SlideShare a Scribd company logo
1 of 23
Download to read offline
Investor AI
Cybersecurity
Pitch
Birta Thorudottir, Estrella Spaans, Qin Zheng, Viet
Dung, Haoxuan Chang, Kaan Korkmaz – Team 4
InvestorPitchPresentation
COVID-19
63%increase in remote workers in the U.S in
the beginning of April, compared to 31%
mid March 2020
Source Data: Brenan, 2020.
Data Source: (Shi, 2020) Phishing Attacks using coronavirus COVID-19 themes : scamming, brand impersonation, and,
business email compromise.
1%
11%
34%
54%
Business Email Compromise
Blackmailing
Brand Impersonation
Scamming
Number of Attacks Per Cyber Atack Type
Category Proportion
Scamming
Brand Impersonation
Black mailing
Business Email Compromise
Fivefold
increase in Cyber Attacks during Covid-
19, directed at its staff, and email scams
targeting the public at large.
Source Data: WHO, 2020
45 years in
business
Our mission is to empower every person and
every organization on the planet to achieve more.
Source Data: Microsoft, 2020
73% market share
of desktop computer operating system
Our Windows operating system is the most widely used
computer operating system in the world, accounting for
around 72.86 percent share of the desktop, tablet, and
console OS market in February 2020
Source Data: Statistia,2020
In 2018, Microsoft
surpassed Apple and
became the most valuable
listed company in the
world. In April 2019,
Microsoft reached a
trillion dollars in
market value.
Source Data: The Verge, 2019
Our AI Solution
Microsoft Threat
Protection
Source Data: Grosh, 2018
5B threats
are detected by our algorithms, by
actively searching between users, emails,
applications, and endpoints.
263+
Artificial Intelligence projects
completed with high quality
engineers.
Source Data: Grosh, 2018
Source Data: Grosh, 2018
61% of Americans would like to do
more to protect their privacy online, and
so should you
Source Data: Cavello, 2020
37%
of businesses already protected
themselves and their customers
private information against an attack.
Source Data: vpnMentor, 2020
Why Invest?
Others
12%
Financial Services
16%23% 21%
ManufacturingHealthcare
14% 14%
Government ICT
Source Data: Renub Research, 2018
Forecasted Cyber Security Revenue %
$10,100,000,000
$126,000,000,000
$8,800,000,000
$30,921,541,180
2016 2017 2018 2019 2020 2021 2022 2023 2024 2025
Global AI Revenue
Cyber Security
AI Revenue
Source Data: MarketsandMarkets, ND. & Statista, 2020 – Dotted line refers to forecasted revenue
$8 million
Annual costs of breaches by the
Manufacturing and Healthcare
Industries
Source Data: Renub Research, 2018
28%
Annual growth of
connected IOT devices
worldwide till 2025
Source Data: Renub Research, 2018
Our goal is to reduce the percentage of cyber threats by 0-5% along
with increasing security breaches, this project proves high future benefits.
Regression Statistics
R Square 99.57%
Adj. R Square 99.45%
Standard Error 666,597,724
Observations 10
Coefficients Standard Error t Stat P-value
Intercept - 3,457,642,142 1,780,894,115 -1.94 0.09
Data Breach -1 2 - 0.60 0.57
IOT devices 1,666,857,012 120,868,496 13.79 0.00
Great Investment
Opportunity just for you.
BE A PART OF THE FUTURE!
Spending patterns for obtained funding
Budgets
Requirements
(USD)
Labor costs $ 52,780,000
Infrastructure $ 103,560,000
Features $ 38,450,000
Tool costs $ 49,338,000
Administrative costs $ 27,147,000
New dedicated campus $ 27,000,000
AI Solution Development
(Total)
$ 298,275,000
$167,568,000
Amount of Investments needed for the Projects
50% of Forbes 500
companies invest in cyber attack
prevention solutions
Q3/2020
Requirement
Analysis
Q4/2020
Design
Q1/2021
Development
Q2/2021
Testing
Q3/2021
Deployment
Q4/2021
Post-
production
Improvement
Spending patterns for obtained funding
Timeline for moving forward
$99,118,000
Amount of Investments needed for the Projects
Budgets
Requirements
(USD)
Labor costs $ 49,780,000
Infrastructure $ 103,560,000
Features $ 38,450,000
Tool costs $ 49,338,000
Administrative costs $ 27,147,000
New dedicated campus $ 0
AI Solution Development
(Total)
$ 298,275,000
Thank you for
your attention!
Small Commitment. Big Deal! And a small exercise.
Video Pitch Link
https://www.youtube.com/watch?v=y2EWSWek_zw&feature=youtu.be
Let’s Break Down
The Pitch
This will be an explanation of what tactics we have
implemented in order to convince the audience to invest
(persuasive tactics & data visualization tactics)
Trigger Pathos
Source Data: Higgins & Walker, 2012.
Data Visualization
Hierarchy Structure
Microsoft Branding Theme
Bigger and Bolder
Color Highlights
Source Data: Nussbaumer, 2015
Data Visualization
Source Data: Nussbaumer, 2015
Social Proof
Positive Number
Sense of Belonging
“HMRC’s Intervention”
Source Data: Martin, Steve J., 2014
Data Visualization
Only showing important
data
Color differentiation
“Regression & Projections
Source Data: Nussbaumer, 2015
Reciprocity
”Obligation to Give
when You Receive”
Unexpected
Personalized
Reciprocity: Door-In-The-Face
Option 1: Initially unreasonable request
Option 2: Relatively more reasonable request
Precise number works better than less precise
$3,935 vs. $4,000
”1.99 vs 2.00 / 1.99 vs 2.99”
Source Data: Martin, Steve J., 2014
Social Proof / Commitment
“Don't miss out on the future, we will hand out paper, write
down the amount you want to invest in us”
BBC. (2020, May 14). US church sues after bible study 'Zoombombed' by child abuse. Retrieved May 2020, from bbc.com: https://www.bbc.com/news/world-us-canada-
52668124?intlink_from_url=https://www.bbc.com/news/topics/cp3mvpdp1r2t/cyber-attacks&link_location=live-reporting-story+
Calvello, M. (2020, April 21). 50 VPN Statistics That Will Make You Reconsider Your Security. Retrieved May 2020, from learn.g2.com: https://learn.g2.com/vpn-statistics
Cogley, M. (2020, May 19). EasyJet cyber attack ‘came from China’. Retrieved May 2020, from telegraph.com: https://www.telegraph.co.uk/technology/2020/05/19/easyjet-hit-highly-sophisticated-cyber-attack/
Doffman, Z. (2020, April 30). New Microsoft Security Alert: Millions Of Users Risk ‘Increased Vulnerability To Attacks’. Retrieved May 2020, from forbes.com: https://www.forbes.com/sites/zakdoffman/2020/04/30/us-issues-
new-microsoft-security-alert-for-millions-of-office-365-users/#4b99022b4169
Fawkes, G. (2020, April 16). VPN Use and Data Privacy Stats for 2020. Retrieved May 2020, from vpnmentor.com: https://www.vpnmentor.com/blog/vpn-use-data-privacy-stats/
Gazis, O. (2020, May 28). NSA warns of new cyberattacks by Russian military hackers. Retrieved May 2020, from cbsnews.com: https://www.cbsnews.com/news/national-security-agency-cyberattack-sandworm-russia-
hackers/
Hallsworth, M., List, J. A., Metcalfe, R. D., & Vlaev, I. (2014). The behavioralist as tax collector: Using natural field experiments to enhance tax compliance. National Bureau of Economic Research working paper no. 20007.
Higgins, C., & Walker, R. (2012, September). Ethos, logos, pathos: Strategies of persuasion in social/environmental reports. Retrieved May 2020, from sciencedirect.com: https://doi.org/10.1016/j.accfor.2012.02.003
Johnson, A. (2020, February). Delivering on the promise of security AI to help defenders protect today’s hybrid environments. Retrieved May 2020, from blogs.microsoft.com:
https://blogs.microsoft.com/blog/2020/02/20/delivering-on-the-promise-of-security-ai-to-help-defenders-protect-todays-hybrid-environments/
Jones, K. (2020, April 7). How COVID-19 Has Impacted Media Consumption, by Generation. Retrieved May 2020, from visualcapitalist.com: https://www.visualcapitalist.com/media-consumption-covid-19/
Knaflic, Cole Nussbaumer. Storytelling With Data: A Data Visualization Guide for Business Professionals. Hoboken, New Jersey: John Wiley & Sons, Inc, 2015. Print.
Markets and Markets. (2019, May). Artificial Intelligence in Cybersecurity Market by Offering (Hardware, Software, and Service), Deployment Type, Security Type, Technology (ML, NLP, and Context-Aware), Application (IAM,
DLP, and UTM), End User, and Geography- Global Forecast to 2026. Retrieved May 2020, from marketsandmarkets.com: https://www.marketsandmarkets.com/Market-Reports/artificial-intelligence-security-market-
220634996.html
Martin, S. J., Goldstein, N. J., & Cialdini, R. B. (2014). The small big: Small changes that spark big influence. London: Profile.
McKinsey & Company. (2015, June). The internet of things: Mapping the Value Beyond The Hype. Retrieved May 2020, from mckinsey.com:
https://www.mckinsey.com/~/media/McKinsey/Industries/Technology%20Media%20and%20Telecommunications/High%20Tech/Our%20Insights/The%20Internet%20of%20Things%20The%20value%20of%20digitizing%20t
he%20physical%20world/The-Internet-of-things-Mapping-the-value-be
Microsoft. (2020, May). About Us. Retrieved May 2020, from microsoft.com: https://www.microsoft.com/en-us/about
Microsoft. (2020, May). Artificial Intelligence. Retrieved May 2020, from microsoft.com: https://www.microsoft.com/en-us/research/research-area/artificial-intelligence/?facet%5Btax%5D%5Bmsr-research-
area%5D%5B%5D=13556&sort_by=most-recent&facet%5Btax%5D%5Bmsr-content-type%5D%5B%5D=msr-project
Muncaster, P. (2020, April 1). Cyber-Attacks Up 37% Over Past Month as #COVID19 Bites. Retrieved May 2020, from infosecurity-magazine.com: https://www.infosecurity-magazine.com/news/cyberattacks-up-37-over-past-
month/
Renub. (2018, December 19). Cybersecurity Market to be USD 164 Billion by the year 2024 due to rise in growth of Digital Spying, Cyber Crimes & IoT Devices. Retrieved May 2020, from renub.com:
https://www.renub.com/global-cybersecurity-market-nd.php
Statista. (2019, July). Microsoft's revenue worldwide 2002-2019. Retrieved May 2020, from startista.com: https://www.statista.com/statistics/267805/microsofts-global-revenue-since-2002/
Statista. (2020, March). Market size and revenue comparison for artificial intelligence worldwide from 2015 to 2025. Retrieved May 2020, from statista.com: https://www.statista.com/statistics/941835/artificial-intelligence-
market-size-revenue-comparisons/
Stein, S., & Jacobs, J. (2020, March 16). Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak. Retrieved May 2020, from bloomberg.com: https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-
suffers-cyber-attack-during-covid-19-response
Warren, T. (2019, April 25). Microsoft is now a $1 trillion company. Retrieved May 2020, from theverge.com: https://www.theverge.com/2019/4/25/18515623/microsoft-worth-1-trillion-dollars-stock-price-value
WHO. (2020, April 23). WHO reports fivefold increase in cyber attacks, urges vigilance. Retrieved May 2020, from who.int: https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-
urges-vigilance
References

More Related Content

What's hot

B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
The New Mega Trends Sarwant Singh Frost Sullivan
The New Mega Trends   Sarwant Singh   Frost SullivanThe New Mega Trends   Sarwant Singh   Frost Sullivan
The New Mega Trends Sarwant Singh Frost SullivanFatine Amante
 
How Facebook Is Using Artificial Intelligence
How Facebook Is Using Artificial IntelligenceHow Facebook Is Using Artificial Intelligence
How Facebook Is Using Artificial IntelligenceBernard Marr
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesEMC
 
10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good
10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good 10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good
10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good Bernard Marr
 
final presentation. technology 2022
final presentation. technology 2022final presentation. technology 2022
final presentation. technology 2022rhyne_cory
 
Frost & Sullivan - world's top global mega trends to 2025 and implications
Frost & Sullivan - world's top global mega trends to 2025 and implicationsFrost & Sullivan - world's top global mega trends to 2025 and implications
Frost & Sullivan - world's top global mega trends to 2025 and implicationspolenumerique33
 
The Three "V"s of Big Data
The Three "V"s of Big DataThe Three "V"s of Big Data
The Three "V"s of Big DataSAP Analytics
 
Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28space150
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityMiraworks.io
 
Technology, Media, and Telecommunications Predictions 2020
 Technology, Media, and Telecommunications Predictions 2020 Technology, Media, and Telecommunications Predictions 2020
Technology, Media, and Telecommunications Predictions 2020ITSitio.com
 
Social Insights: Internet of Things (IoT)
Social Insights: Internet of Things (IoT)Social Insights: Internet of Things (IoT)
Social Insights: Internet of Things (IoT)Leadtail
 
The Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaThe Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaEMC
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveMateusz Maj
 
New Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationNew Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationJoseph M Bradley
 
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale SMAU
 

What's hot (19)

B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
The New Mega Trends Sarwant Singh Frost Sullivan
The New Mega Trends   Sarwant Singh   Frost SullivanThe New Mega Trends   Sarwant Singh   Frost Sullivan
The New Mega Trends Sarwant Singh Frost Sullivan
 
How Facebook Is Using Artificial Intelligence
How Facebook Is Using Artificial IntelligenceHow Facebook Is Using Artificial Intelligence
How Facebook Is Using Artificial Intelligence
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Governments Are Going Digital
Governments Are Going DigitalGovernments Are Going Digital
Governments Are Going Digital
 
The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United States
 
10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good
10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good 10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good
10 Wonderful Examples Of Using Artificial Intelligence (AI) For Good
 
final presentation. technology 2022
final presentation. technology 2022final presentation. technology 2022
final presentation. technology 2022
 
Frost & Sullivan - world's top global mega trends to 2025 and implications
Frost & Sullivan - world's top global mega trends to 2025 and implicationsFrost & Sullivan - world's top global mega trends to 2025 and implications
Frost & Sullivan - world's top global mega trends to 2025 and implications
 
The Three "V"s of Big Data
The Three "V"s of Big DataThe Three "V"s of Big Data
The Three "V"s of Big Data
 
Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28
 
FICCI Conference Mega Trends 2020
FICCI Conference Mega Trends 2020FICCI Conference Mega Trends 2020
FICCI Conference Mega Trends 2020
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological Singularity
 
Technology, Media, and Telecommunications Predictions 2020
 Technology, Media, and Telecommunications Predictions 2020 Technology, Media, and Telecommunications Predictions 2020
Technology, Media, and Telecommunications Predictions 2020
 
Social Insights: Internet of Things (IoT)
Social Insights: Internet of Things (IoT)Social Insights: Internet of Things (IoT)
Social Insights: Internet of Things (IoT)
 
The Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaThe Digital Universe in 2020 - India
The Digital Universe in 2020 - India
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
 
New Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationNew Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business Transformation
 
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
 

Similar to Presenting and persuading with data

Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataNeo4j
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
Cybersecurity Webinar for Small Business
Cybersecurity Webinar for Small BusinessCybersecurity Webinar for Small Business
Cybersecurity Webinar for Small BusinessChad Gniffke
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityGui Carvalhal
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Investment opportunities in the new normal
Investment opportunities in the new normal   Investment opportunities in the new normal
Investment opportunities in the new normal John Henderson
 
Investment Opportunities in the New Normal - AirTree Ventures
Investment Opportunities in the New Normal - AirTree VenturesInvestment Opportunities in the New Normal - AirTree Ventures
Investment Opportunities in the New Normal - AirTree VenturesMelissa Ran
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of ThingsGen Re
 
Asian insurance, pensions, and wealth management undergo rapid change, what a...
Asian insurance, pensions, and wealth management undergo rapid change, what a...Asian insurance, pensions, and wealth management undergo rapid change, what a...
Asian insurance, pensions, and wealth management undergo rapid change, what a...Varun Mittal
 
Tech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxTech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxGiorgia Zunino
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfKrishna N
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 

Similar to Presenting and persuading with data (20)

Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Effective collaboration with ethical hackers community
Effective collaboration with ethical hackers communityEffective collaboration with ethical hackers community
Effective collaboration with ethical hackers community
 
Cybersecurity Webinar for Small Business
Cybersecurity Webinar for Small BusinessCybersecurity Webinar for Small Business
Cybersecurity Webinar for Small Business
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud Profitability
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Investment opportunities in the new normal
Investment opportunities in the new normal   Investment opportunities in the new normal
Investment opportunities in the new normal
 
Investment Opportunities in the New Normal - AirTree Ventures
Investment Opportunities in the New Normal - AirTree VenturesInvestment Opportunities in the New Normal - AirTree Ventures
Investment Opportunities in the New Normal - AirTree Ventures
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Asian insurance, pensions, and wealth management undergo rapid change, what a...
Asian insurance, pensions, and wealth management undergo rapid change, what a...Asian insurance, pensions, and wealth management undergo rapid change, what a...
Asian insurance, pensions, and wealth management undergo rapid change, what a...
 
Tech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxTech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptx
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 

Recently uploaded

DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 

Recently uploaded (20)

DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 

Presenting and persuading with data

  • 1. Investor AI Cybersecurity Pitch Birta Thorudottir, Estrella Spaans, Qin Zheng, Viet Dung, Haoxuan Chang, Kaan Korkmaz – Team 4 InvestorPitchPresentation
  • 2.
  • 3. COVID-19 63%increase in remote workers in the U.S in the beginning of April, compared to 31% mid March 2020 Source Data: Brenan, 2020. Data Source: (Shi, 2020) Phishing Attacks using coronavirus COVID-19 themes : scamming, brand impersonation, and, business email compromise. 1% 11% 34% 54% Business Email Compromise Blackmailing Brand Impersonation Scamming Number of Attacks Per Cyber Atack Type Category Proportion Scamming Brand Impersonation Black mailing Business Email Compromise Fivefold increase in Cyber Attacks during Covid- 19, directed at its staff, and email scams targeting the public at large. Source Data: WHO, 2020
  • 4. 45 years in business Our mission is to empower every person and every organization on the planet to achieve more. Source Data: Microsoft, 2020 73% market share of desktop computer operating system Our Windows operating system is the most widely used computer operating system in the world, accounting for around 72.86 percent share of the desktop, tablet, and console OS market in February 2020 Source Data: Statistia,2020 In 2018, Microsoft surpassed Apple and became the most valuable listed company in the world. In April 2019, Microsoft reached a trillion dollars in market value. Source Data: The Verge, 2019
  • 5. Our AI Solution Microsoft Threat Protection Source Data: Grosh, 2018 5B threats are detected by our algorithms, by actively searching between users, emails, applications, and endpoints. 263+ Artificial Intelligence projects completed with high quality engineers. Source Data: Grosh, 2018 Source Data: Grosh, 2018
  • 6. 61% of Americans would like to do more to protect their privacy online, and so should you Source Data: Cavello, 2020 37% of businesses already protected themselves and their customers private information against an attack. Source Data: vpnMentor, 2020
  • 7. Why Invest? Others 12% Financial Services 16%23% 21% ManufacturingHealthcare 14% 14% Government ICT Source Data: Renub Research, 2018 Forecasted Cyber Security Revenue % $10,100,000,000 $126,000,000,000 $8,800,000,000 $30,921,541,180 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 Global AI Revenue Cyber Security AI Revenue Source Data: MarketsandMarkets, ND. & Statista, 2020 – Dotted line refers to forecasted revenue $8 million Annual costs of breaches by the Manufacturing and Healthcare Industries Source Data: Renub Research, 2018 28% Annual growth of connected IOT devices worldwide till 2025 Source Data: Renub Research, 2018 Our goal is to reduce the percentage of cyber threats by 0-5% along with increasing security breaches, this project proves high future benefits. Regression Statistics R Square 99.57% Adj. R Square 99.45% Standard Error 666,597,724 Observations 10 Coefficients Standard Error t Stat P-value Intercept - 3,457,642,142 1,780,894,115 -1.94 0.09 Data Breach -1 2 - 0.60 0.57 IOT devices 1,666,857,012 120,868,496 13.79 0.00
  • 8. Great Investment Opportunity just for you. BE A PART OF THE FUTURE!
  • 9. Spending patterns for obtained funding Budgets Requirements (USD) Labor costs $ 52,780,000 Infrastructure $ 103,560,000 Features $ 38,450,000 Tool costs $ 49,338,000 Administrative costs $ 27,147,000 New dedicated campus $ 27,000,000 AI Solution Development (Total) $ 298,275,000 $167,568,000 Amount of Investments needed for the Projects
  • 10. 50% of Forbes 500 companies invest in cyber attack prevention solutions
  • 11. Q3/2020 Requirement Analysis Q4/2020 Design Q1/2021 Development Q2/2021 Testing Q3/2021 Deployment Q4/2021 Post- production Improvement Spending patterns for obtained funding Timeline for moving forward $99,118,000 Amount of Investments needed for the Projects Budgets Requirements (USD) Labor costs $ 49,780,000 Infrastructure $ 103,560,000 Features $ 38,450,000 Tool costs $ 49,338,000 Administrative costs $ 27,147,000 New dedicated campus $ 0 AI Solution Development (Total) $ 298,275,000
  • 12. Thank you for your attention! Small Commitment. Big Deal! And a small exercise.
  • 14. Let’s Break Down The Pitch This will be an explanation of what tactics we have implemented in order to convince the audience to invest (persuasive tactics & data visualization tactics)
  • 15. Trigger Pathos Source Data: Higgins & Walker, 2012.
  • 16. Data Visualization Hierarchy Structure Microsoft Branding Theme Bigger and Bolder Color Highlights Source Data: Nussbaumer, 2015
  • 18. Social Proof Positive Number Sense of Belonging “HMRC’s Intervention” Source Data: Martin, Steve J., 2014
  • 19. Data Visualization Only showing important data Color differentiation “Regression & Projections Source Data: Nussbaumer, 2015
  • 20. Reciprocity ”Obligation to Give when You Receive” Unexpected Personalized
  • 21. Reciprocity: Door-In-The-Face Option 1: Initially unreasonable request Option 2: Relatively more reasonable request Precise number works better than less precise $3,935 vs. $4,000 ”1.99 vs 2.00 / 1.99 vs 2.99” Source Data: Martin, Steve J., 2014
  • 22. Social Proof / Commitment “Don't miss out on the future, we will hand out paper, write down the amount you want to invest in us”
  • 23. BBC. (2020, May 14). US church sues after bible study 'Zoombombed' by child abuse. Retrieved May 2020, from bbc.com: https://www.bbc.com/news/world-us-canada- 52668124?intlink_from_url=https://www.bbc.com/news/topics/cp3mvpdp1r2t/cyber-attacks&link_location=live-reporting-story+ Calvello, M. (2020, April 21). 50 VPN Statistics That Will Make You Reconsider Your Security. Retrieved May 2020, from learn.g2.com: https://learn.g2.com/vpn-statistics Cogley, M. (2020, May 19). EasyJet cyber attack ‘came from China’. Retrieved May 2020, from telegraph.com: https://www.telegraph.co.uk/technology/2020/05/19/easyjet-hit-highly-sophisticated-cyber-attack/ Doffman, Z. (2020, April 30). New Microsoft Security Alert: Millions Of Users Risk ‘Increased Vulnerability To Attacks’. Retrieved May 2020, from forbes.com: https://www.forbes.com/sites/zakdoffman/2020/04/30/us-issues- new-microsoft-security-alert-for-millions-of-office-365-users/#4b99022b4169 Fawkes, G. (2020, April 16). VPN Use and Data Privacy Stats for 2020. Retrieved May 2020, from vpnmentor.com: https://www.vpnmentor.com/blog/vpn-use-data-privacy-stats/ Gazis, O. (2020, May 28). NSA warns of new cyberattacks by Russian military hackers. Retrieved May 2020, from cbsnews.com: https://www.cbsnews.com/news/national-security-agency-cyberattack-sandworm-russia- hackers/ Hallsworth, M., List, J. A., Metcalfe, R. D., & Vlaev, I. (2014). The behavioralist as tax collector: Using natural field experiments to enhance tax compliance. National Bureau of Economic Research working paper no. 20007. Higgins, C., & Walker, R. (2012, September). Ethos, logos, pathos: Strategies of persuasion in social/environmental reports. Retrieved May 2020, from sciencedirect.com: https://doi.org/10.1016/j.accfor.2012.02.003 Johnson, A. (2020, February). Delivering on the promise of security AI to help defenders protect today’s hybrid environments. Retrieved May 2020, from blogs.microsoft.com: https://blogs.microsoft.com/blog/2020/02/20/delivering-on-the-promise-of-security-ai-to-help-defenders-protect-todays-hybrid-environments/ Jones, K. (2020, April 7). How COVID-19 Has Impacted Media Consumption, by Generation. Retrieved May 2020, from visualcapitalist.com: https://www.visualcapitalist.com/media-consumption-covid-19/ Knaflic, Cole Nussbaumer. Storytelling With Data: A Data Visualization Guide for Business Professionals. Hoboken, New Jersey: John Wiley & Sons, Inc, 2015. Print. Markets and Markets. (2019, May). Artificial Intelligence in Cybersecurity Market by Offering (Hardware, Software, and Service), Deployment Type, Security Type, Technology (ML, NLP, and Context-Aware), Application (IAM, DLP, and UTM), End User, and Geography- Global Forecast to 2026. Retrieved May 2020, from marketsandmarkets.com: https://www.marketsandmarkets.com/Market-Reports/artificial-intelligence-security-market- 220634996.html Martin, S. J., Goldstein, N. J., & Cialdini, R. B. (2014). The small big: Small changes that spark big influence. London: Profile. McKinsey & Company. (2015, June). The internet of things: Mapping the Value Beyond The Hype. Retrieved May 2020, from mckinsey.com: https://www.mckinsey.com/~/media/McKinsey/Industries/Technology%20Media%20and%20Telecommunications/High%20Tech/Our%20Insights/The%20Internet%20of%20Things%20The%20value%20of%20digitizing%20t he%20physical%20world/The-Internet-of-things-Mapping-the-value-be Microsoft. (2020, May). About Us. Retrieved May 2020, from microsoft.com: https://www.microsoft.com/en-us/about Microsoft. (2020, May). Artificial Intelligence. Retrieved May 2020, from microsoft.com: https://www.microsoft.com/en-us/research/research-area/artificial-intelligence/?facet%5Btax%5D%5Bmsr-research- area%5D%5B%5D=13556&sort_by=most-recent&facet%5Btax%5D%5Bmsr-content-type%5D%5B%5D=msr-project Muncaster, P. (2020, April 1). Cyber-Attacks Up 37% Over Past Month as #COVID19 Bites. Retrieved May 2020, from infosecurity-magazine.com: https://www.infosecurity-magazine.com/news/cyberattacks-up-37-over-past- month/ Renub. (2018, December 19). Cybersecurity Market to be USD 164 Billion by the year 2024 due to rise in growth of Digital Spying, Cyber Crimes & IoT Devices. Retrieved May 2020, from renub.com: https://www.renub.com/global-cybersecurity-market-nd.php Statista. (2019, July). Microsoft's revenue worldwide 2002-2019. Retrieved May 2020, from startista.com: https://www.statista.com/statistics/267805/microsofts-global-revenue-since-2002/ Statista. (2020, March). Market size and revenue comparison for artificial intelligence worldwide from 2015 to 2025. Retrieved May 2020, from statista.com: https://www.statista.com/statistics/941835/artificial-intelligence- market-size-revenue-comparisons/ Stein, S., & Jacobs, J. (2020, March 16). Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak. Retrieved May 2020, from bloomberg.com: https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency- suffers-cyber-attack-during-covid-19-response Warren, T. (2019, April 25). Microsoft is now a $1 trillion company. Retrieved May 2020, from theverge.com: https://www.theverge.com/2019/4/25/18515623/microsoft-worth-1-trillion-dollars-stock-price-value WHO. (2020, April 23). WHO reports fivefold increase in cyber attacks, urges vigilance. Retrieved May 2020, from who.int: https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks- urges-vigilance References