StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk And Information - Assignment Example

Cite this document
Summary
As the chairman of the Insurance Club in the University, I was tasked with the obligation of selecting a viable project among the two available projects. I and other club members were to make sure that the selected project will be the most suited to increase the revenues of the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Risk And Information
Read Text Preview

Extract of sample "Risk And Information"

of the paper: RISK AND INFORMATION By As the chairman of the Insurance Club in the University, I was tasked with the obligation of selecting a viable project among the two available projects. I and other club members were to make sure that the selected project will be the most suited to increase the revenues of the club. The suggested sources of revenues were increasing the members’ semester subscription (X) or to invest the available cash to open a bookshop within the campus (Y). On evaluating these two projects; expected value criterion was used.

The expected time period is 5 years. The table below represent the problem that lead to our decision. Project X (subscription)Project Y (bookshop)YearCash flow ($)ProbabilityExpected value ($)Cash flow ($)Probability Expected value ($)140000.1400120000.11200250000.21000100000.151500360000.4240080000.54000470000.2140060000.15900580000.180040000.14001.0A1 = 60001.0A2 =8000 The expected values were calculated using the formula A=∑Aij PjiWhere;A=expected cash flowAij=cash flow of investment in period tPji =probability of cash flowAfter critical analysis using the expected value criterion method, it was evident that project Y (8000) was best suited to increase the revenues as compared to project X (6000).

The expected return of project Y is greater than that of project X. It was therefore decided that the club should invest the cash on starting a bookshop business because it tends to benefit the club more in terms of revenue increase. I am a risk lover, that’s why I’ll opt for option Y which has high risk (high probabilities) but high returns. Factors that could change the probabilitiesRisk preference-the risk preference of an individual can cause the change in the probabilities. Risk averse individuals will always prefer low probabilities (low risk but low returns) when making decisions while risk loving individuals will go for high probabilities (high risk but high returns).

Therefore, if an individual change his/her risk preferences the probabilities will change. Risk premium- this is the difference between the expected value of returns and the sure thing such that the decision maker is indifferent between the returns and the sure thing. The higher the variance of the returns the larger the risk premium hence the higher the probability. Moral hazard- when an individual exercise less care of the outcome of the returns, then it likely that the probabilities of the returns will change.

ReferencesBergmann, B. R. (1981). The Economic Risks of Being a Housewife. American Economic Review, American Economic Association.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk And Information Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Risk And Information Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/macro-microeconomics/1618314-risk-and-information
(Risk And Information Assignment Example | Topics and Well Written Essays - 250 Words)
Risk And Information Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/macro-microeconomics/1618314-risk-and-information.
“Risk And Information Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/macro-microeconomics/1618314-risk-and-information.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk And Information

Information Security

information Security Name: Institution: information SECURITY Following the anti-virus update from McAfee that affected computers running Windows XP internationally, the company made an official announcement, contending that a very small percentage of their clients had been affected.... The effect that the anti-virus malfunction had on ordinary everyday computer users shows that the world is becoming too reliant on information systems.... information systems are now used to store most of the information and transfer the information (Harkins, 2013)....
3 Pages (750 words) Essay

Who Is Minding the Security Store

Managing Risk And Information Security: Protect to Enable.... In this case, the organization must ensure that the vendor is experienced in every aspect of information and data maintenance.... While the hosted solution provider keeps a close look on the company's information system security, the company can focus on their core competencies (Harkins 77).... Experience includes system components that are tolerant to faults, data redundancy in dual locations, processes and systems of data recovery that are sensitive to risk, technical and monitoring support applications that are active 24/7, and a tiered process of software quality assurance....
3 Pages (750 words) Essay

Two Financial Giants Merge

hellip; Here, the systems are controlled through joint supervision with the reception of data from information systems across the merging organizations.... For instance, when systems from Wells Fargo require information from those at Wachovia, they have to form new links between the business end the and control end of the two information systems.... After these links are formed, the integration process moves to the maturity stage where new links are formed between the same ends of the two information systems....
7 Pages (1750 words) Essay

The Importance of Computer Security

This concept is case specific and may depend on life experience, description of the risk, type of risk, and information processing strategies.... The researchers argue that this requires both communicating risk information and motivating the appropriate risk behaviors.... The main theme of Asghapour and her co-researchers were to emphasize the importance of effective security risk communication.... The crucial argument is that the purpose of risk communication is not transmitting truth to the users, but training them to take an appropriate move to respond against a certain threat to their system....
9 Pages (2250 words) Essay

Information Security Risks

This paper ''information Security Risks''  objectives are the identification of the information security threat to contemporary global financial organizations.... The information security requirements that these frameworks have is going to be researched and any an attempt to assign it to the general categories of information security risks will be made to facilitate an easier management  Methods: We performed multiple literature searches on several areas of pertinent research and undertaken interviews and survey questionnaire in order most he relevant up-to dictate informal-to adults “Achieving information security is extremely complicated and requires the combination of technical resources and management procedures....
8 Pages (2000 words) Essay

Financial Accounting Theories in a Real Life

It has been observed from the analysis of the report that there should be certain strict regulations in order to reduce cases related to misleading financial accounts which… Accounting is known as the universal language relating to business all over the world.... It is used to communicate various aspects of the business....
8 Pages (2000 words) Assignment

IT Controls

Organizations customize and execute security controls as part of its far-reaching practices for the management of privacy Risk And Information security.... he compliance of the information system with the laws and regulations involves the organizations executing absolute attentiveness concerning risk management and information of the security (FIPS, 2006).... Security and privacy controls of information systems are one of the primary strategies organizations and individuals implement to protect their operations, assets, etc....
7 Pages (1750 words) Case Study

Brand Credibility Impact on Consumer Price Sensitivity

Brands may also influence how a consumer evaluates the relative values of attributes/levels, perceptions of Risk And Information costs, attribute combination rules, and the decision rules used to make marketplace choices.... From the paper "Brand Credibility Impact on Consumer Price Sensitivity" it is clear that price on consumer utility impact may be moderated by the credibility of the brand when there is consumer uncertainty about it and asymmetric information in the market....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us