Click here to close now.




















Welcome!

News Feed Item

Northern Light Releases the Global Risk Index to Mark the World Economic Forum Davos Annual Meeting

Analysis Pegged to WEF Risk Categories Indicates the World Got Less Risky in 2013

BOSTON, Jan. 27, 2014 /PRNewswire/ -- Northern Light® marked the World Economic Forum (WEF) annual meeting, concluded this weekend in Davos, Switzerland, with the release of the Northern Light's Global Risk Index (GRI).  This index, based on an analysis of WEF's 50 global risk categories, shows that overall the world is getting less risky, at least for now.

Using the first quarter of 2012 as the starting point with a Northern Light GRI of 100, the GRI peaked in Q4 of 2012 at 147, and declined steadily throughout last year reaching 85 by Q4 of 2013.  This finding is due in part to declining concern over chronic fiscal imbalances, particularly in Europe, over the course of 2013.

(Photo: http://photos.prnewswire.com/prnh/20140127/PH53587 )

To calculate the GRI, Northern Light applies its MI Analyst™ text analytics to an index of over 20 million news articles aggregated from the Web and representing the world's business and technology media.  MI Analyst is Northern Light's text analytics solution optimized for strategic business analysis.  MI Analyst can perform the automated discovery of meaning from large repositories of documents such as news articles and research reports. 

The starting point for the Northern Light GRI is the WEF publically available annual report entitled "Global Risks."  The report identifies 50 global risks categories* and a panel of 469 economic and policy experts solicited by the WEF rates the likelihood and potential impact of each of the risk categories. 

Northern Light took each of the concepts of global risk as described in the WEF annual report and created algorithms that trolled the 20 million article news database looking for indications of the risk factors.  Then each risk factor was weighted for its volume in the news and by its potential impact as rated by the WEF panel of economic experts.  When a risk factor increases in its impact-weighted coverage, Northern Light increments the GRI up, and conversely decrements the GRI when a risk factor declines in impact-weighted coverage.

Using news and Web behavioral data to measure the risk of events is not a new concept. Academic research has validated the practice.  For example, in a paper in the February, 2013, issue of the ACM, Mining the Web to Predict Future Events (http://research.microsoft.com/en-us/um/people/horvitz/future_news_wsdm.pdf), Kira Radinsky of Technion-Israel Institute of Technology and Eric Horvitz or Microsoft Research undertook to mine news stories to predict the future and conclude that it is possible to do so.  In a similar vein, it has been widely reported that user queries on Google (http://www.google.org/flutrends/us/#US ) can predict local flu outbreaks.   

Of the 50 global risk categories analyzed by Northern Light for the GRI, three stand out as most important in the data on an impact-weighted volume basis.  Those three are Chronic Fiscal Imbalances, Terrorism, and Climate Change.  Together, these three contribute 60 percent of the total global risk as measured in the business and technology media.  Sovereign fiscal events drove the GRI in 2012 and 2013.  The index soared with the Eurozone crises at the end of 2012 and then ebbed when the crises was abated.  Interestingly, the fiscal cliff debate in the U.S. at the end of 2013 did not touch off a similar rise in the chatter about catastrophe.  Perception of the risks from terrorism and climate change, though high, were essentially unchanged during this time period.  Also worthy of note, the Boston Marathon terrorist attack in April of 2013 did increment up the perceived risk of terrorism, but it dropped again to about the pre-attack level by yearend, indicating the public did not alter its long term view of the risk based on one event.

"While the Global Risk Index does not predict specific events, since world leaders can act to avoid disaster if they choose to, it can measure the level of danger as perceived by the world's business and technology media, and can also monitor our collective achievements in dealing with the hazards," said C. David Seuss, Northern Light's CEO.  "Overall, despite the media success of doomsday prognosticators and reality TV shows, the journalists at the world's most clued-in publications are telling us that the world has moved to a less risky posture over the last 12 months.  I, for one, will sleep a little better."

Northern Light plans on issuing quarterly updates in the future to the Global Risk Index.

About Northern Light 
Northern Light has been providing strategic research portals, business research content, and search and text analytics technology to global enterprises since 1996.  Northern Light's current clients include Fortune 100 leaders across multiple industries such as information technology, life sciences, financial services, telecommunications, manufacturing, and consumer products. Headquartered in Boston, Massachusetts, Northern Light has unique content aggregation partnerships with more than 150 of the world's leading syndicated technology and industry research publishers, and, along with Lockheed Martin, is a charter member of the Center for Complex Systems and Enterprises at the Stevens Institute of Technology.

Media Contacts:


Sheri Larsen

David Domeshek

Northern Light Group LLC

Domeshek Strategic Communications

(617) 674-2074 ext 6

(508) 873-7068

Email

Email  

* The risk categories enumerated in the WEF 2012 report, on which Northern Light based its analysis, are:

Chronic Fiscal Imbalances

Economic Risks

Chronic Labour Market Imbalances

Economic Risks

Extreme Volatility in Energy and Agricultural Prices

Economic Risks

Hard Landing of an Emerging Economy

Economic Risks

Infrastructure Neglect

Economic Risks

Major Systematic Financial Failure

Economic Risks

Recurring Liquidity Crises

Economic Risks

Severe Income Disparity

Economic Risks

Unforeseen Negative Consequences of Regulations

Economic Risks

Unmanageable Inflation or Deflation

Economic Risks

Antibiotic-Resistant Bacteria

Environmental Risks

Climate Change and Global Warming

Environmental Risks

Irremediable Pollution

Environmental Risks

Land and Waterway Use Mismanagement

Environmental Risks

Mismanaged Urbanization

Environmental Risks

Persistent Extreme Weather

Environmental Risks

Species Overexploitation and Biodiversity Decline

Environmental Risks

Unintended Consequence of Climate Change Mitigation

Environmental Risks

Unprecedented Geophysical Destruction

Environmental Risks

Vulnerability to Geomagnetic Solar Storms

Environmental Risks

Critical Fragile States

Geopolitical Risks

Diffusion of Weapons of Mass Destruction

Geopolitical Risks

Entrenched Organized Crime

Geopolitical Risks

Failure of Diplomatic Conflict Resolution

Geopolitical Risks

Global Governance Failure

Geopolitical Risks

Militarization of Space

Geopolitical Risks

Pervasive Entrenched Corruption

Geopolitical Risks

Terrorism

Geopolitical Risks

Unilateral Resource Nationalization

Geopolitical Risks

Widespread Illicit Trade

Geopolitical Risks

Backlash Against Globalization

Societal Risks

Food Shortage Crises

Societal Risks

Ineffective Drug Policies

Societal Risks

Management of Population Aging

Societal Risks

Rising Rates of Chronic Illness

Societal Risks

Rising Religious Fanaticism

Societal Risks

Unmanaged Migration (Illegal Immigration)

Societal Risks

Unsustainable Population Growth

Societal Risks

Vulnerability To Pandemics

Societal Risks

Water Supply Crises

Societal Risks

Cyber Attacks

Technological Risks

Digital Misinformation

Technological Risks

Failure of the intellectual property regime

Technological Risks

Massive Incident of Data Fraud or Theft

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Proliferation of Orbital Debris

Technological Risks

Unintended Consequences of Nanotechnology

Technological Risks

Unintended Consequence of Life Sciences Technologies

Technological Risks

Read more news from Northern Light.

SOURCE Northern Light

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so the...
Everyone talks about continuous integration and continuous delivery but those are just two ends of the pipeline. In the middle of DevOps is continuous testing (CT), and many organizations are struggling to implement continuous testing effectively. After all, without continuous testing there is no delivery. And Lab-As-A-Service (LaaS) enhances the CT with dynamic on-demand self-serve test topologies. CT together with LAAS make a powerful combination that perfectly serves complex software developm...