Question

In: Statistics and Probability

The chief of security for the Mall of the Dakotas directed a study of theft. He...

The chief of security for the Mall of the Dakotas directed a study of theft. He selected a sample of 140 boxes that had been tampered with and ascertained that, for 60 of the boxes, the missing pants, shoes, and so on were attributed to shoplifting. For 25 boxes, employees had stolen the goods, and for the remaining 55 boxes, he blamed poor inventory control. In his report to the mall management, can he say that shoplifting is twice as likely to be the cause of the loss as compared with either employee theft or poor inventory control and that employee theft and poor inventory control are equally likely? Use the 0.02 significance level.

H0: The proportions are as stated.      H1: The proportions are not as stated.

State the decision rule using 0.02 significance level. (Round your answer to 3 decimal places.)

Compute the value of chi-square. (Round your answer to 3 decimal places.)

What is your decision regarding H0?

Solutions

Expert Solution

Answer: The chief of security for the Mall of the Dakotas directed a study of theft. He selected a sample of 140 boxes that had been tampered with and ascertained that, for 60 of the boxes, the missing pants, shoes, and so on were attributed to shoplifting. For 25 boxes, employees had stolen the goods, and for the remaining 55 boxes, he blamed poor inventory control.

Solution:

In his report to the mall management, can he say that shoplifting is twice as likely to be the cause of the loss as compared with either employee theft or poor inventory control and that employee theft and poor inventory control are equally likely?

The hypothesis test:

H0: The proportions are as stated.

p1 = 0.50, p2 = 0.25, P3 = 0.25

H1: The proportions are not as stated.

Atleast one proportion are not as stated.

Test statistic χ2 = (observed value - expected value)^2 / expected value

Observed (O) Expected (E) (O-E)^2/E
60 70 1.4286
25 35 2.8571
55 35 0.0000
Total 140 140 4.2857

Test statistic χ2 = 4.286

Critical value of χ2:

df = (k-1) = 3-1 = 2

Critical value of χ2 = 9.210

Since, test statistic χ2 (4.286) < χ2 critical (9.210)

Do not reject the null hypothesis Ho.

Decision:

Do not reject Ho. There is sufficient evidence to support the claim that shoplifting is twice as likely to be the cause of the loss as compared with either employee theft or poor inventory control and that employee theft and poor inventory control are equally likely at 0.02 significance level.


Related Solutions

The chief of security for the Mall of the Dakotas directed a study of theft. He...
The chief of security for the Mall of the Dakotas directed a study of theft. He selected a sample of 160 boxes that had been tampered with and ascertained that, for 90 of the boxes, the missing pants, shoes, and so on were attributed to shoplifting. For 20 boxes, employees had stolen the goods, and for the remaining 50 boxes, he blamed poor inventory control. In his report to the mall management, can he say that shoplifting is twice as...
The chief of security for the Mall of the Dakotas directed a study of theft. He...
The chief of security for the Mall of the Dakotas directed a study of theft. He selected a sample of 160 boxes that had been tampered with and ascertained that, for 65 of the boxes, the missing pants, shoes, and so on were attributed to shoplifting. For 35 boxes, employees had stolen the goods, and for the remaining 60 boxes, he blamed poor inventory control. In his report to the mall management, can he say that shoplifting is twice as...
Mall security estimates that the average daily per-store theft is less than $250, but wants to...
Mall security estimates that the average daily per-store theft is less than $250, but wants to determine the accuracy of this statistic. The company researcher takes a sample of 81 clerks and finds that =$252 and s = $10. a) Test at α = .1 b) Construct a 90% CIE of μ 2) A company that manufactures batteries is interested in constructing a two-sided 95% confidence interval for the population mean. They sampled 121 batteries and found that the sample...
You are the chief fiscal officer for a municipality and have been directed by the mayor's...
You are the chief fiscal officer for a municipality and have been directed by the mayor's office to lead government of a writing debt policy statement. You are aware of the risks borrowings money and the grave importance of strong internal control. what must be include in this policy if it is to be effective?
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset he is that they found Telnet in use by their network administrators. The reason was that the version of the router and switch operating system currently in use does not support security protocols. You assure the CISO that the upgrade will resolve that problem among other weaknesses he might be unaware of. you will act as the network administrator. Suggest some other network security...
A researcher tests whether job security and life satisfaction are related. In this study, he observes...
A researcher tests whether job security and life satisfaction are related. In this study, he observes the following frequencies. If he computes a test for independence at a .05 level of significance, then what is the decision for this test? Life Satisfaction Yes No Job Security Yes 14 10 No 12 9 21. What were the total number of participants? 22. What is the null hypothesis? 23. What is the research hypothesis? 24. What is the chi-square value? 25. What...
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
ohn Powell, chief of airport security at a large Canadian airport, is responsible for scheduling security...
ohn Powell, chief of airport security at a large Canadian airport, is responsible for scheduling security agents around the clock. Powell has divided the day into six 4-hour periods: midnight to 4:00 A.M., 4:00 A.M. to 8:00 A.M., etc. Security agents work 8-hour shifts. Passenger traffic in the airport is determined by domestic and international flight schedules, and Powell has decided that the minimum number of security agents that he needs on duty during the different 4-hour shifts is as...
Suppose that Kevin is a 10 years old boy. He is at the mall with his...
Suppose that Kevin is a 10 years old boy. He is at the mall with his mom, and she gives him some money to get food from the food court. At the food court there is a hamburger place, and an ice cream shop. In the following table, I will show you Kevin's Total Utility for each quantity of Hamburgers and ice cream. Hamburgers ($2) Ice Cream ($1) Quantity Total Utility Marginal Utility MU/P Quantity Total Utility Marginal Utility MU/P...
Do any types of security actions regarding employee theft infringe on an employee's right to privacy?
Do any types of security actions regarding employee theft infringe on an employee's right to privacy?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT