1
Running Header: ORGANIZATIONAL SECURITY
4
ORGANIZATIONAL SECURITY
ORGANIZATIONAL SECURITY
Student’s Name
Tutor’s Name
Course Title
Date
Introduction
The security of the world is currently increasing in a simultaneous manner. Many countries all around the world try harder to cater to its citizens despite having huge numbers of citizens. Business is the core factor that gives out people a way to a better life. Organizations have emerged and that they all try as much as possible to be successful, despite having many challenges in the market square. The exchange of goods and services is the main core issue that led to the emergence of business globally. In general terms there are different products that are produced all around the world, researchers have proven that for the business to be rated in a successful level the security status of the business must also be considered. Security generally protects the product and services of the organization. It is very important to keep the security of the of the company high, this is based on the fact that all the product and services produced by the company will be secured from competitors and the ill motive individuals who might want to bring down the business. Employers and employees are the ones who are responsible for keeping the security in an organization to be at a high level.
Background information
In today’s world, everything that is tangible is always stored in a digital form. When the business lacks a form to defend its digital assets generally the business is lost, thus the potential loss of the business will grow bigger every day. (Gupta, Rees, Chaturvedi & Chi, 2006) The need of having legal security in the organization literally existed ever since the introduction of the first computer in the business environment. Recently the paradigm has greatly shifted over the years, nevertheless from the client-server systems and terminal server mainframe systems.
Despite the security system being very important, in many terms it has not always been set aside to be critical in organizational success. With the existence of the mainframe system being in the place, many organizations manage to protect their own systems from the abuse of the resources, for instances having unauthorized user gaining access to the organizational system and also the act of authorized user hogging company’s resources. Such types of abuse were considered to be more damaging based on the fact that the system had a higher cost during the early mainframes days. As time goes by, the technology techniques developed and increased to some level, hence the cost of the systems resources decreases, this issue apparently becomes less important to the business environment. (Gupta, Rees, Chaturvedi & Chi, 2006)The evolving act of having remote access outside the organizational networks was also considered to be non-existence. Furthermore, only the underground community had higher tools and knowledge that is rightfully needed.
1. 1
Running Header: ORGANIZATIONAL SECURITY
4
ORGANIZATIONAL SECURITY
ORGANIZATIONAL SECURITY
Student’s Name
Tutor’s Name
Course Title
Date
Introduction
The security of the world is currently increasing in a
simultaneous manner. Many countries all around the world try
harder to cater to its citizens despite having huge numbers of
citizens. Business is the core factor that gives out people a way
to a better life. Organizations have emerged and that they all try
as much as possible to be successful, despite having many
challenges in the market square. The exchange of goods and
services is the main core issue that led to the emergence of
business globally. In general terms there are different products
that are produced all around the world, researchers have proven
that for the business to be rated in a successful level the
security status of the business must also be considered. Security
2. generally protects the product and services of the organization.
It is very important to keep the security of the of the company
high, this is based on the fact that all the product and services
produced by the company will be secured from competitors and
the ill motive individuals who might want to bring down the
business. Employers and employees are the ones who are
responsible for keeping the security in an organization to be at a
high level.
Background information
In today’s world, everything that is tangible is always stored in
a digital form. When the business lacks a form to defend its
digital assets generally the business is lost, thus the potential
loss of the business will grow bigger every day. (Gupta, Rees,
Chaturvedi & Chi, 2006) The need of having legal security in
the organization literally existed ever since the introduction of
the first computer in the business environment. Recently the
paradigm has greatly shifted over the years, nevertheless from
the client-server systems and terminal server mainframe
systems.
Despite the security system being very important, in many terms
it has not always been set aside to be critical in organizational
success. With the existence of the mainframe system being in
the place, many organizations manage to protect their own
systems from the abuse of the resources, for instances having
unauthorized user gaining access to the organizational system
and also the act of authorized user hogging company’s
resources. Such types of abuse were considered to be more
damaging based on the fact that the system had a higher cost
during the early mainframes days. As time goes by, the
technology techniques developed and increased to some level,
hence the cost of the systems resources decreases, this issue
apparently becomes less important to the business environment.
(Gupta, Rees, Chaturvedi & Chi, 2006)The evolving act of
having remote access outside the organizational networks was
also considered to be non-existence. Furthermore, only the
underground community had higher tools and knowledge that is
3. rightfully needed to compromise the entire mainframe system.
The new security problem was led by the emergence of client-
server technology. Processor utilization was never at any point
the first priority, but access to systems and networks were the
two important activities. Based on the sensitive information the
access control becomes more important, such information may
include the payroll and the human resources that were being
stored in the public file servers. Most of the company all around
the world did not want their information out to the public
knowledge, and also even to some of their employees. This act
led to the new development of unique technologies such as data
encryption and granular access control. As it is well known,
methods of exploiting and circumventing security products and
new application quickly arose. During the server-client era, a
few dial-up accounts were the only way to access corporate
networks. (Wall, 2013) However, at any given point this process
did not open some of the pure security holes, but some of the
risks to such account can be easily be mitigated with some
valuable procedures such as access lists and dial backs. The
dedicated leased lines are the one that branches offices used to
communicate with one another.
The rise of the internet was one of the highly advanced forms of
technology. It generally opens access to worldwide networks,
and out of that everything changed. Most of the companies
provided clear internet access to its employee because of the
wider rise of email and the World Wide Web. The act of
developing an e-business initiative for an organization becomes
more critical for the company to stay competitive in the wider
market areas. With the internet being in place, most of the data
including the information security system became accessible to
the public. This is based on the fact that the entire internet is
considered to be a public network, anybody on the net is can
clearly access and see other systems. (Wall, 2013) As time goes
by, the internet use widely spread out, many organizations
started to allow access to the networks and information over the
internet. The process of allowing anybody to access information
4. on the internet really invites hackers into the system
organizational systems, thus lowering the security of the
company information.
Recently many events have led information security to be of
more significance in any business environment, to which in
many cases it focuses on how the business conducts its
operations. 85% of the businesses all around the world do have
rudimentary security program being in the place, furthermore,
many programs are widely grown and developing in maturity.
As the programs are growing, there is a need to understand that
security is just a technical issue. In today’s world security is
being combined with the fabric of the business, so that the
operation of the business can be protected from unwanted users.
The information security programs are always moved from
being recognized as the tactical implementation of technology
to a strategic partner in the business. The entire matter about
the security program was meant to protect the integrity of the
organization in the marketplaces. (Wall, 2013)This is because
many companies see that there was a need to protect their data,
thus the urge of security was raised. With the internet, the
information of an organization was openly exposed to hackers,
and that is the main reason as to why a security program is one
of the most valuable things in evolving business.
Research objectives
The information and security is the major sector that is always
at risk in ant business environment. It is well understood that
accidents can occur and that attackers can literally gain access
to the organizational system to which it can lead to the
disruption of services, thus it can make the whole system
useless or the information can be stolen. Some of the biggest
companies have already taken an enlightened move about
security issues. The deeply believe that to be successful they
must be open to show their customer that the protecting
information assets and security are some of the core business
function. (Ahmad, Maynard & Shanks, 2015)The act of having
5. security by design generally means that security is not an
afterthought in the entire design process, instead, it is
recognized as one of the requirements that the designer needs to
use when starting a project in an organization. The process of
securing in deployment implies that the product will be shipped
and that it will be ready to use in a way that it cannot
compromise other products or the customers.
In a wider definition, the information security is the plan the
instantly mitigate risks that are associated with the information
processing. Below are some of the objectives of the whole
research about organizational security;
i. Confidentiality – This is the act of preventing an authorized
use or disclosure of any organizational information. The entire
system contains the information that always calls for genuine
protection from all unauthorized disclosure.
ii. Integrity – This is the situation whereby the entire
information must be ensured that it is accurate and complete
and that the data is not is not modified by any an authorized
user. It is clearly understood that most of the system contains
information that must be protected from unanticipated
modification. For instance economic indicators and the survey
reports.
iii. Availability – this is the situation whereby the system
management ensures that users have reliable and timely access
to their assets information. The system provides services and
contains information that must be available on a regular timely
basis to meet the mission requirements and also to avoid
substantial losses that might affect the business, hence lowering
its operation. For instance systems critical to safety and online
accessibility of the business records. (Tang & Zhang, 2016)
These are the main objectives about the organizational security;
the three concepts about information security are linked up
together for major protection. The idea carried out that
information can be categorized as an asset that always calls for
protection is really a sensitive matter.
Method and design
6. Organization security is one of the conceptual things that many
organizations focus and dwell harder to have a strong path. The
method that is used to drives the path of security in an
organization really matters a lot. Below are some of the
methods that are used to ensure the act of organization security
is firmly installed in an organization.
i. The installation of the concept that the security do belongs to
everyone
It is believed that many companies all around the world believe
that the security department is the one that is responsible for all
the security strategy. More and advanced sustainable security
culture state that for the security in an organization to be
paramount, each and every member of the organization must be
accounted to the security matters. (AlHogail, 2015) Each
employee must feel like a legend security person because it is
rendered as the security culture to everybody in the
organization. Security always belongs to everyone, starting
from executive staff to the lobby ambassador of the company.
ii. Always focuses on awareness and beyond
Security awareness is the process of teaching the entire team in
an organization about the security status of the company.
Generally, it entails the basic lesson that each and every
member in an organization is familiar with. Each employee
should be leveled to judge threats before asking them to
understand in depth. In many cases, security awareness has gain
bad rap according to how it is being delivered to worker or
employers. The general awareness is always needed for
application security knowledge. The application security
awareness is rendered to be of the testers and developers within
an organization. (AlHogail, 2015)Awareness, especially on
security matters, is always an ongoing activity, based on that it
can never pass up a good crisis.
iii. Getting a secured and more developed lifecycle
SDL (secure development lifecycle) is one of the most powerful
7. foundational to sustainable security culture. Secured developed
lifecycle is the activity and process that an organization agrees
to perform each system or software's released. Basically, it
includes things such as threat modeling and security
requirements. Secured developing lifecycle (SDL) always
answers how the security culture in an organization is. In
action, it is a sustainable security culture. Customers across
many companies are starting to demand that SDL rules must be
followed in an organization. At this juncture, if the company
doesn’t have an SDL, Microsoft has gone a step ahead in
releasing their details about the SDL free charge. The product
security office is the reasonable place for the SDL to live.
iv. Recognize and reward those people that do the right thing
for security
Security is a major factor to success in any business
environment if an individual is working hard towards making
sure that the security of data and the services in an organization
are being catered for, that particular person must be recognized.
This is based on the fact that when a person is being recognized
and thereafter rewarded, automatically the entire issue about
organization security will be limited, simply because other
employees will also take that initiative of securing their data
hoping that one day they will be rewarded too. (AlHogail, 2015)
Baring in mind that security is all about each and every person
in an organization, individuals should be encouraged so that
they can administer and deal with insecurity issue appropriately.
v. Building security advanced community
According to sustainable security culture, the security
community is its main backbone. Communities are the one that
is responsible for providing all the existing connections
between people across the entire organization. The act of
security community plays an important role in bringing
everyone together against problems that are common. By
understanding the different security level, the security level will
be achieved within an organization. In general terms, it
8. advocates sponsors and security awareness. (AlHogail,
2015)The act of security awareness is considered to be not
passionate but they just contribute to making the security better
in some way.
vi. Making security fun and engaging
For a longer period of time, people have always engaged
security programs as some of the most boring training in the
organizations. That is the reason why many employees never
want to involve themselves in any security training. But when
the security program is handling in a better way, which involves
some fun, automatically a good number of people will gain self-
interest in learning more about security programs. People
should be shown the effect of insecurity in an organization and
be thought all the tactics on how to secure all the information
and services provided by the company. (AlHogail, 2015
Significance
For any organization to be in place and rendered how successful
it is, it should have a security specialist who always keeps the
system safe, the security sector of the company must be
paramount. With the rise of the internet, emails were widely
used in many organizations all around the world. Email is
recognized as the safest mode of communication simply because
it many organizations ensure that all their email accounts are
firmly secured. Thus making email as the primary mode of
communication really helps to simplify the entire
communication process. In a situation when an employee’s
email account is breached, the specialist is the only person who
is allowed to identify the problem, and thereafter sorting it out.
(Dhillon, Syed & Pedron, 2016)
The idea of having security specialist in an organization really
helped many big companies in terms of detecting viruses before
the effects the whole systems. The specialist will set out some
programs that will secure the whole system from being corrupt.
They also play an important part in a fight with hackers who
might have bad intentions on the company's system.
9. Conclusion
Organization security must be taken into consideration because
it prevents many the loss of valuable information about an
organization. The security system in an organization is tight, no
data will be lost, and all the operation in and outside the
business will be secured. No data will be corrupted or lost.
Employees in an organization must also be responsible for
ensuring that there is no data loss or that there is no malicious
activity going on. Maximum security will stand to protect both
the employee's work and the product produced.
References
Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case
analysis of information systems and security incident
responses. International Journal of Information
Management, 35(6), 717-723.
AlHogail, A. (2015). Design and validation of information
security culture framework. Computers in Human Behavior, 49,
567-575.
Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting
information security culture: An organizational transformation
case study. computers & security, 56, 63-69.
Gupta, M., Rees, J., Chaturvedi, A., & Chi, J. (2006). Matching
information security vulnerabilities to organizational security
profiles: a genetic algorithm approach. Decision Support
Systems, 41(3), 592-603.
Tang, M., & Zhang, T. (2016). The impacts of organizational
culture on information security culture: a case
study. Information Technology and Management, 17(2), 179-
186.
Wall, D. S. (2013). Enemies within: Redefining the insider
threat in organizational security policy. Security Journal, 26(2),
11. United States Housing Price Analysis
Dataset Resource: Empirical Evidence from Housing Price in
Student Name - 199807
ANLY 502, Spring 2017
Instructor: Ali Motamedi
March 4, 2017
2
Instruction
“The United States housing bubble was a real estate
bubble affecting over half of the U.S.
states. Housing prices peaked in early 2006, started to decline
in 2006 and 2007, and reached
new lows in 2012. On December 30, 2008, the Case-Shiller
home price index reported its largest
price drop in its history. The credit crisis resulting from the
bursting of the housing bubble is—
12. according to general consensus - the primary cause of the credit
default swap bubble of the
2007–2009 recessions in the United States” (Wikipedia). At that
time, this may negatively affect
housing buyers investing options and discourage home owners.
In real world, real estate industry
reached its downturn and wasn’t able to recover for a long time.
This study is based on the historical dataset on empirical
evidence from housing price in
Boston. Even though this dataset was collected and evaluated in
1970s, it will be a good tool to
start with. Housing price can be affected by a lot of factors. As
time goes by, these factors that
drive housing price will also change due to technology,
economy, and people’s purchasing
power and consumption habits change. However, by studying
historical data using regression
model(s), it will be useful to apply in the real world. Most
importantly, it will be useful for
irrational buyers. Here is a typical example to define irrational
buyers. The reason is the same as
why people buy more at the grocery when they're hungry, the
researchers say. It's impossible for
the brain to turn off what it wants in that moment. So don't go
13. to look at swimming pools on a
hot day--chances are you'll cave. Here's a graph showing the
value of houses with swimming
pools by season: (Lutz, 2012).
3
From above graph, it is obvious that if the housing
searching happens in summer time,
housing hunters are more likely to buy houses with swimming
pools. Therefore, price of houses
with swimming pools dramatically increases in summer time.
Vice versa, in winter time, housing
price drops due to fewer buyers take swimming pools into
consideration. Given supply and
demand theory, increasing demand results in price increase
while decreasing demand results in
price decrease. Here, season is considered an irrational housing
price driven factor. Season is
changeable instead of stable or effective factor. Housing price
is driven by people’s sentiment
due to season.
14. In the dataset chosen in Empirical Evidence from Housing
Price in Boston, thirteen factors
are chosen as effective factors to apply regression model for
further analysis in theory. By the
end of this study, homeowners or homebuyers, even for
investment institutions may take this
interpretation as a useful reference.
4
Factors/ Variables (in Theory) Drive Housing Price
• Crime Rate
The major reason related to crime rate could be wealth
inequality in the United States.
Wealth inequality can be defined as the unequal distribution of
assets among residents of the
United States. Once wealth gap gets larger and larger, people in
lower class may or may not put
themselves in an unfair situation. From psychology perspective,
these group people could be a
reason for crime rate increase. People in middle or upper class
are intended to choose a safe
15. place to call it home. These group people are also a
representative of strong purchasing power.
They are more willing to spend more money to buy safety,
which drives the housing price in this
kind of community get higher. From this stand of point, crime
rate is considered a factor
affecting house price.
• Proportion of Residential Land
Starting from ancient age, human beings have been living
in groups, which enable
communication and socialization easier. Given this aspect,
urban area makes residential center
and business center separate. As economy develops, business
center is developed as well. It gets
shopping center, grocery stores, banks and even employment
center together. As a result, human
traffic is much larger than other area, especially on weekends.
However, for employees who are
busy with work during weekdays, it could be a bad idea living
in area with large human traffic.
Alternatively, living in higher proportion of residential land
may get popular among house
buyers or renters. Hence, higher proportion of residential land
16. may have positive correlation with
housing price.
5
• Proportion of Non-retail Business
Similar concept to proportion of residential land,
proportion of non-retail business is
another reason worthy to be considered as one of the factors. In
first consideration, proportion of
non-retail business may have negative correlation with housing
price. The major reason is due to
inconvenient life experience. For employees, driving a long
distance to shop for grocery won’t
be favorable.
• Landscape: Charles River
Charles River here plays an important role as a factor
related to environment. From personal
experience, I would put environment as a significant aspect in
housing searching. In the past year,
I had been living along the riverside. Even though, it was a
17. rental house, price there is placed
very high among other landlords. And facing river becomes an
outstanding selling privilege.
During the year when I lived there, life was enjoyable. Facing
and staring at computer screen all
day long, eye sight and health may be negatively affected. I
would spend half hour standing in
my balcony and enjoying beautiful river landscape. My eyes
may feel relaxed. Enjoy landscape
can be another factor having positive correlation to housing
price.
• Nitric Oxides Concentration
Nitrogen dioxide is an irritant gas, which at high concentrations
causes inflammation of the
airways. NOx mainly impacts on respiratory conditions causing
inflammation of the airways at
high levels. Long term exposure can decrease lung function,
increase the risk of respiratory
conditions and increases the response to allergens. NOx also
contributes to the formation of fine
particles (PM) and ground level ozone, both of which are
associated with adverse health effects
(2017). People nowadays are paying more and more attention to
heathy problems.
18. 6
Based on this fact of Nitric Oxides, high concentration of Nitric
Oxides may have negative
correlation to housing price.
• Number of Rooms per Dwelling
With the number of rooms increasing at home, it is
necessary for total areas to increase. It is
obvious that more room can accommodate more people. First,
from family perspective,
American family has more kids than residents in other country,
for example, Chinese family. For
kids, having their own room when they grow up may be helpful
for their future development. So
when choosing house for the entire family, number of rooms per
dwelling is important for
households. Second, from renter perspective, one-bedroom
apartment costs less than two-
bedroom apartment.
• Age of House
Age of house could be a factor which may have medium
19. correlation to housing price, which
could depend on house hunters’ taste. Some people like old
house may because old house can
tell a story or it has its own history. Some people may like new
house because it has modern
structure. People may concern that old house could not be as
strong as new house. One defensive
example could be White House, which has a history of 200
years. As a result, age of house could
be a considerable factor to be validated.
• Distance to Employment Centers
Distance to employment centers is another obvious factor
may have negative correlation to
housing price. Houses have farther distance to employment
center might make their price
relatively cheaper than houses close to employment centers.
Young people today get used to stay
up late at night instead of being morning person. It may be hard
for them to get up early in the
7
morning. If they could live close to work, they can save more
20. time in the morning for sleeping
longer. Considering people’s psychology, housing price is asked
higher.
• Access to Radial Highways
Driving at highways to work is normal life of American
people. Especially for large
company, they tend to locate their work site at large and open
area. Therefore, driving highways
is necessary. Houses that have easy access to radial highways
may price higher compared to
houses that are far away from highways.
• Property Tax Rate
Property tax rate may have direct impact on housing price.
Houses have higher tax rate tend
to have higher price while houses have lower tax rate may have
lower price.
• School
School is a factor that more depends on different groups of
people. First, for homebuyers,
their purposes are possibly because people have decided to be a
family and what’s next? It could
be education for kids. Future parents will start to think about
distances to schools. Therefore,
21. houses closer to schools may price higher than houses far away
from any schools.
• Race
Based historical data, communities where minority group
lives in may or may not have
lower price than majority group lives. In the United States,
distribution by race reveals as below:
(2016) White people are considered major group in the United
States, which is up to 61%.
8
Houses where white people groups may price highest, but it
could be higher than where black
lives.
• Status of Population
Back to first point about crime rate analyzed, status of
population is a relatively important
factor. Thinking of purchasing power, people have same or
similar purchasing power tend to live
in the same community because they can afford the housing
22. price. Reversely, houses where
people in upper classes live have higher price than houses
where people in lower class live.
• Number of Owner-occupied Homes
Last factor is about number of owner-occupied homes.
This factor will be compared to
renters. For houses which are built for rental purposes, they are
priced higher than owner-
occupied homes. On the other hand, for homes that are owner-
occupied, their purposes are
different from business purposes as rental landlords.
9
Data Analysis
To deep analyze the dataset, following steps are used to
23. generate data analysis. First, start
from correlation is the first step to prove hypothesis. Second,
use ANOVA analysis to interpret
the relationship between each variable and housing price and
also generate plots to visualize their
relationship. Third, validate linear model by generating plots
for Residual vs. Fitted, Normal Q-
Q, Scale-Location, and Residual vs. Leverage.
Above correlation table is generated in R studio and sorted
in Excel based on the dataset in
attached R codes. The above table clearly analyzes how each
variables correlates to housing
price. Combining each plots in the attached R codes with above
two-way table. Three variables
are considered to have relatively strong relationship with
housing price. They are low-status
population, number of rooms and crime rate.
10
24. • Low-status Population
From above linear regression plot, we can conclude lower-
status class has strong negative
correlation with housing price. The less lower-status class, the
higher housing price. It verifies
the assumption at the beginning. People in upper class tend to
live in the same community with
their neighbors within same social class. Bring purchasing
power theory back to here again, it
results to housing price has strong relationship with social
class.
• Number of Rooms per Dwelling
11
From above linear regression between number of rooms
and housing price, it indicates they
have relatively strong positive relationship with each other.
With number of rooms increasing,
housing price increases as well. Those outliers could be affected
by other factors, such as age of
25. house, or long distance from workplace. This plot reflects both
rentals and houses available for
sale in the market. It also shows that number of rooms around
six is most popular in the market,
and it also indicates this type of houses with six rooms may be
more common and have higher
availability. If number of rooms reaches over eight, the price
drops down. Here we can apply
supply and demand theory to explain. Demand for houses with
eight rooms can be very low in
the market. Therefore, suppliers may lower the house price to
attract more buyers.
• Crime Rate
Even though, the coefficient between crime rate and
housing price is only -0.39, from above
graph, we can still conclude crime rate may have medium
negative correlation with housing
price. With crime rate going up, housing price drops. The graph
shows area where crime rates at
zero has various housing price, which shows other factors may
have impacts on housing price as
well. For example, people who have no roommate may consider
lowest crime rate in the first
26. 12
place. Under this case, one-bedroom or two-bedroom apartment
will be the first option for this
group of people. Therefore, this could be one of the noises that
results in low coefficient between
crime rate and housing price.
27. 13
Model Validation
From first graph, we can tell residuals of majority data are
not all around y=0. Data points
369, 372 and 373 can be treated as outliers. This indicates the
dataset may not be fitted in linear
model perfectly. For the second Normal Q-Q plot, the data is in
ascending order along the
straight line. We can say the residuals are normally
standardized. For the third Scale-Location,
the line is not horizontal and data is not equally spread. For the
last Residual vs. Leverage plot,
data points 369, 372 and 373 are the only three data between 0.5
and 1. From Cook’s distance
theory, we can conclude data points 369, 372 and 373 are
influential data or noise.
14
28. Conclusion
From statistics perspective, no model could be perfect to
interpret a dataset. However,
through this study, major factors influencing housing price are
effectively interpreted. Number of
rooms, landscape, and proportion of residential land may have
positive correlation with housing
price. Proportion of low status class, crime rate, distance to
employment centers and air quality
(NO concentration) may have negative correlation with housing
price. Furthermore, these factors
can be effective factors for rational homebuyers or even renters
to take into consideration for
house searching. For homeowners, this analysis could be a good
reference in evaluating their
own property and making better decision.
29. 15
Reference
Lutz, A. (2012, July 13). Irrational Homebuyers Pay Way Too
Much Attention To The Season.
Retrieved April 15, 2017, from
http://www.businessinsider.com/irrational-consumers-pay-way-
too-much-attention-to-the-season-2012-7
Nitrogen Oxide (NOx) Pollution. (n.d.). Retrieved April 15,
2017, from http://www.icopal-
noxite.co.uk/nox-problem/nox-pollution.aspx
Population Distribution by Race/Ethnicity. (2016, November
18). Retrieved April 15, 2017, from
http://kff.org/other/state-indicator/distribution-by-
raceethnicity/?currentTimeframe=0&selectedRows=%7B%22wr
apups%22%3A%7B%22united-
states%22%3A%7B%7D%7D%7D&sortModel=%7B%22colId%
22%3A%22Location%22%2C
%22sort%22%3A%22asc%22%7D