SlideShare a Scribd company logo
1 of 53
1
Running Header: ORGANIZATIONAL SECURITY
4
ORGANIZATIONAL SECURITY
ORGANIZATIONAL SECURITY
Student’s Name
Tutor’s Name
Course Title
Date
Introduction
The security of the world is currently increasing in a
simultaneous manner. Many countries all around the world try
harder to cater to its citizens despite having huge numbers of
citizens. Business is the core factor that gives out people a way
to a better life. Organizations have emerged and that they all try
as much as possible to be successful, despite having many
challenges in the market square. The exchange of goods and
services is the main core issue that led to the emergence of
business globally. In general terms there are different products
that are produced all around the world, researchers have proven
that for the business to be rated in a successful level the
security status of the business must also be considered. Security
generally protects the product and services of the organization.
It is very important to keep the security of the of the company
high, this is based on the fact that all the product and services
produced by the company will be secured from competitors and
the ill motive individuals who might want to bring down the
business. Employers and employees are the ones who are
responsible for keeping the security in an organization to be at a
high level.
Background information
In today’s world, everything that is tangible is always stored in
a digital form. When the business lacks a form to defend its
digital assets generally the business is lost, thus the potential
loss of the business will grow bigger every day. (Gupta, Rees,
Chaturvedi & Chi, 2006) The need of having legal security in
the organization literally existed ever since the introduction of
the first computer in the business environment. Recently the
paradigm has greatly shifted over the years, nevertheless from
the client-server systems and terminal server mainframe
systems.
Despite the security system being very important, in many terms
it has not always been set aside to be critical in organizational
success. With the existence of the mainframe system being in
the place, many organizations manage to protect their own
systems from the abuse of the resources, for instances having
unauthorized user gaining access to the organizational system
and also the act of authorized user hogging company’s
resources. Such types of abuse were considered to be more
damaging based on the fact that the system had a higher cost
during the early mainframes days. As time goes by, the
technology techniques developed and increased to some level,
hence the cost of the systems resources decreases, this issue
apparently becomes less important to the business environment.
(Gupta, Rees, Chaturvedi & Chi, 2006)The evolving act of
having remote access outside the organizational networks was
also considered to be non-existence. Furthermore, only the
underground community had higher tools and knowledge that is
rightfully needed to compromise the entire mainframe system.
The new security problem was led by the emergence of client-
server technology. Processor utilization was never at any point
the first priority, but access to systems and networks were the
two important activities. Based on the sensitive information the
access control becomes more important, such information may
include the payroll and the human resources that were being
stored in the public file servers. Most of the company all around
the world did not want their information out to the public
knowledge, and also even to some of their employees. This act
led to the new development of unique technologies such as data
encryption and granular access control. As it is well known,
methods of exploiting and circumventing security products and
new application quickly arose. During the server-client era, a
few dial-up accounts were the only way to access corporate
networks. (Wall, 2013) However, at any given point this process
did not open some of the pure security holes, but some of the
risks to such account can be easily be mitigated with some
valuable procedures such as access lists and dial backs. The
dedicated leased lines are the one that branches offices used to
communicate with one another.
The rise of the internet was one of the highly advanced forms of
technology. It generally opens access to worldwide networks,
and out of that everything changed. Most of the companies
provided clear internet access to its employee because of the
wider rise of email and the World Wide Web. The act of
developing an e-business initiative for an organization becomes
more critical for the company to stay competitive in the wider
market areas. With the internet being in place, most of the data
including the information security system became accessible to
the public. This is based on the fact that the entire internet is
considered to be a public network, anybody on the net is can
clearly access and see other systems. (Wall, 2013) As time goes
by, the internet use widely spread out, many organizations
started to allow access to the networks and information over the
internet. The process of allowing anybody to access information
on the internet really invites hackers into the system
organizational systems, thus lowering the security of the
company information.
Recently many events have led information security to be of
more significance in any business environment, to which in
many cases it focuses on how the business conducts its
operations. 85% of the businesses all around the world do have
rudimentary security program being in the place, furthermore,
many programs are widely grown and developing in maturity.
As the programs are growing, there is a need to understand that
security is just a technical issue. In today’s world security is
being combined with the fabric of the business, so that the
operation of the business can be protected from unwanted users.
The information security programs are always moved from
being recognized as the tactical implementation of technology
to a strategic partner in the business. The entire matter about
the security program was meant to protect the integrity of the
organization in the marketplaces. (Wall, 2013)This is because
many companies see that there was a need to protect their data,
thus the urge of security was raised. With the internet, the
information of an organization was openly exposed to hackers,
and that is the main reason as to why a security program is one
of the most valuable things in evolving business.
Research objectives
The information and security is the major sector that is always
at risk in ant business environment. It is well understood that
accidents can occur and that attackers can literally gain access
to the organizational system to which it can lead to the
disruption of services, thus it can make the whole system
useless or the information can be stolen. Some of the biggest
companies have already taken an enlightened move about
security issues. The deeply believe that to be successful they
must be open to show their customer that the protecting
information assets and security are some of the core business
function. (Ahmad, Maynard & Shanks, 2015)The act of having
security by design generally means that security is not an
afterthought in the entire design process, instead, it is
recognized as one of the requirements that the designer needs to
use when starting a project in an organization. The process of
securing in deployment implies that the product will be shipped
and that it will be ready to use in a way that it cannot
compromise other products or the customers.
In a wider definition, the information security is the plan the
instantly mitigate risks that are associated with the information
processing. Below are some of the objectives of the whole
research about organizational security;
i. Confidentiality – This is the act of preventing an authorized
use or disclosure of any organizational information. The entire
system contains the information that always calls for genuine
protection from all unauthorized disclosure.
ii. Integrity – This is the situation whereby the entire
information must be ensured that it is accurate and complete
and that the data is not is not modified by any an authorized
user. It is clearly understood that most of the system contains
information that must be protected from unanticipated
modification. For instance economic indicators and the survey
reports.
iii. Availability – this is the situation whereby the system
management ensures that users have reliable and timely access
to their assets information. The system provides services and
contains information that must be available on a regular timely
basis to meet the mission requirements and also to avoid
substantial losses that might affect the business, hence lowering
its operation. For instance systems critical to safety and online
accessibility of the business records. (Tang & Zhang, 2016)
These are the main objectives about the organizational security;
the three concepts about information security are linked up
together for major protection. The idea carried out that
information can be categorized as an asset that always calls for
protection is really a sensitive matter.
Method and design
Organization security is one of the conceptual things that many
organizations focus and dwell harder to have a strong path. The
method that is used to drives the path of security in an
organization really matters a lot. Below are some of the
methods that are used to ensure the act of organization security
is firmly installed in an organization.
i. The installation of the concept that the security do belongs to
everyone
It is believed that many companies all around the world believe
that the security department is the one that is responsible for all
the security strategy. More and advanced sustainable security
culture state that for the security in an organization to be
paramount, each and every member of the organization must be
accounted to the security matters. (AlHogail, 2015) Each
employee must feel like a legend security person because it is
rendered as the security culture to everybody in the
organization. Security always belongs to everyone, starting
from executive staff to the lobby ambassador of the company.
ii. Always focuses on awareness and beyond
Security awareness is the process of teaching the entire team in
an organization about the security status of the company.
Generally, it entails the basic lesson that each and every
member in an organization is familiar with. Each employee
should be leveled to judge threats before asking them to
understand in depth. In many cases, security awareness has gain
bad rap according to how it is being delivered to worker or
employers. The general awareness is always needed for
application security knowledge. The application security
awareness is rendered to be of the testers and developers within
an organization. (AlHogail, 2015)Awareness, especially on
security matters, is always an ongoing activity, based on that it
can never pass up a good crisis.
iii. Getting a secured and more developed lifecycle
SDL (secure development lifecycle) is one of the most powerful
foundational to sustainable security culture. Secured developed
lifecycle is the activity and process that an organization agrees
to perform each system or software's released. Basically, it
includes things such as threat modeling and security
requirements. Secured developing lifecycle (SDL) always
answers how the security culture in an organization is. In
action, it is a sustainable security culture. Customers across
many companies are starting to demand that SDL rules must be
followed in an organization. At this juncture, if the company
doesn’t have an SDL, Microsoft has gone a step ahead in
releasing their details about the SDL free charge. The product
security office is the reasonable place for the SDL to live.
iv. Recognize and reward those people that do the right thing
for security
Security is a major factor to success in any business
environment if an individual is working hard towards making
sure that the security of data and the services in an organization
are being catered for, that particular person must be recognized.
This is based on the fact that when a person is being recognized
and thereafter rewarded, automatically the entire issue about
organization security will be limited, simply because other
employees will also take that initiative of securing their data
hoping that one day they will be rewarded too. (AlHogail, 2015)
Baring in mind that security is all about each and every person
in an organization, individuals should be encouraged so that
they can administer and deal with insecurity issue appropriately.
v. Building security advanced community
According to sustainable security culture, the security
community is its main backbone. Communities are the one that
is responsible for providing all the existing connections
between people across the entire organization. The act of
security community plays an important role in bringing
everyone together against problems that are common. By
understanding the different security level, the security level will
be achieved within an organization. In general terms, it
advocates sponsors and security awareness. (AlHogail,
2015)The act of security awareness is considered to be not
passionate but they just contribute to making the security better
in some way.
vi. Making security fun and engaging
For a longer period of time, people have always engaged
security programs as some of the most boring training in the
organizations. That is the reason why many employees never
want to involve themselves in any security training. But when
the security program is handling in a better way, which involves
some fun, automatically a good number of people will gain self-
interest in learning more about security programs. People
should be shown the effect of insecurity in an organization and
be thought all the tactics on how to secure all the information
and services provided by the company. (AlHogail, 2015
Significance
For any organization to be in place and rendered how successful
it is, it should have a security specialist who always keeps the
system safe, the security sector of the company must be
paramount. With the rise of the internet, emails were widely
used in many organizations all around the world. Email is
recognized as the safest mode of communication simply because
it many organizations ensure that all their email accounts are
firmly secured. Thus making email as the primary mode of
communication really helps to simplify the entire
communication process. In a situation when an employee’s
email account is breached, the specialist is the only person who
is allowed to identify the problem, and thereafter sorting it out.
(Dhillon, Syed & Pedron, 2016)
The idea of having security specialist in an organization really
helped many big companies in terms of detecting viruses before
the effects the whole systems. The specialist will set out some
programs that will secure the whole system from being corrupt.
They also play an important part in a fight with hackers who
might have bad intentions on the company's system.
Conclusion
Organization security must be taken into consideration because
it prevents many the loss of valuable information about an
organization. The security system in an organization is tight, no
data will be lost, and all the operation in and outside the
business will be secured. No data will be corrupted or lost.
Employees in an organization must also be responsible for
ensuring that there is no data loss or that there is no malicious
activity going on. Maximum security will stand to protect both
the employee's work and the product produced.
References
Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case
analysis of information systems and security incident
responses. International Journal of Information
Management, 35(6), 717-723.
AlHogail, A. (2015). Design and validation of information
security culture framework. Computers in Human Behavior, 49,
567-575.
Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting
information security culture: An organizational transformation
case study. computers & security, 56, 63-69.
Gupta, M., Rees, J., Chaturvedi, A., & Chi, J. (2006). Matching
information security vulnerabilities to organizational security
profiles: a genetic algorithm approach. Decision Support
Systems, 41(3), 592-603.
Tang, M., & Zhang, T. (2016). The impacts of organizational
culture on information security culture: a case
study. Information Technology and Management, 17(2), 179-
186.
Wall, D. S. (2013). Enemies within: Redefining the insider
threat in organizational security policy. Security Journal, 26(2),
107-124.
https://research-
paper.essayempire.com/examples/management/organizational-
security-research-paper/
https://techbeacon.com/6-ways-develop-security-culture-top-
bottom
United States Housing Price Analysis
Dataset Resource: Empirical Evidence from Housing Price in
Student Name - 199807
ANLY 502, Spring 2017
Instructor: Ali Motamedi
March 4, 2017
2
Instruction
“The United States housing bubble was a real estate
bubble affecting over half of the U.S.
states. Housing prices peaked in early 2006, started to decline
in 2006 and 2007, and reached
new lows in 2012. On December 30, 2008, the Case-Shiller
home price index reported its largest
price drop in its history. The credit crisis resulting from the
bursting of the housing bubble is—
according to general consensus - the primary cause of the credit
default swap bubble of the
2007–2009 recessions in the United States” (Wikipedia). At that
time, this may negatively affect
housing buyers investing options and discourage home owners.
In real world, real estate industry
reached its downturn and wasn’t able to recover for a long time.
This study is based on the historical dataset on empirical
evidence from housing price in
Boston. Even though this dataset was collected and evaluated in
1970s, it will be a good tool to
start with. Housing price can be affected by a lot of factors. As
time goes by, these factors that
drive housing price will also change due to technology,
economy, and people’s purchasing
power and consumption habits change. However, by studying
historical data using regression
model(s), it will be useful to apply in the real world. Most
importantly, it will be useful for
irrational buyers. Here is a typical example to define irrational
buyers. The reason is the same as
why people buy more at the grocery when they're hungry, the
researchers say. It's impossible for
the brain to turn off what it wants in that moment. So don't go
to look at swimming pools on a
hot day--chances are you'll cave. Here's a graph showing the
value of houses with swimming
pools by season: (Lutz, 2012).
3
From above graph, it is obvious that if the housing
searching happens in summer time,
housing hunters are more likely to buy houses with swimming
pools. Therefore, price of houses
with swimming pools dramatically increases in summer time.
Vice versa, in winter time, housing
price drops due to fewer buyers take swimming pools into
consideration. Given supply and
demand theory, increasing demand results in price increase
while decreasing demand results in
price decrease. Here, season is considered an irrational housing
price driven factor. Season is
changeable instead of stable or effective factor. Housing price
is driven by people’s sentiment
due to season.
In the dataset chosen in Empirical Evidence from Housing
Price in Boston, thirteen factors
are chosen as effective factors to apply regression model for
further analysis in theory. By the
end of this study, homeowners or homebuyers, even for
investment institutions may take this
interpretation as a useful reference.
4
Factors/ Variables (in Theory) Drive Housing Price
• Crime Rate
The major reason related to crime rate could be wealth
inequality in the United States.
Wealth inequality can be defined as the unequal distribution of
assets among residents of the
United States. Once wealth gap gets larger and larger, people in
lower class may or may not put
themselves in an unfair situation. From psychology perspective,
these group people could be a
reason for crime rate increase. People in middle or upper class
are intended to choose a safe
place to call it home. These group people are also a
representative of strong purchasing power.
They are more willing to spend more money to buy safety,
which drives the housing price in this
kind of community get higher. From this stand of point, crime
rate is considered a factor
affecting house price.
• Proportion of Residential Land
Starting from ancient age, human beings have been living
in groups, which enable
communication and socialization easier. Given this aspect,
urban area makes residential center
and business center separate. As economy develops, business
center is developed as well. It gets
shopping center, grocery stores, banks and even employment
center together. As a result, human
traffic is much larger than other area, especially on weekends.
However, for employees who are
busy with work during weekdays, it could be a bad idea living
in area with large human traffic.
Alternatively, living in higher proportion of residential land
may get popular among house
buyers or renters. Hence, higher proportion of residential land
may have positive correlation with
housing price.
5
• Proportion of Non-retail Business
Similar concept to proportion of residential land,
proportion of non-retail business is
another reason worthy to be considered as one of the factors. In
first consideration, proportion of
non-retail business may have negative correlation with housing
price. The major reason is due to
inconvenient life experience. For employees, driving a long
distance to shop for grocery won’t
be favorable.
• Landscape: Charles River
Charles River here plays an important role as a factor
related to environment. From personal
experience, I would put environment as a significant aspect in
housing searching. In the past year,
I had been living along the riverside. Even though, it was a
rental house, price there is placed
very high among other landlords. And facing river becomes an
outstanding selling privilege.
During the year when I lived there, life was enjoyable. Facing
and staring at computer screen all
day long, eye sight and health may be negatively affected. I
would spend half hour standing in
my balcony and enjoying beautiful river landscape. My eyes
may feel relaxed. Enjoy landscape
can be another factor having positive correlation to housing
price.
• Nitric Oxides Concentration
Nitrogen dioxide is an irritant gas, which at high concentrations
causes inflammation of the
airways. NOx mainly impacts on respiratory conditions causing
inflammation of the airways at
high levels. Long term exposure can decrease lung function,
increase the risk of respiratory
conditions and increases the response to allergens. NOx also
contributes to the formation of fine
particles (PM) and ground level ozone, both of which are
associated with adverse health effects
(2017). People nowadays are paying more and more attention to
heathy problems.
6
Based on this fact of Nitric Oxides, high concentration of Nitric
Oxides may have negative
correlation to housing price.
• Number of Rooms per Dwelling
With the number of rooms increasing at home, it is
necessary for total areas to increase. It is
obvious that more room can accommodate more people. First,
from family perspective,
American family has more kids than residents in other country,
for example, Chinese family. For
kids, having their own room when they grow up may be helpful
for their future development. So
when choosing house for the entire family, number of rooms per
dwelling is important for
households. Second, from renter perspective, one-bedroom
apartment costs less than two-
bedroom apartment.
• Age of House
Age of house could be a factor which may have medium
correlation to housing price, which
could depend on house hunters’ taste. Some people like old
house may because old house can
tell a story or it has its own history. Some people may like new
house because it has modern
structure. People may concern that old house could not be as
strong as new house. One defensive
example could be White House, which has a history of 200
years. As a result, age of house could
be a considerable factor to be validated.
• Distance to Employment Centers
Distance to employment centers is another obvious factor
may have negative correlation to
housing price. Houses have farther distance to employment
center might make their price
relatively cheaper than houses close to employment centers.
Young people today get used to stay
up late at night instead of being morning person. It may be hard
for them to get up early in the
7
morning. If they could live close to work, they can save more
time in the morning for sleeping
longer. Considering people’s psychology, housing price is asked
higher.
• Access to Radial Highways
Driving at highways to work is normal life of American
people. Especially for large
company, they tend to locate their work site at large and open
area. Therefore, driving highways
is necessary. Houses that have easy access to radial highways
may price higher compared to
houses that are far away from highways.
• Property Tax Rate
Property tax rate may have direct impact on housing price.
Houses have higher tax rate tend
to have higher price while houses have lower tax rate may have
lower price.
• School
School is a factor that more depends on different groups of
people. First, for homebuyers,
their purposes are possibly because people have decided to be a
family and what’s next? It could
be education for kids. Future parents will start to think about
distances to schools. Therefore,
houses closer to schools may price higher than houses far away
from any schools.
• Race
Based historical data, communities where minority group
lives in may or may not have
lower price than majority group lives. In the United States,
distribution by race reveals as below:
(2016) White people are considered major group in the United
States, which is up to 61%.
8
Houses where white people groups may price highest, but it
could be higher than where black
lives.
• Status of Population
Back to first point about crime rate analyzed, status of
population is a relatively important
factor. Thinking of purchasing power, people have same or
similar purchasing power tend to live
in the same community because they can afford the housing
price. Reversely, houses where
people in upper classes live have higher price than houses
where people in lower class live.
• Number of Owner-occupied Homes
Last factor is about number of owner-occupied homes.
This factor will be compared to
renters. For houses which are built for rental purposes, they are
priced higher than owner-
occupied homes. On the other hand, for homes that are owner-
occupied, their purposes are
different from business purposes as rental landlords.
9
Data Analysis
To deep analyze the dataset, following steps are used to
generate data analysis. First, start
from correlation is the first step to prove hypothesis. Second,
use ANOVA analysis to interpret
the relationship between each variable and housing price and
also generate plots to visualize their
relationship. Third, validate linear model by generating plots
for Residual vs. Fitted, Normal Q-
Q, Scale-Location, and Residual vs. Leverage.
Above correlation table is generated in R studio and sorted
in Excel based on the dataset in
attached R codes. The above table clearly analyzes how each
variables correlates to housing
price. Combining each plots in the attached R codes with above
two-way table. Three variables
are considered to have relatively strong relationship with
housing price. They are low-status
population, number of rooms and crime rate.
10
• Low-status Population
From above linear regression plot, we can conclude lower-
status class has strong negative
correlation with housing price. The less lower-status class, the
higher housing price. It verifies
the assumption at the beginning. People in upper class tend to
live in the same community with
their neighbors within same social class. Bring purchasing
power theory back to here again, it
results to housing price has strong relationship with social
class.
• Number of Rooms per Dwelling
11
From above linear regression between number of rooms
and housing price, it indicates they
have relatively strong positive relationship with each other.
With number of rooms increasing,
housing price increases as well. Those outliers could be affected
by other factors, such as age of
house, or long distance from workplace. This plot reflects both
rentals and houses available for
sale in the market. It also shows that number of rooms around
six is most popular in the market,
and it also indicates this type of houses with six rooms may be
more common and have higher
availability. If number of rooms reaches over eight, the price
drops down. Here we can apply
supply and demand theory to explain. Demand for houses with
eight rooms can be very low in
the market. Therefore, suppliers may lower the house price to
attract more buyers.
• Crime Rate
Even though, the coefficient between crime rate and
housing price is only -0.39, from above
graph, we can still conclude crime rate may have medium
negative correlation with housing
price. With crime rate going up, housing price drops. The graph
shows area where crime rates at
zero has various housing price, which shows other factors may
have impacts on housing price as
well. For example, people who have no roommate may consider
lowest crime rate in the first
12
place. Under this case, one-bedroom or two-bedroom apartment
will be the first option for this
group of people. Therefore, this could be one of the noises that
results in low coefficient between
crime rate and housing price.
13
Model Validation
From first graph, we can tell residuals of majority data are
not all around y=0. Data points
369, 372 and 373 can be treated as outliers. This indicates the
dataset may not be fitted in linear
model perfectly. For the second Normal Q-Q plot, the data is in
ascending order along the
straight line. We can say the residuals are normally
standardized. For the third Scale-Location,
the line is not horizontal and data is not equally spread. For the
last Residual vs. Leverage plot,
data points 369, 372 and 373 are the only three data between 0.5
and 1. From Cook’s distance
theory, we can conclude data points 369, 372 and 373 are
influential data or noise.
14
Conclusion
From statistics perspective, no model could be perfect to
interpret a dataset. However,
through this study, major factors influencing housing price are
effectively interpreted. Number of
rooms, landscape, and proportion of residential land may have
positive correlation with housing
price. Proportion of low status class, crime rate, distance to
employment centers and air quality
(NO concentration) may have negative correlation with housing
price. Furthermore, these factors
can be effective factors for rational homebuyers or even renters
to take into consideration for
house searching. For homeowners, this analysis could be a good
reference in evaluating their
own property and making better decision.
15
Reference
Lutz, A. (2012, July 13). Irrational Homebuyers Pay Way Too
Much Attention To The Season.
Retrieved April 15, 2017, from
http://www.businessinsider.com/irrational-consumers-pay-way-
too-much-attention-to-the-season-2012-7
Nitrogen Oxide (NOx) Pollution. (n.d.). Retrieved April 15,
2017, from http://www.icopal-
noxite.co.uk/nox-problem/nox-pollution.aspx
Population Distribution by Race/Ethnicity. (2016, November
18). Retrieved April 15, 2017, from
http://kff.org/other/state-indicator/distribution-by-
raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr
apups%22%3A%7B%22united-
states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId%
22%3A%22Location%22%2C
%22sort%22%3A%22asc%22%7D
http://www.businessinsider.com/irrational-consumers-pay-way-
too-much-attention-to-the-season-2012-7
http://www.businessinsider.com/irrational-consumers-pay-way-
too-much-attention-to-the-season-2012-7
http://www.icopal-noxite.co.uk/nox-problem/nox-pollution.aspx
http://www.icopal-noxite.co.uk/nox-problem/nox-pollution.aspx
http://kff.org/other/state-indicator/distribution-by-
raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr
apups%22%3A%7B%22united-
states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId%
22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D
http://kff.org/other/state-indicator/distribution-by-
raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr
apups%22%3A%7B%22united-
states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId%
22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D
http://kff.org/other/state-indicator/distribution-by-
raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr
apups%22%3A%7B%22united-
states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId%
22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D
http://kff.org/other/state-indicator/distribution-by-
raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr
apups%22%3A%7B%22united-
states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId%
22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D
Final Research Paper Brief
Analytical Methods - Using R
You
are
about
to
commence
a
new
research
project
in
a
field
of
your
choice.
You
are
expected
to
write
a
report
that
cons:tutes
a
research
proposal.
Business
field
related
examples
may
include
but
are
not
limited
to:
sa:sfac:on
sa:sfac:on
contribu:on
control
effec:veness
Organiza:onal
Support
Commitment
Sa:sfac:on
effec:veness
management
Forecas:ng
research
Working
individually,
you
will:
Have
chosen
a
clear
and
specific
research
ques:on/
aim/
hypothesis
for
yourresearch;
Have
contextualised
your
research
ques:on/
aim
within
the
academic
literature;
Understand
the
philosophical
and
methodological
bases
for
yourresearch;
Have
a
sound
method
to
address
the
research
ques:on/
aim/hypothesis.
Use
APA
style
in-­‐text
cita8on
andreferencing.
Do
not
copy
any
materials
you
use
word
for
word
unless
you
iden:fy
these
sec:ons
clearly
as
quota:ons.
If
you
paraphrase
any
materials,
you
must
iden:fy
sources
through
in-­‐textreferencing.
This
is
an
individual
assignment
please
do
not
work
closely
with
anyone
else.
Write
2500
words
(+
or
–
10%)
excluding
the
header
sheet,
cover
page,
contents
page,
reference
list,
footnotes
and
appendices.
Marks
for
criteria: Criteria
10% Focus
and
Comple8on
Does
the
proposal
address
the
set
tasks
in
a
meaningful
manner?
10% Research
Objec8ve
Does
the
proposal
clearly
ar:culate
10% Synthesis
and
Soundness
Does
the
proposal
place
the
research
objec:ve
in
the
context
of
the
relevant
academic
literature
and
any
relevant
past
studies?
Does
the
discussion
demonstrate
a
comprehensive
understanding
of
that
literature?
40% Analy8cal
Methods
Does
the
proposal
sensibly
outline
methods
for
accessing
sources
of
data
that
will
address
or
answer
the
research
objec:ve?
Are
the
calcula:on
process
and
analysis
results
clear?
20% Clarity
of
Coding
-­‐
Analy8cal
Approach
Is
the
calcula:on
(R
code/query)
well
organized,
logically
constructed
and
aden:ve
to
the
needs
of
the
user?
10% Mechanical
Soundness
Is
the
poreolio
clearly
wriden,
spell
Structuring
the
research
proposal
Introduc8on
(~200
words)
Explain
the
issue
you
are
examining
and
why
it
is
significant.
Describe
the
general
area
to
be
studied
Explain
why
this
area
is
important
to
the
general
area
under
study
(e.g.,
psychology
of
language,
second
language
acquisi:on,
teaching
methods)
Background/Review
of
the
Literature
(~800
words)
A
descrip9on
of
what
has
already
known
about
this
area
and
short
discussion
of
why
the
background
studies
are
not
sufficient.
Summarise
what
is
already
known
about
the
field.
Include
a
summary
of
the
basic
background
informa:on
on
the
topic
gleaned
from
your
literaturereview
Discuss
several
cri:cal
studies
that
have
already
been
done
in
this
area
(cite
according
to
APA
style).
Point
out
why
these
background
studies
are
insufficient.
In
other
words,
what
ques:on(s)
do
they
leave
unresolved
that
you
would
like
tostudy?
Research
Objec8ve
(~400
words)
A
contextualisa9on
and
descrip9on
of
the
ques9ons
you
are
examining
and
an
explora9on
of
the
claims.
Outline
the
methodological
posi:on
you
will
take
Outline
the
overarching
research
aim,
objec:ve
or
hypothesis
that
you
will
explore.
List
the
specific
ques:on(s)
that
you
are
exploring.
Explain
how
these
research
ques:ons
are
related
to
the
larger
issues
raised
in
the
introduc:on.
Method
and
Design
(~800
words)
A
descrip9on
of
how
you
would
go
about
collec9ng
data
and
test
the
ques9ons
your
are
exploring.
(You
are
not
required
to
come
up
with
a
new
or
original
method!).
Describe
the
general
method
you
choose
for
your
study,
in
order
to
explore
your
research
objec:ve
or
test
yourhypothesis(es).
Explain
why
this
method
is
the
best
for
your
purposes.
Explain
any
poten:al
difficul:es
in
collec:ng
data
and
how
these
will
be
overcome
Explain
the
design
features
that
ensure
acceptability
for
ethical
purposes
Describe
the
step
by
step
calcula:on
and
analysis
process
Explain
how
you
will
present
the
collected
data
and
how
it
will
be
able
to
be
analysed
the
results
to
explore
the
research
aim
or
to
test
the
research
hypothesis
Significance
and
Conclusion
(~300
words)
Discuss,
in
general,
how
your
proposed
research
would
lead
to
a
significant
improvement
over
the
original
studies,
and
how
it
would
benefit
the
field.
(In
other
words,
why
should
someone
care?
References
(not
in
word
count)
Include
all
references
in
APA
style.
Appendix:
(not
in
word
count)
R
code/query
need
to
be
appended

More Related Content

Similar to 1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx

HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docxHAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docxshericehewat
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McChapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McEstelaJeffery653
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 

Similar to 1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx (12)

HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docxHAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
HAL Id hal-01484681httpshal.inria.frhal-01484681Sub.docx
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McChapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by Mc
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 

More from vickeryr87

COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docxCOLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docxvickeryr87
 
Collins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docxCollins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docxvickeryr87
 
Define discrimination, victimization and affirmative actions; .docx
Define discrimination, victimization and affirmative actions; .docxDefine discrimination, victimization and affirmative actions; .docx
Define discrimination, victimization and affirmative actions; .docxvickeryr87
 
Define data mining. Why are there many names and definitions for d.docx
Define data mining. Why are there many names and definitions for d.docxDefine data mining. Why are there many names and definitions for d.docx
Define data mining. Why are there many names and definitions for d.docxvickeryr87
 
Define culture. How can culture be conceptionalizedDiscuss at l.docx
Define culture. How can culture be conceptionalizedDiscuss at l.docxDefine culture. How can culture be conceptionalizedDiscuss at l.docx
Define culture. How can culture be conceptionalizedDiscuss at l.docxvickeryr87
 
Define cultural relativism and how it is used by anthropologis.docx
Define cultural relativism and how it is used by anthropologis.docxDefine cultural relativism and how it is used by anthropologis.docx
Define cultural relativism and how it is used by anthropologis.docxvickeryr87
 
Define cost control and provide several examples of how it affec.docx
Define cost control and provide several examples of how it affec.docxDefine cost control and provide several examples of how it affec.docx
Define cost control and provide several examples of how it affec.docxvickeryr87
 
Define corporate governance.Discuss the events that led up.docx
Define corporate governance.Discuss the events that led up.docxDefine corporate governance.Discuss the events that led up.docx
Define corporate governance.Discuss the events that led up.docxvickeryr87
 
Define communication in your own words. Identify and distinguish amo.docx
Define communication in your own words. Identify and distinguish amo.docxDefine communication in your own words. Identify and distinguish amo.docx
Define communication in your own words. Identify and distinguish amo.docxvickeryr87
 
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docx
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docxDefine Civil Liberties. List 5 Civil Liberties. How do they differ.docx
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docxvickeryr87
 
Define civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docxDefine civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docxvickeryr87
 
Define case management and care management and compare the dif.docx
Define case management and care management and compare the dif.docxDefine case management and care management and compare the dif.docx
Define case management and care management and compare the dif.docxvickeryr87
 
Define Bureaucracy.  Government at all levels has grown enormously, .docx
Define Bureaucracy.  Government at all levels has grown enormously, .docxDefine Bureaucracy.  Government at all levels has grown enormously, .docx
Define Bureaucracy.  Government at all levels has grown enormously, .docxvickeryr87
 
Define and explain how the Twitter search function works to search f.docx
Define and explain how the Twitter search function works to search f.docxDefine and explain how the Twitter search function works to search f.docx
Define and explain how the Twitter search function works to search f.docxvickeryr87
 
Define and relate these different terminologies and Information Gove.docx
Define and relate these different terminologies and Information Gove.docxDefine and relate these different terminologies and Information Gove.docx
Define and relate these different terminologies and Information Gove.docxvickeryr87
 
Define and provide examples of-Basic probability- Bayes the.docx
Define and provide examples of-Basic probability- Bayes the.docxDefine and provide examples of-Basic probability- Bayes the.docx
Define and provide examples of-Basic probability- Bayes the.docxvickeryr87
 
Define and discuss the phrase Manifest Destiny. Explain how this b.docx
Define and discuss the phrase Manifest Destiny. Explain how this b.docxDefine and discuss the phrase Manifest Destiny. Explain how this b.docx
Define and discuss the phrase Manifest Destiny. Explain how this b.docxvickeryr87
 
Define and discuss the differences between vision and mission stat.docx
Define and discuss the differences between vision and mission stat.docxDefine and discuss the differences between vision and mission stat.docx
Define and discuss the differences between vision and mission stat.docxvickeryr87
 
Define and discuss the four types of innovation. How might these.docx
Define and discuss the four types of innovation. How might these.docxDefine and discuss the four types of innovation. How might these.docx
Define and discuss the four types of innovation. How might these.docxvickeryr87
 
Define and discuss the data wiping process.Discuss how a cloud.docx
Define and discuss the data wiping process.Discuss how a cloud.docxDefine and discuss the data wiping process.Discuss how a cloud.docx
Define and discuss the data wiping process.Discuss how a cloud.docxvickeryr87
 

More from vickeryr87 (20)

COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docxCOLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
 
Collins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docxCollins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docx
 
Define discrimination, victimization and affirmative actions; .docx
Define discrimination, victimization and affirmative actions; .docxDefine discrimination, victimization and affirmative actions; .docx
Define discrimination, victimization and affirmative actions; .docx
 
Define data mining. Why are there many names and definitions for d.docx
Define data mining. Why are there many names and definitions for d.docxDefine data mining. Why are there many names and definitions for d.docx
Define data mining. Why are there many names and definitions for d.docx
 
Define culture. How can culture be conceptionalizedDiscuss at l.docx
Define culture. How can culture be conceptionalizedDiscuss at l.docxDefine culture. How can culture be conceptionalizedDiscuss at l.docx
Define culture. How can culture be conceptionalizedDiscuss at l.docx
 
Define cultural relativism and how it is used by anthropologis.docx
Define cultural relativism and how it is used by anthropologis.docxDefine cultural relativism and how it is used by anthropologis.docx
Define cultural relativism and how it is used by anthropologis.docx
 
Define cost control and provide several examples of how it affec.docx
Define cost control and provide several examples of how it affec.docxDefine cost control and provide several examples of how it affec.docx
Define cost control and provide several examples of how it affec.docx
 
Define corporate governance.Discuss the events that led up.docx
Define corporate governance.Discuss the events that led up.docxDefine corporate governance.Discuss the events that led up.docx
Define corporate governance.Discuss the events that led up.docx
 
Define communication in your own words. Identify and distinguish amo.docx
Define communication in your own words. Identify and distinguish amo.docxDefine communication in your own words. Identify and distinguish amo.docx
Define communication in your own words. Identify and distinguish amo.docx
 
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docx
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docxDefine Civil Liberties. List 5 Civil Liberties. How do they differ.docx
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docx
 
Define civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docxDefine civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docx
 
Define case management and care management and compare the dif.docx
Define case management and care management and compare the dif.docxDefine case management and care management and compare the dif.docx
Define case management and care management and compare the dif.docx
 
Define Bureaucracy.  Government at all levels has grown enormously, .docx
Define Bureaucracy.  Government at all levels has grown enormously, .docxDefine Bureaucracy.  Government at all levels has grown enormously, .docx
Define Bureaucracy.  Government at all levels has grown enormously, .docx
 
Define and explain how the Twitter search function works to search f.docx
Define and explain how the Twitter search function works to search f.docxDefine and explain how the Twitter search function works to search f.docx
Define and explain how the Twitter search function works to search f.docx
 
Define and relate these different terminologies and Information Gove.docx
Define and relate these different terminologies and Information Gove.docxDefine and relate these different terminologies and Information Gove.docx
Define and relate these different terminologies and Information Gove.docx
 
Define and provide examples of-Basic probability- Bayes the.docx
Define and provide examples of-Basic probability- Bayes the.docxDefine and provide examples of-Basic probability- Bayes the.docx
Define and provide examples of-Basic probability- Bayes the.docx
 
Define and discuss the phrase Manifest Destiny. Explain how this b.docx
Define and discuss the phrase Manifest Destiny. Explain how this b.docxDefine and discuss the phrase Manifest Destiny. Explain how this b.docx
Define and discuss the phrase Manifest Destiny. Explain how this b.docx
 
Define and discuss the differences between vision and mission stat.docx
Define and discuss the differences between vision and mission stat.docxDefine and discuss the differences between vision and mission stat.docx
Define and discuss the differences between vision and mission stat.docx
 
Define and discuss the four types of innovation. How might these.docx
Define and discuss the four types of innovation. How might these.docxDefine and discuss the four types of innovation. How might these.docx
Define and discuss the four types of innovation. How might these.docx
 
Define and discuss the data wiping process.Discuss how a cloud.docx
Define and discuss the data wiping process.Discuss how a cloud.docxDefine and discuss the data wiping process.Discuss how a cloud.docx
Define and discuss the data wiping process.Discuss how a cloud.docx
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx

  • 1. 1 Running Header: ORGANIZATIONAL SECURITY 4 ORGANIZATIONAL SECURITY ORGANIZATIONAL SECURITY Student’s Name Tutor’s Name Course Title Date Introduction The security of the world is currently increasing in a simultaneous manner. Many countries all around the world try harder to cater to its citizens despite having huge numbers of citizens. Business is the core factor that gives out people a way to a better life. Organizations have emerged and that they all try as much as possible to be successful, despite having many challenges in the market square. The exchange of goods and services is the main core issue that led to the emergence of business globally. In general terms there are different products that are produced all around the world, researchers have proven that for the business to be rated in a successful level the security status of the business must also be considered. Security
  • 2. generally protects the product and services of the organization. It is very important to keep the security of the of the company high, this is based on the fact that all the product and services produced by the company will be secured from competitors and the ill motive individuals who might want to bring down the business. Employers and employees are the ones who are responsible for keeping the security in an organization to be at a high level. Background information In today’s world, everything that is tangible is always stored in a digital form. When the business lacks a form to defend its digital assets generally the business is lost, thus the potential loss of the business will grow bigger every day. (Gupta, Rees, Chaturvedi & Chi, 2006) The need of having legal security in the organization literally existed ever since the introduction of the first computer in the business environment. Recently the paradigm has greatly shifted over the years, nevertheless from the client-server systems and terminal server mainframe systems. Despite the security system being very important, in many terms it has not always been set aside to be critical in organizational success. With the existence of the mainframe system being in the place, many organizations manage to protect their own systems from the abuse of the resources, for instances having unauthorized user gaining access to the organizational system and also the act of authorized user hogging company’s resources. Such types of abuse were considered to be more damaging based on the fact that the system had a higher cost during the early mainframes days. As time goes by, the technology techniques developed and increased to some level, hence the cost of the systems resources decreases, this issue apparently becomes less important to the business environment. (Gupta, Rees, Chaturvedi & Chi, 2006)The evolving act of having remote access outside the organizational networks was also considered to be non-existence. Furthermore, only the underground community had higher tools and knowledge that is
  • 3. rightfully needed to compromise the entire mainframe system. The new security problem was led by the emergence of client- server technology. Processor utilization was never at any point the first priority, but access to systems and networks were the two important activities. Based on the sensitive information the access control becomes more important, such information may include the payroll and the human resources that were being stored in the public file servers. Most of the company all around the world did not want their information out to the public knowledge, and also even to some of their employees. This act led to the new development of unique technologies such as data encryption and granular access control. As it is well known, methods of exploiting and circumventing security products and new application quickly arose. During the server-client era, a few dial-up accounts were the only way to access corporate networks. (Wall, 2013) However, at any given point this process did not open some of the pure security holes, but some of the risks to such account can be easily be mitigated with some valuable procedures such as access lists and dial backs. The dedicated leased lines are the one that branches offices used to communicate with one another. The rise of the internet was one of the highly advanced forms of technology. It generally opens access to worldwide networks, and out of that everything changed. Most of the companies provided clear internet access to its employee because of the wider rise of email and the World Wide Web. The act of developing an e-business initiative for an organization becomes more critical for the company to stay competitive in the wider market areas. With the internet being in place, most of the data including the information security system became accessible to the public. This is based on the fact that the entire internet is considered to be a public network, anybody on the net is can clearly access and see other systems. (Wall, 2013) As time goes by, the internet use widely spread out, many organizations started to allow access to the networks and information over the internet. The process of allowing anybody to access information
  • 4. on the internet really invites hackers into the system organizational systems, thus lowering the security of the company information. Recently many events have led information security to be of more significance in any business environment, to which in many cases it focuses on how the business conducts its operations. 85% of the businesses all around the world do have rudimentary security program being in the place, furthermore, many programs are widely grown and developing in maturity. As the programs are growing, there is a need to understand that security is just a technical issue. In today’s world security is being combined with the fabric of the business, so that the operation of the business can be protected from unwanted users. The information security programs are always moved from being recognized as the tactical implementation of technology to a strategic partner in the business. The entire matter about the security program was meant to protect the integrity of the organization in the marketplaces. (Wall, 2013)This is because many companies see that there was a need to protect their data, thus the urge of security was raised. With the internet, the information of an organization was openly exposed to hackers, and that is the main reason as to why a security program is one of the most valuable things in evolving business. Research objectives The information and security is the major sector that is always at risk in ant business environment. It is well understood that accidents can occur and that attackers can literally gain access to the organizational system to which it can lead to the disruption of services, thus it can make the whole system useless or the information can be stolen. Some of the biggest companies have already taken an enlightened move about security issues. The deeply believe that to be successful they must be open to show their customer that the protecting information assets and security are some of the core business function. (Ahmad, Maynard & Shanks, 2015)The act of having
  • 5. security by design generally means that security is not an afterthought in the entire design process, instead, it is recognized as one of the requirements that the designer needs to use when starting a project in an organization. The process of securing in deployment implies that the product will be shipped and that it will be ready to use in a way that it cannot compromise other products or the customers. In a wider definition, the information security is the plan the instantly mitigate risks that are associated with the information processing. Below are some of the objectives of the whole research about organizational security; i. Confidentiality – This is the act of preventing an authorized use or disclosure of any organizational information. The entire system contains the information that always calls for genuine protection from all unauthorized disclosure. ii. Integrity – This is the situation whereby the entire information must be ensured that it is accurate and complete and that the data is not is not modified by any an authorized user. It is clearly understood that most of the system contains information that must be protected from unanticipated modification. For instance economic indicators and the survey reports. iii. Availability – this is the situation whereby the system management ensures that users have reliable and timely access to their assets information. The system provides services and contains information that must be available on a regular timely basis to meet the mission requirements and also to avoid substantial losses that might affect the business, hence lowering its operation. For instance systems critical to safety and online accessibility of the business records. (Tang & Zhang, 2016) These are the main objectives about the organizational security; the three concepts about information security are linked up together for major protection. The idea carried out that information can be categorized as an asset that always calls for protection is really a sensitive matter. Method and design
  • 6. Organization security is one of the conceptual things that many organizations focus and dwell harder to have a strong path. The method that is used to drives the path of security in an organization really matters a lot. Below are some of the methods that are used to ensure the act of organization security is firmly installed in an organization. i. The installation of the concept that the security do belongs to everyone It is believed that many companies all around the world believe that the security department is the one that is responsible for all the security strategy. More and advanced sustainable security culture state that for the security in an organization to be paramount, each and every member of the organization must be accounted to the security matters. (AlHogail, 2015) Each employee must feel like a legend security person because it is rendered as the security culture to everybody in the organization. Security always belongs to everyone, starting from executive staff to the lobby ambassador of the company. ii. Always focuses on awareness and beyond Security awareness is the process of teaching the entire team in an organization about the security status of the company. Generally, it entails the basic lesson that each and every member in an organization is familiar with. Each employee should be leveled to judge threats before asking them to understand in depth. In many cases, security awareness has gain bad rap according to how it is being delivered to worker or employers. The general awareness is always needed for application security knowledge. The application security awareness is rendered to be of the testers and developers within an organization. (AlHogail, 2015)Awareness, especially on security matters, is always an ongoing activity, based on that it can never pass up a good crisis. iii. Getting a secured and more developed lifecycle SDL (secure development lifecycle) is one of the most powerful
  • 7. foundational to sustainable security culture. Secured developed lifecycle is the activity and process that an organization agrees to perform each system or software's released. Basically, it includes things such as threat modeling and security requirements. Secured developing lifecycle (SDL) always answers how the security culture in an organization is. In action, it is a sustainable security culture. Customers across many companies are starting to demand that SDL rules must be followed in an organization. At this juncture, if the company doesn’t have an SDL, Microsoft has gone a step ahead in releasing their details about the SDL free charge. The product security office is the reasonable place for the SDL to live. iv. Recognize and reward those people that do the right thing for security Security is a major factor to success in any business environment if an individual is working hard towards making sure that the security of data and the services in an organization are being catered for, that particular person must be recognized. This is based on the fact that when a person is being recognized and thereafter rewarded, automatically the entire issue about organization security will be limited, simply because other employees will also take that initiative of securing their data hoping that one day they will be rewarded too. (AlHogail, 2015) Baring in mind that security is all about each and every person in an organization, individuals should be encouraged so that they can administer and deal with insecurity issue appropriately. v. Building security advanced community According to sustainable security culture, the security community is its main backbone. Communities are the one that is responsible for providing all the existing connections between people across the entire organization. The act of security community plays an important role in bringing everyone together against problems that are common. By understanding the different security level, the security level will be achieved within an organization. In general terms, it
  • 8. advocates sponsors and security awareness. (AlHogail, 2015)The act of security awareness is considered to be not passionate but they just contribute to making the security better in some way. vi. Making security fun and engaging For a longer period of time, people have always engaged security programs as some of the most boring training in the organizations. That is the reason why many employees never want to involve themselves in any security training. But when the security program is handling in a better way, which involves some fun, automatically a good number of people will gain self- interest in learning more about security programs. People should be shown the effect of insecurity in an organization and be thought all the tactics on how to secure all the information and services provided by the company. (AlHogail, 2015 Significance For any organization to be in place and rendered how successful it is, it should have a security specialist who always keeps the system safe, the security sector of the company must be paramount. With the rise of the internet, emails were widely used in many organizations all around the world. Email is recognized as the safest mode of communication simply because it many organizations ensure that all their email accounts are firmly secured. Thus making email as the primary mode of communication really helps to simplify the entire communication process. In a situation when an employee’s email account is breached, the specialist is the only person who is allowed to identify the problem, and thereafter sorting it out. (Dhillon, Syed & Pedron, 2016) The idea of having security specialist in an organization really helped many big companies in terms of detecting viruses before the effects the whole systems. The specialist will set out some programs that will secure the whole system from being corrupt. They also play an important part in a fight with hackers who might have bad intentions on the company's system.
  • 9. Conclusion Organization security must be taken into consideration because it prevents many the loss of valuable information about an organization. The security system in an organization is tight, no data will be lost, and all the operation in and outside the business will be secured. No data will be corrupted or lost. Employees in an organization must also be responsible for ensuring that there is no data loss or that there is no malicious activity going on. Maximum security will stand to protect both the employee's work and the product produced. References Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case analysis of information systems and security incident responses. International Journal of Information Management, 35(6), 717-723. AlHogail, A. (2015). Design and validation of information security culture framework. Computers in Human Behavior, 49, 567-575. Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting information security culture: An organizational transformation case study. computers & security, 56, 63-69. Gupta, M., Rees, J., Chaturvedi, A., & Chi, J. (2006). Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems, 41(3), 592-603. Tang, M., & Zhang, T. (2016). The impacts of organizational culture on information security culture: a case study. Information Technology and Management, 17(2), 179- 186. Wall, D. S. (2013). Enemies within: Redefining the insider threat in organizational security policy. Security Journal, 26(2),
  • 11. United States Housing Price Analysis Dataset Resource: Empirical Evidence from Housing Price in Student Name - 199807 ANLY 502, Spring 2017 Instructor: Ali Motamedi March 4, 2017 2 Instruction “The United States housing bubble was a real estate bubble affecting over half of the U.S. states. Housing prices peaked in early 2006, started to decline in 2006 and 2007, and reached new lows in 2012. On December 30, 2008, the Case-Shiller home price index reported its largest price drop in its history. The credit crisis resulting from the bursting of the housing bubble is—
  • 12. according to general consensus - the primary cause of the credit default swap bubble of the 2007–2009 recessions in the United States” (Wikipedia). At that time, this may negatively affect housing buyers investing options and discourage home owners. In real world, real estate industry reached its downturn and wasn’t able to recover for a long time. This study is based on the historical dataset on empirical evidence from housing price in Boston. Even though this dataset was collected and evaluated in 1970s, it will be a good tool to start with. Housing price can be affected by a lot of factors. As time goes by, these factors that drive housing price will also change due to technology, economy, and people’s purchasing power and consumption habits change. However, by studying historical data using regression model(s), it will be useful to apply in the real world. Most importantly, it will be useful for irrational buyers. Here is a typical example to define irrational buyers. The reason is the same as why people buy more at the grocery when they're hungry, the researchers say. It's impossible for the brain to turn off what it wants in that moment. So don't go
  • 13. to look at swimming pools on a hot day--chances are you'll cave. Here's a graph showing the value of houses with swimming pools by season: (Lutz, 2012). 3 From above graph, it is obvious that if the housing searching happens in summer time, housing hunters are more likely to buy houses with swimming pools. Therefore, price of houses with swimming pools dramatically increases in summer time. Vice versa, in winter time, housing price drops due to fewer buyers take swimming pools into consideration. Given supply and demand theory, increasing demand results in price increase while decreasing demand results in price decrease. Here, season is considered an irrational housing price driven factor. Season is changeable instead of stable or effective factor. Housing price is driven by people’s sentiment due to season.
  • 14. In the dataset chosen in Empirical Evidence from Housing Price in Boston, thirteen factors are chosen as effective factors to apply regression model for further analysis in theory. By the end of this study, homeowners or homebuyers, even for investment institutions may take this interpretation as a useful reference. 4 Factors/ Variables (in Theory) Drive Housing Price • Crime Rate The major reason related to crime rate could be wealth inequality in the United States. Wealth inequality can be defined as the unequal distribution of assets among residents of the United States. Once wealth gap gets larger and larger, people in lower class may or may not put themselves in an unfair situation. From psychology perspective, these group people could be a reason for crime rate increase. People in middle or upper class are intended to choose a safe
  • 15. place to call it home. These group people are also a representative of strong purchasing power. They are more willing to spend more money to buy safety, which drives the housing price in this kind of community get higher. From this stand of point, crime rate is considered a factor affecting house price. • Proportion of Residential Land Starting from ancient age, human beings have been living in groups, which enable communication and socialization easier. Given this aspect, urban area makes residential center and business center separate. As economy develops, business center is developed as well. It gets shopping center, grocery stores, banks and even employment center together. As a result, human traffic is much larger than other area, especially on weekends. However, for employees who are busy with work during weekdays, it could be a bad idea living in area with large human traffic. Alternatively, living in higher proportion of residential land may get popular among house buyers or renters. Hence, higher proportion of residential land
  • 16. may have positive correlation with housing price. 5 • Proportion of Non-retail Business Similar concept to proportion of residential land, proportion of non-retail business is another reason worthy to be considered as one of the factors. In first consideration, proportion of non-retail business may have negative correlation with housing price. The major reason is due to inconvenient life experience. For employees, driving a long distance to shop for grocery won’t be favorable. • Landscape: Charles River Charles River here plays an important role as a factor related to environment. From personal experience, I would put environment as a significant aspect in housing searching. In the past year, I had been living along the riverside. Even though, it was a
  • 17. rental house, price there is placed very high among other landlords. And facing river becomes an outstanding selling privilege. During the year when I lived there, life was enjoyable. Facing and staring at computer screen all day long, eye sight and health may be negatively affected. I would spend half hour standing in my balcony and enjoying beautiful river landscape. My eyes may feel relaxed. Enjoy landscape can be another factor having positive correlation to housing price. • Nitric Oxides Concentration Nitrogen dioxide is an irritant gas, which at high concentrations causes inflammation of the airways. NOx mainly impacts on respiratory conditions causing inflammation of the airways at high levels. Long term exposure can decrease lung function, increase the risk of respiratory conditions and increases the response to allergens. NOx also contributes to the formation of fine particles (PM) and ground level ozone, both of which are associated with adverse health effects (2017). People nowadays are paying more and more attention to heathy problems.
  • 18. 6 Based on this fact of Nitric Oxides, high concentration of Nitric Oxides may have negative correlation to housing price. • Number of Rooms per Dwelling With the number of rooms increasing at home, it is necessary for total areas to increase. It is obvious that more room can accommodate more people. First, from family perspective, American family has more kids than residents in other country, for example, Chinese family. For kids, having their own room when they grow up may be helpful for their future development. So when choosing house for the entire family, number of rooms per dwelling is important for households. Second, from renter perspective, one-bedroom apartment costs less than two- bedroom apartment. • Age of House Age of house could be a factor which may have medium
  • 19. correlation to housing price, which could depend on house hunters’ taste. Some people like old house may because old house can tell a story or it has its own history. Some people may like new house because it has modern structure. People may concern that old house could not be as strong as new house. One defensive example could be White House, which has a history of 200 years. As a result, age of house could be a considerable factor to be validated. • Distance to Employment Centers Distance to employment centers is another obvious factor may have negative correlation to housing price. Houses have farther distance to employment center might make their price relatively cheaper than houses close to employment centers. Young people today get used to stay up late at night instead of being morning person. It may be hard for them to get up early in the 7 morning. If they could live close to work, they can save more
  • 20. time in the morning for sleeping longer. Considering people’s psychology, housing price is asked higher. • Access to Radial Highways Driving at highways to work is normal life of American people. Especially for large company, they tend to locate their work site at large and open area. Therefore, driving highways is necessary. Houses that have easy access to radial highways may price higher compared to houses that are far away from highways. • Property Tax Rate Property tax rate may have direct impact on housing price. Houses have higher tax rate tend to have higher price while houses have lower tax rate may have lower price. • School School is a factor that more depends on different groups of people. First, for homebuyers, their purposes are possibly because people have decided to be a family and what’s next? It could be education for kids. Future parents will start to think about distances to schools. Therefore,
  • 21. houses closer to schools may price higher than houses far away from any schools. • Race Based historical data, communities where minority group lives in may or may not have lower price than majority group lives. In the United States, distribution by race reveals as below: (2016) White people are considered major group in the United States, which is up to 61%. 8 Houses where white people groups may price highest, but it could be higher than where black lives. • Status of Population Back to first point about crime rate analyzed, status of population is a relatively important factor. Thinking of purchasing power, people have same or similar purchasing power tend to live in the same community because they can afford the housing
  • 22. price. Reversely, houses where people in upper classes live have higher price than houses where people in lower class live. • Number of Owner-occupied Homes Last factor is about number of owner-occupied homes. This factor will be compared to renters. For houses which are built for rental purposes, they are priced higher than owner- occupied homes. On the other hand, for homes that are owner- occupied, their purposes are different from business purposes as rental landlords. 9 Data Analysis To deep analyze the dataset, following steps are used to
  • 23. generate data analysis. First, start from correlation is the first step to prove hypothesis. Second, use ANOVA analysis to interpret the relationship between each variable and housing price and also generate plots to visualize their relationship. Third, validate linear model by generating plots for Residual vs. Fitted, Normal Q- Q, Scale-Location, and Residual vs. Leverage. Above correlation table is generated in R studio and sorted in Excel based on the dataset in attached R codes. The above table clearly analyzes how each variables correlates to housing price. Combining each plots in the attached R codes with above two-way table. Three variables are considered to have relatively strong relationship with housing price. They are low-status population, number of rooms and crime rate. 10
  • 24. • Low-status Population From above linear regression plot, we can conclude lower- status class has strong negative correlation with housing price. The less lower-status class, the higher housing price. It verifies the assumption at the beginning. People in upper class tend to live in the same community with their neighbors within same social class. Bring purchasing power theory back to here again, it results to housing price has strong relationship with social class. • Number of Rooms per Dwelling 11 From above linear regression between number of rooms and housing price, it indicates they have relatively strong positive relationship with each other. With number of rooms increasing, housing price increases as well. Those outliers could be affected by other factors, such as age of
  • 25. house, or long distance from workplace. This plot reflects both rentals and houses available for sale in the market. It also shows that number of rooms around six is most popular in the market, and it also indicates this type of houses with six rooms may be more common and have higher availability. If number of rooms reaches over eight, the price drops down. Here we can apply supply and demand theory to explain. Demand for houses with eight rooms can be very low in the market. Therefore, suppliers may lower the house price to attract more buyers. • Crime Rate Even though, the coefficient between crime rate and housing price is only -0.39, from above graph, we can still conclude crime rate may have medium negative correlation with housing price. With crime rate going up, housing price drops. The graph shows area where crime rates at zero has various housing price, which shows other factors may have impacts on housing price as well. For example, people who have no roommate may consider lowest crime rate in the first
  • 26. 12 place. Under this case, one-bedroom or two-bedroom apartment will be the first option for this group of people. Therefore, this could be one of the noises that results in low coefficient between crime rate and housing price.
  • 27. 13 Model Validation From first graph, we can tell residuals of majority data are not all around y=0. Data points 369, 372 and 373 can be treated as outliers. This indicates the dataset may not be fitted in linear model perfectly. For the second Normal Q-Q plot, the data is in ascending order along the straight line. We can say the residuals are normally standardized. For the third Scale-Location, the line is not horizontal and data is not equally spread. For the last Residual vs. Leverage plot, data points 369, 372 and 373 are the only three data between 0.5 and 1. From Cook’s distance theory, we can conclude data points 369, 372 and 373 are influential data or noise. 14
  • 28. Conclusion From statistics perspective, no model could be perfect to interpret a dataset. However, through this study, major factors influencing housing price are effectively interpreted. Number of rooms, landscape, and proportion of residential land may have positive correlation with housing price. Proportion of low status class, crime rate, distance to employment centers and air quality (NO concentration) may have negative correlation with housing price. Furthermore, these factors can be effective factors for rational homebuyers or even renters to take into consideration for house searching. For homeowners, this analysis could be a good reference in evaluating their own property and making better decision.
  • 29. 15 Reference Lutz, A. (2012, July 13). Irrational Homebuyers Pay Way Too Much Attention To The Season. Retrieved April 15, 2017, from http://www.businessinsider.com/irrational-consumers-pay-way- too-much-attention-to-the-season-2012-7 Nitrogen Oxide (NOx) Pollution. (n.d.). Retrieved April 15, 2017, from http://www.icopal- noxite.co.uk/nox-problem/nox-pollution.aspx Population Distribution by Race/Ethnicity. (2016, November 18). Retrieved April 15, 2017, from http://kff.org/other/state-indicator/distribution-by- raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr apups%22%3A%7B%22united- states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId% 22%3A%22Location%22%2C %22sort%22%3A%22asc%22%7D
  • 30. http://www.businessinsider.com/irrational-consumers-pay-way- too-much-attention-to-the-season-2012-7 http://www.businessinsider.com/irrational-consumers-pay-way- too-much-attention-to-the-season-2012-7 http://www.icopal-noxite.co.uk/nox-problem/nox-pollution.aspx http://www.icopal-noxite.co.uk/nox-problem/nox-pollution.aspx http://kff.org/other/state-indicator/distribution-by- raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr apups%22%3A%7B%22united- states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId% 22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D http://kff.org/other/state-indicator/distribution-by- raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr apups%22%3A%7B%22united- states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId% 22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D http://kff.org/other/state-indicator/distribution-by- raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr apups%22%3A%7B%22united- states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId% 22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D http://kff.org/other/state-indicator/distribution-by- raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr apups%22%3A%7B%22united- states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId% 22%3A%22Location%22%2C%22sort%22%3A%22asc%22%7D Final Research Paper Brief Analytical Methods - Using R You are