We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

# Business Decision Making Project Essay Sample

The whole doc is available only for registered users OPEN DOC

Get Access

## Business Decision Making Project Essay Sample

Security breaches affect businesses all over the corporate America. Every day there are thousands of companies that are in threat and danger of being affected by this issue. Each business can be affected deeply by this problem. Security breaches can tarnish and blemish the image of the company and create significant tangible and intangible losses for a business. Statistical Techniques

The team used several methods to analyze the data pertaining to security breaches and ways to resolve the issues surrounding this growing issue. Statistical methods that Team C discussed to use to analyze and infer a conclusion from our data are; qualitative analysis because it deals with numbers that can be measured, quantitative analysis because it deals with numbers that can be measured, quantitative analysis that is non-measured qualities, random sampling, descriptive statistic describes and\or summarizes data, and categorical data which is data that is organized.

We analyzed the data set obtained from the combined two data sources and represent the data in various graphical formats in order to communicate the essence of a security breach events along multiple dimensions. We can used surveys to quantify our data. We can say, Allall values are rounded to the nearest integer. Table 1 shows a statistical overview of the data set during the time interval under study- the mean, median, standard deviation, 95% confidence interval around the mean, and high\low values for the frequency distribution of storage breach incidents and total records lost shipping( per month and per incident). The large standard deviation is due to two significant breach incidents that skew the variation statistics.

Conclusion
To test the hypothesis the surveys will be combined to derive the mean, mode and medium which is based on the research and studies. Team C is going to test the hypothesis. We are going to combine the surveys and find the mean, mode and medium based on our research and studies. Resolution for of our security breaches matter will be based on our data gathered. ing that include recommendation from top security firms.and finding the best way to resolve this issue from our statistical results.

References

http:// www.usatoday.com/story/tech/2014/09/24/data-breach-companies-60/16106197/ http://www.csoonline.com/article/2689346/big-data-security/survey-shows-the-cost-of-security- breaches-are-on-the-rise.html

We can write a custom essay

Order an essay

## You May Also Find These Documents Helpful

Roles and responsibilities of data users

In order to successfully gather data from the users, conducting an interview must be a good idea. Hence that may insufficient as users may not able to describe everything by themselves as the ideal meaning may not portrays only by words. So that it is better if the user can be observed while they use an interface they currently use which may portrays much information....

Data Handling - ICT

Choice of Problem When asked to think of ideas to base my ICT course work on I came up with the following; * Make over salon * Modelling agency * School health centre * Job centre * A tracing family trees agency I decided on the job centre for a number of reasons; * This idea was original; no one else in my year was...

Estate Agents - Problems of a Paper...

Introduction An estate agent based in a paper-based office comes across a lot of problems. It necessary to solve these problems and try to bring the system of the basic system and improve to be more efficient and more reliable in a working area. The firm is in an area that is equally part urban and part rural. Further more because of this area people...

Database Analysis and Database Design Project -...

Moving Images operates a DVD library. The library has a large number of titles, each title having at least one copy. Each title falls into a specific category some of these are adventure, thriller, fantasy, action or education. (There are others) All titles are loan only to registered members of Moving Images. Information is keep about the members is only personal details including name, address...

The ICT Theory

Data All the data for the new system will have to be collected together. All the names, addresses and phone numbers of all the client's contacts will need to be put together so that it will be easier to input the data to the new system. To collect the data together there will need to be a data sheet designed. One of the client members...

### Essays 57,092

300+
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
Checker
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

Sorry, but only registered users have full access

immediately?

Become a member

Thank You A Lot!

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?