INVESTING IN CYBERSECURITY:
|
|
|
- Stephanie Booker
- 10 years ago
- Views:
Transcription
1 INVESTING IN CYBERSECURITY: Insights from the Gordon-Loeb Model Lawrence A. Gordon EY Alumni Professor of Managerial Accounting & Information Assurance Affiliate Professor in University of Maryland Institute for Advanced Computer Studies The Robert H. Smith School of Business April
2 Basic Facts Cybersecurity Breaches are Growing at an Alarming Rate 100% Security Is Not Possible Large Share of Infrastructure Assets Owned by Private Sector Corporations Investments in Cybersecurity Involve Resource Allocation Decisions (i.e., Cost-Benefit Decisions or Making the Business Case) Cybersecurity Strategy is a National Policy Priority -- Economics is Key Component of this Strategy* 2 *See Report by OECD (2012)
3 Costs of Cybersecurity Breaches to Corporations Explicit Costs (e.g., Detecting and Correcting Breaches) Implicit Costs (e.g., Reputation Effect, Potential Liability) Impact of Breaches on Corporations Breaches Impact Annual Earnings of Corporations Large % of Breaches Do Not Have a Significant Impact on Stock Market Returns of Firms* -- but Some Do! Firms Have Strengthened Remediation Strategies (Important Part of Cybersecurity Risk Management) Stockholders Have Become Tolerant of Breaches 3 *See Appendix A for Methodology.
4 Why Are Cybersecurity Investments So Difficult to Justify? They are primarily Cost Savings Projects rather than Revenue Generating Projects (and Among the Most Difficult Cost Savings Projects to Justify) Their Benefits and Risks are Impossible to Measure Precisely (Wait-and-See approach is often Rational from an Economics perspective due to Deferment Option) Externalities are Important, but Hard to Justify on a Cost-Benefit basis 4
5 Figure 1: Benefits and Cost of an Investment in Cyber/Information Security* vl $ Cost of Investment Expected Benefits of Investment=(v-S[z,v])L Benefits are Increasing at a Decreasing Rate v = Vulnerability/Threat L = Potential Loss vl = Expected Loss z = Level of Investment 100% Security is Not Possible z* Level of investment in information security vl *Adapted from Gordon and Loeb, 2002a (see Appendix B). z
6 Results of Gordon-Loeb Model* Key Components of Optimal Amount to Invest: Potential Losses (Cost Savings) Vulnerabilities/Threats Productivity of Investments Optimal Level of Cybersecurity Investments Does Not Always Increase with Level of Vulnerability Firms should Generally Invest 37% of Expected Loss (i.e., Invest, but Invest Wisely) *Economic models should be viewed as a complement to, not as a substitute for, sound business judgment! 6
7 How Can Organizations Use the Gordon-Loeb Model?* *Adapted from Gordon and Loeb, 2011 (Wall Street Journal) Step 1. Estimate the Potential Loss (L) from a Security Breach for each Set of Information (Info. Segmentation is Important). Step 2. Estimate the Likelihood that an Information Set will be Breached, by examining its Vulnerability/Threat (v) to Attack. Step 3. Create a Grid with all the Possible Combinations of the First Two Steps, from Low Value, Low Vulnerability/Threat to High Value, High Vulnerability/Threat. Step 4. Focus Spending where it Should Reap the Largest Net Benefits Based on Productivity of Investments. 7
8 Figure 2: Potential Loss from Information Security Breach Value of Information Sets (in $M)* Low Medium High Vulnerability/Threat** Low Medium High % % % % % % % % % % *Value of Information = Potential Loss (L) ** Vulnerability/Threat = v Low: vl <30 Medium: 69 VL 30 High: vl 70
9 PRODUCTIVITY OF INVESTMENTS IN CYBERSECURITY (Example 1) z S(z,Low v ) S' S(z,Mediun v) S' S(z,High v) S' Low Prodcutivity = v/(1+z) for Low Vulnerability/Threat Medium Productivity = v/(1+z)² for Medium Vulnerability/Threat High Productivity = v/(1+z)³ for High Vulnerability/Threat Follow the Yellow Brick Road 9
10 Figure 3: Cost Savings from 1st $M Investments Value of Information Sets (in $M) Low Medium High Vulnerability/Threat Low Medium High % % % % % % % % % %
11 Figure 4: Incremental Cost Savings from 2nd $M Investments Value of Information Sets (in $M) Low Medium High Vulnerability/Threat Low Medium High % % % % % % % % % %
12 Figure 5: Incremental Cost Savings from 3rd $M Investments Value of Information Sets Low Medium High Vulnerability/Threat Low Medium High % % % % % % % % % %
13 Figure 6: Incremental Cost Savings from 4th $M Investments Value of Information Sets (in $M) Low Medium High VulnerabilityThreat Low Medium High % % % % % % % % % %
14 Figure 7: Investment Amounts (Example 1) Value of Information Sets (in $M) Low Medium High VulnerabilityThreat Low Medium High % <1M 1M <2M <2M <2M 2M <3M <3M <3M <3M 20% 1M <2M 2M <3M <3M 3M <4M <4M <4M 4M 30% <2M 2M <3M 3M <4M <4M >4M >4M >4M >4M 40% <2M <3M <3M <3M <3M <4M <4M <4M <4M <4M 50% <2M <3M <3M <3M <4M <4M <4M <4M >4M >4M 60% <2M <3M <3M <4M <4M <4M <4M >4M >4M >4M 70% <2M <3M <4M <4M <4M <4M >4M >4M >4M >4M 80% <2M <3M <3M <3M <3M <4M <4M <4M <4M <4M 90% <2M <3M <3M <3M <3M <4M <4M <4M <4M <4M 100% <2M <3M <3M <3M <4M <4M <4M <4M <4M <4M 14
15 PRODUCTIVITY OF INVESTMENTS IN CYBERSECURITY (Example 2) z S(z,Low v) S' S(z,High V) S' Low Prodcutivity = v/(1+z) for v = 10%, 20%, 30%, 40% and 50% High Productivity = v/(1+z)³ for v = 60%, 70%, 80%, 90% and 100% 15
16 Figure 7: Investment Amounts (Example 2) Value of Information Sets (in $M) Low Medium High Vulnerability/Threat Low High % <1M 1M <2M <2M <2M 2M <3M <3M <3M <3M 20% 1M <2M 2M <3M <3M 3M <4M <4M <4M 4M 30% <2M 2M <3M 3M <4M <4M >4M >4M >4M >4M 40% <2M <3M 3M <4M 4M >4M >4M >4M >4M >4M 50% <2M <3M <4M 4M >4M >4M >4M >4M >4M >4M 60% <2M <3M <3M <3M <3M <3M <3M <4M <4M <4M 70% <2M <3M <3M <3M <3M <3M <4M <4M <4M <4M 80% <2M <3M <3M <3M <3M <4M <4M <4M <4M <4M 90% <2M <3M <3M <3M <3M <4M <4M <4M <4M <4M 100% <2M <3M <3M <3M <4M <4M <4M <4M <4M <4M 16
17 PRODUCTIVITY OF INVESTMENTS IN CYBERSECURITY (Example 3) z S(z, Lev1) S' S(z, Lev2) s' S(z, Lev3) s' S(z, Lev4) s' S(z, Lev5) s' Productivity Lev1 = v/(1+z) for v = 10, 20% Productivity Lev2 = v/(1+z)^1.5 for v = 30, 40% Productivity Lev3 = v/(1+z)^2 for v = 50, 60% Productivity Lev4 = v/(1+z)^2.5 for v = 70, 80% Productivity Lev5 = v/(1+z)^3 for v = 90, 100% 17
18 Figure 7: Investment Amounts (Example 3) Value of Information Sets (in $M) Low Medium High Vulnerabilities/Threats v5 v4 v3 v2 v % <1M 1M <2M <2M <2M 2M <3M <3M <3M <3M 20% 1M <2M 2M <3M <3M 3M <4M <4M <4M 4M 30% <2M <2M <3M <3M <4M <4M <4M <4M <4M >4M 40% <2M <3M <3M <4M <4M <4M 4M >4M >4M >4M 50% <2M <3M <3M <3M <4M <4M <4M <4M >4M >4M 60% <2M <3M <3M <4M <4M <4M <4M >4M >4M >4M 70% <2M <3M <3M <3M <4M <4M <4M <4M <4M <4M 80% <2M <3M <3M <4M <4M <4M <4M <4M <4M >4M 90% <2M <3M <3M <3M <3M <4M <4M <4M <4M <4M 100% <2M <3M <3M <3M <4M <4M <4M <4M <4M <4M 18
19 Concluding Comments I. Cybersecurity Investments Are Hard To Justify They are Cost Savings, Not Revenue Generating, Projects You Can t See Savings Most Breaches Do Not Have Significant Effect on Stock Prices II. Invest, but Invest Wisely Conduct Cost-Benefit Analysis (Making the Business Case) On Average, Invest 37% of Expected Loss per Info. Set Wait-n-See Approach is Rational from Economics Perspective Key Factors for each Information Set: (a) Potential Loss, (b) Vulnerability/Threat, (c) Productivity of Investment Gather Data & Conduct Analyses on Above Factors III. Optimal Level of Investment Does Not Always Increase With The Level of Vulnerability/Threat Best Payoff Often Comes from Mid-level Vulnerability/Threat 19
20 SELECTED REFERENCES Gordon, L.A. and M.P. Loeb. 2011, You May Be Fighting the Wrong Security Battles: How IT executives can determine the right amount to spend and where to spend it, The Wall Street Journal, September 26, Gordon, L.A. and M.P. Loeb MANAGING CYBERSECURITY RESOURCES: A Cost-Benefit Analysis (McGraw-Hill). Gordon, L.A. and M.P. Loeb Information Security Budgeting Process: An Empirical Study, Communications of the ACM / Gordon, L.A., M.P. Loeb Economic Aspects of Information Security: An Emerging Field of Research, Information System Frontiers. Gordon, L.A. and M.P. Loeb. 2002a. The Economics of Information Security Investment, ACM Transactions on Information and System Security. Gordon, L.A. and M.P. Loeb. 2002b. Return on Information Security Investments: Myths vs. Reality, Strategic Finance. Gordon, L.A., M.P. Loeb, and W. Lucyshyn Cybersecurity Investments in the Private Sector: The Role of Governments, Georgetown Journal of International Affairs. Gordon, L.A., M.P. Loeb, and W. Lucyshyn Sharing Information on Computer Systems Security: An Economic Analysis, Journal of Accounting and Public Policy. Gordon, L.A., M.P. Loeb, and W. Lucyshyn Information Security Expenditures and Real Options: A Wait-and-See Approach, Computer Security Journal. Gordon, L.A., M.P Loeb, W. Lucyshyn, and R. Richardson CSI/FBI Computer Crime and Security Survey, Computer Security Journal. Gordon, L.A., M.P. Loeb, W. Lucyshyn, and L. Zhou. Forthcoming. The Impact of Information Sharing on Cybersecurity Underinvestment: A Real Options Perspective, Journal of Accounting and Public Policy. Gordon, L.A., M.P. Loeb, W. Lucyshyn, and L. Zhou Externalities and the Magnitude of Cybersecurity Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model, Journal of Information Security. Gordon, L.A., M.P. Loeb and T. Sohail Market Value of Voluntary Disclosures Concerning Information Security, MIS Quarterly. Gordon, L.A., M.P. Loeb, and T. Sohail A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM. Gordon, L.A., M.P. Loeb, T. Sohail. C-Y Tseng and L. Zhou Cybersecurity Capital Allocation and Management Control Systems, European Accounting Review. Gordon, L.A., M.P. Loeb, and L. Zhou The Impact of Information Security Breaches: Has There Been a Downward Shift in Costs? Journal of Computer Security. Lelarge, M Coordination in network security games: A monotone comparative statics approach. Selected Areas in Communications, IEEE Journal on Selected Areas in Communications. 20 OECD (Organization for Economic Cooperation and Development) Cybersecurity Policy Making at a Turning Point.
21 Appendix A: Research Methodology for Studying Cybersecurity Breaches One-factor Model (Basic CAPM) Abnormal Returns: R it AR RF = a + b ( RM RF ) + ε it = t i i RF ) [ aˆ + bˆ ( RM ( Rit t i i t t t t it RF )] Cumulative Abnormal Returns: CAR i t 2 = t= t 1 AR it, Average CAR across Firms: 1 N CARi N i = 1 CAR = R it : firm s return, RF t : risk-free rate, RM t : market s return b i ; the CAPM market model s slope parameter (i.e., the systematic risk of the return for firm i, relative to the return of the entire market place, and often call the firm s beta) 21
22 Appendix B: Optimal Amount to Invest in Cybersecurity (Gordon-Loeb Model)* Expected benefits of an investment in information security, denoted as EBIS, are equal to the reduction in the firm's expected loss attributable to the extra security. EBIS(z) = [v- S(z,v)] L [1] EBIS is written above as a function of z, since the investment in information security is the firm s only decision variable (v and L are parameters of the information set). The expected net benefits from an investment in information security, denoted ENBIS, equal EBIS less the cost of the investment, or: ENBIS(z) = [v -S(z,v)]L -z [2] Maximizing [2] is equivalent to minimizing: S(z,v)L +z [3] Interior maximum z*>0 is characterized by the first-order condition for maximizing [2] (or minimizing [3]) : -S z (z *,v)l =1 [4] 22 *Adapted from Gordon and Loeb, 2002a.
ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY
ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY Lawrence A. Gordon Ernst & Young Alumni Professor of Managerial Accounting & Information Assurance The Robert H. Smith School of Business University of Maryland
Reducing the Challenges to Making Cybersecurity Investments in the Private Sector
Cyber Security Division 2012 Principal Investigators Meeting TTA: Cyber Economics PI - Dr. Lawrence A. Gordon* ([email protected]), (301) 405-4072 Co-PI Dr. Martin P. Loeb* ([email protected]),
Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective
Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective Testimony for the House Committee on Homeland Security s Subcommittee on Emerging Threats, Cybersecurity, and Science
Information Security and Risk Management
Information Security and Risk Management by Lawrence D. Bodin Professor Emeritus of Decision and Information Technology Robert H. Smith School of Business University of Maryland College Park, MD 20742
PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon ([email protected]) EY Professor of Managerial Accounting and Information Assurance Affiliate
Master of Business Administration, State University of New York at Albany, Accounting/Finance Concentration, 6/67
LAWRENCE A. GORDON ([email protected]) EY Alumni Professor of Managerial Accounting and Information Assurance Robert H. Smith School of Business, University of Maryland - College Park, MD 20742 Affiliate
How To Understand The 2004 Csi/Fbi Computer Crime And Security Survey
NINTH ANNUAL 2004 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY GoCSI.com by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson The Computer Crime and Security Survey is conducted
S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
Sharing Information on Computer Systems Security: An Economic Analysis
Sharing Information on Computer Systems Security: An Economic Analysis Lawrence A. Gordon Ernst & Young Alumni Professor of Managerial Accounting and Information Assurance The Robert H. Smith School of
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
How To Understand Network Security
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011. Threats and Vulnerabilities Attacks are exogenous Contribution (1) Optimal security
Coordination in Network Security Games
Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: [email protected] Abstract Malicious softwares or malwares for short have become a major security threat. While originating
TENTH ANNUAL CSI/FBI COMPUTER CRIME AND SECURITY SURVEY. GoCSI.com
TENTH ANNUAL 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY GoCSI.com 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson The
THE IMPACT OF INFORMATION SECURITY BREACHES ON FINANCIAL PERFORMANCE OF THE BREACHED FIRMS: AN EMPIRICAL INVESTIGATION
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management THE IMPACT OF INFORMATION SECURITY BREACHES ON FINANCIAL PERFORMANCE OF THE BREACHED FIRMS: AN
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
ELEVENTH ANNUAL CSI/FBI COMPUTER CRIME AND SECURITY SURVEY. GoCSI.com
ELEVENTH ANNUAL 2006 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY GoCSI.com 2006 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson The
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
Winkler, D. T. "The Cost of Trade Credit: A Net Present Value Perspective." Journal of Business and Economic Studies, vol. 3, no. 1, 1996, pp. 53-63.
The Cost of Trade Credit: A Net Present Value Perspective By: Daniel T Winkler Winkler, D. T. "The Cost of Trade Credit: A Net Present Value Perspective." Journal of Business and Economic Studies, vol.
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Chap 3 CAPM, Arbitrage, and Linear Factor Models
Chap 3 CAPM, Arbitrage, and Linear Factor Models 1 Asset Pricing Model a logical extension of portfolio selection theory is to consider the equilibrium asset pricing consequences of investors individually
Competitive Cyber-Insurance and Internet Security
Competitive Cyber-Insurance and Internet Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand {nikhils@eecs, schwartz@eecs, mark@icsi, wlr@eecs}.berkeley.edu Abstract This paper investigates
Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania
Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically
Healthcare and IT Working Together. 2013 KY HFMA Spring Institute
Healthcare and IT Working Together 2013 KY HFMA Spring Institute Introduction Michael R Gilliam Over 7 Years Experience in Cyber Security BA Telecommunications Network Security CISSP, GHIC, CCFE, SnortCP,
An Executive Brief for Network Security Investments
An Executive Brief for Network Security Investments Implementing network security resilience is one of the few things that you can do that will: Protect company brand value Decrease operational costs Preserve
Elements of the Patch Management Process
by Thomas Gerace and Huseyin Cavusoglu doi: 10.1145/1536616.1536646 The Critical Elements of the Patch Management Process After the flames from the Slammer s attack were doused and the technology industry
Warranty Designs and Brand Reputation Analysis in a Duopoly
Warranty Designs and Brand Reputation Analysis in a Duopoly Kunpeng Li * Sam Houston State University, Huntsville, TX, U.S.A. Qin Geng Kutztown University of Pennsylvania, Kutztown, PA, U.S.A. Bin Shao
Cybersecurity. Considerations for the audit committee
Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global
UNDERSTANDING THE COST ASSOCIATED WITH DATA SECURITY BREACHES
UNDERSTANDING THE COST ASSOCIATED WITH DATA SECURITY BREACHES Kholekile L. Gwebu, Associate Professor of Decision Sciences, Peter T. Paul College of Business and Economics, University of New Hampshire,
The value of information technology: A case study
ABSTRACT The value of information technology: A case study Lin Zhao Purdue University Calumet Songtao Mo Purdue University Calumet This case requires students to examine how to effectively assess the business
Transmission Price Control Review: Updated Proposals and Smithers & Co. Ltd.: Report on the Cost of Capital. Response to consultation
Transmission Price Control Review: Updated Proposals and Smithers & Co. Ltd.: Report on the Cost of Capital Response to consultation Prepared by Ian Rowson, IMR Solutions On behalf of: BG Gas Services
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal
AS APPROVED BY CONVOCATION, MARCH 25, 2004. (new/amended rules and commentary for rule 2.02)
AS APPROVED BY CONVOCATION, MARCH 25, 2004 (new/amended rules and commentary for rule 2.02) When Client an Organization (1.1) Notwithstanding that the instructions may be received from an officer, employee,
Including Technical and Security Risks in the Development of Information Systems: A Programmatic Risk Management Model
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2003 Proceedings International Conference on Information Systems (ICIS) 12-31-2003 Including Technical and Security Risks in the
DHS Incentives Study: Analysis, Recommendations, and Areas Identified for Further Research
DHS Incentives Study: Analysis, Recommendations, and Areas Identified for Further Research Executive Order 13636 on Improving Critical Infrastructure Cybersecurity Tony Cheesebrough Chief Economist National
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
Course Outline. BUSN 6020/1-3 Corporate Finance (3,0,0)
Course Outline Department of Accounting and Finance School of Business and Economics BUSN 6020/1-3 Corporate Finance (3,0,0) Calendar Description Students acquire the knowledge and skills required to effectively
Calculation of Return on Equity (Ke) Presentation to Stakeholders 8 th October 2008
Calculation of Return on Equity (Ke) Presentation to Stakeholders 8 th October 2008 1 Overview (1) Tariffs set by Energy Regulator based on Allowable Revenue Tariff 1 Tariff 2 Tariff 3 Allowable Revenue
1 Proactive risk management is sometimes described as fire fighting.
1 Proactive risk management is sometimes described as fire fighting. 2 Software risk always involves two characteristics A) fire fighting and crisis management B) known and unknown risks C) uncertainty
How To Audit A Company
INTERNATIONAL STANDARD ON AUDITING 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial statements for
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
Econ 422 Summer 2006 Final Exam Solutions
Econ 422 Summer 2006 Final Exam Solutions This is a closed book exam. However, you are allowed one page of notes (double-sided). Answer all questions. For the numerical problems, if you make a computational
ANALYZING THE SIGNIFICANCE OF RE-ENGINEERING THE BUSINESS PROCESS IN CORPORATE STRATEGY
International Journal of Economics, Commerce and Management United Kingdom Vol. III, Issue 2, Feb 2015 http://ijecm.co.uk/ ISSN 2348 0386 ANALYZING THE SIGNIFICANCE OF RE-ENGINEERING THE BUSINESS PROCESS
PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1
Federal Securities Law Disclosure Obligations Regarding Governmental Investigations
Federal Securities Law Disclosure Obligations Regarding Governmental Investigations Jared S. Richardson Associate General Counsel & Secretary Trinity Industries, Inc. W. Scott Wallace Partner Haynes and
AP Microeconomics Chapter 12 Outline
I. Learning Objectives In this chapter students will learn: A. The significance of resource pricing. B. How the marginal revenue productivity of a resource relates to a firm s demand for that resource.
EMERSON AND SUBSIDIARIES CONSOLIDATED OPERATING RESULTS (AMOUNTS IN MILLIONS EXCEPT PER SHARE, UNAUDITED)
CONSOLIDATED OPERATING RESULTS (AMOUNTS IN MILLIONS EXCEPT PER SHARE, UNAUDITED) TABLE 1 Quarter Ended March 31, Percent Change Net Sales $ 5,854 $ 5,919 1% Costs and expenses: Cost of sales 3,548 3,583
Practice Problems on the Capital Market
Practice Problems on the Capital Market 1- Define marginal product of capital (i.e., MPK). How can the MPK be shown graphically? The marginal product of capital (MPK) is the output produced per unit of
The Application of International Accounting Standards in the Financial Statements of Tearfund Partners
The Application of International Accounting Standards in the Financial Statements of Tearfund Partners Context: International Accounting Standards (IAS) have been developed primarily to bring consistency
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
Private Sector Cyber Security Investment Strategies: An Empirical Analysis *
Private Sector Cyber Security Investment Strategies: An Empirical Analysis * Brent R. Rowe Technology Economics and Policy RTI International [email protected] Michael P. Gallaher Technology Economics and Policy
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
SECURITY BREACH IN TRADING SYSTEM- COUNTERMEASURE USING IPTRACEBACK
American Journal of Applied Sciences 11 (3): 492-498, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.492.498 Published Online 11 (3) 2014 (http://www.thescipub.com/ajas.toc) SECURITY
Financial Issue 2010-7 Instruments, Structured
Financial Issue 2010-7 Instruments, Structured October 8, 2010 Products and Real Estate (FSR) Capital Markets Accounting Developments Advisory Issue 2010-8 December 13, 2010 Analysis of ASU 2010-20 Disclosures
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
Chapter 16 Financial Distress, Managerial Incentives, and Information
Chapter 16 Financial Distress, Managerial Incentives, and Information 16-1. Gladstone Corporation is about to launch a new product. Depending on the success of the new product, Gladstone may have one of
1. Care manager: rhetoric or reality Tad Kubisa Director of Social Services, Cambridgeshire
1. Care manager: rhetoric or reality Tad Kubisa Director of Social Services, Cambridgeshire When Griffiths presented his report Community Care - Agenda for Action to the Secretary of State, directors of
Voluntary Participation in Cyber-insurance Markets
Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh and Mingyan Liu Abstract The study of cyber-insurance, both as a method for transferring residual cyber-security risks, and as an incentive
Dealing with implicit support in relation to intra-group debt
Dealing with implicit support in relation to intra-group debt By Paul Wilmshurst The GE Capital case 1 shone a spotlight on whether and how implicit support should be allowed for in the analysis of intra-group
CAPITAL PROJECTS. To calculate the WACC, it is first necessary to determine the cost of each of the three sources of financing.
CAPITAL PROJECTS INTRODUCTION This reference document covers two topics related to capital projects. The first topic is the cost of capital to use as the discount rate when calculating the net present
Tax Cognizant Portfolio Analysis: A Methodology for Maximizing After Tax Wealth
Tax Cognizant Portfolio Analysis: A Methodology for Maximizing After Tax Wealth Kenneth A. Blay Director of Research 1st Global, Inc. Dr. Harry M. Markowitz Harry Markowitz Company CFA Society of Austin
CHAPTER 6: RISK AVERSION AND CAPITAL ALLOCATION TO RISKY ASSETS
CHAPTER 6: RISK AVERSION AND CAPITAL ALLOCATION TO RISKY ASSETS PROBLEM SETS 1. (e). (b) A higher borrowing is a consequence of the risk of the borrowers default. In perfect markets with no additional
Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy
Waveney Lower Yare & Lothingland Internal Drainage Board Risk Management Strategy and Policy Page: 1 Contents 1. Purpose, Aims & Objectives 2. Accountabilities, Roles & Reporting Lines 3. Skills & Expertise
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
The Stock Market s Reaction to Accounting Information: The Case of the Latin American Integrated Market. Abstract
The Stock Market s Reaction to Accounting Information: The Case of the Latin American Integrated Market Abstract The purpose of this paper is to explore the stock market s reaction to quarterly financial
