Create a model for data that will allow you to address risk

Assignment Help Computer Engineering
Reference no: EM133587728

Assignment

Scenario: Identify a business that is of interest to you. It can be real or fictitious, but it should be a realistic business. Think of one specific risk that your chosen business could face, and consider how and where you will get data that can be analyzed to address that risk.

Complete the following steps:

Question A. Create a Word document to contain all components of your Unit 6 Assignment. Add a title page and table of contents.

Question B. Write an introduction to your chosen topic. Describe the business that you have chosen, identify the risk you selected, and briefly describe how you expect analytics to help you address that risk. Label this section Introduction.

Question C. Perform a SWOT analysis for your business. Ensure that you have at least one element with a description in each of the four quadrants of a SWOT table. Label this section SWOT Analysis.

Question D. Identify which quadrant of a risk matrix your selected risk would fall into (High Probability/High Impact; High Probability/Low Impact; Low Probability/High Impact; or Low Probability/Low Impact. Provide a rationale explaining why you have classified your chosen risk in the way you did. Label this section Risk Classification.

Question E. Obtain or create a data set that you can use to address your risk. You can use built in data sets in R, data sets from the Internet, or data sets from a company with appropriate permission. It is acceptable to create your own data set if you wish. Keep in mind that you will need to use one of the risk analytics techniques you have learned in this class, so the data you use and the outcome your produce must be aligned with a valid technique "Expected Payoff" Please see attached template. Make a screen capture of a representative sample of your data. Place it in your document and label this section Data.

Question F. Create a model for your data that will allow you to address your selected risk. This will be in Excel for the Expected Payoff as your technique. In your Word document, provide evidence by way of labeled screen captures and written descriptions of your model building. Label this section Modeling.

Question G. For Expected Payoff, document your findings for your audience. In your Word document, provide evidence by way of labeled screen captures and written descriptions of your model application/outcomes. Label this section Outcomes.

Question H. Write a conclusion that summarizes what you did to assess and analyze risk using data. Discuss legal and/or ethical considerations that your chosen business must consider and address in using your risk analytics approach. Label this section Conclusion.

Reference no: EM133587728

Questions Cloud

What are analytics and what are different types of analytics : When we ask questions like, How much data is too much data-to-data mine? What are analytics, and what are the different types of analytics?
Four main types of public policy include regulatory policy : The four main types of public policy include regulatory policy, constituent policy, distributive policy, and redistributive policy.
What kind of heredity-environmental correlation does this : twelve year-old Melissa has been invited by her science teachers to join the school's bot-building team. What kind of heredity-environmental correlation does
Why the organization used risk analytics : You must summarize how and why the organization used risk analytics, citing the source of your information.
Create a model for data that will allow you to address risk : Create a model for your data that will allow you to address your selected risk. This will be in Excel for the Expected Payoff as your technique.
Discuss impact of the process to the company : Discuss the impact of the process to the company. Explain the changes employees need to know.
Evaluate the different competing financial objectives : ACC7032 Managerial Finance, Birmingham City Business School - Evaluate the different competing financial objectives of the firm and the agency problem
What would you say in response : ISSC 452- On your first day on the job as an IT intern, you attend a meeting with several department heads regarding proposed. What would you say in response?
How to call balls and strikes during baseball games and swim : how to call balls and strikes during baseball games and swim, hike, and bike with members of his family. What kind of heredity-environmental correlation does

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd