BQ 271
Business Statistics
Chapter 4 Case 4.3
Cases are assigned from the end of chapters that represent real world applications of the statistical concepts
discussed in the chapter. You will use Microsoft Excel to perform the statistical procedures. You will also use
Microsoft Word to prepare a managerial report that summarizes the key requirements of the case, explains the
statistical methods used, discusses the results, and recommends a course of action based on your analysis. The
managerial report will be submitted to Safe Assign for originality.
Deliverables
Managerial report
o Use format available in Sample Managerial Report;
Section 1 summarizes the case described in the chapter. Include in this section any
descriptive statistics and state the purpose and objective of the case. DO NOT copy the
case.
Section 2 should describe the statistical methods used to analyze the case. Include
interval estimates, hypothesis tests, tables and charts as necessary. DO NOT include the
data set in the report. Figures and tables should be labeled (Table 1. Descriptive statistics,
Figure 1. Chi-square distribution, etc.) and properly formatted for clarity.
Section 3 should provide the conclusions of your analysis and recommendations for
future action. Include your answers to any questions posed in this section.
Excel Spreadsheet
o Use separate sheet for each chart, pivot table, and table created with the Analysis Tool-Pak.
o Name each tab with the name of the table or chart.
o Format numbers to 3 decimal places.
Grading
A rubric in Blackboard is used to grade each case study:
Spreadsheet – Demonstrate ability to use Microsoft Excel to perform statistical analysis.
o Use of analysis tools, pivot tables, charts, graphs, formulas and functions.
Managerial Report – Demonstrate understanding of statistical methods.
o Provide a clear and focused summary of the case along with stated purpose and objectives;
o Critically analyze data and explain statistical procedures used along with resultant outcomes;
o Make logical recommendations to management supported by statistical analysis;
o Use proper punctuation, spelling and grammar. Tables and charts should be properly identified,
formatted, and referenced in the document.
Data File: NO DATA FILE NEEDED (More information found p. 158-159 in 3rd edition of
the textbook.)
1. Construct a contingency table that shows frequencies for the qualitative variables Gender (Male or
Female) and Use of Social Networking Sites (Yes or No).
2. Determine the probability that a teen uses social networking sites.
3. Determine the probability that a teen girl uses a social networking site.
4. A bill before Congress would like to extend the Children’s Online Privacy Protection Act to apply to
15-year-olds. In addition, the bill would also ban Internet companies from sending targeted
advertising to children under 16 and give these children and ...
BQ 271 Business Statistics Chapter 4 Case 4.3 .docx
1. BQ 271
Business Statistics
Chapter 4 Case 4.3
Cases are assigned from the end of chapters that represent real
world applications of the statistical concepts
discussed in the chapter. You will use Microsoft Excel to
perform the statistical procedures. You will also use
Microsoft Word to prepare a managerial report that summarizes
the key requirements of the case, explains the
statistical methods used, discusses the results, and recommends
a course of action based on your analysis. The
managerial report will be submitted to Safe Assign for
originality.
Deliverables
o Use format available in Sample Managerial Report;
summarizes the case described in the chapter.
Include in this section any
descriptive statistics and state the purpose and objective of the
2. case. DO NOT copy the
case.
analyze the case. Include
interval estimates, hypothesis tests, tables and charts as
necessary. DO NOT include the
data set in the report. Figures and tables should be labeled
(Table 1. Descriptive statistics,
Figure 1. Chi-square distribution, etc.) and properly formatted
for clarity.
recommendations for
future action. Include your answers to any questions posed in
this section.
o Use separate sheet for each chart, pivot table, and table
created with the Analysis Tool-Pak.
o Name each tab with the name of the table or chart.
o Format numbers to 3 decimal places.
Grading
A rubric in Blackboard is used to grade each case study:
– Demonstrate ability to use Microsoft Excel to
perform statistical analysis.
o Use of analysis tools, pivot tables, charts, graphs, formulas
and functions.
3. – Demonstrate understanding of statistical
methods.
o Provide a clear and focused summary of the case along with
stated purpose and objectives;
o Critically analyze data and explain statistical procedures used
along with resultant outcomes;
o Make logical recommendations to management supported by
statistical analysis;
o Use proper punctuation, spelling and grammar. Tables and
charts should be properly identified,
formatted, and referenced in the document.
Data File: NO DATA FILE NEEDED (More information found
p. 158-159 in 3rd edition of
the textbook.)
1. Construct a contingency table that shows frequencies for the
qualitative variables Gender (Male or
Female) and Use of Social Networking Sites (Yes or No).
2. Determine the probability that a teen uses social networking
sites.
3. Determine the probability that a teen girl uses a social
networking site.
4. A bill before Congress would like to extend the Children’s
Online Privacy Protection Act to apply to
15-year-olds. In addition, the bill would also ban Internet
companies from sending targeted
4. advertising to children under 16 and give these children and
their parents the ability to delete their
digital footprint and profile with an “eraser button” (The Boston
Globe, May 20, 2012). Given the
probabilities that you calculated with respect to teen usage of
social networking sites, do you thing
that this legislation is necessary? Explain.
ISOL634-25 Physical Security
1
Your Name
University of the Cumberlands
ISOL634-25 Physical Security
Week 17 Individual Project
Professor Richards
Date
What is defensible space?
According to Fennelly (2013), defensible space is a surrogate
term for the range of mechanisms real and symbolic barriers,
strongly defined areas of influence, improved opportunities for
5. surveillance that combine to bring an environment under the
control of its residents. To provide maximum security and
control over an area, it should first be divided into smaller,
clearly defined areas or zones, which describe
the defensible space (Wayland, 2015).
What is Crime Prevention through Environmental Design?
Crime Prevention through Environmental Design (CPTED) is a
multidisciplinary approach to the reduction of crime and the
associated enhancement of the perception of personal safety by
inhabitants of an environment (Tipton & Nozaki, 2007). White
(2014) stated that CPTED is a concept in the security industry,
basically meaning that you may be able to reduce criminal acts
from occurring with the proper design and planning of an
environment. In theory, you can make changes to the physical
environment that allow for better physical and operational
controls of the property; as a result, it can further
your crime prevention strategies.
References
Fennelly, L. J. (2013). Effective physical security (Fourth
edition. ed.). Amsterdam: Butterworth-Heinemannis an imprint
of Elsevier.
Tipton, H. F., & Nozaki, M. K. (2007). Information security
management handbook (6th ed.). Boca Raton: Auerbach
Publications.
Wayland, B. A. (2015). Emergency preparedness for business
professionals : How to mitigate and respond to attacks against
6. your organization (1st edition. ed.). Wlatham, MA: Elsevier.
White, J. M. (2014). Security risk assessment : Managing
physical and operational security. Amsterdam ; Boston:
Butterworth-Heinemann is an imprint of Elsevier.
Fennelly (2017) stated that the key to risk management is to
knowingly determine an acceptable level, rather than
unwittingly accepting it. In relation to security risk
management, these decisions are based on the consequence of
loss of the asset, the defined threat, and the risk tolerance of the
enterprise.
For this assignment, you will research and expound on the
following questions as they relate to physical security?
What is risk management?
What is Vulnerability assessment?
What is the difference between security and safety?
What is the relationship between risk management and
vulnerability assessment?
Assignment Requirements
7. You must write a minimum of two paragraphs, with two
different in-text citations for each question.
Every paragraph should have at least four complete sentences.
Every question should have a subtitle (Bold and Centered)
Every paragraph must be indented
Do not continuously cite at the end of each paragraph.
You are required to write and cite according to APA 6th Edition
format.
Your SafeAssign Score needs to be no more than 30%.
Please ensure that you use the Individual Project Header for this
and every IP assignment.
Please proofread your work and correct all grammatical,
punctuation, and spelling errors before posting your assignment.
Failure to comply with these requirements will result in a low
or zero grade.