Draw a decision tree and calculate the emv

Assignment Help Management Information Sys
Reference no: EM131162250

CEO of a multihospital system is planning to expand operations into various states. It will take several years to get certifi cate of need (CON) approvals so that the new facilities can be constructed. The eventual cost (in millions of dollars) of building a facility will differ among states, depending upon fi nances, labor, and the economic and political climate. An outside consulting fi rm estimated the costs for the new facilities as based on declining, similar, or improving economies, and the associated probabilities as shown in Table EX 3.3 .

440_Table.png

a. The CEO remembered the Decision Support Systems class from graduate studies (a long time ago) and decided to use that information for the company ' s decision process. The first action was to draw a decision tree and calculate the EMV for each event node; then the best site would be selected for the next hospital for the system.

b. However, feeling uneasy with the limited data, the CEO wanted to collect more information about economic conditions and to allocate money in the budget for that purpose.

The CEO remembered that there is a way to calculate how much the company can tolerate for the additional information.

Reference no: EM131162250

Questions Cloud

What is the consumer''s income : Suppose the budget line changes so that the consumer achieves a new equilibrium at point B. What change in the economic environme3nt led to this new equilibrium? Is the consumer better off as a result of the price change?
Magnitude of the acceleration of the center : What is the magnitude of the acceleration of the center of mass of the plank just after the right end is released? And can you explain why T is greater than mg?
Debits or credits in the balance of payments : Classify each of the following as debits or credits in the U.S. balance of payments. Americans buy chocolate from the Swiss. U.S. gives foreign aid to Bosnia
Did you find anything interesting or unusual : Summarize your findings. Did you find anything interesting or unusual? How is this tool useful to investors? How is this useful to analysts? How do you see yourself using this tool in the future?
Draw a decision tree and calculate the emv : draw a decision tree and calculate the EMV for each event node;- then the best site would be selected for the next hospital for the system.
What is the value of the resonant frequency : The resonant frequency of a certain series RL Ccircuit is 2.64kHz, and the value of its capacitance is5.50μF. What is the value of the resonant frequency when the capacitance of the circuit is9.00 μF?
What is the marginal benefit of the eight snickers bar : A snickers bar costs $1.00 each at the concession stand at Notre Dame football games. Amanda revealed how much she is willing to pay for each snickers sold at the concession stand. She value the first bar at $2.00 and her marginal benefit declines by..
What topics you suggest to include in the educational plan : What steps would you take to assess the current cultural competence and prior knowledge, or preconceptions, of the group? What topics would you suggest to include in the educational plan for this group?
Determine the benefit-cost ratio for the proposed facility : Assuming an interest rate of 5% per year, determine the benefit-cost ratio for the proposed facility. Should the Council approve the proposal?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a security plan for medium sized health care facility

Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization

  Case projects - developing a security-testing tool

Case Projects: Developing a Security-Testing Tool. Your manager at Security Consulting Company has asked you to develop a tool that can gather information from several hundred computers running Windows XP Professional at Alexander Rocco

  Using a summary of the six business activities for perfect

data flow diagramusing a summary of the six business activities for perfect pizza as follows create 1 a context diagram

  Fundamentals of database systems

Now that the ERD is completed for your selected project, you are anxious to create the database and setup the tables. Before that step you remind everyone that the 2nd phase in the Database development process has not been completed yet

  Evaluation of security technologies and methodologies

Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards

  Challenges of managing a supply chain

Challenges of Managing a Supply Chain - determine which is the most challenging to manage effectively. Provide specific examples to support the response.

  Activity model of process of the transformation programme

Assessment 7301ICT - (Enterprise Architecture Concepts) - The purpose of the model is to ascertain what are the activities involved in the processes of the Programme Entity, and what or who is responsible for performing those activities

  The use of data miningdata mining what is data mining

the use of data miningdata mining what is data mining? compare data warehouses data marts and data mining. how can they

  Have you ever encountered a filter bubble

What are you thoughts about companies collecting data about you? Do you feel this type of data collection is a beneficial or detrimental? Why? Do you feel you have a right to know what data companies are collecting about you? Does this concern you..

  Explain the importance of the chosen metrics

Explain the importance of the chosen metrics and How do these measurements help to ensure competitive advantage?

  Work about information system

Internet-based technology is driving economic change at a level not seen since the spread of industrial technology in the late nineteenth and early twentieth centuries. What became known as "Web 2.0" and the business and consumer applications it b..

  Discuss the specifics of the incident you researched

Analyze the overall attributes of symmetric and asymmetric cryptography technologies. Discuss the advantages and disadvantages of each, and speculate upon the main reasons why organizations utilize both technologies today. Give an example of where..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd