His solution? Federal law that requires government agencies and private industry to encrypt, or digitally scramble, sensitive data.
|
|
- Mervyn Simon
- 8 years ago
- Views:
Transcription
1 NET GAIN Scoring points for your financial future AS SEEN IN USA TODAY S MONEY SECTION, FEBRUARY 9, 2007 Tec experts plot to catc identity tieves Politicians to security gurus offer ideas to prevent data breaces By Jon Swartz SAN FRANCISCO Te topic of data protection stole te sow at te RSA Conference on computer security ere tis week. Identity teft and corporate espionage were dominant temes among te 15,000 attendees. And wit good reason. Data are te new currency of te Internet age for legitimate and illegitimate businesses, says Howard Scmidt, former cief information security off icer of ebay wo now is a consultant. Data ave never been sared as quickly, and in suc vast amounts. But as millions of Americans use personal data to sop and bank online, and as more companies store data electronically, tey remain targets for online fraudsters, Scmidt and oters said. Microsoft Cairman Bill Gates, security experts, politicians and oter analysts offered teir takes on te problems, and suggestions to fix tem: "Te most dangerous breac." Identity teft was, again, a major source of discussion. Tere was no sortage of and-wringing over te consequences of consumer data ending up in te ands of fraudsters, and te fear was igligted by an FTC report of rampant consumer complaints about identity teft. But te unreported filcing of data from government agencies and private enterprises worries Ricard Clarke. "ID teft is one ting, but te teft of proprietary information witout te knowledge of te government or a private business is anoter," Clarke, best-selling autor and former Wite House cybersecurity czar, said Wednesday. "Te most dangerous breac is one you are unaware of." Te cost to companies and agencies is immeasurable, says Clarke, in town to take in te conference and plug is cybertriller, Breakpoint. And e fears te treat is growing, especially from Russia and Cina. His solution? Federal law tat requires government agencies and private industry to encrypt, or digitally scramble, sensitive data. On Tuesday, U.S. Sens. Patrick Leay, D- Vt., and Arlen Specter, R-Pa., introduced a data-privacy bill tat makes it a crime to conceal security breaces involving personal data. Gates: "A stupid system." Identity teft was also on te mind of Gates, wo visibly perked up wen te subject turned to te credit cardissuing system during an interview after is Tuesday morning speec. "It's a stupid system," e said, waving is ands dismissively. "It's a weak system wen someone wit your Social Security number or moter's maiden name can apply for credit witout you knowing it." Gates says te problem is largely solvable wit an autorization system tat requires consumers' final approval wen any financial transaction is made under teir name. He suggests biometric smart cards as part of a solution tat could be acieved witin five years. But tere will be a "paradigm sift" only wen fraud costs force a cange in te system, Gates says. Federal law? Tere were rumblings trougout convention alls and otel lobbies about a pus in Congress to make a federal law protecting consumers from te loss of sensitive information. Reprinted wit permission. All rigts reser ved.
2 AS SEEN IN USA TODAY S MONEY SECTION, FEBRUARY 9, 2007 But te autor of California's databreac notification law used as a model for more tan 30 oter states is worried a weak national law would pre-empt stronger state laws. "Let's not sacrifice te standard set in California on te altar of federal regulation," said state Sen. Joe Simitian, D-Palo Alto. FTC Cairman Debora Platt Majoras, wile sensitive to te consequences for consumers, says se favors a strong national law. Tere are at least two pieces of legislation in Congress, including te Leay-Specter bill, tat would require companies to publicly disclose data breaces. Since February 2005, more tan 100 million records containing personal information ave been subject to some sort of security breac, according to te non-profit Privacy Rigts Clearingouse. Hackers go sopping. Consumers aren't te only ones sopping online. A ras of recent data breaces suggest ackers also are sopping for te personal data of consumers at major retailers. TJX, wic operates more tan 2,500 stores under suc cains as T.J. Maxx and Marsalls, last mont said an outside audit of its PCs indicated ackers ad broken in and potentially ad access to a wide range of financial information. "Were do you get credit card information from? If not banks, ten retail outlets," says Art Coviello, president of RSA Security, te company tat sponsored te conference. Citing market researcer IDC, e says tere was a $1 billion market among cybercrooks for te sale of stolen identities last year. Attacks ave increased against retailers, e says, as large financial institutions ave fortified teir computer-security systems, forcing tieves to go elsewere. Retail payment systems were not designed wit security in mind, and ackers are finding weak links especially among retailers tat ave te most sensitive data stored, said Aviva Litan, an analyst at market researcer Gartner, in a pone interview. Reprinted wit permission. All rigts reserved. Page 2
3 NET GAIN Scoring points for your financial future Tec experts plot to catc identity tieves Objectives: Students will: Preparations: Eac student will need: Read te article Tec experts plot to catc identity tieves. A copy of te article Tec experts plot to catc identity tieves. Answer te discussion questions. A copy of tis lesson. List ways ID tieves steal information. Access to te Internet. Identify ways fraud is committed. Write ways to protect temselves against ID teft. Navigate a reliable website for information relevant to teir lives. 20 minutes Read te article and discuss questions Read Tec experts plot to catc identity tieves. Wen you are finised reading, discuss and answer te following questions as a class. According to te article, wat two crimes garnered a lot of attention at te RSA convention in 2007? Define tose two crimes. Wat is te most dangerous breac? Wat is Ricard Clarke s solution to stopping identity teft and corporate espionage? Wat qualifications does Clarke ave to suggest tis solution? Wat is Bill Gates solution to stopping identity teft? Wic solution do you tink would work better: Clarke s or Gates? Wy? Do you tink getting te government involved in minimizing information breaces is a good ting? Wy or wy not? Wat would be your solution for minimizing information breaces? List te many repercussions of aving your identity stolen. Wat would you ave to do to get your identity back and get your credit problems cleared up? Page 3
4 minutes Activity: Keeping Your Good Name Wit a partner, go to te Federal Trade Commission s website at to answer te questions below. Name six ways tieves steal personal information Wat is pising? Have you received tese offers in your ? Describe te offer. How did you know it was fraudulent? 1. According to te FTC, wat kinds of fraud do tieves commit wit te information? Name at least tree. Wat is one way you can find out if your personal information as been used fraudulently? 1. If your identity is stolen, wat are tree steps you sould take to stop te fraud? How can you proctect yourself from identity teft in te first place? Page 4
5 30 minutes Activity: Calculating te Cost of Identity Teft Wit your partner, use te cart to answer te answer te questions tat follow it. New Accounts & Oter Frauds Existing Non- Credit Card Accounts Existing Credit Cards Onliy All ID Teft Value of goods and services obtained by itentity tieves Median $1,350 $457 $350 $ t Percentile $15,000 $3,800 $4,000 $6, t Percentile $30,000 $6,000 $7,000 $13,000 Victims Out-of- Pocket Expenses Median $40 $0 $0 $0 90 t Percentile $3,000 $900 $132 $1, t Percentile $5,000 $1,200 $400 $2,000 Hours Victims Spent Resolving Teir Problems Median t Percentile t Percentile 1, Sample size n = Source: Tis table presents various measures of te costs of ID teft. Rater tan average values, te table uses median values (te point at wic alf te victims fell above te number and alf below). A minority of ID tefts result in muc greater arm tan te typical case. Because tese large values ave a significant impact on te average value, te median better represents te typical experience. To capture te experiences of tose wo suffer te most serious arm, te table also reports values for te 90t percentile and 95t percentile of arms reported. For tis survey, 4,917 people were surveyed. Tese people represented te 2294 million residents of te United States wo were 18 and older as of July Wat does median mean? Wat was te median time it took for a consumer to resolve te fraud problems on existing credit cards? Wat was te median time it took for a consumer to resolve te fraud problems on all identity teft? 4. 7 percent of te people surveyed said tey were victims of identity teft in How many people would tat represent in te wole United States? 5. If te average teft was $500, ow muc money did tieves get in 2005 from stealing identities? 6. Ten percent of people surveyed wo ad been victims said it took about 55 ours to resolve problems related to any kind of identity teft. If you make $8 an our, and it takes 55 ours to resolve tese problems, ow muc could tis potentially cost you just in lost wages? Discuss: Wit all te information you ve learned in tis lesson, wat main conclusions can you draw about te causes and effects of identity teft? Page 5
A strong credit score can help you score a lower rate on a mortgage
NET GAIN Scoring points for your financial future AS SEEN IN USA TODAY S MONEY SECTION, JULY 3, 2007 A strong credit score can elp you score a lower rate on a mortgage By Sandra Block Sales of existing
More information2.23 Gambling Rehabilitation Services. Introduction
2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority
More informationHow To Ensure That An Eac Edge Program Is Successful
Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.
More informationCollege Planning Using Cash Value Life Insurance
College Planning Using Cas Value Life Insurance CAUTION: Te advisor is urged to be extremely cautious of anoter college funding veicle wic provides a guaranteed return of premium immediately if funded
More informationWhat is Advanced Corporate Finance? What is finance? What is Corporate Finance? Deciding how to optimally manage a firm s assets and liabilities.
Wat is? Spring 2008 Note: Slides are on te web Wat is finance? Deciding ow to optimally manage a firm s assets and liabilities. Managing te costs and benefits associated wit te timing of cas in- and outflows
More informationTangent Lines and Rates of Change
Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims
More informationDigital evolution Where next for the consumer facing business?
Were next for te consumer facing business? Cover 2 Digital tecnologies are powerful enablers and lie beind a combination of disruptive forces. Teir rapid continuous development demands a response from
More informationNAFN NEWS SPRING2011 ISSUE 7. Welcome to the Spring edition of the NAFN Newsletter! INDEX. Service Updates Follow That Car! Turn Back The Clock
NAFN NEWS ISSUE 7 SPRING2011 Welcome to te Spring edition of te NAFN Newsletter! Spring is in te air at NAFN as we see several new services cropping up. Driving and transport emerged as a natural teme
More information2 Limits and Derivatives
2 Limits and Derivatives 2.7 Tangent Lines, Velocity, and Derivatives A tangent line to a circle is a line tat intersects te circle at exactly one point. We would like to take tis idea of tangent line
More informationDetermine the perimeter of a triangle using algebra Find the area of a triangle using the formula
Student Name: Date: Contact Person Name: Pone Number: Lesson 0 Perimeter, Area, and Similarity of Triangles Objectives Determine te perimeter of a triangle using algebra Find te area of a triangle using
More informationWorking Capital 2013 UK plc s unproductive 69 billion
2013 Executive summary 2. Te level of excess working capital increased 3. UK sectors acieve a mixed performance 4. Size matters in te supply cain 6. Not all companies are overflowing wit cas 8. Excess
More informationArea-Specific Recreation Use Estimation Using the National Visitor Use Monitoring Program Data
United States Department of Agriculture Forest Service Pacific Nortwest Researc Station Researc Note PNW-RN-557 July 2007 Area-Specific Recreation Use Estimation Using te National Visitor Use Monitoring
More informationFor Sale By Owner Program. We can help with our for sale by owner kit that includes:
Dawn Coen Broker/Owner For Sale By Owner Program If you want to sell your ome By Owner wy not:: For Sale Dawn Coen Broker/Owner YOUR NAME YOUR PHONE # Look as professional as possible Be totally prepared
More informationPioneer Fund Story. Searching for Value Today and Tomorrow. Pioneer Funds Equities
Pioneer Fund Story Searcing for Value Today and Tomorrow Pioneer Funds Equities Pioneer Fund A Cornerstone of Financial Foundations Since 1928 Te fund s relatively cautious stance as kept it competitive
More informationCan a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade?
Can a Lump-Sum Transfer Make Everyone Enjoy te Gains from Free Trade? Yasukazu Icino Department of Economics, Konan University June 30, 2010 Abstract I examine lump-sum transfer rules to redistribute te
More informationVerifying Numerical Convergence Rates
1 Order of accuracy Verifying Numerical Convergence Rates We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, suc as te grid size or time step, and
More information1. Case description. Best practice description
1. Case description Best practice description Tis case sows ow a large multinational went troug a bottom up organisational cange to become a knowledge-based company. A small community on knowledge Management
More informationOperation go-live! Mastering the people side of operational readiness
! I 2 London 2012 te ultimate Up to 30% of te value of a capital programme can be destroyed due to operational readiness failures. 1 In te complex interplay between tecnology, infrastructure and process,
More informationInstantaneous Rate of Change:
Instantaneous Rate of Cange: Last section we discovered tat te average rate of cange in F(x) can also be interpreted as te slope of a scant line. Te average rate of cange involves te cange in F(x) over
More informationThe EOQ Inventory Formula
Te EOQ Inventory Formula James M. Cargal Matematics Department Troy University Montgomery Campus A basic problem for businesses and manufacturers is, wen ordering supplies, to determine wat quantity of
More informationGuide to Cover Letters & Thank You Letters
Guide to Cover Letters & Tank You Letters 206 Strebel Student Center (315) 792-3087 Fax (315) 792-3370 TIPS FOR WRITING A PERFECT COVER LETTER Te resume never travels alone. Eac time you submit your resume
More informationAn inquiry into the multiplier process in IS-LM model
An inquiry into te multiplier process in IS-LM model Autor: Li ziran Address: Li ziran, Room 409, Building 38#, Peing University, Beijing 00.87,PRC. Pone: (86) 00-62763074 Internet Address: jefferson@water.pu.edu.cn
More information2.12 Student Transportation. Introduction
Introduction Figure 1 At 31 Marc 2003, tere were approximately 84,000 students enrolled in scools in te Province of Newfoundland and Labrador, of wic an estimated 57,000 were transported by scool buses.
More information1.6. Analyse Optimum Volume and Surface Area. Maximum Volume for a Given Surface Area. Example 1. Solution
1.6 Analyse Optimum Volume and Surface Area Estimation and oter informal metods of optimizing measures suc as surface area and volume often lead to reasonable solutions suc as te design of te tent in tis
More informationAn Orientation to the Public Health System for Participants and Spectators
An Orientation to te Public Healt System for Participants and Spectators Presented by TEAM ORANGE CRUSH Pallisa Curtis, Illinois Department of Public Healt Lynn Galloway, Vermillion County Healt Department
More informationNote: Principal version Modification Modification Complete version from 1 October 2014 Business Law Corporate and Contract Law
Note: Te following curriculum is a consolidated version. It is legally non-binding and for informational purposes only. Te legally binding versions are found in te University of Innsbruck Bulletins (in
More informationStrategic trading in a dynamic noisy market. Dimitri Vayanos
LSE Researc Online Article (refereed) Strategic trading in a dynamic noisy market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt and Moral
More informationGeometric Stratification of Accounting Data
Stratification of Accounting Data Patricia Gunning * Jane Mary Horgan ** William Yancey *** Abstract: We suggest a new procedure for defining te boundaries of te strata in igly skewed populations, usual
More informationCatalogue no. 12-001-XIE. Survey Methodology. December 2004
Catalogue no. 1-001-XIE Survey Metodology December 004 How to obtain more information Specific inquiries about tis product and related statistics or services sould be directed to: Business Survey Metods
More informationWelfare, financial innovation and self insurance in dynamic incomplete markets models
Welfare, financial innovation and self insurance in dynamic incomplete markets models Paul Willen Department of Economics Princeton University First version: April 998 Tis version: July 999 Abstract We
More informationOnce you have reviewed the bulletin, please
Akron Public Scools OFFICE OF CAREER EDUCATION BULLETIN #5 : Driver Responsibilities 1. Akron Board of Education employees assigned to drive Board-owned or leased veicles MUST BE FAMILIAR wit te Business
More informationCare after stroke. or transient ischaemic attack. Information for patients and their carers
Care after stroke or transient iscaemic attack Information for patients and teir carers 2008 Tis booklet is based on te National Clinical Guideline for Stroke, tird edition, wic includes te National Institute
More informationMath Test Sections. The College Board: Expanding College Opportunity
Taking te SAT I: Reasoning Test Mat Test Sections Te materials in tese files are intended for individual use by students getting ready to take an SAT Program test; permission for any oter use must be sougt
More informationTeams without Walls. The value of medical innovation and leadership
Teams witout Walls Te value of medical innovation and leadersip Report of a Working Party of te Royal College of Pysicians, te Royal College of General Practitioners and te Royal College of Paediatrics
More informationA system to monitor the quality of automated coding of textual answers to open questions
Researc in Official Statistics Number 2/2001 A system to monitor te quality of automated coding of textual answers to open questions Stefania Maccia * and Marcello D Orazio ** Italian National Statistical
More information- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz
CS106B Spring 01 Handout # May 3, 01 Huffman Encoding and Data Compression Handout by Julie Zelenski wit minor edits by Keit Scwarz In te early 1980s, personal computers ad ard disks tat were no larger
More informationResearch on the Anti-perspective Correction Algorithm of QR Barcode
Researc on te Anti-perspective Correction Algoritm of QR Barcode Jianua Li, Yi-Wen Wang, YiJun Wang,Yi Cen, Guoceng Wang Key Laboratory of Electronic Tin Films and Integrated Devices University of Electronic
More informationResearch on Risk Assessment of PFI Projects Based on Grid-fuzzy Borda Number
Researc on Risk Assessent of PFI Projects Based on Grid-fuzzy Borda Nuber LI Hailing 1, SHI Bensan 2 1. Scool of Arcitecture and Civil Engineering, Xiua University, Cina, 610039 2. Scool of Econoics and
More informationDerivatives Math 120 Calculus I D Joyce, Fall 2013
Derivatives Mat 20 Calculus I D Joyce, Fall 203 Since we ave a good understanding of its, we can develop derivatives very quickly. Recall tat we defined te derivative f x of a function f at x to be te
More informationRISK ASSESSMENT MATRIX
U.S.C.G. AUXILIARY STANDARD AV-04-4 Draft Standard Doc. AV- 04-4 18 August 2004 RISK ASSESSMENT MATRIX STANDARD FOR AUXILIARY AVIATION UNITED STATES COAST GUARD AUXILIARY NATIONAL OPERATIONS DEPARTMENT
More informationWriting Mathematics Papers
Writing Matematics Papers Tis essay is intended to elp your senior conference paper. It is a somewat astily produced amalgam of advice I ave given to students in my PDCs (Mat 4 and Mat 9), so it s not
More informationACT Math Facts & Formulas
Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationals: fractions, tat is, anyting expressable as a ratio of integers Reals: integers plus rationals plus special numbers suc as
More informationSAT Math Must-Know Facts & Formulas
SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas
More informationEnding tobacco smoking in Britain. Radical strategies for prevention and harm reduction in nicotine addiction
Ending tobacco smoking in Britain Radical strategies for prevention and arm reduction in nicotine addiction A report by te Tobacco Advisory Group of te Royal College of Pysicians, September 2008 Acknowledgements
More informationTorchmark Corporation 2001 Third Avenue South Birmingham, Alabama 35233 Contact: Joyce Lane 972-569-3627 NYSE Symbol: TMK
News Release Torcmark Corporation 2001 Tird Avenue Sout Birmingam, Alabama 35233 Contact: Joyce Lane 972-569-3627 NYSE Symbol: TMK TORCHMARK CORPORATION REPORTS FOURTH QUARTER AND YEAR-END 2004 RESULTS
More informationHow doctors can close the gap
RCP policy statement 2010 How doctors can close te gap Tackling te social determinants of ealt troug culture cange, advocacy and education Acknowledgements We would like to tank te Department of Healt
More informationSAT Subject Math Level 1 Facts & Formulas
Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reals: integers plus fractions, decimals, and irrationals ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences: PEMDAS (Parenteses
More informationTis Problem and Retail Inventory Management
Optimizing Inventory Replenisment of Retail Fasion Products Marsall Fiser Kumar Rajaram Anant Raman Te Warton Scool, University of Pennsylvania, 3620 Locust Walk, 3207 SH-DH, Piladelpia, Pennsylvania 19104-6366
More informationHow To Get A Garnisment On An Inerited Ir
Valdivia v. Valdivia, %13 SO.2c1 1190 Page 1190 593 So.2d 1190 17 Fla. L. Weekly D514 Isabel VALDIVIA, Appellant, v. Ester Fajardo VALDIVIA, Appellee. No. 91-1438. District Court of Appeal of Florida,
More informationM(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1)
Insertion and Deletion in VL Trees Submitted in Partial Fulfillment of te Requirements for Dr. Eric Kaltofen s 66621: nalysis of lgoritms by Robert McCloskey December 14, 1984 1 ackground ccording to Knut
More informationHeterogeneous firms and trade costs: a reading of French access to European agrofood
Heterogeneous firms and trade costs: a reading of Frenc access to European agrofood markets Cevassus-Lozza E., Latouce K. INRA, UR 34, F-44000 Nantes, France Abstract Tis article offers a new reading of
More informationReferendum-led Immigration Policy in the Welfare State
Referendum-led Immigration Policy in te Welfare State YUJI TAMURA Department of Economics, University of Warwick, UK First version: 12 December 2003 Updated: 16 Marc 2004 Abstract Preferences of eterogeneous
More informationf(a + h) f(a) f (a) = lim
Lecture 7 : Derivative AS a Function In te previous section we defined te derivative of a function f at a number a (wen te function f is defined in an open interval containing a) to be f (a) 0 f(a + )
More informationa joint initiative of Cost of Production Calculator
a joint initiative of Cost of Production Calculator 1 KEY BENEFITS Learn to use te MAKING MORE FROM SHEEP cost of production calculator to: Measure te performance of your seep enterprise year on year Compare
More informationRewards-Supply Aggregate Planning in the Management of Loyalty Reward Programs - A Stochastic Linear Programming Approach
Rewards-Supply Aggregate Planning in te Management of Loyalty Reward Programs - A Stocastic Linear Programming Approac YUHENG CAO, B.I.B., M.Sc. A tesis submitted to te Faculty of Graduate and Postdoctoral
More informationEC201 Intermediate Macroeconomics. EC201 Intermediate Macroeconomics Problem set 8 Solution
EC201 Intermediate Macroeconomics EC201 Intermediate Macroeconomics Prolem set 8 Solution 1) Suppose tat te stock of mone in a given econom is given te sum of currenc and demand for current accounts tat
More informationImproved dynamic programs for some batcing problems involving te maximum lateness criterion A P M Wagelmans Econometric Institute Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam Te Neterlands
More informationStrategic trading and welfare in a dynamic market. Dimitri Vayanos
LSE Researc Online Article (refereed) Strategic trading and welfare in a dynamic market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt
More informationComputer Science and Engineering, UCSD October 7, 1999 Goldreic-Levin Teorem Autor: Bellare Te Goldreic-Levin Teorem 1 Te problem We æx a an integer n for te lengt of te strings involved. If a is an n-bit
More informationOptimized Data Indexing Algorithms for OLAP Systems
Database Systems Journal vol. I, no. 2/200 7 Optimized Data Indexing Algoritms for OLAP Systems Lucian BORNAZ Faculty of Cybernetics, Statistics and Economic Informatics Academy of Economic Studies, Bucarest
More informationLecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function
Lecture 10: Wat is a Function, definition, piecewise defined functions, difference quotient, domain of a function A function arises wen one quantity depends on anoter. Many everyday relationsips between
More informationFree Shipping and Repeat Buying on the Internet: Theory and Evidence
Free Sipping and Repeat Buying on te Internet: eory and Evidence Yingui Yang, Skander Essegaier and David R. Bell 1 June 13, 2005 1 Graduate Scool of Management, University of California at Davis (yiyang@ucdavis.edu)
More informationDEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES
DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES Sara Brown, University of Leicester, UK Karl Taylor, University of Leicester, UK
More informationMath 113 HW #5 Solutions
Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten
More informationSAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY
ASA Section on Survey Researc Metods SAMPLE DESIG FOR TE TERRORISM RISK ISURACE PROGRAM SURVEY G. ussain Coudry, Westat; Mats yfjäll, Statisticon; and Marianne Winglee, Westat G. ussain Coudry, Westat,
More informationNew Vocabulary volume
-. Plan Objectives To find te volume of a prism To find te volume of a cylinder Examples Finding Volume of a Rectangular Prism Finding Volume of a Triangular Prism 3 Finding Volume of a Cylinder Finding
More informationUnemployment insurance/severance payments and informality in developing countries
Unemployment insurance/severance payments and informality in developing countries David Bardey y and Fernando Jaramillo z First version: September 2011. Tis version: November 2011. Abstract We analyze
More informationThe modelling of business rules for dashboard reporting using mutual information
8 t World IMACS / MODSIM Congress, Cairns, Australia 3-7 July 2009 ttp://mssanz.org.au/modsim09 Te modelling of business rules for dasboard reporting using mutual information Gregory Calbert Command, Control,
More informationON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE
ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE Byeong U. Park 1 and Young Kyung Lee 2 Department of Statistics, Seoul National University, Seoul, Korea Tae Yoon Kim 3 and Ceolyong Park
More informationChapter 10: Refrigeration Cycles
Capter 10: efrigeration Cycles Te vapor compression refrigeration cycle is a common metod for transferring eat from a low temperature to a ig temperature. Te above figure sows te objectives of refrigerators
More informationStaying in-between Music Technology in Higher Education
Staying in-between Music Tecnology in Higer Education (Post-modern) Callenges and Opportunities for Music Tecnology Education Carola Boem Carola Boem Centre for Music Tecnology Department of Music Department
More informationMULTY BINARY TURBO CODED WOFDM PERFORMANCE IN FLAT RAYLEIGH FADING CHANNELS
Volume 49, Number 3, 28 MULTY BINARY TURBO CODED WOFDM PERFORMANCE IN FLAT RAYLEIGH FADING CHANNELS Marius OLTEAN Maria KOVACI Horia BALTA Andrei CAMPEANU Faculty of, Timisoara, Romania Bd. V. Parvan,
More informationStaffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky
8 Int. J. Operational Researc, Vol. 1, Nos. 1/, 005 Staffing and routing in a two-tier call centre Sameer Hasija*, Edieal J. Pinker and Robert A. Sumsky Simon Scool, University of Rocester, Rocester 1467,
More informationSchedulability Analysis under Graph Routing in WirelessHART Networks
Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,
More informationTo motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R}
4. Variograms Te covariogram and its normalized form, te correlogram, are by far te most intuitive metods for summarizing te structure of spatial dependencies in a covariance stationary process. However,
More informationDistances in random graphs with infinite mean degrees
Distances in random graps wit infinite mean degrees Henri van den Esker, Remco van der Hofstad, Gerard Hoogiemstra and Dmitri Znamenski April 26, 2005 Abstract We study random graps wit an i.i.d. degree
More informationModel Quality Report in Business Statistics
Model Quality Report in Business Statistics Mats Bergdal, Ole Blac, Russell Bowater, Ray Cambers, Pam Davies, David Draper, Eva Elvers, Susan Full, David Holmes, Pär Lundqvist, Sixten Lundström, Lennart
More informationYale ICF Working Paper No. 05-11 May 2005
Yale ICF Working Paper No. 05-11 May 2005 HUMAN CAPITAL, AET ALLOCATION, AND LIFE INURANCE Roger G. Ibbotson, Yale cool of Management, Yale University Peng Cen, Ibbotson Associates Mose Milevsky, culic
More informationPredicting the behavior of interacting humans by fusing data from multiple sources
Predicting te beavior of interacting umans by fusing data from multiple sources Erik J. Sclict 1, Ritcie Lee 2, David H. Wolpert 3,4, Mykel J. Kocenderfer 1, and Brendan Tracey 5 1 Lincoln Laboratory,
More informationNote nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1
Copyrigt c Sanjoy Dasgupta Figure. (a) Te feasible region for a linear program wit two variables (see tet for details). (b) Contour lines of te objective function: for different values of (profit). Te
More informationComparison between two approaches to overload control in a Real Server: local or hybrid solutions?
Comparison between two approaces to overload control in a Real Server: local or ybrid solutions? S. Montagna and M. Pignolo Researc and Development Italtel S.p.A. Settimo Milanese, ITALY Abstract Tis wor
More informationNotes: Most of the material in this chapter is taken from Young and Freedman, Chap. 12.
Capter 6. Fluid Mecanics Notes: Most of te material in tis capter is taken from Young and Freedman, Cap. 12. 6.1 Fluid Statics Fluids, i.e., substances tat can flow, are te subjects of tis capter. But
More informationHuman Capital, Asset Allocation, and Life Insurance
Human Capital, Asset Allocation, and Life Insurance By: P. Cen, R. Ibbotson, M. Milevsky and K. Zu Version: February 25, 2005 Note: A Revised version of tis paper is fortcoming in te Financial Analysts
More informationChildren as insurance
J Popul Econ 2001) 14: 119±136 999 2001 Cildren as insurance Claus Cr. PoÈrtner University of Copenagen, Institute of Economics, Studiestraede 6, 1455 Copenagen K, Denmark Fax: 45-35323085, e-mail: claus.poertner@econ.ku.dk)
More informationUsing Intelligent Agents to Discover Energy Saving Opportunities within Data Centers
1 Using Intelligent Agents to Discover Energy Saving Opportunities witin Data Centers Alexandre Mello Ferreira and Barbara Pernici Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico
More informationPressure. Pressure. Atmospheric pressure. Conceptual example 1: Blood pressure. Pressure is force per unit area:
Pressure Pressure is force per unit area: F P = A Pressure Te direction of te force exerted on an object by a fluid is toward te object and perpendicular to its surface. At a microscopic level, te force
More informationAnalyzing the Effects of Insuring Health Risks:
Analyzing te Effects of Insuring Healt Risks: On te Trade-off between Sort Run Insurance Benefits vs. Long Run Incentive Costs Harold L. Cole University of Pennsylvania and NBER Soojin Kim University of
More informationOptimizing Desktop Virtualization Solutions with the Cisco UCS Storage Accelerator
Optimizing Desktop Virtualization Solutions wit te Cisco UCS Accelerator Solution Brief February 2013 Higligts Delivers linear virtual desktop storage scalability wit consistent, predictable performance
More informationEXTRA PRACTICE 1 EXTRA PRACTICE VOCABULARY. Across. Down NAME. Circle seven words. Then complete the sentences with the words you circled.
EXTRA PRACTICE EXTRA PRACTICE NAME VOCABULARY Circle seven words. Ten complete te sentences wit te words you circled.. Many animals try to ide from teir..... Te coral snake is a poisonous..... A bee is
More informationYour List of Work Orders This Summer. (Hiking in these mountains is not on the list.)
A Voice for HR Directors at Independent Scools S lifeline May 2013, Issue #6 Your List of Work Orders Tis Summer (Hiking in tese mountains is not on te list.) Work Orders n SOS HR Training (June 2013)
More informationPerformance Evaluation of Selected Category of Public Sector Mutual Fund Schemes in India
Performance Evaluation of Selected Category of Public Sector Mutual Scemes in India Dr. R. Karrupasamy Director, Department of Management Studies Neru College of Tecnology, Coimbatore, Sout India. Mrs.
More informationCHAPTER 7. Di erentiation
CHAPTER 7 Di erentiation 1. Te Derivative at a Point Definition 7.1. Let f be a function defined on a neigborood of x 0. f is di erentiable at x 0, if te following it exists: f 0 fx 0 + ) fx 0 ) x 0 )=.
More informationOn Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Saring Scemes Based on General Access Structure (Corrected Version) Ventzislav Nikov 1, Svetla Nikova 2, Bart
More information13 PERIMETER AND AREA OF 2D SHAPES
13 PERIMETER AND AREA OF D SHAPES 13.1 You can find te perimeter of sapes Key Points Te perimeter of a two-dimensional (D) sape is te total distance around te edge of te sape. l To work out te perimeter
More information10 Building Code Opportunities for California Local Governments
IN PARTNERSHIP WITH 0 Building Code Opportunities for California Local Governments Go beyond Title 24 codes by instituting local ordinances tat elp you reac your climate goals sooner and reap rewards earlier.
More informationTraining Robust Support Vector Regression via D. C. Program
Journal of Information & Computational Science 7: 12 (2010) 2385 2394 Available at ttp://www.joics.com Training Robust Support Vector Regression via D. C. Program Kuaini Wang, Ping Zong, Yaoong Zao College
More informationCHAPTER TWO. f(x) Slope = f (3) = Rate of change of f at 3. x 3. f(1.001) f(1) Average velocity = 1.1 1 1.01 1. s(0.8) s(0) 0.8 0
CHAPTER TWO 2.1 SOLUTIONS 99 Solutions for Section 2.1 1. (a) Te average rate of cange is te slope of te secant line in Figure 2.1, wic sows tat tis slope is positive. (b) Te instantaneous rate of cange
More informationDynamically Scalable Architectures for E-Commerce
MKWI 2010 E-Commerce und E-Business 1289 Dynamically Scalable Arcitectures for E-Commerce A Strategy for Partial Integration of Cloud Resources in an E-Commerce System Georg Lackermair 1,2, Susanne Straringer
More informationDesign and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System
Design and Analysis of a Fault-olerant Mecanism for a Server-Less Video-On-Demand System Jack Y. B. Lee Department of Information Engineering e Cinese University of Hong Kong Satin, N.., Hong Kong Email:
More informationBinary Search Trees. Adnan Aziz. Heaps can perform extract-max, insert efficiently O(log n) worst case
Binary Searc Trees Adnan Aziz 1 BST basics Based on CLRS, C 12. Motivation: Heaps can perform extract-max, insert efficiently O(log n) worst case Has tables can perform insert, delete, lookup efficiently
More information