Welcome!

News Feed Item

Northern Light Releases the Global Risk Index to Mark the World Economic Forum Davos Annual Meeting

Analysis Pegged to WEF Risk Categories Indicates the World Got Less Risky in 2013

BOSTON, Jan. 27, 2014 /PRNewswire/ -- Northern Light® marked the World Economic Forum (WEF) annual meeting, concluded this weekend in Davos, Switzerland, with the release of the Northern Light's Global Risk Index (GRI).  This index, based on an analysis of WEF's 50 global risk categories, shows that overall the world is getting less risky, at least for now.

Using the first quarter of 2012 as the starting point with a Northern Light GRI of 100, the GRI peaked in Q4 of 2012 at 147, and declined steadily throughout last year reaching 85 by Q4 of 2013.  This finding is due in part to declining concern over chronic fiscal imbalances, particularly in Europe, over the course of 2013.

(Photo: http://photos.prnewswire.com/prnh/20140127/PH53587 )

To calculate the GRI, Northern Light applies its MI Analyst™ text analytics to an index of over 20 million news articles aggregated from the Web and representing the world's business and technology media.  MI Analyst is Northern Light's text analytics solution optimized for strategic business analysis.  MI Analyst can perform the automated discovery of meaning from large repositories of documents such as news articles and research reports. 

The starting point for the Northern Light GRI is the WEF publically available annual report entitled "Global Risks."  The report identifies 50 global risks categories* and a panel of 469 economic and policy experts solicited by the WEF rates the likelihood and potential impact of each of the risk categories. 

Northern Light took each of the concepts of global risk as described in the WEF annual report and created algorithms that trolled the 20 million article news database looking for indications of the risk factors.  Then each risk factor was weighted for its volume in the news and by its potential impact as rated by the WEF panel of economic experts.  When a risk factor increases in its impact-weighted coverage, Northern Light increments the GRI up, and conversely decrements the GRI when a risk factor declines in impact-weighted coverage.

Using news and Web behavioral data to measure the risk of events is not a new concept. Academic research has validated the practice.  For example, in a paper in the February, 2013, issue of the ACM, Mining the Web to Predict Future Events (http://research.microsoft.com/en-us/um/people/horvitz/future_news_wsdm.pdf), Kira Radinsky of Technion-Israel Institute of Technology and Eric Horvitz or Microsoft Research undertook to mine news stories to predict the future and conclude that it is possible to do so.  In a similar vein, it has been widely reported that user queries on Google (http://www.google.org/flutrends/us/#US ) can predict local flu outbreaks.   

Of the 50 global risk categories analyzed by Northern Light for the GRI, three stand out as most important in the data on an impact-weighted volume basis.  Those three are Chronic Fiscal Imbalances, Terrorism, and Climate Change.  Together, these three contribute 60 percent of the total global risk as measured in the business and technology media.  Sovereign fiscal events drove the GRI in 2012 and 2013.  The index soared with the Eurozone crises at the end of 2012 and then ebbed when the crises was abated.  Interestingly, the fiscal cliff debate in the U.S. at the end of 2013 did not touch off a similar rise in the chatter about catastrophe.  Perception of the risks from terrorism and climate change, though high, were essentially unchanged during this time period.  Also worthy of note, the Boston Marathon terrorist attack in April of 2013 did increment up the perceived risk of terrorism, but it dropped again to about the pre-attack level by yearend, indicating the public did not alter its long term view of the risk based on one event.

"While the Global Risk Index does not predict specific events, since world leaders can act to avoid disaster if they choose to, it can measure the level of danger as perceived by the world's business and technology media, and can also monitor our collective achievements in dealing with the hazards," said C. David Seuss, Northern Light's CEO.  "Overall, despite the media success of doomsday prognosticators and reality TV shows, the journalists at the world's most clued-in publications are telling us that the world has moved to a less risky posture over the last 12 months.  I, for one, will sleep a little better."

Northern Light plans on issuing quarterly updates in the future to the Global Risk Index.

About Northern Light 
Northern Light has been providing strategic research portals, business research content, and search and text analytics technology to global enterprises since 1996.  Northern Light's current clients include Fortune 100 leaders across multiple industries such as information technology, life sciences, financial services, telecommunications, manufacturing, and consumer products. Headquartered in Boston, Massachusetts, Northern Light has unique content aggregation partnerships with more than 150 of the world's leading syndicated technology and industry research publishers, and, along with Lockheed Martin, is a charter member of the Center for Complex Systems and Enterprises at the Stevens Institute of Technology.

Media Contacts:


Sheri Larsen

David Domeshek

Northern Light Group LLC

Domeshek Strategic Communications

(617) 674-2074 ext 6

(508) 873-7068

Email

Email  

* The risk categories enumerated in the WEF 2012 report, on which Northern Light based its analysis, are:

Chronic Fiscal Imbalances

Economic Risks

Chronic Labour Market Imbalances

Economic Risks

Extreme Volatility in Energy and Agricultural Prices

Economic Risks

Hard Landing of an Emerging Economy

Economic Risks

Infrastructure Neglect

Economic Risks

Major Systematic Financial Failure

Economic Risks

Recurring Liquidity Crises

Economic Risks

Severe Income Disparity

Economic Risks

Unforeseen Negative Consequences of Regulations

Economic Risks

Unmanageable Inflation or Deflation

Economic Risks

Antibiotic-Resistant Bacteria

Environmental Risks

Climate Change and Global Warming

Environmental Risks

Irremediable Pollution

Environmental Risks

Land and Waterway Use Mismanagement

Environmental Risks

Mismanaged Urbanization

Environmental Risks

Persistent Extreme Weather

Environmental Risks

Species Overexploitation and Biodiversity Decline

Environmental Risks

Unintended Consequence of Climate Change Mitigation

Environmental Risks

Unprecedented Geophysical Destruction

Environmental Risks

Vulnerability to Geomagnetic Solar Storms

Environmental Risks

Critical Fragile States

Geopolitical Risks

Diffusion of Weapons of Mass Destruction

Geopolitical Risks

Entrenched Organized Crime

Geopolitical Risks

Failure of Diplomatic Conflict Resolution

Geopolitical Risks

Global Governance Failure

Geopolitical Risks

Militarization of Space

Geopolitical Risks

Pervasive Entrenched Corruption

Geopolitical Risks

Terrorism

Geopolitical Risks

Unilateral Resource Nationalization

Geopolitical Risks

Widespread Illicit Trade

Geopolitical Risks

Backlash Against Globalization

Societal Risks

Food Shortage Crises

Societal Risks

Ineffective Drug Policies

Societal Risks

Management of Population Aging

Societal Risks

Rising Rates of Chronic Illness

Societal Risks

Rising Religious Fanaticism

Societal Risks

Unmanaged Migration (Illegal Immigration)

Societal Risks

Unsustainable Population Growth

Societal Risks

Vulnerability To Pandemics

Societal Risks

Water Supply Crises

Societal Risks

Cyber Attacks

Technological Risks

Digital Misinformation

Technological Risks

Failure of the intellectual property regime

Technological Risks

Massive Incident of Data Fraud or Theft

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Proliferation of Orbital Debris

Technological Risks

Unintended Consequences of Nanotechnology

Technological Risks

Unintended Consequence of Life Sciences Technologies

Technological Risks

Read more news from Northern Light.

SOURCE Northern Light

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software sec...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.