SlideShare a Scribd company logo
INTRODUCTION
One of the most critical factors in customer relationship
management that directly impacts a company’s long-term
profitability is customer attrition. When a company can better
predict if a customer is likely to cut ties, it can take a more
targeted approach to mitigate customer turnover.
In this task, you will use Python, SAS, or R to analyze data for
a telecommunications company (see “Customer Data” web link)
and create a data mining report in a word processor (e.g.,
Microsoft Word). You will create visual representations
throughout the submission to show each step of your work and
to visually represent the findings of your data analysis.
All algorithms and visual representations used need to be
captured (either in tables within the word document or with
screen shots added into the word document) and should be
submitted as part of your document for final submission
A separate Excel (.xls or .xlsx) document of the cleaned data
should be submitted along with the written aspects of the data
mining report.
SCENARIO
You are an analyst for a telecommunications company that is
concerned about the number of customers leaving their landline
business for cable competitors. The company needs to know
which customers are leaving and attempt to mitigate continued
customer loss. You have been asked to analyze customer data to
identify why customers are leaving and potential indicators to
explain why those customers are leaving so the company can
make an informed plan to mitigate further loss.
REQUIREMENTS
Your submission must be your original work. No more than a
combined total of 30% of the submission and no more than a
10% match to any one individual source can be directly quoted
or closely paraphrased from sources, even if cited correctly. An
originality report is provided when you submit your task that
can be used as a guide.
You must use the rubric to direct the creation of your
submission because it provides detailed criteria that will be
used to evaluate your work. Each requirement below may be
evaluated by more than one rubric aspect. The rubric aspect
titles may contain hyperlinks to relevant portions of the course.
I: Tool Selection
Execute data extraction from the “Customer Data” web link
using data mining software (Python, R, or SAS). Provide a
screen shot of the code you have written and its successful
application with a copy of all the extracted data.
A. Describe the benefits of using the tool you have chosen
(Python, R, or SAS) for extracting data in this scenario.
B. Define the objectives or goals of the data analysis. Ensure
that your objectives or goals are reasonable within the scope of
the scenario and are represented in the available data.
C. Select a descriptive method and a nondescriptive method
(i.e., predictive, classification, or probabilistic techniques) you
will use to analyze the data, and explain how the methods you
have selected are appropriate for the objectives or goals you
have defined.
II: Data Exploration and Preparation
Clean the data you have extracted and save as .xls or .xlsx
format for submission. Be sure to address all necessary
formatting, converting, and missing data.
D. Describe the target variable in the data and indicate the
specific type of data the target variable is using, including
examples that support your claims.
E. Describe an independent predictor variable in the data and
indicate the specific type of data being described. Use examples
from the data set that support your claims.
F. Propose the goal in manipulation of the data and define your
data preparation aims.
G. Define the statistical identity of the data, including the
essential criteria and phenomenon to be predicted.
H. Explain the steps used to clean the data and how you
addressed any anomalies or missing data.
III: Data Analysis
For each of the following steps, be sure to clearly indicate each
step within your data sheet with a screen shot and annotations in
your final submission. All algorithms used need to be clearly
identified in the screen shot and submission.
I. Identify the distribution of variables using univariate
statistics from your cleaned and prepared data. Represent your
findings visually as part of your submission.
J. Identify the distribution of variables using bivariate statistics
from your cleaned and prepared data. Represent your findings
visually as part of your submission.
K. Apply an analytic method and an evaluative method.
Annotate the data showing both methods and your findings.
L. Justify the methods you have chosen to analyze your data. Be
sure to include details about how the methods you have chosen
better represents your findings than other methods.
M. Justify the methods you have chosen to visually present your
data. Be sure to include details about how the presentation
methods you chose better represents your findings than other
presentation methods.
IV: Data Summary
Summarize the findings of your data evaluation. Provide the
final findings dataset, including evaluation measures.
N. Explain how your data shows that it was discriminating or
not and whether the phenomenon you wanted to detect was
present in your findings. Provide specific examples from the
data to support your claims.
O. Describe the methods you used for detecting interactions and
for selecting the most important predictor variables. Include the
specific interactions you detected and the most important
predictor variables that you found.
P. Acknowledge sources, using in-text citations and references,
for content that is quoted, paraphrased, or summarized.
File Restrictions
File name may contain only letters, numbers, spaces, and these
symbols: ! - _ . * ' ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf,
txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg,
wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
Information Security Policy
A good information security policy sets clear, defined
boundaries for how users should be using company technology.
The policy acts as a contingency plan for how the company will
handle the situation if or when things go wrong.
The resources to build an effective information security policy
can be found in many publications and articles found from the
web. An excellent source that I found to be informative and
helpful is the InfoSec Institute’s article (Key Elements of,
2018) which outlines the key sections of an information security
policy. It also includes some helpful examples of policy rules.
Another great source that I found is research papers from The
SANS Institute. It is a terrific source for security research,
training, and information. The whitepaper found from the source
(Liddiard, 2002), although old, outlines how to design, create,
and implement an information security policy and the author
shares his experience and has listed down clear steps to follow.
The first most important item that I would include is the Data
Breach Response Policy which can also be known as an incident
response plan. The purpose of this policy is to establish the
goals and vision for how the organization will respond to a data
breach. This plan will help to mitigate the risks of being a
victim of a cyber-attack because it will detail how the
organization plans to protect data assets throughout the incident
response process. The policy should define who it applies to and
when it comes into effect, including the definition of a breach,
staff roles and responsibilities, standards and metrics, reporting,
remediation, and feedback mechanisms (RSI Security, 2019).
Another important item (but often overlooked) that I would
include in an Information Security Policy is the audits of the IT
assets and its security. The audits will review the security
practices and policies of the central IT systems, as well as the
end-user departments and at every corner of the enterprise,
similar to automated machines and IoT that might be employed
at remote manufacturing plants. The audit should look not only
at the software and hardware techniques you have in place to
protect security but also at remote site personnel habits and
compliance with security policies. This will help in finding and
fixing the loopholes that people often perceive as not existing.
References
(n.A.). (2018). Key Elements of an Information Security Policy.
Retrieved from: https://resources.infosecinstitute.com/key-
elements-information-security-policy/
Liddiard, M. (2002). Building and Implementing an Information
Security Policy. Retrieved from: https://www.sans.org/reading-
room/whitepapers/policyissues/building-implementing-
information-security-policy-509
RSI Security. (2019). How To Build An Information Security
Plan For Your Small Business. Retrieved from:
https://blog.rsisecurity.com/how-to-build-an-information-
security-plan-for-your-small-business/
Hi All,
Information security policy (ISP) refers to a set of rules
implemented by an organization to ensure that employees and
all users within an organization follow regulations regarding the
security of data and information within the organizational
environment. It governs the protection of information, which an
essential asset that organizations must protect. Developing an
information security policy requires a risk assessment to
provide policy-makers with an accurate depiction of the specific
security needs of an organization. A proper information security
policy requires decision-makers to identify sensitive data and
critical systems. Today, security threats are becoming more
dynamic and complex, and without a proper information
security policy, organizations may find it difficult to counter
such threats (Passi, 2018). However, an information security
policy must contain two crucial elements for it to be effective.
One of the most critical items in an information security policy
(ISP) is outlining the purpose. The purpose of an ISP is to
create an overall approach to information security and detecting
data breaches by third-party vendors, misuse of networks and
applications, as well as the computer systems (Tunggal, 2020).
The policy needs to protect customer assets, which include
personal information and should, therefore, address
confidentiality, which ensures that only authorized individuals
can access certain information. It also addresses integrity,
which ensures the accuracy and completeness of the
information. The policy also needs to address the availability,
which involves making sure that only authorized personnel can
access information when required.
The policy must also contain the scope of the ISP, which
includes all the information assets governed by an organization.
The policy should address all data, programs, IT infrastructure,
and its users, as well as the third parties that may be authorized
to access the information assets. The policy should address the
scope to whom the ISP applies and also consider what is not in
the scope (Passi, 2018). The policy should point out what is in
the scope and what is out of the scope.
References
Passi, H. (2018). Greycampus. Retrieved 26 May 2020,
from https://www.greycampus.com/blog/information-
security/essentials-of-an-information-security-policy
Tunggal, A. (2020). What is an Information Security Policy?
Retrieved 26 May 2020,
from https://www.upguard.com/blog/information-security-
policy

More Related Content

Similar to INTRODUCTIONOne of the most critical factors in customer relat.docx

The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
teresehearn
 
Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEW
Alan D. Duncan
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
gasciognecaren
 
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...
IRJET Journal
 
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET Journal
 
Following your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docxFollowing your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docx
houndsomeminda
 
Moh.Abd-Ellatif_DataAnalysis1.pptx
Moh.Abd-Ellatif_DataAnalysis1.pptxMoh.Abd-Ellatif_DataAnalysis1.pptx
Moh.Abd-Ellatif_DataAnalysis1.pptx
AbdullahEmam4
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
Sandeep Garg
 
The Comparison of Big Data Strategies in Corporate Environment
The Comparison of Big Data Strategies in Corporate EnvironmentThe Comparison of Big Data Strategies in Corporate Environment
The Comparison of Big Data Strategies in Corporate Environment
IRJET Journal
 
Introduction to Business Anlytics and Strategic Landscape
Introduction to Business Anlytics and Strategic LandscapeIntroduction to Business Anlytics and Strategic Landscape
Introduction to Business Anlytics and Strategic Landscape
Rani Channamma University, Sangolli Rayanna First Grade Constituent College, Belagavi
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
odiliagilby
 
Data_Scientist_Position_Description
Data_Scientist_Position_DescriptionData_Scientist_Position_Description
Data_Scientist_Position_DescriptionSuman Banerjee
 
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docxNGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
taitcandie
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerD
alehosickg3
 
Overcoming Common Data Analysis Challenges.pdf
Overcoming Common Data Analysis Challenges.pdfOvercoming Common Data Analysis Challenges.pdf
Overcoming Common Data Analysis Challenges.pdf
Soumodeep Nanee Kundu
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
IRJET- Customer Feedback Analysis using Machine Learning
IRJET-  	  Customer Feedback Analysis using Machine LearningIRJET-  	  Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
IRJET Journal
 
07. Analytics & Reporting Requirements Template
07. Analytics & Reporting Requirements Template07. Analytics & Reporting Requirements Template
07. Analytics & Reporting Requirements Template
Alan D. Duncan
 
Data Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdf
Data Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdfData Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdf
Data Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdf
Neha Singh
 

Similar to INTRODUCTIONOne of the most critical factors in customer relat.docx (19)

The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
 
Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEW
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...
IRJET- Implementing Social CRM System for an Online Grocery Shopping Platform...
 
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
 
Following your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docxFollowing your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docx
 
Moh.Abd-Ellatif_DataAnalysis1.pptx
Moh.Abd-Ellatif_DataAnalysis1.pptxMoh.Abd-Ellatif_DataAnalysis1.pptx
Moh.Abd-Ellatif_DataAnalysis1.pptx
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
 
The Comparison of Big Data Strategies in Corporate Environment
The Comparison of Big Data Strategies in Corporate EnvironmentThe Comparison of Big Data Strategies in Corporate Environment
The Comparison of Big Data Strategies in Corporate Environment
 
Introduction to Business Anlytics and Strategic Landscape
Introduction to Business Anlytics and Strategic LandscapeIntroduction to Business Anlytics and Strategic Landscape
Introduction to Business Anlytics and Strategic Landscape
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
Data_Scientist_Position_Description
Data_Scientist_Position_DescriptionData_Scientist_Position_Description
Data_Scientist_Position_Description
 
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docxNGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
NGOKAN - ATTENTIONPROJECT 3 – ASSESSING INFORMATION SYSTEM VULNE.docx
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerD
 
Overcoming Common Data Analysis Challenges.pdf
Overcoming Common Data Analysis Challenges.pdfOvercoming Common Data Analysis Challenges.pdf
Overcoming Common Data Analysis Challenges.pdf
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
IRJET- Customer Feedback Analysis using Machine Learning
IRJET-  	  Customer Feedback Analysis using Machine LearningIRJET-  	  Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
 
07. Analytics & Reporting Requirements Template
07. Analytics & Reporting Requirements Template07. Analytics & Reporting Requirements Template
07. Analytics & Reporting Requirements Template
 
Data Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdf
Data Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdfData Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdf
Data Analytics Course Curriculum_ What to Expect and How to Prepare in 2023.pdf
 

More from bagotjesusa

Issues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docxIssues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docx
bagotjesusa
 
Issues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docxIssues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docx
bagotjesusa
 
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docxISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
bagotjesusa
 
ISSA Journal September 2008Article Title Article Author.docx
ISSA Journal  September 2008Article Title  Article Author.docxISSA Journal  September 2008Article Title  Article Author.docx
ISSA Journal September 2008Article Title Article Author.docx
bagotjesusa
 
ISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docxISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docx
bagotjesusa
 
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docxISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
bagotjesusa
 
Is the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docxIs the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docx
bagotjesusa
 
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docxIslamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
bagotjesusa
 
IS-365 Writing Rubric Last updated January 15, 2018 .docx
IS-365 Writing Rubric Last updated January 15, 2018   .docxIS-365 Writing Rubric Last updated January 15, 2018   .docx
IS-365 Writing Rubric Last updated January 15, 2018 .docx
bagotjesusa
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
bagotjesusa
 
Is teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docxIs teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docx
bagotjesusa
 
Is Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docxIs Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docx
bagotjesusa
 
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docxIrreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
bagotjesusa
 
IRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docxIRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docx
bagotjesusa
 
irem.orgjpm jpm® 47AND REWARDRISK .docx
irem.orgjpm      jpm®      47AND  REWARDRISK .docxirem.orgjpm      jpm®      47AND  REWARDRISK .docx
irem.orgjpm jpm® 47AND REWARDRISK .docx
bagotjesusa
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
bagotjesusa
 
In two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docxIn two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docx
bagotjesusa
 
Investigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docxInvestigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docx
bagotjesusa
 
Investigating Happiness at College SNAPSHOT T.docx
Investigating   Happiness   at   College  SNAPSHOT  T.docxInvestigating   Happiness   at   College  SNAPSHOT  T.docx
Investigating Happiness at College SNAPSHOT T.docx
bagotjesusa
 
Investigate Development Case Death with Dignity Physician-Assiste.docx
Investigate Development Case Death with Dignity  Physician-Assiste.docxInvestigate Development Case Death with Dignity  Physician-Assiste.docx
Investigate Development Case Death with Dignity Physician-Assiste.docx
bagotjesusa
 

More from bagotjesusa (20)

Issues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docxIssues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docx
 
Issues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docxIssues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docx
 
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docxISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
 
ISSA Journal September 2008Article Title Article Author.docx
ISSA Journal  September 2008Article Title  Article Author.docxISSA Journal  September 2008Article Title  Article Author.docx
ISSA Journal September 2008Article Title Article Author.docx
 
ISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docxISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docx
 
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docxISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
 
Is the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docxIs the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docx
 
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docxIslamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
 
IS-365 Writing Rubric Last updated January 15, 2018 .docx
IS-365 Writing Rubric Last updated January 15, 2018   .docxIS-365 Writing Rubric Last updated January 15, 2018   .docx
IS-365 Writing Rubric Last updated January 15, 2018 .docx
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
 
Is teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docxIs teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docx
 
Is Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docxIs Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docx
 
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docxIrreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
 
IRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docxIRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docx
 
irem.orgjpm jpm® 47AND REWARDRISK .docx
irem.orgjpm      jpm®      47AND  REWARDRISK .docxirem.orgjpm      jpm®      47AND  REWARDRISK .docx
irem.orgjpm jpm® 47AND REWARDRISK .docx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
In two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docxIn two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docx
 
Investigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docxInvestigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docx
 
Investigating Happiness at College SNAPSHOT T.docx
Investigating   Happiness   at   College  SNAPSHOT  T.docxInvestigating   Happiness   at   College  SNAPSHOT  T.docx
Investigating Happiness at College SNAPSHOT T.docx
 
Investigate Development Case Death with Dignity Physician-Assiste.docx
Investigate Development Case Death with Dignity  Physician-Assiste.docxInvestigate Development Case Death with Dignity  Physician-Assiste.docx
Investigate Development Case Death with Dignity Physician-Assiste.docx
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

INTRODUCTIONOne of the most critical factors in customer relat.docx

  • 1. INTRODUCTION One of the most critical factors in customer relationship management that directly impacts a company’s long-term profitability is customer attrition. When a company can better predict if a customer is likely to cut ties, it can take a more targeted approach to mitigate customer turnover. In this task, you will use Python, SAS, or R to analyze data for a telecommunications company (see “Customer Data” web link) and create a data mining report in a word processor (e.g., Microsoft Word). You will create visual representations throughout the submission to show each step of your work and to visually represent the findings of your data analysis. All algorithms and visual representations used need to be captured (either in tables within the word document or with screen shots added into the word document) and should be submitted as part of your document for final submission A separate Excel (.xls or .xlsx) document of the cleaned data should be submitted along with the written aspects of the data mining report. SCENARIO You are an analyst for a telecommunications company that is concerned about the number of customers leaving their landline business for cable competitors. The company needs to know which customers are leaving and attempt to mitigate continued customer loss. You have been asked to analyze customer data to identify why customers are leaving and potential indicators to explain why those customers are leaving so the company can make an informed plan to mitigate further loss. REQUIREMENTS
  • 2. Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course. I: Tool Selection Execute data extraction from the “Customer Data” web link using data mining software (Python, R, or SAS). Provide a screen shot of the code you have written and its successful application with a copy of all the extracted data. A. Describe the benefits of using the tool you have chosen (Python, R, or SAS) for extracting data in this scenario. B. Define the objectives or goals of the data analysis. Ensure that your objectives or goals are reasonable within the scope of the scenario and are represented in the available data. C. Select a descriptive method and a nondescriptive method (i.e., predictive, classification, or probabilistic techniques) you will use to analyze the data, and explain how the methods you have selected are appropriate for the objectives or goals you have defined. II: Data Exploration and Preparation Clean the data you have extracted and save as .xls or .xlsx format for submission. Be sure to address all necessary formatting, converting, and missing data. D. Describe the target variable in the data and indicate the specific type of data the target variable is using, including examples that support your claims.
  • 3. E. Describe an independent predictor variable in the data and indicate the specific type of data being described. Use examples from the data set that support your claims. F. Propose the goal in manipulation of the data and define your data preparation aims. G. Define the statistical identity of the data, including the essential criteria and phenomenon to be predicted. H. Explain the steps used to clean the data and how you addressed any anomalies or missing data. III: Data Analysis For each of the following steps, be sure to clearly indicate each step within your data sheet with a screen shot and annotations in your final submission. All algorithms used need to be clearly identified in the screen shot and submission. I. Identify the distribution of variables using univariate statistics from your cleaned and prepared data. Represent your findings visually as part of your submission. J. Identify the distribution of variables using bivariate statistics from your cleaned and prepared data. Represent your findings visually as part of your submission. K. Apply an analytic method and an evaluative method. Annotate the data showing both methods and your findings. L. Justify the methods you have chosen to analyze your data. Be sure to include details about how the methods you have chosen better represents your findings than other methods. M. Justify the methods you have chosen to visually present your data. Be sure to include details about how the presentation methods you chose better represents your findings than other presentation methods. IV: Data Summary Summarize the findings of your data evaluation. Provide the final findings dataset, including evaluation measures. N. Explain how your data shows that it was discriminating or not and whether the phenomenon you wanted to detect was
  • 4. present in your findings. Provide specific examples from the data to support your claims. O. Describe the methods you used for detecting interactions and for selecting the most important predictor variables. Include the specific interactions you detected and the most important predictor variables that you found. P. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. File Restrictions File name may contain only letters, numbers, spaces, and these symbols: ! - _ . * ' ( ) File size limit: 200 MB File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z Information Security Policy A good information security policy sets clear, defined boundaries for how users should be using company technology. The policy acts as a contingency plan for how the company will handle the situation if or when things go wrong. The resources to build an effective information security policy can be found in many publications and articles found from the web. An excellent source that I found to be informative and helpful is the InfoSec Institute’s article (Key Elements of, 2018) which outlines the key sections of an information security policy. It also includes some helpful examples of policy rules. Another great source that I found is research papers from The SANS Institute. It is a terrific source for security research, training, and information. The whitepaper found from the source (Liddiard, 2002), although old, outlines how to design, create, and implement an information security policy and the author shares his experience and has listed down clear steps to follow. The first most important item that I would include is the Data Breach Response Policy which can also be known as an incident
  • 5. response plan. The purpose of this policy is to establish the goals and vision for how the organization will respond to a data breach. This plan will help to mitigate the risks of being a victim of a cyber-attack because it will detail how the organization plans to protect data assets throughout the incident response process. The policy should define who it applies to and when it comes into effect, including the definition of a breach, staff roles and responsibilities, standards and metrics, reporting, remediation, and feedback mechanisms (RSI Security, 2019). Another important item (but often overlooked) that I would include in an Information Security Policy is the audits of the IT assets and its security. The audits will review the security practices and policies of the central IT systems, as well as the end-user departments and at every corner of the enterprise, similar to automated machines and IoT that might be employed at remote manufacturing plants. The audit should look not only at the software and hardware techniques you have in place to protect security but also at remote site personnel habits and compliance with security policies. This will help in finding and fixing the loopholes that people often perceive as not existing. References (n.A.). (2018). Key Elements of an Information Security Policy. Retrieved from: https://resources.infosecinstitute.com/key- elements-information-security-policy/ Liddiard, M. (2002). Building and Implementing an Information Security Policy. Retrieved from: https://www.sans.org/reading- room/whitepapers/policyissues/building-implementing- information-security-policy-509 RSI Security. (2019). How To Build An Information Security Plan For Your Small Business. Retrieved from: https://blog.rsisecurity.com/how-to-build-an-information- security-plan-for-your-small-business/
  • 6. Hi All, Information security policy (ISP) refers to a set of rules implemented by an organization to ensure that employees and all users within an organization follow regulations regarding the security of data and information within the organizational environment. It governs the protection of information, which an essential asset that organizations must protect. Developing an information security policy requires a risk assessment to provide policy-makers with an accurate depiction of the specific security needs of an organization. A proper information security policy requires decision-makers to identify sensitive data and critical systems. Today, security threats are becoming more dynamic and complex, and without a proper information security policy, organizations may find it difficult to counter such threats (Passi, 2018). However, an information security policy must contain two crucial elements for it to be effective. One of the most critical items in an information security policy (ISP) is outlining the purpose. The purpose of an ISP is to create an overall approach to information security and detecting data breaches by third-party vendors, misuse of networks and applications, as well as the computer systems (Tunggal, 2020). The policy needs to protect customer assets, which include personal information and should, therefore, address confidentiality, which ensures that only authorized individuals can access certain information. It also addresses integrity, which ensures the accuracy and completeness of the information. The policy also needs to address the availability, which involves making sure that only authorized personnel can access information when required. The policy must also contain the scope of the ISP, which includes all the information assets governed by an organization. The policy should address all data, programs, IT infrastructure, and its users, as well as the third parties that may be authorized to access the information assets. The policy should address the scope to whom the ISP applies and also consider what is not in the scope (Passi, 2018). The policy should point out what is in
  • 7. the scope and what is out of the scope. References Passi, H. (2018). Greycampus. Retrieved 26 May 2020, from https://www.greycampus.com/blog/information- security/essentials-of-an-information-security-policy Tunggal, A. (2020). What is an Information Security Policy? Retrieved 26 May 2020, from https://www.upguard.com/blog/information-security- policy