| Rates of Return 1926-2013 | ||||||||
| World Portfolios | US Markets | |||||||
| Year | World Equity Return in US Dollars | World Bond Return in US Dollars | Small Stocks | Large Stock | Long-Term T-Bonds | T-Bills | Inflation | Real T-bill Rates |
| 1926 | 25.24 | 8.10 | -8.91 | 12.21 | 4.54 | 3.19 | -1.12 | 4.36 |
| 1927 | 23.15 | 9.62 | 33.99 | 35.99 | 8.11 | 3.12 | -2.26 | 5.50 |
| 1928 | 28.62 | 2.44 | 51.46 | 39.29 | -0.93 | 3.56 | -1.16 | 4.77 |
| 1929 | -12.56 | 3.45 | -49.25 | -7.66 | 4.41 | 4.75 | 0.59 | 4.14 |
| 1930 | -22.6 | 6.04 | -48.04 | -25.90 | 6.22 | 2.41 | -6.40 | 9.41 |
| 1931 | -39.94 | -12.32 | -53.19 | -45.56 | -5.31 | 1.07 | -9.32 | 11.45 |
| 1932 | 1.46 | 18.26 | 7.75 | -9.14 | 11.89 | 0.96 | -10.27 | 12.52 |
| 1933 | 70.81 | 29.26 | 159.05 | 54.56 | 1.03 | 0.3 | 0.76 | -0.46 |
| 1934 | 0.15 | 3.87 | 28.47 | -2.32 | 10.15 | 0.16 | 1.52 | -1.33 |
| 1935 | 22.44 | -1.41 | 68.82 | 45.67 | 4.98 | 0.17 | 2.99 | -2.73 |
| 1936 | 18.84 | -0.49 | 77.53 | 33.55 | 6.52 | 0.18 | 1.45 | -1.25 |
| 1937 | -17.7 | -0.96 | -54.27 | -36.03 | 0.43 | 0.31 | 2.86 | -2.48 |
| 1938 | 6.21 | 0.65 | 16.6 | 29.42 | 5.25 | -0.02 | -2.78 | 2.84 |
| 1939 | -5.6 | -5.11 | -6.28 | -1.06 | 5.90 | 0.02 | 0.00 | 0.02 |
| 1940 | 7.97 | 11.32 | -15.26 | -9.65 | 6.54 | 0 | 0.71 | -0.71 |
| 1941 | 13.26 | 5.61 | -12.66 | -11.20 | 0.99 | 0.06 | 9.93 | -8.98 |
| 1942 | -0.56 | -3.69 | 38.94 | 20.80 | 5.39 | 0.27 | 9.03 | -8.04 |
| 1943 | 19.3 | 2.76 | 109.87 | 26.54 | 4.87 | 0.35 | 2.96 | -2.53 |
| 1944 | 13.49 | 3.02 | 60.34 | 20.96 | 3.59 | 0.33 | 2.30 | -1.92 |
| 1945 | 13.72 | 0.08 | 77.93 | 36.11 | 6.84 | 0.33 | 2.25 | -1.87 |
| 1946 | -16.91 | -13.50 | -13.16 | -9.26 | 0.15 | 0.35 | 18.13 | -15.05 |
| 1947 | -1.09 | -8.46 | -1.52 | 4.88 | -1.19 | 0.5 | 8.88 | -7.70 |
| 1948 | 3.06 | 5.59 | -5.84 | 5.29 | 3.07 | 0.81 | 2.73 | -1.87 |
| 1949 | 17.35 | 1.83 | 21.22 | 18.24 | 6.03 | 1.1 | -1.83 | 2.98 |
| 1950 | 24.44 | 2.52 | 46.86 | 32.68 | -0.96 | 1.2 | 5.80 | -4.35 |
| 1951 | 28.69 | 0.60 | 6.66 | 23.47 | -1.95 | 1.49 | 5.97 | -4.22 |
| 1952 | 14.21 | 4.73 | 5.05 | 18.91 | 1.93 | 1.66 | 0.91 | 0.75 |
| 1953 | 5.37 | 3.74 | -5.59 | -1.74 | 3.83 | 1.82 | 0.60 | 1.21 |
| 1954 | 48.2 | 7.66 | 63.49 | 52.55 | 4.88 | 0.86 | -0.37 | 1.24 |
| 1955 | 22.94 | 0.20 | 24.61 | 31.44 | -1.34 | 1.57 | 0.37 | 1.19 |
| 1956 | 8.62 | -4.28 | 4.31 | 6.45 | -5.12 | 2.46 | 2.83 | -0.36 |
| 1957 | -6.86 | 2.97 | -13.99 | -11.14 | 9.46 | 3.14 | 3.04 | 0.10 |
| 1958 | 36.78 | -0.42 | 65.46 | 43.78 | -3.71 | 1.54 | 1.76 | -0.21 |
| 1959 | 24.96 | 0.47 | 21.83 | 12.95 | -3.55 | 2.95 | 1.52 | 1.41 |
| 1960 | 7.71 | 10.46 | -4.72 | 0.19 | 13.78 | 2.66 | 1.36 | 1.28 |
| 1961 | 19.86 | 1.99 | 29.48 | 27.63 | 0.19 | 2.13 | 0.67 | 1.45 |
| 1962 | -7.2 | 9.59 | -11.56 | -8.79 | 6.81 | 2.73 | 1.23 | 1.48 |
| 1963 | 14.35 | 2.76 | 18.45 | 22.63 | -0.49 | 3.12 | 1.65 | 1.45 |
| 1964 | 11.05 | 3.20 | 19.07 | 16.67 | 4.51 | 3.54 | 1.20 | 2.31 |
| 1965 | 10.49 | 2.84 | 39.2 | 12.50 | -0.27 | 3.93 | 1.92 | 1.97 |
| 1966 | -6.47 | 5.36 | -6.94 | -10.25 | 3.70 | 4.76 | 3.36 | 1.36 |
| 1967 | 23.75 | -3.28 | 104.33 | 24.11 | -7.41 | 4.21 | 3.28 | 0.90 |
| 1968 | 19.92 | 2.11 | 50.43 | 11.00 | -1.20 | 5.21 | 4.71 | 0.48 |
| 1969 | -6.21 | -2.35 | -31.43 | -8.33 | -6.52 | 6.58 | 5.90 | 0.64 |
| 1970 | -5.71 | 9.76 | -17.88 | 4.10 | 12.69 | 6.52 | 5.57 | 0.90 |
| 1971 | 15.59 | 15.01 | 18.07 | 14.17 | 17.47 | 4.39 | 3.27 | 1.09 |
| 1972 | 19.96 | 7.90 | 0.14 | 19.14 | 5.55 | 3.84 | 3.41 | 0.42 |
| 1973 | -17.08 | 4.39 | -38.23 | -14.75 | 1.40 | 6.93 | 8.94 | -1.85 |
| 1974 | -27.83 | 5.08 | -27.39 | -26.40 | 5.53 | 8 | 12.10 | -3.65 |
| 1975 | 28.91 | 7.44 | 59.79 | 37.26 | 8.50 | 5.8 | 7.13 | -1.24 |
| 1976 | 10.31 | 11.26 | 49.06 | 23.98 | 11.07 | 5.08 | 5.04 | 0.04 |
| 1977 | -2.46 | 16.04 | 27.6 | -7.26 | 0.90 | 5.12 | 6.68 | -1.46 |
| 1978 | 12.68 | 13.56 | 24.92 | 6.50 | -4.16 | 7.18 | 8.99 | -1.66 |
| 1979 | 7.21 | 0.41 | 42.25 | 18.77 | 9.02 | 10.38 | 13.26 | -2.54 |
| 1980 | 21.46 | 2.84 | 40.19 | 32.48 | 13.17 | 11.24 | 12.35 | -0.99 |
| 1981 | -7.92 | -3.78 | -1.69 | -4.98 | 3.61 | 14.71 | 8.91 | 5.32 |
| 1982 | 5.82 | 21.95 | 27.9 | 22.09 | 6.52 | 10.54 | 3.83 | 6.47 |
| 1983 | 18.56 | 1.73 | 34.44 | 22.37 | -0.53 | 8.8 | 3.79 | 4.83 |
| 1984 | 1.77 | 7.50 | -10.57 | 6.46 | 15.29 | 9.85 | 4.04 | 5.58 |
| 1985 | 37.02 | 34.12 | 29.19 | 32.00 | 32.68 | 7.72 | 3.79 | 3.79 |
| 1986 | 39.11 | 30.56 | 3.7 | 18.40 | 23.96 | 6.16 | 1.19 | 4.91 |
| 1987 | 14.34 | 18.86 | -14.15 | 5.34 | -2.65 | 5.47 | 4.33 | 1.09 |
| 1988 | 21.19 | 4.32 | 18.73 | 16.86 | 8.40 | 6.35 | 4.41 | 1.86 |
| 1989 | 14.75 | 6.70 | 9.13 | 31.34 | 19.49 | 8.37 | 4.64 | 3.56 |
| 1990 | -18.65 | 12.70 | -27.28 | -3.20 | 7.13 | 7.81 | 6.26 | 1.46 |
| 1991 | 16.00 | 15.35 | 49.08 | 30.66 | 18.39 | 5.6 | 2.98 | 2.54 |
| 1992 | -7.14 | 6.30 | 21.17 | 7.71 | 7.79 | 3.51 | 2.97 | 0.53 |
| 1993 | 20.39 | 10.42 | 19.12 | 9.87 | 15.48 | 2.9 | 2.81 | 0.09 |
| 1994 | 3.36 | 1.56 | -5.64 | 0.41 | -7.18 | 3.9 | 2.60 | 1.27 |
| 1995 | 21.11 | 20.18 | 34.2 | 38.05 | 31.67 | 5.6 | 2.53 | 2.99 |
| 1996 | 14.02 | 5.11 | 16.56 | 22.50 | -0.81 | 5.21 | 3.38 | 1.77 |
| 1997 | 16.32 | 1.92 | 23.62 | 33.46 | 15.08 | 5.26 | 1.70 | 3.50 |
| 1998 | 24.77 | 13.76 | -7.48 | 28.70 | 13.52 | 4.86 | 1.61 | 3.20 |
| 1999 | 25.33 | -6.46 | 40.59 | 20.38 | -8.74 | 4.68 | 2.68 | 1.95 |
| 2000 | -12.72 | 2.58 | -6.33 | -9.74 | 20.27 | 5.89 | 3.44 | 2.37 |
| 2001 | -16.34 | -2.19 | 29.26 | -11.76 | 4.21 | 3.83 | 1.60 | 2.19 |
| 2002 | -19.28 | 23.41 | -12.04 | -21.58 | 16.79 | 1.65 | 2.48 | -0.81 |
| 2003 | 33.32 | 13.27 | 75.4 | 28.18 | 2.38 | 1.02 | 2.04 | -0.99 |
| 2004 | 15.27 | 8.27 | 14.59 | 10.69 | 7.71 | 1.2 | 3.34 | -2.07 |
| 2005 | 9.97 | -4.20 | 3.22 | 4.83 | 6.50 | 2.98 | 3.34 | -0.35 |
| 2006 | 20.57 | 3.50 | 17.31 | 15.84 | -1.21 | 4.8 | 2.52 | 2.22 |
| 2007 | 9.72 | 15.83 | -8.17 | 5.14 | 10.25 | 4.66 | 4.11 | 0.53 |
| 2008 | -39.48 | 2.55 | -39.91 | -36.79 | 1.34 | 1.6 | -0.02 | 1.62 |
| 2009 | 30.16 | 7.46 | 36.38 | 26.34 | -12.92 | 0.1 | 2.82 | -2.64 |
| 2010 | 12.17 | 5.18 | 29.67 | 15.05 | 9.38 | 0.12 | 1.42 | -1.28 |
| 2011 | -4.77 | 10.65 | -12.17 | 1.90 | 14.0 | 0.04 | 3.02 | -2.89 |
| 2012 | 16.48 | 6.95 | 16.84 | 15.99 | 7.3 | 0.06 | 1.77 | -1.68 |
| 2013 | 27.10 | -4.84 | 46.9 | 32.31 | -9.3 | 0.02 | 1.51 | -1.47 |
| Average | Since 1956 | 4.81 | 3.84 | 0.94 | ||||
| 1926-2013 | 9.86 | 5.70 | 17.48 | 11.88 | 5.37 | 3.54 | 3.05 | 0.59 |
| 1926-1955 | 10.40 | 2.85 | 20.82 | 12.77 | 3.53 | 1.10 | 1.51 | -0.10 |
| 1956-1985 | 8.97 | 6.22 | 18.06 | 10.84 | 4.96 | 5.84 | 4.85 | 0.98 |
| 1986-2013 | 10.25 | 8.20 | 13.30 | 12.03 | 7.79 | 3.70 | 2.77 | 0.91 |
1. Calculate the excess returns during the period of study
2. Calculate the average excess return, standard deviation, Skewness and kurtosis using the excel functions
3. Calculate the 5% Value at Risk (VaR) assuming
a) distribution is normal
b) distribution is not normal
c) comment on your findings
In: Finance
In September 2002, the Financial Accounting Standards Board (FASB) of the United States published a discussion paper seeking views on whether U.S. standard setting should move from a principle based approach toward a principle based approach as sometimes associated with the International Accounting Standards Board (IASB). That paper was partly in response to the SarbanesOxley Act, which was itself a response to such accounting scandals as Enron and WorldCom. Schipper (2003) points out that the U.S. rules are often based on principles. That is, the standard setters use principles in order to produce the rules for the preparers of financial statements. Nelson (2003, 91) agrees, and suggests that a particular standard should rather be seen as more or less rules-based. He suggests that rules can increase the accuracy with which standard setters communicate their requirements and can reduce the sort of imprecision that leads to aggressive reporting choices by management. However, he notes that rules can also lead to excessive complexity and to the structuring of transactions. One of the reasons why standards on several topics need to contain rules is that the standards are inconsistent with the conceptual frameworks of the standard setters. For several topics, the use of the appropriate principle could lead to clearer communication and to more precision without the need for the current rules. That is, before asking how rules-based a particular standard should be, we should ask whether the standard is based on the most appropriate principle. I identify six topics on which the accounting standards have detailed technical rules. In each case, I suggest that part of the need for rules is caused by a lack of principle or by the use of an inappropriate principle (i.e., one that does not fit with higher-level principles). The lack of clear and appropriate principles can also lead to optional accounting methods in standards because no one policy is obviously the correct one; this leads to lack of comparability. I do not suggest that the use of appropriate principles would lead inexorably to standards with no optional methods but that, on some topics, optional methods could be eliminated. The six topics are examined one by one. In each case, I attempt to locate the principles being used, to assess the appropriateness of the principles, and then to identify any arbitrary rules or optional methods that result from the absence of appropriate principles. I start with the IASB’s standards (hereafter, IFRSs), with frequent comparison with U.S. GAAP. One reason for examining
IFRSs in particular is that they are required for the financial reporting of listed companies throughout much of the world in 2005 onward,1 and the FASB has announced plans for convergence of its standards with IFRSs.2 The final section of the paper draws conclusions about how accounting might be improved by substituting principles (or better principles) for the existing requirements. PRIOR LITERATURE AND PURPOSE OF THIS PAPER Alexander (1999) investigates the nature of principles and rules in an accounting context. Below, I use the word ìprinciplesî to include Alexanderís type A overall criteria (e.g., fair presentation, the definitions of elements of accounting and, in particular, the primacy of the asset and liability definitions) and his type B conventions (e.g., prudence). Such principles are contained in the standard settersí conceptual frameworks. I contrast this to ìrulesî which are Alexanderís type C rules (e.g., the requirement to measure inventories at the lower of cost and market). My definition of ìrulesî includes Nelsonís (2003, 91) ìspecific criteria, ëbright lineí thresholds, examples, scope restrictions, exceptions, subsequent precedents, implementation guidance, etc.î The use of the terms ìprinciplesî and ìrulesî seems broadly consistent among Alexander (1999), Nelson (2003), Schipper (2003), and me. My purpose is not to investigate why the U.S. system tends toward the writing of rules (whether based on principles or not). Identifying the roles played by the existence since the 1930s of the Securities and Exchange Commission (SEC) as an enforcement agency and the perceived need of auditors to protect themselves from litigation by encouraging the setting of clear and detailed rules is left to Benston (1976), Zeff (1995), and future research. As discussed below, the IASB also frequently writes rules. Thus, my purpose is to evaluate how the failure to use the appropriate principles can lead any standard setter to rely too much on rules. As noted earlier, the imposition of rules has some potential advantages. Those identified by Schipper (2003) and Nelson (2003) include: ï increased comparability; ï increased verifiability for auditors and regulators (and a related reduction in litigation); ï reduced opportunities for earnings management through judgments (but increased opportunities through transaction structuring); and ï improved communication of standard settersí intentions. Nelson (2003) and the American Accounting Associationís Financial Accounting Standards Committee (FASC) (2003) review the literature related to these issues. FASC concludes: Concepts-based standards, if applied properly, better support the FASBís stated mission of ìimproving the usefulness of financial reporting by focusing on the primary characteristics of relevance and reliability.î (AAA FASC 2003, 74) (emphasis added) In addition to balancing the advantages and disadvantages of more detailed rules, the standard setters sometimes face competing principles. An obvious example is the difficulty of trading off relevance and reliability: for instance, estimates of current values or future cash flows might be potentially relevant data, but some such estimates have low reliability. Departure from one principle might be justified by the need to follow another one. Standard setters are also subject to political pressure, especially from the management of large companies (e.g., Hope and Gray 1982; Solomons 1978; Watts and Zimmerman 1978; Nobes 1992; Zeff 1997). Giving way to political pressure might be an explanation for departing from principles. However, a bad standard cannot be re-classified as a good one because issuing it enabled the standard setter to survive.
As noted earlier, my purpose is to identify several accounting topics for which the accounting standard could be improved by being based more closely on a principle from the conceptual frameworks. In some cases, merely removing a rogue ìprincipleî that is not contained in the conceptual frameworks is sufficient. The improvements come in the form of increased clarity, decreased complexity, and decreased motivation for the structuring of transactions. That is, in some cases, increased clarity can be associated with a reduction in rules. This is not to say that principles-based standards are always clearer than rules-based standards. For example, development costs can represent an asset that meets reasonable recognition criteria; IAS No. 38 (para. 57) is based on this argument. In this context, the U.S. requirement (in SFAS No. 2) to expense development costs could be seen as an un-principled rule. However, in this case, the U.S. ìruleî leads to a clearer instruction and to several resulting advantages (see above), although not necessarily to a better balance sheet. Because some accounting topics are not susceptible to solution by use of appropriate principles without rules, standard setters are then forced to choose, for example, between an unclear principle and a clear rule. However, I and most other authors quoted above do not welcome rules for their own sake. They should be kept to the minimum necessary to achieve the various advantages claimed for them, such as clarity. This warrants an examination of each accounting topic to see if a more appropriate principle could achieve the advantages of rules and yet reduce the amount of rules at the same time. As mentioned earlier, the use of appropriate principles can reduce optional accounting treatments, with a consequent increase in comparability. I am not talking here of judgments by preparers, but of overt optional methods in accounting standards. Optional methods are not prevalent in U.S. accounting standards, although some exist.3 However, several options continue to exist in IFRS even after the removal of many in December 2003. The options were needed to achieve a three-quarters majority on the IASC Board, but arguing for the options was easier in the absence of clear principles. Using appropriate principles does not guarantee a reduction in options, but the discussion below finds several instances where a focus on principles can reduce options.
WHAT IS THE MAIN POINT OF THIS ARTICLE? HOW TO SUMMARY THIS?
In: Accounting
Case 8
Hemoglobin, the Oxygen Carrier
Focus concept
A mutation in the gene for hemoglobin results in an altered protein responsible for the disease sickle cell anemia. An understanding of the biochemistry of the disease may suggest possible treatments.
Prerequisite
Hemoglobin structure and function concepts.
Background
Normal adult hemoglobin is called Hemoglobin A (Hb A). Ninety-eight percent of adult hemoglobin is Hb A and 2% is Hb A2. There are other forms of hemoglobin. For example, the developing fetus has a different kind of hemoglobin than most normal adults. Fetal hemoglobin (or Hemoglobin F) consists of two α chains and two γ chains, whereas adult hemoglobin (Hemoglobin A) consists of two α chains and two β chains. Fetal hemoglobin is synthesized beginning at the third month of gestation and continues up through birth. After the neonate is born, hemoglobin F synthesis declines (because synthesis of the γ chain declines) and hemoglobin A is synthesized (because synthesis of β chains begins). By the time the baby is six months old, 98% of its hemoglobin is Hemoglobin A.
There is also a mutant form of hemoglobin called Hemoglobin S which is found in persons with the disease sickle cell anemia. The disease sickle cell anemia is one of the major health problems facing the African-American community. The World Health Organization estimates that 250,000 babies world- wide are born with sickle cell anemia. Currently there is no cure. A person afflicted with sickle cell anemia has inherited a defective gene from each parent. (Parents who are carriers of the sickle cell gene are heterozygous AS, whereas the person afflicted with sickle cell anemia is SS; non-carriers are designated AA.) The defective gene is the one coding for the β-chain. The amino acid at position 6 on each β chain has been mutated from a glutamate to a valine. Normal α chains have a decreased affinity for the mutated β chains; thus assembly of the HbS tetramer is more difficult. Red blood cells containing HbS form a sickle shape because the Hb S molecules polymerize. Hb S molecules are more likely to polymerize when in the deoxygenated T form than in the oxygenated R form. The polymerized Hb deforms the normal discoid shape of the red blood cells, producing a sickle-shaped cell. The sickle shaped red blood cells become trapped in capillaries and organs, depriving the victim of adequate oxygen supply and causing chronic pain and organ damage.
In this case we will consider our patient, a 10-year-old black male child named Michael B., who was admitted to the hospital because he was experiencing severe chest pain. He had been hospitalized on several previous occasions for vaso-occlusive episodes that caused him to experience severe pain that could not be managed with non-prescription drugs such as ibuprofen. He was slightly jaundiced, short of breath and easily tired, and feverish. A chest x-ray was taken and was abnormal. An arterial blood sample showed a pO2 value of 6 kPa (normal is 10-13 kPa).
Questions
You suspect that Michael has sickle cell anemia and you have ordered an isoelectric focusing analysis of the child‟s lysed red blood cells. (Lysing the red blood cells releases the hemoglobin.) Draw a diagram of the predicted results. Why will this test allow you to diagnose this child‟s disease?
Why do you think that Hb S molecules would be likely to clump together whereas Hb A molecules do not?
In the emergency room, oxygen (100%) was administered to the patient. (Inspired air normally is about 20% oxygen.) Why was this an effective treatment?
You recall reading in the medical literature about a dramatic new drug treatment for sickle cell anemia, and you‟d like to try it on this patient. The drug is hydroxyurea, and is thought to function by stimulating the afflicted person‟s synthesis of fetal hemoglobin. Exactly how hydroxyurea stimulated fetal hemoglobin synthesis is unclear, but it is believed that hydroxyurea is metabolized to NO, which binds to a soluble guanylate cyclase enzyme which then catalyzes the synthesis of a second messenger, cyclic GMP (cGMP). The cGMP interacts with transcription factors in a manner that is not completely understood to induce the transcription (and then translation) of the fetal hemoglobin gene.
In a clinical study, patients who took hydroxyurea showed a 50% reduction in frequency of hospital admissions for severe pain, and there was also a decrease in the frequency of fever and abnormal chest x-rays. Why would increasing the synthesis of fetal hemoglobin result in alleviating the symptoms of sickle cell anemia?
Medical practioners who used hydroxyurea as a treatment for sickle cell anemia noted that their patients seemed to benefit from the administration of the drug long before the synthesis of fetal hemoglobin had time to take effect. It has recently been determined that hydroxyurea can react directly with the iron ion of oxy- and deoxyHb to form iron nitrosyl hemoglobin (HbNO). Why would this be of benefit to the sickle-cell anemic patient?
And finally, hydroxyurea has been shown to produce NO directly, in less than an hour after hydroxyurea administration. It‟s also possible that HbNO could produce NO, either directly or indirectly. NO is an important second messenger which, even in nanomolar amounts, stimulates vasodilation. How could NO production help the sickle-cell anemic patient?
A year ago, at a conference, one of your colleagues told you that she had “cured” a patient of sickle cell anemia by performing a bone marrow transplant. Why would this procedure “cure” sickle cell anemia?
The patient‟s parents tell you that they are planning on having another child and that they are confident that subsequent children will not have sickle cell anemia, since they already have a child with the disease. What will you tell them?
References
Glew, R. H., and Ninomiya, Y. (1997) Clinical Studies in Medical Biochemistry, Oxford University Press, pp. 78-90.
Glover, R. E., Ivy, E. D., Orringer, E. P., Maeda, H., and Mason, R. (1999) Molecular Pharmacology 55, pp. 1006-1010.
Huang, J., Hadimani, S. B., Rupon, J. W., Ballas, S. K., Kim-Shapiro, D. B., and S. Bruce King (2002) Biochemistry 41, pp. 2466-2474.
S. Bruce King (2003) J.Clin. Invest., 111, pp. 171-172.
In: Chemistry
Answer the following Questions using the Measles at Disneyland Article listed below:
1. Apply the epidemiological triangle. Describe the agent, person, and environment.
2. How would you classify the Disease?
3. Identify a prevention strategy for each of the 3 levels of prevention. (Prinmary Prevention, Secondary Prevention, Tertiary Prevention)
Article: Measles at Disneyland, a Problem for All Ages
Measles is once again capturing headlines in the United States. Even though only a small portion of the U.S. population is susceptible, international travel, vaccine refusal or delay, and rare vaccine failures combined with high social contacts allow the highly infectious measles virus to infect susceptible individuals of all ages (1). The story of an unvaccinated child or adolescent contracting measles while traveling abroad and transmitting the virus to others upon return to the United States has been repeated many times in recent years. The 2014–2015 Disneyland-associated outbreak has captured public attention because infants too young to receive the vaccine and children with true medical contraindications to vaccination became infected (2). In addition, Disneyland employees contracted measles and possibly contributed to disease transmission. In 2014, there were 23 measles outbreaks and more than 644 cases of measles (2). More outbreaks owing to vaccine refusal will undoubtedly occur because of sufficient numbers of susceptible individuals in many areas.
Several factors have contributed to parents' refusal to vaccinate their children, and rates of refusal have increased in some states in recent years (3). In addition, although great progress has been made in controlling measles globally, it has recently rebounded in many countries (1). In Europe, where most countries do not require measles or other immunizations for children to attend schools, more than 10 000 cases of measles have been reported each year for several years. The flawed and fraudulent study published in 1998 claiming that the measles-mumps-rubella (MMR) vaccine caused autism has contributed to the hesitancy to vaccinate and the resurgence of measles (1, 3, 4) over the 12 years before the study was retracted. However, even after the study was proven to be based on fabricated data, and numerous reviews and reports in the responsible press discredited the study, fears linger. It is hoped that the recent encouragement by Autism Speaks for parents to vaccinate their children should help increase rates (5).
The relative absence of measles in most areas of the United States for many years has led to an under-appreciation of measles-related complications and mortality that occurs at all ages and in all countries, including the United States. A review of more than 67 000 reported cases of measles in the United States from 1987 to 2000 found that complications include otitis media, pneumonia, diarrhea, and encephalitis in children younger than 5 years and that hospitalization for measles complications was required for approximately 25% of infected children (6). The complication rates are lowest among children and adolescents aged 5 to 19 years, but the rate of complications increases after adolescence, and hospitalization and mortality rates are highest in persons 30 years of age or older (6). In fact, case-fatality rates in adults 30 years of age or older are higher than those in children younger than 5 years.
Much can be done to prevent these outbreaks. Children younger than 12 months of age (the recommended age for the first dose of MMR) and those with medical contraindications depend on high levels of immunity in the rest of the population to provide “community protection,” sometimes referred to as “herd immunity.” These individuals are not immune to measles and will remain susceptible during outbreaks. Parents should be able to take all children to Disneyland and other public places without the fear of measles exposure. Some have proposed removing religious, philosophical, and/or personal belief exemptions to school laws, but enacting these changes could inflame public opinion against immunizations (3, 7). How can adult primary care clinicians assist their pediatric colleagues in boosting community protection? They should routinely review immunization records as they see new patients who are transitioning from pediatric care. The current Advisory Committee on Immunization Practices recommendations advise immunization for potentially susceptible individuals to help prevent future outbreaks (8). Primary care practitioners can also be sure to confirm immunization status of their patients who are health care providers or who plan to travel to other countries (including Europe) where measles is a problem (8). Primary care clinicians should also consider confirmation of immunization status of adult patients working in settings with a high likelihood of exposure to large numbers of children or international travelers, such as schoolteachers or theme park staff. Most adults do not know their detailed vaccination history or have access to their pediatric medical records. Verbal reassurance that “I had all my shots” is insufficient. The simplest thing to do if vaccine status is uncertain is to provide a dose of MMR to those without documentation of 2 doses of measles vaccine after 12 months of age (8). Although serologic testing is an option, it requires multiple visits and possible delays. Primary care physicians also need to be familiar with the clinical signs of measles and promptly report suspect cases to local health authorities to try to limit outbreaks when they do occur.
Measles can be eradicated. However, this will take time; ramped-up efforts to ensure that eligible U.S. children are vaccinated; and greater international collaboration to improve prevention of measles in all countries, including highly industrialized countries with ongoing measles problems (1). Maintaining public trust in immunization and our immunization safety system is essential in helping parents to understand the potential adverse consequences of failure to vaccinate and that processes are in place to ensure that their children receive the safest vaccines possible. Coordinated input from all stakeholders with oversight as recommended in 2011 by the National Vaccine Advisory Committee (9) would enhance public confidence in our immunization programs. Following the framework recommended by the Institute of Medicine (10), constant surveillance and additional studies of vaccine safety to address public concerns should be a priority. Adequate funding is necessary to take advantage of the expanded use of electronic health records to conduct epidemiologic studies that identify or rule out even small postvaccination risks. Also, funding of studies to take advantage of advances in immunology and genomics can allow us to better understand the biological mechanisms for adverse events caused by vaccines and for diseases of concern. Such studies would help counter the common misperception that every illness that occurs after vaccination was caused by the vaccine.
In: Nursing
Chapter 1 of our text casts the Spotlight on Nigeria, with a population of 186 million and counting. Africa’s most populous country faces the curious challenge the comparative literature calls the “resource curse--” one that other resource-rich countries such as Iran, Venezuela, the Democratic Republic of the Congo, and South Sudan also grapple. The “curse” points to a situation in which an abundance of oil resources, instead of delivering higher living standards, a better quality of life, and economic prosperity for the population, instead perpetuates underdevelopment.
The paradox is particular pronounced for Nigeria, one of the world’s biggest oil-producers. Despite earning hundreds of billions from its petroleum exports, accounting for a whopping 90 percent of gross domestic product (GDP), Nigeria scores only 0.532 on the UNDP’s 2017 HDI index, up a mere 0.061 from 2012, or 157 out of 189 countries. (UNDP. International Human Development Indicators. Its poor showing on critical QLI indicators--health, life expectancy, education, poverty, gender equality, sustainability, and so on--is illustrative of the classic challenge to many resource-rich countries in the Global South: abundant natural resources that, instead of bringing economic prosperity has done the opposite. It begs the question, would Nigeria be better off without oil?
It may strike us as odd that a country so richly-endowed with natural resources has not been able to show more for it. Instead, what we have had are several military coups, rampant corruption, political fragmentation, poor living standards, and fitful democratic progress. On the corruption side of the ledger, Nigeria ranks 148/180 on Transparency International’s 2017 Corruption Index, scoring a mere 27 out of 100, slightly above Afghanistan, Burundi, Haiti, North Korea, Somalia, and Tajikistan. Corruption has enabled the political elite to “buy off” mass publics and, until recently, underwrite repressive rule. “Black gold” has served to distort normal economic development in Nigeria by robbing other sectors of needed resources. (Similar situations obtain in other oil-producing economies such as Algeria (now experiencing great political upheaval) and Iran in the Middle East/North Africa and Mexico and Venezuela in our own Hemisphere.)
Nigeria’s (post-independence) economic plan sought to encourage domestic growth through tariffs and subsidies, a strategy that should have produced good results, given its high oil revenues. It failed, being driven more by political expediency than by economic logic. So, for example, a US$ 8 billion investment in steel production failed to get off the ground. (Nmehelle, Vincent O. “Sharia Law in the Northern States of Nigeria: To implement, or not to implement, the Constitutionality is the Question,” Human Rights Quarterly 26, no. 3 (2004), pp. 730-59.).
Oil price declines beginning in the 1980s, amidst economic uncertainty and changing energy habits in the industrialized North and a chronic foreign-debt burden, forced Nigeria’s leaders to reverse course on its economic development strategy. This resulted in huge job losses, run-away inflation, and much public discontent. To win support, the military government of Ibrahim Babangida (1985-93) diverted the country’s oil wealth to coopt opponents and the civil society, even while it kept up the pressure on its critics. Political support was purchased through an elaborate system of patrimony using petro dollars.
Another military coup in 1993 brought Sani Abacha to power. Corruption (the misuse of political office for personal or political gain) became endemic (Johnston, Michael. Syndromes of Corruption: Wealth, Power, and Democracy. Cambridge & New York: Cambridge University Press (2005)--as was narco- and human trafficking, money laundering, and so-called 419 scams--an internet swindle involving unknown Nigerian civil servants.
The fourth republic under the popularly-elected government of Olusegun Obasanjo (1999-2007) faced the daunting task of reining in the economy while breaking with the past. The approach produced only limited results. Yar’Adua (2007-2010) and his Democratic Party (PDP) successors (2010-15) launched what became known as the National Economic Empowerment and Development Strategy (NEEDS). NEEDS was an ambitious plan to stimulate domestic enterprise through foreign direct investment (FDI). It was also meant to bring more transparency in government spending, foster the rule of law, reduce corruption, improve transportation and telecom, and deliver the people’s health. The International Monetary Fund (IMF) report on Nigeria sounds a cautious note of optimism, i.e. if the economic reforms and diversification plans, and the efforts to control inflation (the money supply), stabilise the country’s finances, and “move beyond oil,” remain on track.
In theory, then all is not lost for Nigeria to overcome its resource curse. For all that, it continues to depend heavily on one source of income--petroleum; and not much has changed in terms of improvements in living standards for the majority of Nigerians. Indeed, inequality has reached alarming levels. To be fair, Nigeria’s civilian leaders have boldly gone where none of its military rulers have gone, starting the “rainy-day” fund and tackling corruption, especially in the all-important oil sector.
Still, huge challenges remain, reflecting the ambiguous role of petroleum in the country’s life. So, although there are hopeful signs, Nigeria’s prospects, like that of Brazil and others, remain uncertain. The rise of the Boko Haram terrorist group and the failure of the current President Muhammadu Buhari to bring it to book has not helped. (For background on the group, founded in 2002, see the BBC here.) Buhari has come in for “widespread criticism over his government’s inability to defeat the renewed …insurgency in the northeast.” The New York Times, 9 April 2018 (here). This explains in part why Nigeria scores only modestly on civil liberties (freedom of expression, association, the rule of law, personal and individual rights) on the Freedom House Index; and also on the EIU Index.
Here are some pathways into this first discussion: What do you make of Nigeria’s resource-curse challenge? Can the country get out from under this curse and how? Why does Nigeria seem to hold so much promise, yet continually fails to deliver? Comparatively speaking, how do we account for the fact that Canada, also an energy-rich country, has not fallen prey to this curse?
In: Psychology
In: Math
Read the Italy Defied Starbucks—Until It Didn’t case below and answer the 4 questions:
“We arrive with humility and respect in the country of coffee,” Howard Schultz, the former longtime CEO of Starbucks, told Corriere della Sera, Italy’s leading daily, last week. He was about to inaugurate, in Milan, the first Italian outpost of the global chain that supersized coffee and now vies with McDonald’s and Coca Cola as a symbol of American gastronomic imperialism. Even, of course, if Italy has one of the world’s most developed coffee cultures, which in fact is what inspired Schultz to convince the founders of the small Starbucks coffee company to open its first coffeehouse in 1984.
Italy is a country where the pumpkin is generally found in the ravioli, not the latte, and so the Milan Starbucks isn’t just any Starbucks branch. It’s a huge “Roastery” in the former Milan outpost
of the Poste, the Italian postal service, and is meant as a full “experience,” Starbucks said in a press release that has already been mocked by Eater. (“Eight Ridiculous Things Starbucks Is Saying About Its New Store in Milan.”) The Roastery, the first in Europe after others in Seattle and Shanghai, will offer coffee and food and also illustrate Starbucks’s roasting process.
Okay. But a question leaps to mind: Does Italy need Starbucks? “Che tristezza,” one Italian friend told me when I asked her about it opening in Milan. “How sad.” I called the Tazza d’Oro, one of Rome’s most historic coffee shops—they’re called bars in Italian—and Laura Birrozzi, a manager, offered some thoughts. “We and Starbucks sell something completely different. We have quality Italian espresso,” she said. I asked her if she’d ever been to a Starbucks, and she said she had on one occasion, on a visit to London. “It wasn’t the coffee I’m used to,” was all she’d say.
At the Milan Roastery, an espresso will cost 1.80 euros “sitting or standing,” Corriere della Sera noted, since in Italian coffee shops, the price changes depending on whether you have table service or gulp your drink down at the bar. A cappuccino will cost as much as 4.50 euros. This has already prompted Italy’s consumer association to file a complaint with Italy’s antitrust authority, saying the prices were far above average for Milan. Online, Italians are already complaining that Starbucks could drive up prices elsewhere in Italy. (Still, from the coverage, it seems the Roastery piqued people’s curiosity; the lines were around the block for the musical-gala opening party.)
The announcement last year about the opening did not go over well. The columnist Aldo Cazzullo wrote in Corriere della Sera then that “as an Italian,” he considered the opening of Starbucks in Italy nothing short of “a humiliation.” Though he conceded that the arrival of the chain might make some Italian coffee shops step up their game: Starbucks “represents a philosophy, as well as a sort of office for people who don’t have an office,” he wrote. “Maybe our bars will also become more hospitable.”
But, he ended on a discordant note: “I wonder how many of the 350 jobs announced in Milan will go to young Italians and how many to young immigrants,” Cazzullo wrote. It’s unclear what kind of immigrants he had in mind, or why hiring immigrants would be an issue. What is clear is that in Italy, coffee seems to connect in unexpected ways to national identity. There were polemics last year after Starbucks sponsored a garden of palm trees in Piazza Duomo, to drum up enthusiasm ahead of its opening this year. This prompted Matteo Salvini, then only the leader of the far-right League party and now Italy’s interior minister and deputy prime minister, to decry what he called the “Africanization” of Italy, and to call for the defense of the “Italianness” of coffee. “All that’s missing are the sand and camels, and the illegal immigrants will feel at home,” he said then.
Schultz has been trying to open Starbucks in Italy for decades, and the fact that Italy has such excellent coffee everywhere—even the coffee at the average highway rest stops in Italy is better than much of what’s served in good restaurants elsewhere in the world— was no doubt a major issue. In 1998, Michael Specter wrote in The New Yorker about Schultz’s efforts to open Starbucks and said a branch of the chain would open in Italy “next year.”
So why the delay? For one thing, Italians don’t drink coffee the way Starbucks serves coffee. In Italy, coffee—espresso—is drunk generally standing up, at a coffee bar. Cappuccino or caffè latte is drunk in the morning or sometimes in the late afternoon if you haven’t had a proper lunch, and never after meals, because who can digest milk after a meal? Italians are very attuned to proper digestion.
Also, Italy has a market economy with some protectionist elements. In her interview with Schultz for Corriere, the journalist Daniela Polizzi noted that the context had changed in the past 20 years, from one of adjusting to globalization to one in which trade barriers have become an issue. Starbucks now has 30,000 stores in 77 countries, including 3,400 stores in China, with 45,000 employees, Schultz answered. Italy hasn’t given up quite so much ground, but the chain has now established a beachhead there.
Some saw the arrival of Starbucks as a window into the challenges to the Italian economy. “The lack of Starbucks indicates a double anomaly: On the one hand, the biggest coffee chain in the world wasn’t present in Italy, and on the other, the biggest coffee chain in the world isn’t Italian,” the journalist Luciano Capone wrote in Il Foglio, an intellectual daily, this week, citing the economist Luigi Zingales. It seemed a sign of how Italy’s economy is based on smaller businesses with more modest ambitions. More than 90 percent of Italian companies have fewer than 15 employees.
Then there’s the flip side. “Operating in Italy, in competition with Italian coffee bars, it’s probable that Starbucks will soon learn to make excellent espressos and cappuccinos,” Capone continued. “But will the Italian system manage to learn from Starbucks how to create a global chain? It would be a small step for us, but a great step for mankind: Finally the rest of the world would discover that coffee and pizza aren’t the kind on offer at Starbucks and Pizza Hut.”
So if the wheel is coming full circle, does Olive Garden have any plans to open in Italy? I asked its spokeswoman, Meagan Mills. “We do not have any plans,” she wrote back. “Thanks for thinking of us, though!”
Questions to answer
1- What are the main marketing environment factors affecting Starbucks business in the Italian market? Why are these factors affecting the Italian market?
In: Operations Management
Case Study 9—Social Media Is Gateway to eBook Sales Success: Amazon Kindle eBooks Thomas S. Mueller, Appalachian State University The Amazon Kindle eBook brand is one of the most popular forms of digital publishing in today’s social community. As of early 2016, the direct-to-consumer online retailer was selling 1.06 million eBooks (paid downloads) per day. Consumers spent $5.75 million per day during a recent month, with $1.76 million of those sales directed to author royalties. Though it is somewhat undocumented regarding distribution, authors received an additional $140 million in funds from Kindle Unlimited, Amazon’s subscription reading service.32 The industry as a whole is generating over $2.1 billion in sales annually. It is interesting to note that as established publisher sales decreased, eBooks written by independent authors increased.33 During an assessment in 2016, 56 of Amazon’s 100 top-selling eBooks were self-published titles. Topically, the bestselling independent authors write about paranormal activities, romance, thrillers, urban fiction, suspense, and science fiction. With the ascent of digital titles on Amazon and other sources, industry experts posit that printed versions of books will become a niche market, similar to the effect noted in magazine and newsprint.34 Digital publishing strategist Ben Thompson applies aggregation theory to the process, suggesting that sales portals like Amazon eliminate intermediaries, which allows independent publishers to avoid publishers and go direct to consumers.35 With a substantial faction of the social publishing market operating independently, advertising and promotion become the responsibility of the author. One portion of an author’s time is allocated to writing the novel, while the other half of the time is invested in social commerce, which includes marketing to expand the author’s fan base. The challenge is to differentiate an eBook from millions of competitive titles, then convince readers to download the digital offering onto a Kindle reader or other digital device. Pre-selling is essential to assure return on investment for the self-published author. One viable and affordable option is to build a social media marketing plan. Social media platforms provide opportunities to develop leads, generate a follower list, leverage other prominent users, access large topical groups, and promote content “teasers” that showcase your upcoming eBook.36 Most eBook authors develop a social media plan through content generation. These are most often short, concise articles of 250 to 500 words. Most successful social media plans offer shorter posts, with frequent placement. Social media content is usually housed in a blog, such as Google’s Blogger platform, or the highly customizable WordPress.37 It’s important to claim a URL that is unique and specific to the author and her or his work. A strong URL, along with key search words included in blog post titles, can help the author’s social media content climb in ranking on search engines. Social media portals such as LinkedIn and Google+ offer each user a personal landing page, but much more is available through groups and communities, where individuals share common interests. For example, a fashion community in Google+ hosts 557,000 followers.38 A marketing communication group in LinkedIn has collected 621,000 members.39 And, the LinkedIn Book Marketing group has 28,000 members.40 It is essential to identify a topical group to understand the relevance of posts, how interaction and replies work, and who posts the top viewed submissions. Authors can integrate into these platforms by reading posts, replying to posts, and finally crafting content that resonates with potential readers. Some authors incorporate introductory promotional comments on their upcoming eBook. It is important for authors to remember that blatant selling is not admissible; posted content must provide value and prove interesting to other group members.41 Facebook has been the most influential platform for many eBook authors. It has grown to over 1.4 billion users worldwide, with 70% checking their feed multiple times each day. eBook authors create a “landing page” for their profile as an author, or sometimes for a specific title. The challenge is to direct friends from the page to a personal website, and to target specific Facebook users who are profiled as sharing an interest in the eBook topic. Some authors host events or make promotional offers to engage users and increase traffic, which can be measured through social media data management. Mark Dawson initially started writing for a traditional publishing firm. His sales were weak and he transitioned to self-publishing. After learning how to leverage Facebook, Mark invested time and energy and now earns over $450,000 per year.42 Video platforms such as Vimeo and YouTube have been integrated into the social media promotion of eBooks. YouTube, the predominant player, was purchased in 2006 for $1.65 billion by Google. YouTube currently reports that it generates over 1 billion views per month.43 Successful eBook authors have integrated YouTube segments into their social media plans, including interviews or “teasers” that offer special introductory offers at eBook launch time. It’s beneficial to cross-promote YouTube posts across Facebook pages and embedded content in visual sharing sites such as Pinterest and Instagram. Studies indicate that the human brain assimilates images 60,000 times more quickly than text. eBook authors are intentional about visual sharing; Instagram is predominantly 18 to 24 female (56%) and allows space to share images. Pinterest represents a female and male audience, with two thirds between the ages of 18 and 24. One half are located outside the United States. It allows users to aggregate content that appeals to their interests and sensibilities. The author’s challenge is to entice user engagement, create awareness for the latest published eBook, and generate reader feedback, which can channel into digital book reviews. Many authors use the visual advantage to promote their eBook through storytelling in multiple posts.44 A social media platform that serves as the “messenger” for all social media activity is Twitter. Each message is limited to 140 characters, which can in turn be reposted and shared. Twitter now has 320 million monthly users, with over 1 billion monthly visits.45 Savvy eBook authors use Twitter to include “@” user handles to attract other key authors, or hashtags to create topical searches. Twitter can also steer followers to other platforms, where blog or web content has been placed. Some have also leveraged Twitter’s new live video broadcast program Periscope to promote special programs and activities. Some of the most highly successful eBook authors are also prominent podcast hosts. Technology entrepreneur James Altucher has published 11 books, including the Wall Street Journal bestseller Choose Yourself! Altucher’s unique position in the marketplace is that he lost his fortune, earned it back, and then lost it again. He now publishes eBooks such as Reinvent Yourself and promotes his projects on the popular “James Altucher Show” podcast, which is accessible on podbay.fm and iTunes.46 One social media opportunity that is sometimes overlooked is within the Amazon portal itself. An Amazon author page can showcase the author, include a biography, feature a compilation of the author’s Amazon Kindle publications, and link to other social media content such as Twitter or personal blogs. Most anyone can become a digital author, but not everyone can sell books. The holistic author understands how to write, publish, network, create, associate, and entertain. Social media presents the gateway where authors and customers connect in the open and unregulated marketplace.
Historical documentarian Ken Burns created a 1990 television series on the Civil War for the Public Broadcasting Network (PBS). Find Mr. Burns’ Twitter user handle, then write a tweet that would include both user handle and hashtag to link his work with a new eBook on the Civil War.
In: Operations Management
Risk Assessment Homework
In this assignment, you will perform a qualitative risk assessment, using a template that has been provided below.
A listing of threats has been prepopulated for you. These threats have been categorized by type as shown below:
|
Threat Origination Category |
Type Identifier |
|
Threats launched purposefully |
P |
|
Threats created by unintentional human or machine errors |
U |
|
Threats caused by environmental agents or disruptions |
E |
Purposeful threats are launched by threat actors for a variety of reasons and the reasons may never be fully known. Threat actors could be motivated by curiosity, monetary gain, political gain, social activism, revenge or many other driving forces. It is possible that some threats could have more than one threat origination category. Some threat types are more likely to occur than others. The following table takes threat types into consideration to help determine the likelihood that vulnerability could be exploited. The threat table shown in Table 2-2 is designed to offer typical threats to information systems and these threats have been considered for the organization. Not all of these will be relevant to the findings in your risk assessment, however you will need to identify those that are.
|
ID |
Threat Name |
Type ID |
Description |
Typical Impact to Data or System |
||
|---|---|---|---|---|---|---|
|
Confidentiality |
Integrity |
Availability |
||||
| T-1 |
Alteration |
U, P, E |
Alteration of data, files, or records. |
Modification |
||
| T-2 |
Audit Compromise |
P |
An unauthorized user gains access to the audit trail and could cause audit records to be deleted or modified, or prevents future audit records from being recorded, thus masking a security relevant event. Also applies to a purposeful act by an Administrator to mask unauthorized activity. |
Modification or Destruction |
Unavailable Accurate Records |
|
| T-3 |
Bomb |
P |
An intentional explosion. |
Modification or Destruction |
Denial of Service |
|
| T-4 |
Communications Failure |
U, E |
Cut of fiber optic lines, trees falling on telephone lines. |
Denial of Service |
||
| T-5 |
Compromising Emanations |
P |
Eavesdropping can occur via electronic media directed against large scale electronic facilities that do not process classified National Security Information. |
Disclosure |
||
| T-6 |
Cyber Brute Force |
P |
Unauthorized user could gain access to the information systems by random or systematic guessing of passwords, possibly supported by password cracking utilities. |
Disclosure |
Modification or Destruction |
Denial of Service |
| T-7 |
Data Disclosure |
P, U |
An attacker uses techniques that could result in the disclosure of sensitive information by exploiting weaknesses in the design or configuration. Also used in instances where misconfiguration or the lack of a security control can lead to the unintentional disclosure of data. |
Disclosure |
||
| T-8 |
Data Entry Error |
U |
Human inattention, lack of knowledge, and failure to cross-check system activities could contribute to errors becoming integrated and ingrained in automated systems. |
Modification |
||
| T-9 |
Denial of Service |
P |
An adversary uses techniques to attack a single target rendering it unable to respond and could cause denial of service for users of the targeted information systems. |
Denial of Service |
||
| T-10 |
Distributed Denial of Service Attack |
P |
An adversary uses multiple compromised information systems to attack a single target and could cause denial of service for users of the targeted information systems. |
Denial of Service |
||
| T-11 |
Earthquake |
E |
Seismic activity can damage the information system or its facility. Please refer to the following document for earthquake probability maps http://pubs.usgs.gov/of/2008/1128/pdf/OF08-1128_v1.1.pdf . |
Destruction |
Denial of Service |
|
| T-12 |
Electromagnetic Interference |
E, P |
Disruption of electronic and wire transmissions could be caused by high frequency (HF), very high frequency (VHF), and ultra-high frequency (UHF) communications devices (jamming) or sun spots. |
Denial of Service |
||
| T-13 |
Espionage |
P |
The illegal covert act of copying, reproducing, recording, photographing or intercepting to obtain sensitive information . |
Disclosure |
Modification |
|
| T-14 |
Fire |
E, P |
Fire can be caused by arson, electrical problems, lightning, chemical agents, or other unrelated proximity fires. |
Destruction |
Denial of Service |
|
| T-15 |
Floods |
E |
Water damage caused by flood hazards can be caused by proximity to local flood plains. Flood maps and base flood elevation should be considered. |
Destruction |
Denial of Service |
|
| T-16 |
Fraud |
P |
Intentional deception regarding data or information about an information system could compromise the confidentiality, integrity, or availability of an information system. |
Disclosure |
Modification or Destruction |
Unavailable Accurate Records |
| T-17 |
Hardware or Equipment Failure |
E |
Hardware or equipment may fail due to a variety of reasons. |
Denial of Service |
||
| T-18 |
Hardware Tampering |
P |
An unauthorized modification to hardware that alters the proper functioning of equipment in a manner that degrades the security functionality the asset provides. |
Modification |
Denial of Service |
|
| T-19 |
Hurricane |
E |
A category 1, 2, 3, 4, or 5 land falling hurricane could impact the facilities that house the information systems. |
Destruction |
Denial of Service |
|
| T-20 |
Malicious Software |
P |
Software that damages a system such a virus, Trojan, or worm. |
Modification or Destruction |
Denial of Service |
|
| T-21 |
Phishing Attack |
P |
Adversary attempts to acquire sensitive information such as usernames, passwords, or SSNs, by pretending to be communications from a legitimate/trustworthy source. Typical attacks occur via email, instant messaging, or comparable means; commonly directing users to Web sites that appear to be legitimate sites, while actually stealing the entered information. |
Disclosure |
Modification or Destruction |
Denial of Service |
| T-22 |
Power Interruptions |
E |
Power interruptions may be due to any number of reasons such as electrical grid failures, generator failures, uninterruptable power supply failures (e.g. spike, surge, brownout, or blackout). |
Denial of Service |
||
| T-23 |
Procedural Error |
U |
An error in procedures could result in unintended consequences. This is also used where there is a lack of defined procedures that introduces an element of risk. |
Disclosure |
Modification or Destruction |
Denial of Service |
| T-24 |
Procedural Violations |
P |
Violations of standard procedures. |
Disclosure |
Modification or Destruction |
Denial of Service |
| T-25 |
Resource Exhaustion |
U |
An errant (buggy) process may create a situation that exhausts critical resources preventing access to services. |
Denial of Service |
||
| T-26 |
Sabotage |
P |
Underhand interference with work. |
Modification or Destruction |
Denial of Service |
|
| T-27 |
Scavenging |
P |
Searching through disposal containers (e.g. dumpsters) to acquire unauthorized data. |
Disclosure |
||
| T-28 |
Severe Weather |
E |
Naturally occurring forces of nature could disrupt the operation of an information system by freezing, sleet, hail, heat, lightning, thunderstorms, tornados, or snowfall. |
Destruction |
Denial of Service |
|
| T-29 |
Social Engineering |
P |
An attacker manipulates people into performing actions or divulging confidential information, as well as possible access to computer systems or facilities. |
Disclosure |
||
| T-30 |
Software Tampering |
P |
Unauthorized modification of software (e.g. files, programs, database records) that alters the proper operational functions. |
Modification or Destruction |
||
| T-31 |
Terrorist |
P |
An individual performing a deliberate violent act could use a variety of agents to damage the information system, its facility, and/or its operations. |
Modification or Destruction |
Denial of Service |
|
| T-32 |
Theft |
P |
An adversary could steal elements of the hardware. |
Denial of Service |
||
| T-33 |
Time and State |
P |
An attacker exploits weaknesses in timing or state of functions to perform actions that would otherwise be prevented (e.g. race conditions, manipulation user state). |
Disclosure |
Modification |
Denial of Service |
| T-34 |
Transportation Accidents |
E |
Transportation accidents include train derailments, river barge accidents, trucking accidents, and airlines accidents. Local transportation accidents typically occur when airports, sea ports, railroad tracks, and major trucking routes occur in close proximity to systems facilities. Likelihood of HAZMAT cargo should be determined when considering the probability of local transportation accidents. |
Destruction |
Denial of Service |
|
| T-35 |
Unauthorized Facility Access |
P |
An unauthorized individual accesses a facility which may result in comprises of confidentiality, integrity, or availability. |
Disclosure |
Modification or Destruction |
Denial of Service |
| T-36 |
Unauthorized Systems Access |
P |
An unauthorized user accesses a system or data. |
Disclosure |
Modification or Destruction |
|
Analyze Risk
The risk analysis for each vulnerability consists of assessing threats to determine the likelihood that a vulnerability could be exploited and the potential impact should the vulnerability be exploited. Essentially, risk is proportional to both likelihood of exploitation and possible impact. The following sections provide a brief description of each component used to determine the risk.
Likelihood
This risk analysis process is based on qualitative risk analysis. In qualitative risk analysis the impact of exploiting a threat is measured in relative terms. When a system is easy to exploit, it has a High likelihood that a threat could exploit the vulnerability. Likelihood definitions for the exploitation of vulnerabilities are found in the following table.
|
Likelihood |
Description |
|
Low |
There is little to no chance that a threat could exploit vulnerability and cause loss to the system or its data. |
|
Medium |
There is a Medium chance that a threat could exploit vulnerability and cause loss to the system or its data. |
|
High |
There is a High chance that a threat could exploit vulnerability and cause loss to the system or its data. |
Impact
Impact refers to the magnitude of potential harm that could be caused to the system (or its data) by successful exploitation. Definitions for the impact resulting from the exploitation of a vulnerability are described in the following table. Since exploitation has not yet occurred, these values are perceived values. If the exploitation of vulnerability can cause significant loss to a system (or its data) then the impact of the exploit is considered to be High.
|
Impact |
Description |
|
Low |
If vulnerabilities are exploited by threats, little to no loss to the system, networks, or data would occur. |
|
Medium |
If vulnerabilities are exploited by threats, Medium loss to the system, networks, and data would occur. |
|
High |
If vulnerabilities are exploited by threats, significant loss to the system, networks, and data would occur. |
Risk Level
The risk level for the finding is the intersection of the likelihood value and impact value as depicted the table depicted below. The combination of High likelihood and High impact creates the highest risk exposure. The risk exposure matrix shown in the table below presents the same likelihood and impact severity ratings as those found in NIST SP 800-30 Risk Management Guide for Information Technology Systems.
|
Impact |
|||
|
Likelihood |
High |
Medium |
Low |
|
High |
High |
Medium |
Low |
|
Medium |
Medium |
Medium |
Low |
|
Low |
Low |
Low |
Low |
Risk Assessment Results
This section documents the technical and non-technical security risks to the system. Complete the following risk assessment table, ensuring that you have addressed at least 20 risks. You will be graded on your ability to demonstrate knowledge that the security controls are appropriate to the controlling the risks you have identified, as well as being able to identify appropriate risk levels based on the Impact and Likelihood levels.
The following provides a brief description of the information documented in each column:
Identifier: Provides a unique number used for referencing each vulnerability in the form of R#-Security Control ID.
Threat: Indicates the applicable threat type from the table of threats..
Risk Description: Provides a brief description of the risk.
Business Impact: Provides a brief description of the impact to the organization if the risk is realized.
Recommended Corrective Action: Provides a brief description of the corrective action(s) recommended for mitigating the risks associated with the finding.
Likelihood: Provides the likelihood of a threat exploiting the vulnerability. This is determined by applying the methodology outlined in Section 3 of this document.
Impact: Provides the impact of a threat exploiting the vulnerability. This is determined by applying the methodology outlined in Section 3 of this document.
Risk Level: Provides the risk level (high, Medium, low) for the vulnerability. This is determined by applying the methodology outlined in Section 3 of this document.
|
Identifier |
Threat ID |
Risk Description |
Business Impact |
Recommended Corrective Action |
Likelihood |
Impact |
Risk Level |
|---|---|---|---|---|---|---|---|
|
T-1, T-8, T-23, T-24, T-36 |
Notification is not performed when account changes are made. |
The lack of notification allows unauthorized changes to individuals who elevate permissions and group membership to occur without detection. |
Enable auditing of all activities performed under privileged accounts in GPOs and develop a process to allow these events to be reviewed by an individual who does not have Administrative privileges. |
Low |
Medium |
Low |
|
|
Malicious Code/Social Engineering |
|||||||
|
Application and Network Attacks |
|||||||
|
Physical Security |
|||||||
|
Wireless |
|||||||
|
Email and Web |
|||||||
|
Mobile Devices |
|||||||
In: Operations Management
CASE STUDY 2
The Wedding
Tony and Peggy Sue graduated from a university in Texas last May. She received a degree in elementary education, and he graduated from the culinary school. They both now work in the Dallas area. Peggy Sue is a teacher, and Tony is a chef at a resort hotel restaurant.
It is Christmas Day and Tony asks Peggy Sue to marry him. She excitedly accepts. They set a wedding date of June 30.
Tony is from New York City. He is the only son of “Big Tony" and Carmella. He is known as “Little Tony" to his family. He has three younger sisters, none of whom are yet married. The family owns a restaurant called Big Tony's, and all four children have worked in the restaurant since they were young. They have a large extended family with many relatives, most of whom live in New York City. They also have many friends in the neighborhood.
Peggy Sue is from Cornfield, Nebraska. She is the youngest of four sisters. She and her sisters worked on the family farm when they were young. Her father passed away several years ago. Her mother, Mildred, now lives alone in the family farmhouse and leases the farmland to a neighboring farmer. Peggy Sue's sisters all married local men and all live in Cornfield. All of their weddings were small (about 50 people), simple, and pretty much the same. Mildred has the wed- ding plans down to almost a standard operating procedure–9:00 A.M. ceremony at the small church, followed by a buffet brunch in the church hall, and that is about it. They really could not afford much more elaborate weddings because the income from the farm had been pretty meager. Peggy Sue's sisters did not go to college, and she had to take out loans to pay for her college expenses.
Tony and Peggy Sue decide to call home and announce the good news about their engagement and the forthcoming wedding.
Tony calls home and tells his mom, Carmella, the news. She replies, "That's great, honey! I've been waiting for this day. I can't believe my little baby is getting married. I'm so excited. We're going to have the biggest, best wedding ever. All our friends and family will come to celebrate. We'll probably have 300 people. And, of course, we'll have the reception at our restaurant; the banquet room should be big enough. I'll tell your cousin Vinnie that you want him to be best man. You grew up together, although you haven't seen much of each other since you went off to college in Texas. I'll call Aunt Lucy as soon as we're done talking and tell her that we want her little Maria and Teresa to be flower girls and little Nicky to be ring bearer. And, oh, I almost forgot the most important thing, your sisters, they'll all be bridesmaids. I already know what color their gowns will be-a decp rose; they'll be gorgeous. And sweetie, I didn't ask your papa yet, but I know he'll agree with me-on Monday, I'm going to call my friend Francine, the travel agent, and get two tickets for you for a two-week honeymoon in Italy. You've never been there, and you must go. It will be a gift from your papa and me. And tell Peggy Lee or Peggy Susie or whatever congratulations. We are so happy for both of you. It's your wedding, and I don't want to interfere. I'll just be here to help. You know what I'm saying. So, my little Tony, whatever you want me to do, you just tell me. And one more thing, I'll see Father Frank after Mass on Sun- day and tell him to mark his calendar already for a two o'clock ceremony on June 30. Goodbye, my big boy. I'll tell Papa you called. And I can't wait to start telling everybody to get ready to party on June 30."
Peggy Sue also calls her mom to tell her the news about the upcoming wed- ding. Mildred responds, “That's wonderful, dear. I'm glad you're finally getting married. You waited so long with going off to college and everything. I'il start getting everything ready. I know how to do this in my sleep by now. Tīl mention it to Reverend Johnson after Sunday service. I'll tell your sisters to expect to be bridesmaids again in keeping with the family tradition. I guess Holley will be the matron of honor; it's her turn. By the way, she's expecting her third child probably right around the same time as your wedding, but I don't think that will matter. Well, I guess pretty soon you'll be having babies of your own, like all your sisters. I'm glad you are finally settling down. You should really be thinking about moving back home, now that you are done with college. I saw Emma Miller, your second-grade teacher, at grocery store the other day. She told me she is retiring. I told her you would be excited to hear that and probably want to apply for her job."
"She said she didn't think they would have too many people applying so you would have a good chance. You could move in with me. The house is so big and lonely. There is plenty of room, and I can help you watch your babies. And your boyfriend, Tony—isn't he a cook or something? I'm sure he could probably get a job at the diner in town. Oh dear, I'm so happy. I've been praying that you would come back ever since you left. I'll tell all your sisters the news when they all come over for family dinner tonight. It won't be long before we're all together again. Goodbye, my dear, and you be careful in that big city."
Tony and Peggy Sue start discussing their wedding. They decide they want a big wedding—with their families and friends, including a lot of their college friends. They want an outdoor ceremony and outdoor reception, including plenty of food, music, and dancing into the night. They are not sure how much it will cost, though, and realize Peggy Sue's mother cannot afford to pay for the wedding, so they will have to pay for it themselves. Both Tony and Peggy Sue have college loans to pay back, but they hope that the money gifts they get from the wedding guests will be enough to pay for the wedding expenses and maybe have some left over for a honeymoon.
It is now New Year's Day, and Tony and Peggy Sue decide to sit down and start laying out the detailed plan of all the things they need to do to get ready for their wedding
CASE QUESTIONS
1. Develop an estimated duration for each activity.
2. Using a project start time of 0 (or January 1) and a required project completion time of 180 days (or June 30), calculate the ES, EF, LS, and LF times and TS for each activity. If your calculations result in a project schedule with negative TS, revise the project scope, activity estimated durations, and/or sequence or dependent relationships among activities to arrive at an acceptable baseline schedule for completing the project within 180 days (or by June 30). Describe the revisions you made.
3. Determine the critical path, and identify the activities that make up the critical path.
4. Produce a bar chart (Gantt chart) based on the ES and EF times from the schedule in item 2.
In: Operations Management