Recent orders

Case Study

Case Study:

Southwestern University: F The recent success of Southwestern University’s football program is causing SWU’s president, Joel Wisner, more problems than he faced during the team’s losing era in the early 1990s. For one thing, increasing game-day attendance is squeezing the town of Stephenville, Texas and the campus. Complaints are arising over parking, seating, concession prices, and even a shortage of programs at some games. Dr. Wisner, once again, turns to his stadium manager, Hank Maddux. This time, he needs a guaranteed revenue stream to help fuel the stadium expansion. One source of income could easily be the high-profit game programs. Selling for $6 each, programs are a tricky business. Under substantial pressure from Wisner, Maddux knows he has to ensure that costs are held to a minimum and contribution to the new expansion maximized. As a result, Maddux wants the programs for each game to be purchased economically. His inquiries have yielded two options. A local Stephenville printer, Sam Taylor of Quality Printing, has offered the following discount schedule for the programs and game inserts: Programs Weekly Game Detail Inserts 10,000 to 30,000 $2.00 each 10,000 to 30,000 $1.00 30,000 to 60,000 $1.90 each 30,000 to 60,000 $0.95 60,000 to 250,000 $1.80 each 60,000 to 250,000 $0.90 250,000 and up $1.50 each 250,000 and up $0.85 As a second option, however, First Printing, owned by Michael Shader, an S.W.U. alumnus in Ft. Worth, will do the job for 10% less as a favor to help the athletic department. This option will mean sending a truck to Ft. Worth to pick up each order. Maddux estimates that the cost of each trip to Ft. Worth will be $250. Maddux’s other major problem is he is never sure what the demand for programs will be. Sales vary from opponent to opponent and how well the team is doing that year. However, he does know that running out is a very bad idea. This football team is not only expected to make money for SWU, but it is also entertainment. This means programs for all who want them. With the new facility, attendance could be 60,000 for each of the five home games. And two of every three people buy a program. In addition to the programs, Maddux must purchase the inserts for each game. The inserts have information about the opposing team, photos of the expected starters, and recent game statistics. The purchasing issue is the same for inserts, except inserts will be purchased separately for each game and are a total loss after the game. The carrying cost, because inserts are to be delivered just as they are needed, should be nominal; he estimates 5%. The other costs and the same discount schedule apply, but the inserts only cost half as much because they are much smaller. First Printing will give the same 10% discount on the inserts. Givens: Annual demand is 300,000 (60,000 per game times 5 games) Set-up cost for programs is $1,000.00 Holding cost is 40%

DISCUSSION QUESTIONS 1. With whom should Maddux place the order for the programs, and how many should he order each time? 2. With whom should Maddux place the order for the inserts, and how many should he order each time? 3. What is Maddux’s total cost for programs with inserts for the season? 4. What other program management opportunities might Maddux pursue?

Solution:

1. With whom should Maddux place the order for the programs and how many should he order each time?

Answer:

D = 60000 * 5 * 2/3= 200000

H = 0.5 * unit price

S quality printing = 100

S first printing = 100 + .9*(200) = 280

For quality printing

Q = √2DS / IP

Q1 = √2(200000)(100) / 0.5*5 = 4000

Q 2 = √2(200000)(100) / 0.5*1.80 = 6667

Q3 = √2(200000)(100) / 0.5*1.70 = 6860

Q4 = √2(200000)(100) / 0.5*1.60 = 7071

Q4 = √2(200000)(100) / 0.5*1.40 = 7559

Q1 = 6928

Q2 = 11547

Q3 = 30000

Q4 = 60000

Q5 = 250000

Annual Product cost = Demand * unit price

Annual order cost = Demand* setup cost/order quantity

Annual holding cost = Order quantity * holding cost / 2

Number Unit Price Order quantity Annual Product cost Annual order cost Annual holding cost Total

1 5.00 4000 1000000 5000 5000 5000

2 1.80 10000 360000 2000 4500 366500

3 1.70 30000 340000 666.67 12750 353416.67

4 1.60 60000 320000 333.33 24000 344333.33

5 1.40 250000 280000 80 875000 367580

Order quantity of 60000 will minimize total cost to 344333.33

For first printing, Q = √2(200000)(280) / 0.5*5 = 6693

Total cost = Setup cost + holding cost + product cost

= 200000/6693 * 280 + 6693 / 2 * (0.5*5.00) + 6693*5

= 50198.20

So the order for the programs should be placed at quality printing as ordering quantity of 60000 each time

2. With whom should Maddux place the order for the inserts and how many should he order each time?

D = 60000

H = 0.5 * unit price

S quality printing = .5*100 = 50

S first printing = 0.5(100 + .9(200)) = 140

For quality printing

Q = √2DS / IP

Q1 = √2(60000)(50) / 0.5*2.5 = 12649

Q 2 = √2(60000)(50) / 0.5*.90 = 21082

Q3 = √2(60000)(500) / 0.5*.85 = 21693

Q4 = √2(60000)(50) / 0.5*.80 = 22361

Q4 = √2(60000)(50) / 0.5*.70 = 23905

Q1 = 6928

Q2 = 11547

Q3 = 30000

Q4 = 60000

Q5 = 250000

Annual Product cost = Demand * unit price

Annual order cost = Demand* setup cost/order quantity

Annual holding cost = Order quantity * holding cost / 2

Number Unit Price Order quantity Annual Product cost Annual order cost Annual holding cost Total

1 2.50 6928 150000 433.03 433 150866.03

2 0.90 11547 54000 259.81 259.81 54519.62

3 0.85 30000 51000 100 637.50 51737.50

4 0.80 60000 48000 50.00 1200.00 49250

5 0.70 250000 42000 12.00 4357 46387

Order quantity of 250000 will minimize total cost to 46387

For first printing, Q = √2(60000)(140) / 0.5*2.50 = 11593

Total cost = Setup cost + holding cost + product cost

= 60000/11593 * 140 + 11593 / 2 * (.05*2.50) + (11593 * 2.50)

= 30431.64

3.What is Maddux’s total cost for programs with inserts for the season?

The total cost for the program for the inserts for this season will be about $ 374764.97

4. What other program management opportunities might Maddux pursue?

Answer:

Maddux focuses on purchasing the game economically with a strong focus on quality printing, there are different program that maddux can pursue different programs, 10000 to 30000, 30000 to 60000, withna strong focus on first printing, Maddux. Muddux has high carrying cost because he lacks a good place to store the programs. He can’t put them in the office, or store them down in the maintenance department, where they may get dirty and damaged. So, the compnay needs to focus on reducing the carrying cost so as to have profits. Maddux needs to focus on inserts as well for the programs, so as to increase its revenue and sales.

Addressing the Increase in the number and Types of Computer Crimes

Addressing the Increase in the number and Types of Computer Crimes

THESIS: Laws must be passed to address the increase in the number and types of computer crimes.

Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today’s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office.

People commit computer crimes because of society’s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today’s non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be “between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.”(Shannon, 16:2)

“It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ‘normal’ individuals, but that is not the case.”(Sharp, 18:3) It is believed that the computer criminal “often marches to the same drum as the potential victim but follows and unanticipated path.”(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall.

Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. “When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.”(2600: Summer 92,p.13)

Some new terms have been added to the computer criminal vocabulary. “Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn’t have to physically present himself or herself.” (Phrack 12,p.43) Another form of a hidden code is “salamis.” It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44)

Congress has been reacting to the outbreak of computer crimes. “The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes.”(Markoff, B

13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information.

This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems.

“Computer crime often requires more sophistications than people realize it.”(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. “It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion.” (Blumenthal, B 1:2)

All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is “only as big as the Gulf of Mexico or as huge as the North Atlantic.” (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, “nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier.” (Carley, A 1:1)

A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. “My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights.” (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson’s computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. “I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson’s game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them.”(Steve Jackson Interview)

Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain.

“A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account.”(2600: Spring 93, p.19) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ‘Butch Cassidys’ of the electronic age. “These true tales of computer capers are far from being futuristic fantasies.”(2600: Spring 93:p.19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more.

“With the average damage from a computer crime amounting to about $.5 million, sophisticated computer crimes can rock the industry.”(Phrack 25,p.6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack 23,p.46)

Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the resident’s names and credit information to apply for 24 Mastercards and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn’t prove that he was the one who did the other ones so he was put on probation. “I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren’t for my computer my life would be nothing like it is today.”(Interview w/Raven)

“Finally, one of the thefts involving the computer is the theft of computer time. Most of us don’t realize this as a crime, but the congress consider this as a crime.”(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most colleges’ computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper.

In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss.

“While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems.”(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class actionsuits.

CONCLUSION

Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes. Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be devised.

However, computers don’t commit crimes; people do. The perpetrator’s best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.

BIBLIOGRAPHY

Alexander, Charles, “Crackdown on Computer Capers,” Time, Feb. 8, 1982, V119.

Ball, Leslie D., “Computer Crime,” Technology Review, April 1982, V85.

Blumenthal,R. “Going Undercover in the Computer Underworld”. New York Times, Jan. 26,

1993, B, 1:2.

Carley, W. “As Computers Flip, People Lose Grip in Saga of Sabatoge at Printing Firm”. Wall

Street Journal, Aug. 27, 1992, A, 1:1.

Carley, W. “In-House Hackers: Rigging Computers for Fraud or Malice Is Often an Inside Job”.

Wall Street Journal, Aug 27, 1992, A, 7:5.

Markoff, J. “Hackers Indicted on Spy Charges”. New York Times, Dec. 8, 1992, B, 13:1.

Finn, Nancy and Peter, “Don’t Rely on the Law to Stop Computer Crime,” Computer World,

Dec. 19, 1984, V18.

Phrack Magazine issues 1-46. Compiled by Knight Lightning and Phiber Optik.

Shannon, L R. “THe Happy Hacker”. New York Times, Mar. 21, 1993, 7, 16:2.

Sharp, B. “The Hacker Crackdown”. New York Times, Dec. 20, 1992, 7, 18:3.

Sullivan, D. “U.S. Charges Young Hackers”. New York Times, Nov. 15, 1992, 1, 40:4. 2600: The Hacker Quarterly. Issues summer 92-Spring 93. Compiled by Emmanuel G

Case Study Transforming Data into Information

Case Study: Transforming Data into Information

Institution

Name

Date

Case Study: Transforming Data into Information

This case study focused on producing a report to demonstrate the ability to analyze data both graphically and numerically. The case study was based on the data obtained from the Regional Call Center’s Washington, DC. Regional is a company that provides contract call center services to various companies in the US, including major retail organizations, and banks, among others. As the company’s supervisor and having worked with the company for seven years, I was required to prepare a report describing the calls that the company handled for one of the Regional’s clients. Thus, I was provided with a data file consisting of 57 calls and with the following variables: account number, past due amount, current account balance, and nature of the call.

Therefore, to produce the report, the data were analyzed both graphically and numerically using Excel. For instance, to investigate whether there was a difference in the mean and median current account balance, a bar chart was produced (Figure 1). The results showed that the average current account balance was greater than the median current account balance. Since the mean was greater than the median, then the distribution of the current account balance was positively skewed (Stephanie, 2022). This implies most of the current account balances were equal to or greater than the mean.

Figure 1. Bar chart of the mean and median current balance

In addition, to understand the relationship between current account balance and past due amount, a scatter plot was used (Figure 2). A scatter plot helps a researcher to understand the direction and strength of the linear relationship between variables (“What is a scatter plot and when to use one,” 2020). The scatter plot showed a weak positive linear relationship between current balance and past due. This implies that when the current account balance increases, the past due amount also increases. Conversely, when the current account balances decrease, the past due amount also decreases.

Figure 2. Scatter plot of current balance vs. past due

Moreover, descriptive statistics were computed to further describe the current account balance and past due amount (Table 1). Descriptive statistics are useful in research because they help in describing the fundamental characteristics of the data (Trochim, n.d.). In addition, when combined with simple graphics, they help in gaining insights into the data. Based on the results, the highest current amount due was 323.78. On the other hand, the lowest current amount due was -129.67. The average current amount due was 62.70, while the median was 57.54. Since the mean was slightly greater than the median, then the current amount due data was skewed to the right (positive skewness). The standard deviation was 75.58, which is very large. This implies that there was high variability in the data. This high variance is a good factor that can attract aggressive investors, who are less risk averse. However, the high variance could discourage conservative investors who have less risk tolerance (“Is variance good or bad for stock investors?” 2015). In fact, the coefficient of variation was 1.21, which further supports that the variance was extremely high to attract investors.

For the past due amount, descriptive results showed that the minimum was zero, while the maximum was 386.77. This indicates the highest amount required to make the bank account current again. The results also revealed that the average past due amount was 23.95 and a median value of zero. This implies that the past due amount of data was skewed to the right (positive skewness). The standard deviation was 61.67, which was very high. This high variability could discourage conservative investors with less risk tolerance.

Table 1: Descriptive Statistics (Current Amount Due and Past Due Amount)

Current Amount Due   Past Due Amount  

Mean 62.6982456 Mean 23.9464912

Standard Error 10.010904 Standard Error 8.16830585

Median 57.54 Median 0

Mode 0 Mode 0

Standard Deviation 75.5806676 Standard Deviation 61.6693568

Sample Variance 5712.43732 Sample Variance 3803.10957

Kurtosis 1.99588201 Kurtosis 22.0569587

Skewness 0.56451104 Skewness 4.29303586

Range 453.45 Range 386.77

Minimum -129.67 Minimum 0

Maximum 323.78 Maximum 386.77

Sum 3573.8 Sum 1364.95

Count 57 Count 57

The descriptive statistics for the past due balances were also computed (Table 2). The variable was derived as the difference between the current account amount and the past due amount. The descriptive statistics showed that the maximum past-due balance was 323.78. The maximum value indicates that the past due balance was 323.78 above the current due balance. On the other hand, the minimum past-due balance was -386.77. The minimum value indicates that the worst account was 386.77 below the current balance. The average past-due balance was 38.75. This implies that on average, the bank was above the current balance by 38.75. However, the standard deviation was 86.86, which was very high. This implies that the past-due balance was very unreliable for investors.

Table 2: Descriptive Statistics (Past Due Balance)

 Past due balance

Mean 38.7517544

Standard Error 11.504976

Median 50.79

Mode 0

Standard Deviation 86.8606639

Sample Variance 7544.77493

Kurtosis 11.3810395

Skewness -1.6611254

Range 710.55

Minimum -386.77

Maximum 323.78

Sum 2208.85

Count 57

In conclusion, the results revealed that the average current account amount was higher than the median. This implies most of the bank’s accounts had a current amount equal to or above the mean. However, descriptive statistics indicated that the current amount due had high variance, indicating that there was high variability in the current amount balance for the 57 calls. Regarding the past due amount, the results revealed that the amount was 386.77 above the current amount due. In addition, the mean was higher than the median, indicating that the distribution of past due amounts was positively skewed. This further implies that, on average, the past due amount for most of the calls was greater or equal to the mean. However, the standard deviation in past due amounts indicates that the company was unreliable for investment, especially those that are less risk tolerant. This case study also analyzed the past due balance using descriptive statistics. The results showed that the worst account was 386.77 below the current balance. In addition, there was high variability in the past due balance indicating that the 57 calls were generally unreliable for less-risk tolerance investors.

Moreover, this study investigated the relationship between the past amount due and the current amount due. The results showed a weak and positive linear relationship between the variables. This implies that when the current amount due increases, the past due amount also increases. Conversely, when the current amount due decreases, the past due amount also decreases. Thus, for the company to reduce the past due amount, it should encourage investors to increase the current amount due. In addition, the company should focus on investors who are aggressive investors, who are less risk averse.

References

Stephanie. (2022, January 13). Pearson mode skewness. Retrieved from https://www.statisticshowto.com/pearson-mode-skewness/What is a scatter plot and when to use one. (2020, July 10). Retrieved from https://visme.co/blog/scatter-plot/Trochim, W. M. (n.d.). Descriptive statistics. Retrieved from https://conjointly.com/kb/descriptive-statistics/

Is variance good or bad for stock investors? (2015, April 14). Retrieved from https://www.investopedia.com/ask/answers/041415/variance-good-or-bad-stock-investors.asp