Welcome!

News Feed Item

Northern Light Releases the Global Risk Index to Mark the World Economic Forum Davos Annual Meeting

Analysis Pegged to WEF Risk Categories Indicates the World Got Less Risky in 2013

BOSTON, Jan. 27, 2014 /PRNewswire/ -- Northern Light® marked the World Economic Forum (WEF) annual meeting, concluded this weekend in Davos, Switzerland, with the release of the Northern Light's Global Risk Index (GRI).  This index, based on an analysis of WEF's 50 global risk categories, shows that overall the world is getting less risky, at least for now.

Using the first quarter of 2012 as the starting point with a Northern Light GRI of 100, the GRI peaked in Q4 of 2012 at 147, and declined steadily throughout last year reaching 85 by Q4 of 2013.  This finding is due in part to declining concern over chronic fiscal imbalances, particularly in Europe, over the course of 2013.

(Photo: http://photos.prnewswire.com/prnh/20140127/PH53587 )

To calculate the GRI, Northern Light applies its MI Analyst™ text analytics to an index of over 20 million news articles aggregated from the Web and representing the world's business and technology media.  MI Analyst is Northern Light's text analytics solution optimized for strategic business analysis.  MI Analyst can perform the automated discovery of meaning from large repositories of documents such as news articles and research reports. 

The starting point for the Northern Light GRI is the WEF publically available annual report entitled "Global Risks."  The report identifies 50 global risks categories* and a panel of 469 economic and policy experts solicited by the WEF rates the likelihood and potential impact of each of the risk categories. 

Northern Light took each of the concepts of global risk as described in the WEF annual report and created algorithms that trolled the 20 million article news database looking for indications of the risk factors.  Then each risk factor was weighted for its volume in the news and by its potential impact as rated by the WEF panel of economic experts.  When a risk factor increases in its impact-weighted coverage, Northern Light increments the GRI up, and conversely decrements the GRI when a risk factor declines in impact-weighted coverage.

Using news and Web behavioral data to measure the risk of events is not a new concept. Academic research has validated the practice.  For example, in a paper in the February, 2013, issue of the ACM, Mining the Web to Predict Future Events (http://research.microsoft.com/en-us/um/people/horvitz/future_news_wsdm.pdf), Kira Radinsky of Technion-Israel Institute of Technology and Eric Horvitz or Microsoft Research undertook to mine news stories to predict the future and conclude that it is possible to do so.  In a similar vein, it has been widely reported that user queries on Google (http://www.google.org/flutrends/us/#US ) can predict local flu outbreaks.   

Of the 50 global risk categories analyzed by Northern Light for the GRI, three stand out as most important in the data on an impact-weighted volume basis.  Those three are Chronic Fiscal Imbalances, Terrorism, and Climate Change.  Together, these three contribute 60 percent of the total global risk as measured in the business and technology media.  Sovereign fiscal events drove the GRI in 2012 and 2013.  The index soared with the Eurozone crises at the end of 2012 and then ebbed when the crises was abated.  Interestingly, the fiscal cliff debate in the U.S. at the end of 2013 did not touch off a similar rise in the chatter about catastrophe.  Perception of the risks from terrorism and climate change, though high, were essentially unchanged during this time period.  Also worthy of note, the Boston Marathon terrorist attack in April of 2013 did increment up the perceived risk of terrorism, but it dropped again to about the pre-attack level by yearend, indicating the public did not alter its long term view of the risk based on one event.

"While the Global Risk Index does not predict specific events, since world leaders can act to avoid disaster if they choose to, it can measure the level of danger as perceived by the world's business and technology media, and can also monitor our collective achievements in dealing with the hazards," said C. David Seuss, Northern Light's CEO.  "Overall, despite the media success of doomsday prognosticators and reality TV shows, the journalists at the world's most clued-in publications are telling us that the world has moved to a less risky posture over the last 12 months.  I, for one, will sleep a little better."

Northern Light plans on issuing quarterly updates in the future to the Global Risk Index.

About Northern Light 
Northern Light has been providing strategic research portals, business research content, and search and text analytics technology to global enterprises since 1996.  Northern Light's current clients include Fortune 100 leaders across multiple industries such as information technology, life sciences, financial services, telecommunications, manufacturing, and consumer products. Headquartered in Boston, Massachusetts, Northern Light has unique content aggregation partnerships with more than 150 of the world's leading syndicated technology and industry research publishers, and, along with Lockheed Martin, is a charter member of the Center for Complex Systems and Enterprises at the Stevens Institute of Technology.

Media Contacts:


Sheri Larsen

David Domeshek

Northern Light Group LLC

Domeshek Strategic Communications

(617) 674-2074 ext 6

(508) 873-7068

Email

Email  

* The risk categories enumerated in the WEF 2012 report, on which Northern Light based its analysis, are:

Chronic Fiscal Imbalances

Economic Risks

Chronic Labour Market Imbalances

Economic Risks

Extreme Volatility in Energy and Agricultural Prices

Economic Risks

Hard Landing of an Emerging Economy

Economic Risks

Infrastructure Neglect

Economic Risks

Major Systematic Financial Failure

Economic Risks

Recurring Liquidity Crises

Economic Risks

Severe Income Disparity

Economic Risks

Unforeseen Negative Consequences of Regulations

Economic Risks

Unmanageable Inflation or Deflation

Economic Risks

Antibiotic-Resistant Bacteria

Environmental Risks

Climate Change and Global Warming

Environmental Risks

Irremediable Pollution

Environmental Risks

Land and Waterway Use Mismanagement

Environmental Risks

Mismanaged Urbanization

Environmental Risks

Persistent Extreme Weather

Environmental Risks

Species Overexploitation and Biodiversity Decline

Environmental Risks

Unintended Consequence of Climate Change Mitigation

Environmental Risks

Unprecedented Geophysical Destruction

Environmental Risks

Vulnerability to Geomagnetic Solar Storms

Environmental Risks

Critical Fragile States

Geopolitical Risks

Diffusion of Weapons of Mass Destruction

Geopolitical Risks

Entrenched Organized Crime

Geopolitical Risks

Failure of Diplomatic Conflict Resolution

Geopolitical Risks

Global Governance Failure

Geopolitical Risks

Militarization of Space

Geopolitical Risks

Pervasive Entrenched Corruption

Geopolitical Risks

Terrorism

Geopolitical Risks

Unilateral Resource Nationalization

Geopolitical Risks

Widespread Illicit Trade

Geopolitical Risks

Backlash Against Globalization

Societal Risks

Food Shortage Crises

Societal Risks

Ineffective Drug Policies

Societal Risks

Management of Population Aging

Societal Risks

Rising Rates of Chronic Illness

Societal Risks

Rising Religious Fanaticism

Societal Risks

Unmanaged Migration (Illegal Immigration)

Societal Risks

Unsustainable Population Growth

Societal Risks

Vulnerability To Pandemics

Societal Risks

Water Supply Crises

Societal Risks

Cyber Attacks

Technological Risks

Digital Misinformation

Technological Risks

Failure of the intellectual property regime

Technological Risks

Massive Incident of Data Fraud or Theft

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Proliferation of Orbital Debris

Technological Risks

Unintended Consequences of Nanotechnology

Technological Risks

Unintended Consequence of Life Sciences Technologies

Technological Risks

Read more news from Northern Light.

SOURCE Northern Light

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...