Statistics and Risk Management Risk Management Data Performance Objective:

advertisement
Statistics and Risk
Management
Risk Management Data
Performance Objective:
After completing this lesson, the student will understand the basic concepts of
data gathering and some of the issues involved in data security risks and ethical
utilization.
Approximate Time:
When taught as written, this lesson should take 4-5 days to complete.
Specific Objectives:
 The student will discuss the sources of available data.
 The student will understand the ethics involved in data acquisition.
 The student will review basic legal issues with data acquisition. This lesson corresponds with Unit 3 of the Statistics and Risk
Management Scope and Sequence. Copyright © Texas Education Agency, 2012. All rights reserved. 1 TEKS Correlations:
This lesson, as published, correlates to the following
TEKS for Regression. Any changes/alterations to
the activities may result in the elimination of any or
all of the TEKS listed.
130.169(C)(6)
(C) generate a spreadsheet to collect, collate, organize, and analyze
quantitative data;
(D) use spreadsheets and graphical techniques to present data in a
manner that is understood by and meaningful to colleagues and clients;
InterdisciplinaryTEKS:
English:
110.31 (C) (21) (B)
… organize information gathered from multiple sources to create a
variety of graphics and forms (e.g., notes, learning logs)…
110.31 (C) (22) (B)
…evaluate the relevance of information to the topic and determine the
reliability, validity, and accuracy of sources (including Internet sources)
by examining their authority and objectivity…
110.31 (C) (23) (C)
… use graphics and illustrations to help explain concepts where
appropriate…
Copyright © Texas Education Agency, 2012. All rights reserved. 2 110.31 (C) (23) (D)
… use a variety of evaluative tools (e.g., self-made
rubrics, peer reviews, teacher and expert evaluations)
to examine the quality of the research…
Math:
111.36 (C) (4) (A)
… compare theoretical and empirical probability;
111.37. (C) (3) (B)
… use probabilities to make and justify decisions about risks in everyday
life
Occupational Correlation
(O*Net - http://www.onetonline.org/)
Insurance Underwriter 13-2053.00
Similar Job Titles: Personal Lines Underwriter, Health Underwriter,
Underwriter Director
Tasks:



Decrease value of policy when risk is substandard and specify applicable
endorsements or apply rating to ensure safe profitable distribution of
risks, using reference materials.
Decline excessive risks.
Write to field representatives, medical personnel, and others to obtain
further information, quote rates, or explain company underwriting policies
(Soft) Skills:
Active listening; Judgment and Decision Making; Speaking; Critical Thinking
Copyright © Texas Education Agency, 2012. All rights reserved. 3 Instructional Aids:
1. Display for presentation, websites for
assignments and class discussion
2. Assignment Worksheets
3. Supporting Spreadsheets
Materials Needed:
1. Printer paper
2. Assignments and website information ready to distribute to
students.
Student projects will be displayed to increase interest in Statistics
Equipment Needed:
1. Computer with presentation and Internet Access
2. Computers for Students to Conduct Research and Collect Data
for Projects
Copyright © Texas Education Agency, 2012. All rights reserved. 4 References:
Data Collection Methods
Data Collection is an important aspect of any type of research study. Inaccurate
data collection can impact the results of a study and ultimately lead to invalid
results.
Data collection methods for impact evaluation vary along a continuum. At the
one end of this continuum are quantitative methods and at the other end of the
continuum are qualitative methods for data collection.
http://people.uwec.edu/piercech/researchmethods/data%20collection%20metho
ds/data%20collection%20methods.htm
Data Acquisition and Management
This article answers the following important questions on the collection and use
of data. What are data? Who owns data? What are proper ways to collect data?
What are the issues in data storage and retention? What are the obligations to
share data?
http://ccnmtl.columbia.edu/projects/rcr/rcr_data/foundation/index.html
Database Security: What Students Need To Know
Understanding the aspects of controlling and protecting data, including:
confidentiality, integrity, and availability.
http://www.jite.org/documents/Vol9/JITEv9IIPp061-077Murray804.pdf
Copyright © Texas Education Agency, 2012. All rights reserved. 5 Teacher Preparation:
Teacher will:
1.
presentation, and
handouts.
2.
resources and websites.
3.
websites ready.
Review terms in outline,
Locate and evaluate various
Have assignments and
Learner Preparation:
It is time to wrap up what the students have learned about
statistics. You will briefly describe commercial software for
statistics with examples the student might find interesting. Then
the student will get to apply what they have learned to analyzing
data.
Introduction:
STUDENTS will watch the Unit video found here:
jukebox.esc13.net/untdeveloper/Videos/Risk%20Management%
20Data.mov
STUDENTS will take the practice test and review using the Key,
found in Common/Student Documents.
EXHIBIT:
Excitement for data acquisition.
INTRODUCE: The idea of acquiring data.
ASK:
Ask students to list the many reasons data may
be acquired, and the entities (retailers,
politicians, not-for-profits, hotels, airlines, etc.)
that acquire data.
Copyright © Texas Education Agency, 2012. All rights reserved. 6 I. Risk Management Data
A. Risk Management Review
Context Definition
Risk Identification
Risk Assessment
Risk Treatment
Communication
Planning
Checking & Supervision
Process Review
External Research
News Papers
Industry Periodicals
Industry Journals
Government Documents
Web Based Searches
Internal Research
Proposals
Running Projects
Department Reports
Human Resource Reports
Financial Statements
Litigation Reports
Data Liability Risks
Credit Information
Medical History Information
Internal Data Capture
Point of Sale Systems (Cash
Registers)
Bar Code Readers
Magnetic Strip Readers
Optical Character
Recognition (OCR)
Radio Frequency (RF)
Capture
Finger Print Scanners
Eye/Facial Scanners
Human Resource
Operation Capture
Machine Operation
Capture
Data Transfer
Local Area Networks
(LAN)
Use
3.1_RiskManagementData.pp
tx
Copyright © Texas Education Agency, 2012. All rights reserved. 7 Wide Area Networks
(WAN)
End of Day Batch
Transfers
Real Time Reporting
Data Processing
Hardware
Main Frame/Server
Computers
Desktop Computers
Hand-held & Portable
Devices
Software
Accounting Software
Statistical Software
Spreadsheets
Data Security
Anonymity of Sites
Firewall Appliances and
Software.
Advanced User Security.
Comprehensive “user”
logs with a good review
process.
Protected Batch Driven
software.
Data Security
Strategic Plans and
Decisions
Copyrighted or Patented
Materials
Competitive Processes
and Techniques
Communications
Misuse of IT technologies
Provide Assignment sheets and discuss
and answer any questions about
assignment (In class or take homeInstructor’s Option)
Provided .docx files
13.1a_RiskManagementData.
docx
Copyright © Texas Education Agency, 2012. All rights reserved. 8 Guided Practice:
See assignments.
Independent Practice:
Review document “Spreadsheets for Statistical Purposes” – in
Common Documents.
See assignments.
Review:
Question:
Describe ways of collecting data.
Question:
What are some main uses of data?
Informal Assessment:
Instructor should observe student discussion and monitor interaction.
Formal Assessment:
Completion of provided assignments using included keys for grading.
Copyright © Texas Education Agency, 2012. All rights reserved. 9 Student Assignment
13.1a Risk Management Data Key
Name: ____________________
The Loan Officers of a large bank were given a report of the cancer
patients receiving treatments at a large hospital for the purpose of
approving a loan for the hospital in regards to the expansion of their
cancer treatment center.
The Loan Officers reviewed the list and found two patients who had
loans at their bank. They immediately called in those loans under the
terms of the loan contract using a clause that states “any identifiable
conditions calling into doubt the ability to service loan, renders the loan
immediately due in full.”
Is this a good business practice? Is what happened unethical? Are
there any illegalities involved? Explain what you find in your research.
Key Words: HIPAA Confidentiality, Medical Privacy, Lending Practices,
Loan Discrimination
Answers will vary.
Copyright © Texas Education Agency, 2012. All rights reserved. 10 NAME:_________________________________________ DATE:____________________ CLASS:______________ Risk Management Data Test TRUE and FALSE: 1. Two types of research include internal and external research A. True B. False 2. Observational studies require random selection. A. True B. False 3. A sample survey is a study that obtains data from a subset of a population, in order to estimate population attributes. A. True B. False 4. In most studies, a census is not practical because of the cost and/or time required. A. True B. False 5. A well‐designed sample survey can provide very precise estimates of population parameters. A. True B. False 6. Causal Inference refers to the appropriateness of applying findings from a study to a larger population. A. True B. False MATCHING: A.
B.
C.
D.
E.
7.
8.
9.
10.
11.
Census Regression Observational Study Measures of Central Tendencies Experiment __________ A controlled study in which the researcher tries to understand cause‐and‐effect relationships. __________ Like experiments, these attempt to understand cause‐and‐effect relationships __________ The measurement of a relationship between two variables. __________ The technique of predictive relationships based upon correlational data. __________ A study that obtains data from every member of a population. MULTIPLE CHOICE: 12. ____ Which of the following is not an example of internal data capture? A. Finger Print Scanner B. Bar Code Reader C. Magnetic Strip Reader D. None of the Above 13. ____ Encryption along with which of the following help to ensure data security? A. Data integrity B. System availability C. Access control D. All of the above 14. ____ Data collection methods consist of _____________. A. Census B. Sample Survey C. Experiment D. All of the above Copyright © Texas Education Agency, 2012. All rights reserved. 11 NAME:_________________________________________ DATE:____________________ CLASS:______________ Risk Management Data Test 15. ____ _____ in statistics are important to give the right direction to research so that it is objective and reflects the truth. A. Ethics B. Bias C. Reliability D. None of the above 16. ____ _____ means that data is protected from deletion and corruption, both while it resides within the database, and while it is being transmitted over the network. A. Availability B. Data Integrity C. Granular access control D. Secure storage 17. ____ All of the following except ______ are potential data security risks. A. Password related threats B. Eavesdropping and data theft C. Data tampering D. Strong accountability 18. ____ Changing the dollar amount of a banking transaction from $100 to $10,000 is an example of ___. A. Data theft and eavesdropping B. Falsifying user identities C. Data tampering D. Password related threats 19. ____ _____ of data loss is caused by insiders, not hackers. A. 50% B. 60% C. 70% D. 80% 20. ____ _______ of Internet break‐ins occur in spite of a firewall being in place. A. 20% B. 30% C. 40% D. 50% 21. ____ _______ are a collection of facts, measurements, or observations used to make inferences about the world we live in. A. Statistics B. Sample Sets C. Populations D. Data 22. ____ Television, Newspapers, Industry Periodicals and Web Searches are all examples of _____. A. Internal Research B. External Research C. Surveys D. Experiments 23. ____ WAN stands for _____. A. World Area Network B. Wide Area Network C. Wide Assisted Network D. Wide Associated Network 24. ____ The _________ is responsible for using the system for legitimate purposes, protecting sensitive data to which they have access, and managing passwords securely. A. Network Administrator B. Database Administrator C. Operating System Administrator D. User 25. ____ This person is responsible for ensuring the security of data in transmission. A. Network Administrator B. Database Administrator C. Operating System Administrator D. User Copyright © Texas Education Agency, 2012. All rights reserved. 12 Risk Management Data Test Key
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
A B A A A B E C D B A D D D A B D C D C D B B D A Copyright © Texas Education Agency, 2012. All rights reserved. 13 
Download