mentoned n numerous textbooks, several researchers have nvestgated economcs of nformaton securty. The semnal research n ths area can be dentfed wth the work of Gordon and Loeb (2002, 2003) and Cavusoglu and Raghunathan (2004), Cavusoglu et.al (2005). As dscussed n Cavusoglu (2004), researchers have consdered dfferent approaches to determne the effectve level of IT securty nvestments. For example, Hoo (2000) provdes a tradtonal decson analytc framework to evaluate dfferent IT securty polces based on cost-beneft tradeoffs. He consders not only the costs of securty 2

3 controls and expected loss from securty breaches but also addtonal profts expected from new opportuntes. Longstaff et.al (2000) show that nvestment n systematc rsk assessment reduces the lkelhood of ntrusons yeldng benefts much hgher than the nvestment cost. Gordon and Loeb (2002) propose a model to dentfy the optmal level of securty nvestment (an nteror optmal soluton) based on the dentfcaton of potental securty volatons n terms of ther damage and lkelhood. They argue that allocaton of funds to nformaton securty should be smlar or at least based on cost and beneft terms smlar to allocatng funds to any other actvtes usng captal budgetng technques such as net present value (NPV) or more advanced real opton technques and/or game theory. Cavusoglu and Raghunathan (2004), Cavusoglu et.al. 2004, 2005) explore the optmal confguraton of detecton software by usng decson and game theory approaches. Ther framework s more rgorous snce t allows features specfc to IT technologes to be consdered. Whle these studes provde valuable nsght nto dfferent securty vulnerabltes ncludng hackng there s no one sze ft all type model soluton. For example, the game theory approach tres to analyze the optmal securty nvestment problem as a game between a hacker and the organzaton. It s unque to stuatons of ntrusons where a hacker has a motve aganst a partcular organzaton. However, n a scenaro such as the securty problem of spam and e-mal vrus, whch ths paper focuses on, the malcous user may not have a motve aganst a partcular organzaton. Then t may be more approprate to treat the securty problem as a game aganst nature. In a spam and vrus emal securty scenaro the game theoretc approach may not be the best approach but decson theoretc methods seem more approprate. Our paper nvestgates the problem of justfyng IT securty nvestments concernng spam and emal vrus securty usng real lfe data from a mdsze North Amercan unversty. We 3

4 formulate the spam and emal vrus securty the problem as a captal budgetng problem usng operatng characterstc (ROC) curves n a decson theoretc framework as n Ulvla and Gaffney (2004) and Cavusoglu and Raghunathan (2004). Cavusoglu and Raghunathan (2004), focus on fndng the optmal confguraton (.e. optmal qualty parameters) n a detecton system. In a corporate settng when makng the case for nformaton securty not only the technology specfc detecton costs but other costs (captal expendtures, operatng costs and opportunty costs) have to be consdered. We contrbute to the current lterature n two ways, frst, by nvestgatng spam and emal vrus securty problem. Second, demonstratng how theoretcal research can really be appled n practce through a real lfe case study. The paper s as follows. Secton 2 starts wth the case example by provdng a bref descrpton of an unversty emal servce archtecture currently n place and confguraton alternatves. Secton 3 summarzes pror work that dentfes specfc features of nformaton technology securty. In secton 4 we ncorporate these confguraton specfc characterstcs n a captal budgetng model that can be used to make the case for nvestments n IT securty nvestments. Secton 5 provdes an applcaton example wth real data and secton 6 concludes. 2. Exstng Unversty Emal Servce Archtecture The north amercan unversty (hereafter referred to as NAU) consdered n ths study s a mdsze unversty wth over 18,000 full and part tme students wth approxmately 1200 staff and faculty. We consder the e-mal servces at ths unversty as our applcaton case study. Many recent surveys report that vruses pose a sgnfcant threat to nformaton technology systems. The 2004 ecrme watch survey reports that vrus and other malcous codes were the most frequent type of electronc crmes (77%) experenced by organzatons. SPAM 4

5 and phshng e-mals also ranked hgh n the lst of electronc crmes commtted. A recent CSI/FBI survey (2004) notes that, although attacks on computer systems have declned steadly n last few years, vrus attacks remans hghest compared other types of attacks causng maxmum dollar losses. Whle there are varous sources for vrus propagaton, the 2004 ICSA survey shows that vrus propagaton by e-mal pose the greatest threat. As llustrated n Table 1 n recent years emal vectors contnues to be the prmary means of vrus spread. Table 1: Vrus Propagaton Vrus Source E-mal Attachment 9% 26% 32% 56% 87% 83% 86% 88% Internet ownloads 10% 16% 9% 11% 1% 13% 11% 16% Web Browsng 0% 5% 2% 3% 0% 7% 4% 4% on t Know 15% 7% 5% 9% 2% 1% 1% 3% Other Vector 0% 5% 1% 1% 1% 2% 3% 11% Software strbuton 0% 3% 3% 0% 1% 2% 0% 0% skette 71% 84% 64% 27% 7% 1% 0% 0% Source: ICSA Labs 9 th Annual Computer Vrus Prevalence Survey, 2004 In addton to the drect damage the vrus e-mals pose, spam e-mals also adversely affect organzatons. Spam e-mals affect the productvty of the employees, e-mal server storage space and have bandwdth mplcatons. Organzatons contnue to deal wth these problems usng several mechansms. For example, organzatons may use dfferent e-mal server archtectures dependng resource avalablty and securty levels. Fgure 1 depcts the archtecture used for e-mal servces at NAU. 5

6 SMTP server E-mal flterng software Freeware Grey Lst Clam Ant Vrus Unversty e-mal On-campus and Off-campus users Internet through ISP Frewall Spam Home Spam Assassn Mmedefang Outsde e-mal Gmal, Yahoo Fgure 1: E-mal servces archtecture All ncomng e-mals wth NAU e-mal address passes through a frewall. Along wth other actvtes, the frewall checks the e-mal (as well as web) traffc for any potental vrus nfectons. The allowed-to-pass (ATP) through e-mal traffc s then dverted to SMTP server. The emals are stored on the SMTP server tll they are retreved by the e-mal recpent. Several flters are confgured to dentfy malcous or spam e-mal. Snce all organzatonal e-mals are fltered, the locaton of a recpent whether on-ste (at unversty premses) or off-ste does not make dfference. However, e-mals receved on thrd party e-mal servces such as Yahoo, GMal, Hotmal and others, do not get scanned and therefore ncrease NAU s systems vulnerablty. In Table 2 we tabulate e-mal transactons data for a two day perod from NAU system for ts exstng confguraton whch we call Opton II. As seen there are 238 detected vrus nfectons n a span of two days. These along wth other non-productve e-mals such as SPAM and phshng, pose a sgnfcant productvty as well as IT securty ssue to NAU. 6

7 Table 2: NAU E-mal Statstcs (October 24-26, 2005) Outgong Incomng Total e-mal transactons Incomng Vrus 298 Spam 9924 Reject Longform User Grey Trplet (Whte, Black, New) and Msc Passed Accepted Mal n Archtecture for e-mal Securty In Fgure 2 we show the e-mal flterng process at NAU. All external traffc ncludng e- mal and web traffc passes through the frewall. The unauthorzed traffc fltered by the frewall s dropped and remander s passed to approprate servers. E-mal traffc whch s routed to SMTP server can orgnate from both known and unknown sources. E-mals from unknown sources are subject to extra scrutny. E-mals consdered malcous are dropped and others grey lsted for further nvestgaton. One type of nvestgaton to verfy authentcty ncludes requestng the sendng machne to resend the e-mal message wthn a specfed tme (say 20 mnutes). If the resent emal s agan receved by the NAU server wthn the stpulated tme then the sender s assumed to be authentc. That message s removed from grey lst and delvered to the ntended recpent. However, f the sender s not authentc and the messages are not resent as majorty tmes n case of spam, then the messages are dropped. Other flters have dfferent processes for verfyng authentcty. Based on the confguraton that allows the extent of montorng, a sgnal score s calculated and compared aganst a threshold to classfy an emal as 7

8 harmful or harmless. rop 1 E-mal Pass Frewall 2 Un-known sources Pass 3 Consdered malcous rop Known sources 4 Pass Grey Lst 5 6 Harmful 7 Harmless 8 Harmful 9 Harmless 10 - Montor the sgnal score - Take acton based on score and threshold Fgure 2: NAU Emal Flterng Process 2.3 Securty Confguraton Alternatves There are many flters avalable as freeware, whch are qute effectve. However, these flters need to be confgured and that requres sklled labor. ependng on the level of the securty desred the labor hours allocated to confguratons may vary. Off-the-shelf products are also avalable whch need relatvely less number of, nearly neglgble, hours to mplement. However, the cost of the product as well as the level of securty t provdes may dffer from an n-house developed confguraton. At the tme of nvestng n IT securty at NAU, several optons were avalable to the 8

9 decson makers as shown n Fgure 3. These nclude opton I (low level of securty confguraton), opton II (medum level of securty confguraton), opton III (hgh level of securty confguraton) and opton IV (off-the shelf box). The decson makers also had to argue the case for whch confguraton would be the best gven NAU s budget, as many other unverstes NAU operates on a tght annual budget. Fgure 3 shows captal expendture costs n the mplementaton phase. Next sectons detals how IT nvestment planers could make the case for justfyng IT securty spendng. Grey Lst Clam Ant Vrus Spam Home Cost = Hardware (20,000)+ Labor (500 hrs) Hardware + Freeware Grey Lst Clam Ant Vrus Spam Home Spam Assassn Mmedefang Cost = Hardware (20,000)+ Labor (1000 hrs) E-mal flterng solutons Grey Lst Clam Ant Vrus Spam Home Spam Assassn Mmedefang AddFl1 AddFl2 AddFl3 AddFl4 Cost = Hardware (20,000)+ Labor (1300 hrs) Out of Box Soluton Cost = Soluton (45,000)+ Labor (mnmum) Fgure 3: Confguraton Alternatves 3. Pror Related Research 9

10 We follow the recevng operatng characterstc (ROC) approach by Ulvla and Gaffney (2004) Cavusoglu and Raghunathan (2004) for comparng the effectveness (or qualty profle) of dfferent confguraton of the emal gateways. The approach s based on classcal statstcal theory where the ROC curve provdes the relatonshp between the two classfcaton errors n a detecton system. The two error classfcatons are false postve whch occurs when the system classfes an authorzed transacton as malcous and false negatve where a malcous transacton s classfed as authorzed. We use smlar notaton used by above authors to be consstent 3. Let s be a numercal score used by detecton software based on transacton data and t the threshold score. The system classfes a transacton as a malcous/fraudulent f s > t. The numercal scores for authorzed (normal) transactons sn and unauthorzed (fraudulent) transacton s F s assumed to follow exponental dstrbutons wth parameters λ N and λ. efne F λ r λf = as the rato of mean score N of normal transactons to that of fraudulent transactons. Then the relatonshp between the qualty parameters of the detecton system, probablty of detecton P and probablty of false postve P F s gven by the ROC curve as P = r P F transacton as H 0 and an unauthorzed transacton as H1 then,. Notce that f one denotes an authorzed P = Pr( H 1 H1s P F = Pr( H 1 H 0 s true). There s also the error of a false negatve gven by 1 P = Pr( H 0 H1s true) but, ths s taken care of by P tself. true) and The decson tree for confgurng a detecton system s shown n Fgure 4. The detecton uses the scored transactons to provde sgnal to flag the state of the transacton as an unauthorzed transacton a sgnal (.e. wth probablty x ) or not classfed as unauthorzed a no sgnal 3 To avod confuson, for the numercal score, we use s here nstead of x as x s also used for the probablty of a sgnal. 10

11 (.e. wth probablty 1 x ). Let ψ denote the proporton of malcous emals, then the probablty of a sgnal and no-sgnal are gven by: P(no - sgnal) P(sgnal) = F = F x = P ψ + P (1 ψ ).(1) 1 x = (1 P ) ψ + (1 P )(1 ψ ).(2) Usng the Baye s rule then one can obtan the followng posteror probabltes P(malcous sgnal) = η1 = Pψ P ψ + P (1 ψ ) F.(3) P(malcous no - sgnal) = η2 = (1 P (1 P ) ψ ) ψ + (1 P F )(1 ψ ).(4) Costs Authorzed c 1 1 η 1 B Sgnal Grey lsted or dropped s>t x Malcous η 1 c Emal transactons A No Sgnal Authorzed s<t 1 x C Authorzed 1 η 2 0 η 2 Malcous d Fgure 4: Probablty tree for a gven Confguraton We assume that f the detector sgnals a fraud then t s nvestgated and f t does not sgnal t s not nvestgated. Ths s a smplfyng assumpton but can be relaxed as n Cavusoglu 11

12 and Raghunathan (2004) where a decson wll be taken n both sgnal and no-sgnal state whether or not to nvestgate. The costs pertanng to the termnal states are shown n Fgure 4. We defne ( c ) as the cost of an nvestgaton for correctly sgnaled malcous e-mals, ( c 1 ) as opportunty cost of lost productvty plus the cost to nvestgate f an authorzed transacton s ncorrectly sgnaled as malcous, and ( d ) as the damage from an undetected fraud. Usng equatons 1, 2, 3 and 4 and takng the expected values at each node n the probablty tree and foldng back we compute the expected cost of the detecton system confguraton as a functon of the qualty parameters P and P F of the system gven by E ( C ) cp ψ + d(1 P ) ψ + c1p (1 ψ ).(5) = F Ths result s dentcal to the frm s expected cost under Regon 2 n Cavusoglu and Raghunathan (2004), pg 137. Our smplfcaton, whether or not to nvestgate dd not mpact the cost snce Regons (1) and (3) are of no nterest to system evaluators as proved n Cavusoglu and Raghunathan (2004). In Cavusoglu and Raghunathan (2004), under the decson theory approach, the optmal confguraton (.e. optmal qualty parameters) s found by mnmzng Equaton 5. Whle ths approach provdes the corner soluton of the confguraton t does not consder how the nformaton systems budget would affect the system confguraton or the captal budgetng problem. In the next secton, we ncorporate confguraton specfc characterstcs n a captal budgetng model that can be used to make the case for nvestments n IT securty nvestments. 4. Investment Model Every securty system has costs and requres tradeoffs. Most securty costs money, sometmes substantal amounts; but other tradeoffs may be more mportant, rangng from matter 12

13 of nconvenence and comfort to ssues nvolvng basc freedoms lke prvacy. These cost/beneft tradeoffs have to be consdered when undertakng securty nvestments. Typcally the benefts of nformaton securty nvestments wll ntally ncrease but may eventually reduce snce the probablty of breach wll reduce as level of nformaton securty nvestments ncrease. The cost of nformaton on the other hand may ntally ncrease slowly but may ncrease at a hgher rate due to access restrcton placed by more controls at hgher levels of secured IT envronments. 4.1 efnton of Terms and Varables : Index for project 4 s : Level of nformaton securty (expressed as an ndex) assocated wth project I : Base level of nformaton securty nvestment cost 0 I : Informaton securty nvestment cost assocated wth project Bˆ : Beneft (cost savngs) assocated wth preventng a securty breach by nvestng n s level of nformaton securty Ĉ : Total nformaton securty related cost (excludng nvestment costs) a 0 : Annual avodable fxed operatng costs pertanng to project a 1 : Varable cost per unt level of nformaton securty pertanng to project a 2 : Quadratc cost term reflectng ncreasng margnal cost per unt level of nformaton securty pertanng to project C : Cost of a securty breach f no nformaton securty nvestment s made B Pr( o s ) : Securty breach probablty functon (probablty that a breach wll occur gven a level of nformaton securty nvestment s ) k : dscount rate r : rsk-free rate τ : corporate tax rate f s ) : net annual after tax cash flows pertanng to project ( 4.2 Level of Securty Investment: The nvestment cost assocated wth a securty nvestment wll nclude the hardware cost and one-tme IT labor cost for confguraton and system set up. We argue that the systems desgners have the flexblty to confgure the detecton systems dependng on how much they 4 We use the term project and nvestment opportunty nterchangeably to descrbe an nvestment n nformaton securty 13

14 wsh to spend on system hardware and the labor costs. For example, one nvestment alternatve may be to confgure system at a low securty level by not allocatng much IT labor. Another alternatve may be to allocate a hgher level of IT labor to acheve a hgh level of securty. There are two prmary cost components assocated wth nformaton securty the system confguraton specfc costs and the operatng costs. The costs and benefts of securty nvestments are assumed to vary wth the level of securty nvestment denoted by s. In order to express the securty nvestment costs as an ndex we use a base level of securty nvestment (I 0 ). The level of nformaton securty s then gven by: I s = (6) I Beneft functon: The beneft functon assocated wth the nformaton securty nvestment s the expected beneft of preventng a breach. It s a functon of the level of nformaton securty and the probablty of a breach occurrng condtonal on the level of securty. The probablty of a breach occurrng s modeled by a decay functon as Pr( o s ) = e breach s gven by s. Then the probablty of avodng a 1 e s, whch s equal to the probablty of detectng a breach for a gven level of nvestment P. In Fgure 5 below we show the probablty breach functon. For any level of nvestment s one can compute the probablty of detectng P and usng the ROC curves for a gven r λ = F we can compute the probablty of false postve F N λ P. The assumpton that qualty parameters are a functon of the money spent (resources allocated) on IT securty s a reasonable assumpton snce that s exactly what happens n practce. Gven the probablty of a breach, the beneft from preventng a breach can be calculated usng the probablty of avodng the breach, the complement probablty ( 1 e s ) tmes the cost 14

15 of an nformaton breach f no securty nvestment s made. Therefore the beneft assocated wth preventng a breach s Bˆ s = C (1 Pr( o s )) = C (1 e ) (7) B B Probablty of a Securty Breach s Fgure 5. Securty Breach Functon Notce that the functon s ndependent of the tme subscrpt ndcatng that the beneft assocated wth a certan level of nvestment wll be the same throughout the project lfe. Ths s smplfyng assumpton and can be easly relaxed. The cost of a breach (C B ) s dffcult to measure exactly due to unavalablty of frm specfc data. In order to overcome ths dffculty we model C B as a contnuous random varable havng a trangular (PERT type) dstrbuton for Monte Carlo smulaton. 4.4 Cost functon: The total cost functon ncludes the confguraton specfc costs as gven n Equaton (5) for some level of nvestment s and the operaton costs wth annualzed cost parameters. We consder the followng as operatng costs (annual fxed operatng costs that can be avoded f the 15

16 nformaton securty s not put n place). These are hrng costs of IT securty personnel to mantan the system ndependent on the level of IT securty capacty acqured. Second the annual varable porton of costs, whch wll depend on the level of nformaton securty nvestments such as tranng costs etc. Thrd, the opportunty cost assocated wth loss of ste access as more and more controls are emphaszed. We assume these costs to have a quadratc term so that the total cost of nformaton securty wll ntally ncrease at a decreasng rate and thereafter ncrease at an ncreasng rate due to access restrcton place by hgher levels of nformaton securty. The total cost functon wth confguraton specfc cost and operatng costs are gven below: ˆ 1 C { (1 ) (1 )} { 2 = cp ψ + d P ψ + c1pf ψ + a0 + a1 s + a2s } (8) 2 The annual after tax cash flow related to project s gven by Where τ s the tax rate and f Bˆ and s ) = (1 τ )( Bˆ Cˆ ) (9) ( Ĉ are as n Equatons 7 and 8 respectvely. Assume that each project has an economc lfe of 3 years, and the cost of captal s k. Then the net present value NPV of project s gven by NPV( ) = (1 τ )( Bˆ Cˆ )( P / A, k%,3) I where, ( P / A, k%,3) s the present value of annuty factor. Then as n Fgure 6 we can pck the confguraton that provdes the hghest NPV, gven IT budget constrants. 16

17 Authorzed Payoffs c η 1 Hgh Securty Level Confguraton (L1) Sgnal Grey lsted Emal transactons No Sgnal Authorzed x 1 1 x 1 1 η 1 Fraudulent Authorzed 1 1 η 2 1 η 2 c 0 Fraudulent d Authorzed Payoffs c η 1 Medum Securty Level Confguraton (L2) Emal transactons Sgnal Grey lsted x 2 1 x 2 2 η 1 Fraudulent Authorzed c 0 Max[NPV(L1), NPV(L2), NPV(L3), NPV(O)] No Sgnal Authorzed 2 1 η 2 2 η 2 Low Securty Level Confguraton (L3) Fraudulent Authorzed d Payoffs c η 1 Emal transactons Sgnal Grey lsted x 3 1 x 3 3 η 1 Fraudulent Authorzed c 0 No Sgnal Authorzed 3 1 η 2 3 η 2 Fraudulent d Out of Box Soluton Fgure 6. ecson Tree for Investment Optons 5. Model Applcaton We llustrate the applcaton of the model usng the actual data for NAU s emal transactons for the 1 st September 2005 to 15 th February 2006 perod gven n Table 3. The parameter values related to NAU s nvestment alternatves, opton I (low level of securty confguraton), opton II (medum level of securty confguraton), opton III (hgh level of securty confguraton) and opton IV (off-the shelf box) are gven n Table 4. We make the followng assumptons: NAU s IT budget s lmted to $50,000, each nvestment alternatve 17

18 (opton I, II, and III) have project lfe of three years, and to fnd the level of securty (s ), we assume a base level of nvestment (I 0 = $100,000). The probablty of a detecton s computed s as P = ( 1 e ). Table 3. NAU s Emal statstcs for 1 st September 2005 to 15 th February 2006 Outgong Incomng Total e-mal transactons Incomng Vrus 5180 Spam Reject Longform User Grey Trplet (Whte, Black, New) and Msc Passed Accepted Mal n The rato of mean score of normal transactons to that of fraudulent transactons λ r λf = s determned by defnng normal transactons as # of passed + # of accepted + # of mal n and fraudulent transactons as # of vruses + # of spam + # of reject. We assume a constant r for llustraton smplcty but ths can be relaxed. Next from the ROC curves we compute the probablty of false postve P F. The proporton of malcous emals ψ s found by dvdng the # of fraudulent transactons (computed as # of vruses + # of spam + # of reject ) by the total # of ncomng mal. Snce the beneft and cost parameters are dffcult to precsely estmate we recommend usng Monte Carlo smulaton. For each of the three alternatves we assume the followng N 18

19 beneft and cost nput parameters 5. The cost of securty breach (C B ) s modeled by a trangular dstrbuton wth mnmum securty breach cost of $150,000, a modal value of $170,000 and a maxmum securty breach cost of $215,000.e. T[150,170,215] n thousands. For the confguraton specfc cost parameters we assume the followng: annual nvestgaton cost of correctly sgnaled malcous emal to be unformly dstrbuted over the nterval c~[$10,000, $15,000].e. opportunty cost plus cost to nvestgate an ncorrectly sgnaled emal as c 1 ~U[$12,000, $17,000], damage from an undetected emal, vrus d ~U[$20,000, $80,000],. The followng operatng costs parameters are assumed; an annual fxed cost to be unformly dstrbuted over the nterval [$7,000, $12,500].e. a 0 ~U[7, 12.5] n thousands, the varable cost per unt level of nvestment unformly dstrbuted over [$1,000, $2,500].e. a 1 ~U[1,2.5] n thousands and the margnal cost per unt level of nformaton unform over the nterval [$500, $800],.e. a 2 ~U[ ] n thousands. The data for the three projects s summarzed n Table 4. A company's cost of captal of 10% per annum s assumed, reflectng a rsk-premum of 3% above the rsk-free rate of 7%. The margnal tax s assumed to be 40%. Table 4: Cost and Parameter Values All costs are n thousands of $ escrpton Opton I Opton II Opton III Opton VI Project lfe 3 years 3 years 3 years Investment cost (I ) $35 $50 $59 $45 Level of nvestment (s ) P P F r ψ Cost of a securty breach T[50,70,115] T[50,70,115] T[50,70,115] (C B ) Annual fxed (a 0 ) U[7, 12.5] U[7, 12.5] U[7, 12.5] Varable cost (a 1 ) U[1,2.5] U[1,2.5] U[1,2.5] Margnal cost (a 2 ) U[ ] U[ ] U[ ] 5 We have assumed the same costs and beneft parameters for all the three projects for smplcty but dfferent values can be consdered for each project. 19

20 c U[10, 15] U[10, 15] U[10, 15] c U[12, 17] U[12, 17] U[12, 17] 1 d U[20, 80] U[20, 80] U[20, 80] 6. Conclusons In Table 5, we present the smulaton output for each of the three IT securty nvestment alternatves along wth the out-of-the-box alternatve. Snce NAU s IT securty budget s lmted to $50,000, opton III s not vable although t has the largest NPV. From the remanng two n house confguraton alternatves, opton I wll be rejected as the NPV s negatve. Then the best n house confgures alternatve s opton II wth a postve NPV and a hgh proftablty ndex. Snce NAU can also buy an out-of-the-box system for $45,000, there are two possble IT securty nvestment alternatves: (1) select a medum securty level confguraton (opton II) or (2) the out of box alternatve (opton VI). NAU decded on opton II snce the probablty of detecton s hgher than under opton (IV). Other factors favorng opton II nclude greater flexblty to manage snce IT staff are famlar wth the confguraton as t was developed n house, value of learnng, and n house tranng. Table 5. Summary of Results Opon I Opton II Opton III Opton VI Mean(NPV) (12,646) 21,511 21,874 stdev(npv) 6,489 8,129 9,313 Investment Proftablty ndex prob of detecton In ths artcle we nvestgated the spam emal and vrus problem of an organzaton and demonstrated how theoretcal research can be appled n practce through a real lfe case study. Future research should also look at how game theoretc models can be ncorporated nto ths 20

21 framework n a mult-perod settng f hackng s found to be sgnfcant. Although, we have consdered the vablty of several confguraton alternatves, we have not nvestgated the manageral flexblty or embedded real optons to choose on the optmal tmng of nvestment. Acknowledgement valuable nput. We would lke to thank computng consultants Josh Sekel and Shawn Marrott for ther REFERENCES E-Crme Watch Survey Summary of Fndngs. Retreved ecember 3, 2004, from Computer Emergency Response Team Coordnaton Center Web Ste: Cagnem, M. P Top Technology Issues. Informaton Systems Controls Journal, 4(6). Camp, L. J., C. Wolfram Prcng Securty. J. Camp and R. Lews (eds). Economcs of Informaton Securty, Kluwer, Cavusoglu, H., B. Mshra, S. Raghunathan The Value of Intruson etecton Systems n Informaton Technology Securty Archtecture. Informaton Systems Research, 16(1), Cavusoglu, H Economcs of IT Securty: A Lterature Revew. J. Camp and R. Lews (eds), Economcs of Informaton Securty, Kluwer, Cavusoglu, H., B. Mshra, S. Raghunathan A Model for Evaluatng IT Securty Investments. Communcatons of ACM, 47(7), Cavusoglu, H., S. Raghunathan Confguraton of etecton Software: A comparson of ecson and Game Theory Approaches. ecson Analyss. 1(3), CSI/FBI Computer Crme and Securty Survey. Retreved September 12, 2004, from Gordon, L. A., M. P. Loeb, W. Lucyshyn Informaton Securty Expendtures and Real Optons: A Wat and See Approach. Computer Securty Journal, 19(2),

22 Gordon, L. A., M. P. Loeb The Economcs of Informaton Securty Investment, ACM Transactons on Informaton and Systems Securty, November, Hoo, K.J. Soo How much s Enough? A Rsk Management Approach to Computer Securty. Consortum for Research on Informaton Securty Polcy (CRISP) Workng Paper, Stanford Unversty, June. ICSA Labs Computer Vrus Prevalence Survey. Longstaff, T.A., C. Chttster, R. Petha, Y.Y. Hames Are we forgettng the Rsks of Informaton Technology? IEEE Computer, ecember, Ulvla, J.W., J.E. Gaffney A ecson Analyss Method for Evaluatng Computer Intruson etecton Systems. ecson Analyss. 1(1)

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C White Emerson Process Management

ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C White Emerson Process Management ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C Whte Emerson Process Management Abstract Energy prces have exhbted sgnfcant volatlty n recent years. For example, natural gas prces

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

DO LOSS FIRMS MANAGE EARNINGS AROUND SEASONED EQUITY OFFERINGS?

DO LOSS FIRMS MANAGE EARNINGS AROUND SEASONED EQUITY OFFERINGS? DO LOSS FIRMS MANAGE EARNINGS AROUND SEASONED EQUITY OFFERINGS? Fernando Comran, Unversty of San Francsco, School of Management, 2130 Fulton Street, CA 94117, Unted States, [email protected] Tatana Fedyk,

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120 Kel Insttute for World Economcs Duesternbrooker Weg 45 Kel (Germany) Kel Workng Paper No. Path Dependences n enture Captal Markets by Andrea Schertler July The responsblty for the contents of the workng

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Outsourcing inventory management decisions in healthcare: Models and application

Outsourcing inventory management decisions in healthcare: Models and application European Journal of Operatonal Research 154 (24) 271 29 O.R. Applcatons Outsourcng nventory management decsons n healthcare: Models and applcaton www.elsever.com/locate/dsw Lawrence Ncholson a, Asoo J.

More information

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt.

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt. Chapter 9 Revew problems 9.1 Interest rate measurement Example 9.1. Fund A accumulates at a smple nterest rate of 10%. Fund B accumulates at a smple dscount rate of 5%. Fnd the pont n tme at whch the forces

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

A Model of Private Equity Fund Compensation

A Model of Private Equity Fund Compensation A Model of Prvate Equty Fund Compensaton Wonho Wlson Cho Andrew Metrck Ayako Yasuda KAIST Yale School of Management Unversty of Calforna at Davs June 26, 2011 Abstract: Ths paper analyzes the economcs

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Construction Rules for Morningstar Canada Target Dividend Index SM

Construction Rules for Morningstar Canada Target Dividend Index SM Constructon Rules for Mornngstar Canada Target Dvdend Index SM Mornngstar Methodology Paper October 2014 Verson 1.2 2014 Mornngstar, Inc. All rghts reserved. The nformaton n ths document s the property

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001 Proceedngs of the Annual Meetng of the Amercan Statstcal Assocaton, August 5-9, 2001 LIST-ASSISTED SAMPLING: THE EFFECT OF TELEPHONE SYSTEM CHANGES ON DESIGN 1 Clyde Tucker, Bureau of Labor Statstcs James

More information

STATISTICAL DATA ANALYSIS IN EXCEL

STATISTICAL DATA ANALYSIS IN EXCEL Mcroarray Center STATISTICAL DATA ANALYSIS IN EXCEL Lecture 6 Some Advanced Topcs Dr. Petr Nazarov 14-01-013 [email protected] Statstcal data analyss n Ecel. 6. Some advanced topcs Correcton for

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000

More information

Student Performance in Online Quizzes as a Function of Time in Undergraduate Financial Management Courses

Student Performance in Online Quizzes as a Function of Time in Undergraduate Financial Management Courses Student Performance n Onlne Quzzes as a Functon of Tme n Undergraduate Fnancal Management Courses Olver Schnusenberg The Unversty of North Florda ABSTRACT An nterestng research queston n lght of recent

More information

Chapter 15: Debt and Taxes

Chapter 15: Debt and Taxes Chapter 15: Debt and Taxes-1 Chapter 15: Debt and Taxes I. Basc Ideas 1. Corporate Taxes => nterest expense s tax deductble => as debt ncreases, corporate taxes fall => ncentve to fund the frm wth debt

More information

Returns to Experience in Mozambique: A Nonparametric Regression Approach

Returns to Experience in Mozambique: A Nonparametric Regression Approach Returns to Experence n Mozambque: A Nonparametrc Regresson Approach Joel Muzma Conference Paper nº 27 Conferênca Inaugural do IESE Desafos para a nvestgação socal e económca em Moçambque 19 de Setembro

More information

STAMP DUTY ON SHARES AND ITS EFFECT ON SHARE PRICES

STAMP DUTY ON SHARES AND ITS EFFECT ON SHARE PRICES STAMP UTY ON SHARES AN ITS EFFECT ON SHARE PRICES Steve Bond Mke Hawkns Alexander Klemm THE INSTITUTE FOR FISCAL STUIES WP04/11 STAMP UTY ON SHARES AN ITS EFFECT ON SHARE PRICES Steve Bond (IFS and Unversty

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

The impact of hard discount control mechanism on the discount volatility of UK closed-end funds

The impact of hard discount control mechanism on the discount volatility of UK closed-end funds Investment Management and Fnancal Innovatons, Volume 10, Issue 3, 2013 Ahmed F. Salhn (Egypt) The mpact of hard dscount control mechansm on the dscount volatlty of UK closed-end funds Abstract The mpact

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Cyber-Insurance: Copula Pricing Framework and Implications for Risk Management

Cyber-Insurance: Copula Pricing Framework and Implications for Risk Management Cyber-Insurance: Copula Prcng Framework and Implcatons for Rsk Management Hemantha S. B. Herath Assocate Professor, Department of Accountng, Faculty of Busness, 40 Taro Hall, 500 Glenrdge Avenue, St. Catharnes,

More information

How To Trade Water Quality

How To Trade Water Quality Movng Beyond Open Markets for Water Qualty Tradng: The Gans from Structured Blateral Trades Tanl Zhao Yukako Sado Rchard N. Bosvert Gregory L. Poe Cornell Unversty EAERE Preconference on Water Economcs

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

UK Letter Mail Demand: a Content Based Time Series Analysis using Overlapping Market Survey Statistical Techniques

UK Letter Mail Demand: a Content Based Time Series Analysis using Overlapping Market Survey Statistical Techniques 10-170 Research Group: Econometrcs and Statstcs 2010 UK Letter Mal Demand: a Content Based Tme Seres nalyss usng Overlappng Market Survey Statstcal Technques CTHERINE CZLS, JEN-PIERRE FLORENS, LETICI VERUETE-MCKY,

More information

Trust Formation in a C2C Market: Effect of Reputation Management System

Trust Formation in a C2C Market: Effect of Reputation Management System Trust Formaton n a C2C Market: Effect of Reputaton Management System Htosh Yamamoto Unversty of Electro-Communcatons [email protected] Kazunar Ishda Tokyo Unversty of Agrculture [email protected] Toshzum

More information

Optimal Customized Pricing in Competitive Settings

Optimal Customized Pricing in Competitive Settings Optmal Customzed Prcng n Compettve Settngs Vshal Agrawal Industral & Systems Engneerng, Georga Insttute of Technology, Atlanta, Georga 30332 [email protected] Mark Ferguson College of Management,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence Factors Affectng Outsourcng for Informaton Technology Servces n Rural Hosptals: Theory and Evdence Bran E. Whtacre Department of Agrcultural Economcs Oklahoma State Unversty [email protected] J.

More information