Create a model for data that will allow you to address risk

Assignment Help Computer Engineering
Reference no: EM133587728

Assignment

Scenario: Identify a business that is of interest to you. It can be real or fictitious, but it should be a realistic business. Think of one specific risk that your chosen business could face, and consider how and where you will get data that can be analyzed to address that risk.

Complete the following steps:

Question A. Create a Word document to contain all components of your Unit 6 Assignment. Add a title page and table of contents.

Question B. Write an introduction to your chosen topic. Describe the business that you have chosen, identify the risk you selected, and briefly describe how you expect analytics to help you address that risk. Label this section Introduction.

Question C. Perform a SWOT analysis for your business. Ensure that you have at least one element with a description in each of the four quadrants of a SWOT table. Label this section SWOT Analysis.

Question D. Identify which quadrant of a risk matrix your selected risk would fall into (High Probability/High Impact; High Probability/Low Impact; Low Probability/High Impact; or Low Probability/Low Impact. Provide a rationale explaining why you have classified your chosen risk in the way you did. Label this section Risk Classification.

Question E. Obtain or create a data set that you can use to address your risk. You can use built in data sets in R, data sets from the Internet, or data sets from a company with appropriate permission. It is acceptable to create your own data set if you wish. Keep in mind that you will need to use one of the risk analytics techniques you have learned in this class, so the data you use and the outcome your produce must be aligned with a valid technique "Expected Payoff" Please see attached template. Make a screen capture of a representative sample of your data. Place it in your document and label this section Data.

Question F. Create a model for your data that will allow you to address your selected risk. This will be in Excel for the Expected Payoff as your technique. In your Word document, provide evidence by way of labeled screen captures and written descriptions of your model building. Label this section Modeling.

Question G. For Expected Payoff, document your findings for your audience. In your Word document, provide evidence by way of labeled screen captures and written descriptions of your model application/outcomes. Label this section Outcomes.

Question H. Write a conclusion that summarizes what you did to assess and analyze risk using data. Discuss legal and/or ethical considerations that your chosen business must consider and address in using your risk analytics approach. Label this section Conclusion.

Reference no: EM133587728

Questions Cloud

What are analytics and what are different types of analytics : When we ask questions like, How much data is too much data-to-data mine? What are analytics, and what are the different types of analytics?
Four main types of public policy include regulatory policy : The four main types of public policy include regulatory policy, constituent policy, distributive policy, and redistributive policy.
What kind of heredity-environmental correlation does this : twelve year-old Melissa has been invited by her science teachers to join the school's bot-building team. What kind of heredity-environmental correlation does
Why the organization used risk analytics : You must summarize how and why the organization used risk analytics, citing the source of your information.
Create a model for data that will allow you to address risk : Create a model for your data that will allow you to address your selected risk. This will be in Excel for the Expected Payoff as your technique.
Discuss impact of the process to the company : Discuss the impact of the process to the company. Explain the changes employees need to know.
Evaluate the different competing financial objectives : ACC7032 Managerial Finance, Birmingham City Business School - Evaluate the different competing financial objectives of the firm and the agency problem
What would you say in response : ISSC 452- On your first day on the job as an IT intern, you attend a meeting with several department heads regarding proposed. What would you say in response?
How to call balls and strikes during baseball games and swim : how to call balls and strikes during baseball games and swim, hike, and bike with members of his family. What kind of heredity-environmental correlation does

Reviews

Write a Review

Computer Engineering Questions & Answers

  What information is contained within an audit trail

What information is contained within an audit trail? What are the advantages and disadvantages of using an audit trail?

  Question1 assume that a file containing a series of

question1. assume that a file containing a series of integers is named number.dat and exists on the computers disk.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  Build an application that invites the user to enter a number

Build an application that invites the user to enter an integer number into each of two Edit Text boxes. The application must have four buttons.

  A program where you keep reading strings from the input

Write a program in C++ where you keep reading strings from the input, and then: if the number of characters is three or less.

  Design a cmos logic circuit that realizes

It is required to design a CMOS logic circuit that realizes a three-input, even-parity checker - Specifically, the output Yis to be low when an even number (0 or 2) of the inputs A, B, and Care high

  What is the time complexity for pushing an element

If we amortize this, what is the time complexity for pushing an element in the back of the array? What about the front of the array?

  Identify and describe 7 types of literature review

Identify and describe 7 types of literature review Write the difference and similarities of each type of literature review Put your answer in a table or matrix

  Describe different uses of the tools besides cryptography

What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

  Explain the advantages and disadvantages of operating

Why are database views important and how are they beneficial in a DBMS

  Discuss the need for high redundancy for virtualization

Describe the organization's environment, and evaluate its preparedness for virtualization. Recommend a configuration for shared storage; make sure to discuss.

  Explain and mention the developmental milestone

Explain and mention the developmental milestone in cognition,social skills, and languange acqusition observed in children between the ages of 0 and 18 months.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd