Welcome!

News Feed Item

Northern Light Releases the Global Risk Index to Mark the World Economic Forum Davos Annual Meeting

Analysis Pegged to WEF Risk Categories Indicates the World Got Less Risky in 2013

BOSTON, Jan. 27, 2014 /PRNewswire/ -- Northern Light® marked the World Economic Forum (WEF) annual meeting, concluded this weekend in Davos, Switzerland, with the release of the Northern Light's Global Risk Index (GRI).  This index, based on an analysis of WEF's 50 global risk categories, shows that overall the world is getting less risky, at least for now.

Using the first quarter of 2012 as the starting point with a Northern Light GRI of 100, the GRI peaked in Q4 of 2012 at 147, and declined steadily throughout last year reaching 85 by Q4 of 2013.  This finding is due in part to declining concern over chronic fiscal imbalances, particularly in Europe, over the course of 2013.

(Photo: http://photos.prnewswire.com/prnh/20140127/PH53587 )

To calculate the GRI, Northern Light applies its MI Analyst™ text analytics to an index of over 20 million news articles aggregated from the Web and representing the world's business and technology media.  MI Analyst is Northern Light's text analytics solution optimized for strategic business analysis.  MI Analyst can perform the automated discovery of meaning from large repositories of documents such as news articles and research reports. 

The starting point for the Northern Light GRI is the WEF publically available annual report entitled "Global Risks."  The report identifies 50 global risks categories* and a panel of 469 economic and policy experts solicited by the WEF rates the likelihood and potential impact of each of the risk categories. 

Northern Light took each of the concepts of global risk as described in the WEF annual report and created algorithms that trolled the 20 million article news database looking for indications of the risk factors.  Then each risk factor was weighted for its volume in the news and by its potential impact as rated by the WEF panel of economic experts.  When a risk factor increases in its impact-weighted coverage, Northern Light increments the GRI up, and conversely decrements the GRI when a risk factor declines in impact-weighted coverage.

Using news and Web behavioral data to measure the risk of events is not a new concept. Academic research has validated the practice.  For example, in a paper in the February, 2013, issue of the ACM, Mining the Web to Predict Future Events (http://research.microsoft.com/en-us/um/people/horvitz/future_news_wsdm.pdf), Kira Radinsky of Technion-Israel Institute of Technology and Eric Horvitz or Microsoft Research undertook to mine news stories to predict the future and conclude that it is possible to do so.  In a similar vein, it has been widely reported that user queries on Google (http://www.google.org/flutrends/us/#US ) can predict local flu outbreaks.   

Of the 50 global risk categories analyzed by Northern Light for the GRI, three stand out as most important in the data on an impact-weighted volume basis.  Those three are Chronic Fiscal Imbalances, Terrorism, and Climate Change.  Together, these three contribute 60 percent of the total global risk as measured in the business and technology media.  Sovereign fiscal events drove the GRI in 2012 and 2013.  The index soared with the Eurozone crises at the end of 2012 and then ebbed when the crises was abated.  Interestingly, the fiscal cliff debate in the U.S. at the end of 2013 did not touch off a similar rise in the chatter about catastrophe.  Perception of the risks from terrorism and climate change, though high, were essentially unchanged during this time period.  Also worthy of note, the Boston Marathon terrorist attack in April of 2013 did increment up the perceived risk of terrorism, but it dropped again to about the pre-attack level by yearend, indicating the public did not alter its long term view of the risk based on one event.

"While the Global Risk Index does not predict specific events, since world leaders can act to avoid disaster if they choose to, it can measure the level of danger as perceived by the world's business and technology media, and can also monitor our collective achievements in dealing with the hazards," said C. David Seuss, Northern Light's CEO.  "Overall, despite the media success of doomsday prognosticators and reality TV shows, the journalists at the world's most clued-in publications are telling us that the world has moved to a less risky posture over the last 12 months.  I, for one, will sleep a little better."

Northern Light plans on issuing quarterly updates in the future to the Global Risk Index.

About Northern Light 
Northern Light has been providing strategic research portals, business research content, and search and text analytics technology to global enterprises since 1996.  Northern Light's current clients include Fortune 100 leaders across multiple industries such as information technology, life sciences, financial services, telecommunications, manufacturing, and consumer products. Headquartered in Boston, Massachusetts, Northern Light has unique content aggregation partnerships with more than 150 of the world's leading syndicated technology and industry research publishers, and, along with Lockheed Martin, is a charter member of the Center for Complex Systems and Enterprises at the Stevens Institute of Technology.

Media Contacts:


Sheri Larsen

David Domeshek

Northern Light Group LLC

Domeshek Strategic Communications

(617) 674-2074 ext 6

(508) 873-7068

Email

Email  

* The risk categories enumerated in the WEF 2012 report, on which Northern Light based its analysis, are:

Chronic Fiscal Imbalances

Economic Risks

Chronic Labour Market Imbalances

Economic Risks

Extreme Volatility in Energy and Agricultural Prices

Economic Risks

Hard Landing of an Emerging Economy

Economic Risks

Infrastructure Neglect

Economic Risks

Major Systematic Financial Failure

Economic Risks

Recurring Liquidity Crises

Economic Risks

Severe Income Disparity

Economic Risks

Unforeseen Negative Consequences of Regulations

Economic Risks

Unmanageable Inflation or Deflation

Economic Risks

Antibiotic-Resistant Bacteria

Environmental Risks

Climate Change and Global Warming

Environmental Risks

Irremediable Pollution

Environmental Risks

Land and Waterway Use Mismanagement

Environmental Risks

Mismanaged Urbanization

Environmental Risks

Persistent Extreme Weather

Environmental Risks

Species Overexploitation and Biodiversity Decline

Environmental Risks

Unintended Consequence of Climate Change Mitigation

Environmental Risks

Unprecedented Geophysical Destruction

Environmental Risks

Vulnerability to Geomagnetic Solar Storms

Environmental Risks

Critical Fragile States

Geopolitical Risks

Diffusion of Weapons of Mass Destruction

Geopolitical Risks

Entrenched Organized Crime

Geopolitical Risks

Failure of Diplomatic Conflict Resolution

Geopolitical Risks

Global Governance Failure

Geopolitical Risks

Militarization of Space

Geopolitical Risks

Pervasive Entrenched Corruption

Geopolitical Risks

Terrorism

Geopolitical Risks

Unilateral Resource Nationalization

Geopolitical Risks

Widespread Illicit Trade

Geopolitical Risks

Backlash Against Globalization

Societal Risks

Food Shortage Crises

Societal Risks

Ineffective Drug Policies

Societal Risks

Management of Population Aging

Societal Risks

Rising Rates of Chronic Illness

Societal Risks

Rising Religious Fanaticism

Societal Risks

Unmanaged Migration (Illegal Immigration)

Societal Risks

Unsustainable Population Growth

Societal Risks

Vulnerability To Pandemics

Societal Risks

Water Supply Crises

Societal Risks

Cyber Attacks

Technological Risks

Digital Misinformation

Technological Risks

Failure of the intellectual property regime

Technological Risks

Massive Incident of Data Fraud or Theft

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Mineral Resource Supply Vulnerability

Technological Risks

Proliferation of Orbital Debris

Technological Risks

Unintended Consequences of Nanotechnology

Technological Risks

Unintended Consequence of Life Sciences Technologies

Technological Risks

Read more news from Northern Light.

SOURCE Northern Light

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
As machines are increasingly connected to the internet, it’s becoming easier to discover the numerous ways Industrial IoT (IIoT) is helping to shape the business world. This is exactly why we have decided to take a closer look at this pervasive movement and to examine the desire to connect more things! Now if you need a refresher on IIoT and how it is changing the world, take a moment and listen to Greg Gorbach with ARC Advisory Group. Gorbach believes, "IIoT will significantly change the worl...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit y...
Cloud computing changed data analytics for good. It enabled companies to drastically decrease resources and architecture previously assigned with business intelligence departments. It also enabled laymen to run advanced business analytics. Cloud was also the architecture of choice for storing and processing big data. Data piling is a continuous process, which is going to explode with emerging Internet of Things concept. Answer to this issue developers found in new concept called fog computing. ...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will discuss the vast to...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
SYS-CON Events announced today the How to Create Angular 2 Clients for the Cloud Workshop, being held June 7, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified. Now it’s a component-based well-performing framework. The immersive one-day workshop led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and...