Skip to main content
Top
Published in: Applied Network Science 1/2018

Open Access 01-12-2018 | Research

Evolution of threats in the global risk network

Authors: Xiang Niu, Alaa Moussawi, Gyorgy Korniss, Boleslaw K. Szymanski

Published in: Applied Network Science | Issue 1/2018

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With a steadily growing population and rapid advancements in technology, the global economy is increasing in size and complexity. This growth exacerbates global vulnerabilities and may lead to unforeseen consequences such as global pandemics fueled by air travel, cyberspace attacks, and cascading failures caused by the weakest link in a supply chain. Hence, a quantitative understanding of the mechanisms driving global network vulnerabilities is urgently needed. Developing methods for efficiently monitoring evolution of the global economy is essential to such understanding. Each year the World Economic Forum publishes an authoritative report on the state of the global economy and identifies risks that are likely to be active, impactful or contagious. Using a Cascading Alternating Renewal Process approach to model the dynamics of the global risk network, we are able to answer critical questions regarding the evolution of this network. To fully trace the evolution of the network we analyze the asymptotic state of risks (risk levels which would be reached in the long term if the risks were left unabated) given a snapshot in time; this elucidates the various challenges faced by the world community at each point in time. We also investigate the influence exerted by each risk on others. Results presented here are obtained through either quantitative analysis or computational simulations.
Notes
Xiang Niu and Boleslaw K. Szymanski contributed equally to this work.
Abbreviations
AGGI
Annual greenhouse gas index
CARP
Cascading alternating renewal processes
CTA
Collaborative Technology Alliance
DTRA
Defense Threat Reduction Agency
EU
European Union
FAO
Food and Agriculture Organization
ISIS
Islamic State in Iraq and Syria
KS
Kolmogorov-Smirnov
MLE
Maximum likelihood estimation
NATO
North Atlantic Treaty Organization
RPI
Rensselaer Polytechnic Institute
SIS
Susceptible-infectious-susceptible
U.S.
the United States
WEF
World Economic Forum

Introduction

Recently, cascading failures have been extensively studied, with most studies on infrastructure systems (Moussawi et al. 2017; Dobson et al. 2007), financial institutions (Haldane and May 2011; Gai and Kapadia 2010; Battiston et al. 2012), and the Internet (Oppenheimer et al. 2003; Brown and Patterson 2001). In (Moussawi et al. 2017), the authors analyze cascading failures in power grid networks. In real and synthetic spatial systems, they study properties of failures and strategies to reduce the corresponding damages. In either single-node or multi-nodes cases, the damage caused by attacks is weakly correlated with network properties, such as node degree or initial state load. They also test different mitigation strategies and various combinations of node failures. Knowing in advance a set of failing nodes and damage incurred by every single-node failure, they are able to predict the damage caused by sets of multi-node failures. That is because, in the multi-node failure, the node with the highest damage dominates the entire multi-node cascading failure. Authors in (Dobson et al. 2007) also focus on blackout cascading failure mechanisms. Studying the real blackouts from a few countries, they find that frequencies of blackouts exhibit a power-law distribution in agreement with the scale-free property of complex networks. The authors’ power system model suggests that the real power system gradually reaches a critical point.
In the area of financial institutions, authors in (Haldane and May 2011) discuss the failures of banking ecosystems. Inspired by models from food webs and disease networks, the authors apply an analogous model in financial networks to reduce risks. In (Gai and Kapadia 2010), the authors study the contagion in the financial market. They mainly focus on the robustness of asset market liquidity. With a novel model based on the Poisson random graph in the banking system, they find that high average degree of nodes increases both the probability of transmission and the speed of contagion. Using the feedback-centrality, the authors in (Battiston et al. 2012) propose a DebtRank to find the critical nodes that play the most important role in the systemic failure of financial networks. They studied a real dataset from Fed emergency loans program and detected 22 institutions that were critical to 2008-2010 crises. They also find that some small institutions can be important because of their high centralities in the network. Unlike here, the authors do not even attempt to match the model with historical data. In (Kenett et al. 2015; 2012; Raddant and Kenett 2016; Havlin and Kenett 2015), the authors observe historical correlations between stock prices and build stock dependency networks. They also consider events that may affect the stock market such as “tsunami in Japan”. In their node failure analysis, they mainly focus on the failure of one industry and test the system tolerance of such failure. In summary, the research in the above papers targets the cascade failures in the global financial market.
Some other analyses are related to the cascade failure of the Internet. In (Oppenheimer et al. 2003), the authors analyze the fault-tolerance of Internet service. They establish that Internet failures are mainly caused by operator errors and suggest the use of extensive online testing to reduce the failure rates. In (Brown and Patterson 2001), the authors find that the latent errors are likely to accumulate within the Internet services and cause chain reaction cascades. In (Majdandzic et al. 2014), the authors analyze spontaneous recovery from cascading failures of economy. In their model, a node can fail independently or by external causes. All nodes have the same internal failure probability so the authors can solve the model using mean-field equation.
Only a few of studies discussed above focus on the cascades of global risks (Szymanski et al. 2015; Lin et al. 2017). Yet, the global risks impact highly global economy and lives of countless people. Hence, there is an urgent need to study and understand global risk network. Here, we model such network using a Cascading Alternating Renewal Processes (CARP) (Szymanski et al. 2015; Lin et al. 2017; Cox and Miller 1977). In the model, a system alternates between active and passive states, denoted by 1 and 0 respectively. An active risk represents a failed node, while a passive risk corresponds to a fully operational node. State transitions are instantaneous. They are triggered by non-homogeneous Poisson processes (Szymanski et al. 2015). Given the complexity of real-world network interactions and node specific dynamics, the processes causing state transitions may be observable, or latent. The latent processes are not directly observable, only their combined effect, a state transition, is. In the global risk model, the latent processes are categorized as endogenous (caused internally at the node) or exogenous (caused by neighboring active risk node) Poisson processes. Their parameters are recovered by maximum likelihood estimation from the records of historical events.
The risks listed in the WEF Global Risk Reports (World Economic Forum Global Risks Report 2013; 2014; 2015; World Economic ForumGlobal Risks Report 2016; World Economic Forum Global Risks Report 2017) constantly change; new risks arise and are added to the network, while existing active risks either continue to be a threat and remain in the network, or, thanks to the response of threatened governments and industry, decline in importance and are removed. This evolution causes continuous changes in the global risks and their probabilities, and leads to an annual revision of the list of risks present in the network. However, if left unabated, the global risk network would approach the steady state, in which some risk will be active much more frequently making their threats much more pronounced than in the initial state. These considerations motivate us not to compare the states of the global risk network at fixed points in time. Instead, we compare the steady states to which these initial states would evolve if no changes to the system had been introduced. Looking at the steady states accentuates the different challenges that the well-being and stability of the global risks network has faced at each reported point in the time.
The CARP model has been successfully applied to analyze cascading failures of global risks in (Szymanski et al. 2015) by taking into account the interconnectivity and interdependence among risks. This model is also used here to analyze the evolution of the global risk network. Furthermore, in (Lin et al. 2017), the authors investigate the asymptotic normality of the MLE procedure used to find the most likely model parameters in CARP. They demonstrate that this property is preserved in the presence of latent processes causing state transitions. We use this property here to bind the error of model parameter recovery in the global risk network.
In the following sections of the paper we analyze evolution of risks over the years 2013-2017. Some of these results were presented in (Niu et al. 2017) but they were limited to two points in time, year 2013 and year 2017. Hence, the number of the results and points of evolution presented here more than doubled. Consequently, all the analyses and evaluations were expanded accordingly. In particular, we first present the annual evolution of the risk network itself from 2013 to 2017. We also show how the definitions of risks themselves change and how we deal with these changes. Finally, we present and discuss how steady states of risks evolve annually.

Models

CARP

The CARP model for the global risk network contains two primary types of Poisson processes: two latent passive risk activation processes and a directly observable active risk continuation process. Here, we further subdivide the passive risk activation type into internal activation and external activation. We assume that the active risk continuation process is always triggered internally. The corresponding Poisson processes are defined as follows (Szymanski et al. 2015).
  • Passive risk with internal activation: a passive risk i is activated internally with intensity \(\lambda _{i}^{int}\). The Poisson probability of transition over one time unit is \(p_{i}^{int}=1-e^{-\lambda _{i}^{int}}\).
  • Passive risk with external activation: a passive risk i is activated externally by the neighboring active risk j with intensity \(\lambda _{ji}^{ext}\). The corresponding Poisson probability is \(p_{ji}^{ext}=1-e^{-\lambda _{ji}^{ext}}\).
  • Active risk continuation: an active risk i continues its activity for the next time unit internally with intensity \(\lambda _{i}^{con}\). The corresponding Poisson probability is \(p_{i}^{con}=1-e^{-\lambda _{i}^{con}}=1-p_{i}^{rec}\), where \(p_{i}^{rec}\) denotes probability of recovery in a time unit from an active risk i.
Using the likelihood li for each risk i provided by experts in the WEF Global Risk Reports (World Economic Forum Global Risks Report 2013; 2014; 2015; 2016; 2017), we obtain a normalized likelihood Li, which indicates how likely a risk i is to be active by logarithmic transformation \(\lambda _{i}^{int}=-\alpha \ln (1-L_{i})\), \(\lambda _{ji}^{ext}=-\beta \ln (1-L_{i})\), \(\lambda _{i}^{con}=-\gamma \ln (1-L_{i})\) (Szymanski et al. 2015) getting:
$$\begin{array}{@{}rcl@{}} p_{i}^{int}&=&1-(1-L_{i})^{\alpha} \\ p_{ji}^{ext}&=&1-(1-L_{i})^{\beta} \\ p_{i}^{con}&=&1-(1-L_{i})^{\gamma}. \end{array} $$
(1)
The advantage of Eq. 1 is that the probabilities of the three Poisson processes are defined only by a normalized likelihood Li and model parameters α,β,γ. These parameters are needed because while humans can often adequately estimate relative probabilities by crowd sourcing, they usually are less precise in predicting absolute probabilities. By providing a mapping from likelihood to probabilities based on the most likely values of the model parameters obtained through MLE procedure (Pawitan 2001) they model over historical data, we account for expert biases that may render the absolute probabilities inaccurate, while extracting relevant information from the relative estimations of the likelihoods.
After combining the probabilities of all possible transitions of the Poisson processes in the risk network, we obtain the state transition probabilities (Szymanski et al. 2015) as
$$\begin{array}{@{}rcl@{}} P_{i}(t)^{0\rightarrow1}&=&1-(1-p_{i}^{int})\prod_{j\in N_{i}} \left(1-p_{ji}^{ext}\right) \\ P_{i}(t)^{1\rightarrow0}&=&p_{i}^{rec}. \end{array} $$
(2)
where \(P_{i}(t)^{s_{1}\rightarrow s_{2}}\) represents the probability of a state transition from state s1 to state s2 for risk i at time t, while Ni represents the set of neighbors of risk i that were active at time t−1.
The specific state transition probability of all risks over one time unit is \(\overrightarrow {S(t)}=\prod _{i=1}^{R} P_{i}(t)^{s_{i}(t)\rightarrow s_{i}(t+1)}\), where we sum over all R risks. The likelihood of the sequence of state transition of all risks is \(L(\overrightarrow {S(1)},\overrightarrow {S(2)},\ldots,\overrightarrow {S(T)})=\prod _{t=1}^{T-1} \prod _{i=1}^{R} P_{i}(t)^{s_{i}(t)\rightarrow s_{i}(t+1)}\), where T represents the number of time steps during the entire observed or predicted evolution (Szymanski et al. 2015). The corresponding log-likelihood is
$$\begin{array}{@{}rcl@{}} \ln L(\overrightarrow{S(1)},\overrightarrow{S(2)},\ldots,\overrightarrow{S(T)})=\sum\limits_{t=1}^{T-1} \sum\limits_{i=1}^{R} \ln P_{i}(t)^{s_{i}(t)\rightarrow s_{i}(t+1)}. \end{array} $$
(3)
We compute the most likely values of model parameters α,β, and γ by maximizing the log-likelihood (Eq. 3) of the observed state transitions over the historical data (Dempster et al. 1977; Pawitan 2001). With these most likely values, we simulate the system evolution to identify the mean-field steady state evolution of the global risk network at any particular point in time. Given the state of the global risk network at time t we ask to what state the network will evolve as t if it is not further influenced by external actors. We simulate the system evolution as t training on historical data till time t, and relying only on learned model dynamics past time t. We approximate the asymptotic state at a finite time at which activity frequencies for all risks stabilize.
The CARP model for global risk network was first proposed and analyzed in detail in (Szymanski et al. 2015). Through the study of 2013 network, the authors calculate the contagion potentials of risks, risk persistence and risk failure cascade survival probability caused by a single risk failure. The risk persistence is calculated as the fraction of time steps during which a risk is active. The contagion potential is not positively correlated with internal activation probability, but is mainly defined by external activation and recovery probabilities. Ranked by their contagion potentials, the top three risks are: “Severe income disparity”, “Chronic fiscal imbalances”, and “Rising greenhouse gas emissions”. The results show that about 80% of the time, the number of active risks is between 8 and 19. By setting internal activation probabilities of risks to zero, the authors found cascade survival probability initiated by a single risk decreases exponentially with time. To validate the choice of the model, the authors compared it with 60 alternative models, including disconnected model (β=0, so only internal activation is acting), expert data based model (α=1,β=0, internal activation is equal to likelihood Li), uniform model (likelihood Li is ignored), weighted network model (edges are assigned different weights depending on the number of experts listing them) and combinations of them. The CARP model outperforms all other models with at least 95% statistical confidence interval because it takes into account the interconnectivity and interdependence among risks.
The precision of predictability is likely to depend on the quality and amount of historical ground truth data. Thus, in (Lin et al. 2017), the authors proposed an artificial model of fire propagation among houses to establish the limits of model predictability. The authors use simulations of CARP model to generate data with arbitrary lengths (from 100 to 6400 time steps) and arbitrary number of variants of model execution. The authors use these variants as alternative historical ground truth data. They measure the prediction precision between variants at different length of alternative historical data, and study how the prediction precision changes over time. The authors conclude that the average relative error of parameter recovery decays according to the power law of the size of historical data and ultimately tends to zero when the length of historical data tends to infinity. These results demonstrate that the asymptotic normality of MLE holds also in the presence of latent Poisson processes.
There are some similarities between the CARP model (Cox and Miller 1977) and epidemic models, such as SIS (Pastor-Satorras et al. 2015), if we consider risks as a population undergoing infection with the activation pathogen. Yet deeper comparison reveals that the CARP model is more complex by including latent exogenous (becoming sick by infection) and directly observable endogenous (becoming sick without or not through contact with infected nodes) activation. Thus, finding model parameters matching historical data is more complex in CARP model than in epidemic model. Another significant difference is the evolution of transition probabilities and risk population, as new threats arise, old ones die, and some existing risks change their probability to activate as a result of the increasing resilience developed by threatened governments, organizations, and people.

Risk network evolution

In the World Economic Forum (WEF) Global Risk Reports (World Economic Forum Global Risks Report 2013; 2014; 2015; 2016; 2017), experts define risks in five categories: economic, environmental, geopolitical, societal and technological. The list of risks is shown in Table 1. We use five different colors to differentiate between risk categories and to aid the understanding of the WEF network, because each year the risks are categorized slightly differently. To track related risks, we give them identical numerical codes. The categories of risks vary over the years as well. For example, risk 21a “Illicit trade” is in the geopolitical category in 2013 and 2014 when experts felt illicit activity and crime were probable risks. In 2016 and 2017 this risk is categorized as economic, considering that such trade impacts more the global economy than geopolitical factors. In the 2013 risk network, the risks are uniformly distributed over the five categories. From 2014 to 2017, the economic risks category is the largest and contains around eight risks; the environmental, geopolitical and societal categories contain approximately six risks, and the technological category is the smallest with mostly four risks.
Table 1
Indices and descriptions of global risks from the year 2013 to 2017
https://static-content.springer.com/image/art%3A10.1007%2Fs41109-018-0077-0/MediaObjects/41109_2018_77_Figa_HTML.png
To compare related risks in different years, we give them same numerical code but different alphabetical indices here. In the World Economic Forum (WEF) Global Risk Reports, experts define risks in 5 categories: economic (blue), environmental (green), geopolitical (orange), societal (red) and technological (purple)
Figures 1 and 2 show how the global risk network and it’s properties have changed over time. In Fig. 1, each node represents different risk from Table 1. Each undirected unweighted link of two endpoints represents that the two risks are related in opinion of some WEF experts. For the WEF report, each of the experts was asked to answer the question: “Global risks are not isolated and it is important to assess their interconnections. In your view, which are the most strongly connected global risks? Please select three to six pairs of global risks.” Then the interconnection wij between risks i and j is calculated as:
$$ {\displaystyle \begin{array}{cc}{w}_{ij}& =\sqrt{\frac{\sum_{n=1}^N pai{r}_{ij,n}}{pai{r}_{max}}}\\ {} pai{r}_{max}& =\underset{ij}{\max}\left(\sum \limits_{n=1}^N pai{r}_{ij,n}\right)\end{array}} $$
(4)
where pairij,n is 1 if the risks i and j are interconnected from the perspective of expert n, otherwise it is 0 (World Economic Forum Global Risks Report 2017). In paper (Szymanski et al. 2015), the authors report on testing whether the model with weighted edges outperforms the one used here which has unweighted edges and current model was statistically significantly better than the weighted edge alternative. By definition, these edges represent risk relationships, thus they act as transmission channels for risk propagation through the external activation process. The 2013 risk network is the largest, with the greatest average degree. Despite this, due to the smaller size of the 2017 network, its risks have greater interconnectivity, a larger mean clustering coefficient, and a smaller diameter. Most subfigures in Fig. 2 show that the 2013, 2015, and 2017 networks are denser than the 2014 and 2016 networks.

Historical events

We utilize and update the event dataset created for (Szymanski et al. 2015), which included news, academic articles, Wikipedia entries, etc. from Jan. 2000 to Dec. 2012, and from which we collected 13×12×50=7,800 data points for the 2013 risk network. For the 2014 to the 2017 risk networks, we relabel prior events and collect new events dated from Jan. 2013 to Dec. 2016. Thus the total number of data points is now 17×12×62=12,648, for 62 risks in Table 1. Each data point indicates if a risk is active or passive in a certain month. By maximizing the log-likelihood defined by Eq. 3 for the observed state transitions (Dempster et al. 1977; Pawitan 2001), we obtain the most likely values of model parameters α,β,γ for each year.
Figure 3 shows the timeline of historical events. Among economic risks, activation of some events is recorded directly based on the corresponding Wikipedia articles, such as “European debt crisis”, “Subprime mortgage crisis” and “Air travel disruption after the 2010 Eyjafjallajokull eruption”. Activation of other events is identified through human processing of the online statistical data. “U.S. high unemployment rate” is recorded when the United States (U.S.) unemployment rate is above 7.5%, “EU high unemployment rate” is recognized when the European Union (EU) unemployment rate is above 9.5%. The “Oil price shock” is recognized when the yearly change of oil price per barrel exceeds $40 which happened during 2008 and 2009, and during 2011 and 2012. “U.S. housing bubble burst” is recorded when the average new house purchase price in the U.S., reaches above $280,000. “EU deflation” is recognized when the inflation rate is below 0% in the EU, “Global inflation” is recorded when major economic regions such as the U.S. and the EU have the inflation rate above 2%. “U.S. severe income disparity” is recognized when U.S. top 1% of U.S. richest people own more than 20% of total incomes. Most of the economic risk events activated at around 2008 but then became passive after 2014. There is also a chain reaction among them, “U.S. housing bubble” caused “Subprime mortgage crisis”, then led to “U.S. and EU high unemployment rate” and “European debt crisis”.
Among environmental risks, “Hurricane seasons” is identified according to the yearly Atlantic and Pacific hurricane seasons, which happen regularly every year, starting from May and ending in December. Risk 12 “Failure of climate-change mitigation and adaptation” is recognized when there are tremendous damages caused by climate change such as hurricanes Allison, Dean, and Alex. We consider damage as tremendous when the cost is above $1 billion. Risk 13 “loss of biodiversity” is recognized when common bird index drops below 100. Risk 14 “Major natural catastrophes” are identified by deadliest earthquakes, avalanches, wildfires, heat waves, solar storms, etc. Those events also happen naturally, but last shorter than extreme weather events. “Deforestation of the Amazon Rainforest” is recorded when yearly deforestation rate is above 15,000 km2 which happened from 2000 to 2005. “Deepwater Horizon oil spill” happened in 2010, “Beijing air pollution soars to hazard level” was observed in 2012. Unlike economic risk events, those events usually last up to a year. “Rising greenhouse gas emissions” is recorded when Annual Greenhouse Gas Index (AGGI) exceeds 1.2.
Among geopolitical risks, Risk 17 “State collapse or crisis” is recognized by all coups d’état and coup attempts. Most of them ends within a month. Among few events related to Risk 18 “Weapons of mass destruction”, we list “Destruction of Syria’s chemical weapons” in 2013 and several “North Korean nuclear test” started in 2006. Risk 19 “Interstate conflict” activation list includes major global conflicts from 2000: “War on Terror”, “Second Congo War”, “Syrian Civil War”, “Iraqi Civil War”, and “Cold War II”. The “War on Terror” was triggered by “911 attack” in 2001 and includes the wars in Afghanistan, Iraqi, Syria, etc. We consider it ended in 2007 when British government abandoned the use of the term. But the conflicts between nations and terrorists continue to happen. The “Second Congo War” from 1998 to 2003 involved nine nations and often is referred to as “Africa’s World War”. The “Syrian Civil War” from 2011 and the “Iraqi Civil War” from 2014 are sometimes described as “proto-world war”. “Cold War II” refers to the political tension between two opposing geopolitical sides, with one led by Russia and China, and the other led by the United States and NATO. It starts at the same time with the “Ukraine crisis” event activation in 2013. The events related to Risk 20 “Large-scale terrorist attack” are selected from the worldwide worst terrorist strikes each of which caused at least 300 injuries, 100 fatalities or 20 fatalities among children. Illicit financial flows from developing countries are above $1 trillion per year from 2011. We consider activation of Risk 22b “Pervasive entrenched corruption” occurs when there is at least one country in the world with the Corruption Perceptions Index above 10%. The scope of Risk 23 “Failure of global governance” is close to Risk 19 “Interstate conflict”, since it includes the inability to resolve issues of terrorism, wars, political and economic tensions between countries. The geopolitical risks are closely related and share similar activity scope: 2001-2006 and 2012-2016. We can see correlation between events related to those risks. These events started with “911” followed by the increase of the number and damages of terrorist attacks.
Among the societal risks, there were two major world food price crises during 2007-2008 and 2010-2014, flagged by the rise of the FAO deflated food price index above 150. The peak of the number of “water conflicts” was reached during 2012-2014 (above 15 conflicts per year) in the Middle East, which is most likely caused by the geopolitical risks. Risk 29a “Rapid and massive spread of infectious diseases” includes infectious diseases that cause more than thousands death and had worldwide impact, such as “SARS”, “H1N1” and “Ebola”. The new disease occurs every several years and it also last takes several years before it stops spreading. Risk 30 “Large-scale involuntary migration” includes migration crises in the U.S. and the EU. In “U.S. migration crisis”, tens of thousands of women and children from El Salvador, Guatemala, and Honduras migrated to the United States in 2014. In “EU migration crisis”, more than 50,000 refugees were arriving in EU each month in 2015. The refugees mainly come from Eritrea, Nigeria, Somalia, Syria, and Afghanistan. Risk 31 “Profound political and social instability” includes major global protests. Risk 34 “Mismanagement of population ageing” mostly activates in developing countries such as China and India. Risk 35 “Rising religious fanaticism” mostly materializes in the Middle East.
Among technological risks, Risk 37 “Breakdown of critical information infrastructure and networks” materializes every several years. But each time it lasts a short period. The source of the risk could be natural or human-made incidents, such as “Submarine cable disruption”, government control or social instability, such as “Egypt blackout” during the Egyptian revolution, or cyberattacks, such as “Dyn cyberattack”. Risk 38 “Large-scale cyberattacks” includes “Indiscriminate attacks”, “Destructive attacks”, “Cyberwarfare”, “Government espionage”, “Corporate espionage”, “Stolen e-mail addresses and login credentials”, “Stolen credit card and financial data”, and “Stolen medical-related data”. Some of the cyberattacks are caused by geopolitical risks, such as “Cyberattacks during the Russo-Georgian War”. Some are related to social instabilities. Some are possibly caused by economic risks, such as “2014 JPMorgan Chase data breach”. It is also part of Risk 39 “Massive incident of data fraud/theft”, which includes major incidents of data breaches. One of the most significant data theft events is “Global surveillance disclosure” in 2013. Cyberattack and Data theft become significant during 2013 and 2014. Most of the other technological risks are unforeseen consequences of technological advances and may materialize in the future.
For a particular month, there are four different reasons to label a risk as being active. One is monthly statistical data, such as “unemployment rate”, “oil price”, “housing price”, “deflation rate”, and “food price index”. They are recorded month by month, which can be directly used to label a risk. Another reason is yearly statistical data, such as “yearly deforestation rate”, “annual greenhouse gas index”, “corruption perceptions index”, and “number of water conflicts per year”. They are recorded year by year. Thus, we use one year’s single data point to estimate a risk status for twelve months. The third one is the record of daily events, such as “air travel disruption”, “oil spill”, “nuclear test”, “terrorist attack”, “blackout”, and “cyber attacks”. Within a certain month, if at least predefined number of events occurs, we consider the corresponding risk as active for the whole month. The last reason is the record of continuous events, such as “European debt crisis”, “subprime mortgage crisis”, “hurricane seasons”, “civil war”, “spread of disease”, “migration”, and “data breaches”. Since those events usually last several months, we consider corresponding risks as active from the beginning to the end of the event.
Of the five categories, economic and geopolitical risks have strong intra-dependence, environmental risks happens quite regularly and are relatively independent from each other, while societal and technological risks are affected by and have strong inter-dependence with geopolitical and economic risks.

Mean-field steady state points

Simulation

With the fitted parameters α,β,γ, and the activation and recovery probabilities, we can perform Monte Carlo simulations of the cascades of global risks. Figure 4 shows the frequency of a risk being active at each time step t during the simulation of the 2017 risk network with all risks initially inactive. With different initial states, the risk trajectories differ but eventually reach the same steady state. The frequency of risk i being active at time t is the ratio of the number of simulation months during which risk i is active to the total number of simulation months t. The frequency distributions of risks being active mainly change from 10 to 1000 steps, and generally saturate afterward. In the steady state, the frequencies of risks being active varies a lot even for risks in the same category. By denoting the probability of risk i being active at time t as pi(t), we define such frequencies to be stable when pi(t)≈pi(t+1). By plugging in the state transition probabilities from Eq. 2, we have
$$ \left[1-p_{i}(t)\right]P_{i}(t)^{0\rightarrow1}+p_{i}(t)\left[1-P_{i}(t)^{1\rightarrow0}\right]=p_{i}(t+1)=p_{i}(t).\\ $$
(5)
Thus,
$$\begin{array}{@{}rcl@{}} \hat{p_{i}}&=&\frac{P_{i}^{0\rightarrow1}}{P_{i}^{0\rightarrow1}+P_{i}^{1\rightarrow0}}=\frac{1-(1-L_{i})^{\alpha+\beta\sum_{j\in N_{i}}\hat{p_{j}}}}{1-(1-L_{i})^{\alpha+\beta\sum_{j\in N_{i}}\hat{p_{j}}}+(1-L_{i})^{\gamma}}, \end{array} $$
(6)
where \(\hat {p_{i}}\) is the steady state probability of risk i being active, computed with a successive approximation method. The results are plotted in Fig. 5.

Risk evolution

Figure 5 shows the evolution of the global risks networks and their mean-field steady state points. To see the changes in risks, we display related risks and their indices in the five networks side by side. In Table 1 from 2013 to 2017 five risk categories remain the same, while around 20 risks vanish or merge into other risks. Risk 05b “Extreme volatility in energy and agriculture prices” is changed to Risk 05a “Severe energy price shock” after 2014. The extreme volatility in agriculture prices is merged into Risk 27 “Food crises”. Risk 07c “Unmanageable inflation or deflation” splits into risk 07a “Deflation in a major economy” and 07b “Unmanageable inflation”. Risk 08 “Severe income disparity”, 09 “Unforeseen negative consequences of regulation”, and 10 “Hard landing of an emerging economy” are not discussed since/after 2014, because of the recovery of the global economy. Risk 14b “Unprecedented geophysical destruction” and 14c “Vulnerability to geomagnetic storms” are merged into 14a “Major natural catastrophes”. Risk 15b “Irremediable pollution”, 15c “Land and waterway use mismanagement” and 15d “Rising greenhouse gas emissions” are merged into 15a “Man-made environmental catastrophes”. Risk 16 “Antibiotic-resistant bacteria” is not discussed after 2014. Risk 21a “Illicit trade” is changed from geopolitical to economic and not described in 2015. Risk 26 “Failure of urban planning” changes from an environmental to a geopolitical. Risk 30 “Large-scale involuntary migration” is not described in 2014. Risk 31 “Profound social instability” is newly proposed in 2014 while risks 32-36 are removed because of their low likelihoods and impacts. Finally, risks 40b-42 are excluded because most of them describe unforeseen consequences of advanced technologies and have not yet occurred.
Comparing the mean-field steady state probabilities of risks from 2013 to 2017 in Figs. 6, 7, 8, 9, 10 and 11, we find that the probabilities of economic risks widely decreased, reflecting a gradual global recovery from the 2008 economic crisis. Only “State collapse”, “Large-scale terrorist attacks”, “Illicit trade” and “Large-scale involuntary migration” significantly increased in the category of geopolitical and societal risks, respectively. This reveals the downside of “Failure of global governance”. Considering environmental risks, we find that man-made risks decreased, while only natural risks “Extreme weather events” and “Major natural disasters” increased. The ability of the public to prevent environmental degradation improved. In the technological risks category, “Massive incident of data fraud/theft” increases due to the boom of private data in the Internet era. The global risks transfer from economic to geopolitical and societal, as technological risks become heightened.

Analytic probabilities and empirical observations

Figure 5 shows the analytic probabilities of risk being active at steady state over years. Figure 3 depicts the time periods at which specific risk activities were observed and recorded. The analytic probabilities are smoother than the observations because they provide a real numbers instead of a binary signal. Empirical observations contain more detailed information than analytic probabilities. Although there are some differences, their main results are very consistent. Both results show the economic risks becoming inactive after year 2014. The environmental risks happen regularly every year. The geopolitical risks are highly interconnected. The risks “State collapse”, “Interstate conflict” and “Failure of national governance” have similar activity time scope. “Terrorist attacks” and “Illicit trade” are becoming important recently. The risk “Migration” had active start from year 2016. The activity of technological risks gradually increases over years.

Model validations

Parameter recovery precision

To test the accuracy of parameter recovery process for each year, we first take the learned α,β,γ as ground truth parameters, then use them to generate 125 test datasets with the same time steps of the historical data. From 125 test dataset, we learned 125 sets of new parameters that we use as sets of as test parameters. We consider activation parameter as aα+bβ, where a,b is the average fraction of internal and external activation in a dataset. The recovery parameter equals to γ. From 125 sets test parameters, we first filter out 33.3% outliers with the largest KS distance, defined by Eq. 7, to the ground truth parameters, then determine the relative activation bound and recovery bound in the rest 66.6% of the sets. We call those sets validation dataset and we refer to the corresponding parameters as validation parameters.
$$\begin{array}{@{}rcl@{}} KS(v_{1}, v_{2}) = \max_{i}(|v_{1}\left[i\right]/v_{2}\left[i\right]-1|) \end{array} $$
(7)
In this experiment, v1 of Eq. 7 is a vector of validation parameters, while v2 is a vector of ground truth parameters. Each vector contains two variables, activation parameter and recovery parameter. Table 2 shows the bounds of activation and recovery parameters for each year network. In 2013, recovery bound 0.087 represents that within the validation parameters, the largest absolute relative error of recovery parameter to the ground truth recovery parameter is 0.087. For all risk networks, the relative error bound of activation parameter is less than 20%, the relative error bound of recovery parameter is around 10%.
Table 2
Relative error bounds of activation and recovery parameters of global risks from the year 2013 to 2017
 
2013
2014
2015
2016
2017
activation bound
0.181
0.125
0.174
0.200
0.188
recovery bound
0.087
0.104
0.119
0.077
0.071
Clearly activation bounds are higher, up to 2.5 times higher than corresponding recovery bounds. The former peak at 20% in 2016, while the latter peak at 12% in 2015
Furthermore, we use the set of ground truth parameters and each set of validation parameters to generate another 12 months of data after the end of ground truth historical data. In this test, we run 100 realizations and calculate the average frequency of risk being active and risk activation for each set of parameters and the results are plotted in Fig. 12. The average frequencies of risk being active are the sum of number of risks being active in each month averaged over R risks and 12 months. The average frequencies of risk activation are the number of times any of the risks was activated over the entire simulation averaged over R risks. In both tests of all risk networks, the average results of ground truth and validation data are very close. The absolute relative error of results in the worst simulation in validation data to the average results in ground truth data is around 20%.

Network effects

We compare the simulation results by CARP model with and without network effect in Fig. 13. This test is based on 2013 network and dataset from (Szymanski et al. 2015). The network model is the simulation of the 2013 network in Fig. 1, while the independent model ignores network effects by disregarding all edges. In general, compared with the independent model, the accuracy of the network model is significantly higher as evidenced by having the mean simulated activity closer to historical data than independent model does and by requiring 47% smaller multiple of standard deviation bound to cover all historical data than the independent model needs. Some other network effect analyses were presented in (Niu et al. 2017). The results show that the isolated risks (nodes with low degrees) have extremely low external activation fractions and thus are unlikely to be influenced by other risks in the network.

Sensitivity tests

In this subsection, we consider another two important factors: likelihood and historical data. Figure 14 shows the sensitivity test by changing the likelihood or historical data of single or all risks. The probability of a risk being active at steady state is sensitive to both likelihood and historical data. In the likelihood test, a risk is sensitive to the change of its single likelihood but tolerant to the change of all risks likelihoods. In the historical data test, on the contrary, a risk is tolerant to the change of its single historical activity but sensitive to the change of all risks historical activity.

External activation

Transition fractions

With the steady state probability of a risk being active, we can compute the probability of three different transition processes:
  • internal activation: \(A_{i}^{int}=(1-\hat {p_{i}})p_{i}^{int}\) is the probability of inactive risk i\((1-\hat {p_{i}})\) being triggered internally \(p_{i}^{int}\).
  • external activation: \(A_{i}^{ext}=(1-\hat {p_{i}})\left [1-\left (1-p_{ji}^{ext}\right)^{{\sum \nolimits }_{j\in N_{i}}\hat {p_{j}}}\right ]\) is the probability of inactive risk i\((1-\hat {p_{i}})\) being triggered externally \(1-\left (1-p_{ji}^{ext}\right)^{\sum _{j\in N_{i}}\hat {p_{j}}}\).
  • internal recovery: \(A_{i}^{rec}=\hat {p_{i}}p_{i}^{rec}\) is the probability of active risk i\((\hat {p_{i}})\) recovering \(p_{i}^{rec}\).
For simplicity, we ignore the probability of a risk being activated both internally and externally with probability \((1-\hat {p_{i}})p_{i}^{int}\left [1-(1-p_{ji}^{ext})^{{\sum \nolimits }_{j\in N_{i}}\hat {p_{j}}}\right ]\) (the value is negligible). Thus, the three transition processes can be treated as independent variables. With the probabilities of transition processes, we can get the fraction of one transition process to all possible transitions for each risk by setting \(a_{i}^{int}=\frac {A_{i}^{int}}{A_{i}^{int}+A_{i}^{ext}+A_{i}^{rec}}\), \(a_{i}^{ext}=\frac {A_{i}^{ext}}{A_{i}^{int}+A_{i}^{ext}+A_{i}^{rec}}\), \(a_{i}^{rec}=\frac {A_{i}^{rec}}{A_{i}^{int}+A_{i}^{ext}+A_{i}^{rec}}\).

Risk influence

In this section, we calculate the influence exerted by one risk on others. In the experiments, we first disable a risk i by setting its normalized likelihood Li=0, and then calculate the new external activation frequency of risk j as \(a_{j-i}^{ext}\) (ji). We obtain
$$ I_{i\rightarrow j}=a_{j}^{ext}-a_{j-i}^{ext}, $$
(8)
where Iij is an indicator of the influence that risk i exerts on risk j, quantifying the external activation effects of risk i onto risk j.
Figure 15 shows the influence of a category of risks on other categories, which discerns between cause and correlation of risks. From 2013 to 2017, the most significant changes in risk influence categories are observed for economic and technological risks. The economic risks used to be the most influential risks and had the highest impact on other risks. However, as of 2017 their influence decreased. Instead, the influence of geopolitical and societal risks increased. In 2013, technological risks were the least vulnerable risks and had very limited influence on others. Although they are still the least influential risks in 2017, we can see an increasing trend in their influence. As shown in Figs. 1 and 2, the 2014 and 2016 risk networks are sparser than the others. In a sparse risk network, risks have a higher tendency to connect with ones in the same category. Thus, the risk categories in 2014 and 2016 have largest self-influence in Fig. 15.

Conclusions

Here, we use the CARP model to simulate cascades in the global risk networks. With the most likely model parameters obtained through MLE (maximum likelihood estimation) and applied to a real event dataset, we compute the mean-field steady state probabilities of risks being active for each year from 2013 to 2017. The results obtained for the annual risk networks from 2013 to 2017 show significant changes in the asymptotic mean-field probabilities of risk activation. Applying the approach to finding bounds on recovery in CARP model presented in (Lin et al. 2017) to the global risk network, we measure the error of model parameter recovery and find that it is bounded by ± 20% of the values obtained with historical data for years from 2013 to 2017. The corresponding error of the risk activity is smaller but of similar magnitude. Since the range of values for critical risks reported above was much larger, we can conclude that we have enough historical data to support the conclusions of our paper. Finally, by computing the difference of external activation frequencies of risk j with enabled and disabled risk i, we define the influence Iij that risk i exerts on risk j. The results for the annual risk networks from 2013 to 2017 demonstrate that the influence among risks changes significantly over the years.
With the CARP model, we first compare yearly risks and then measure the quantitative changes of risks that provide an interesting view on evolution of the global economy and its risks. The activation probabilities and influences of economic risks are dramatically reduced as a result of economic recovery since 2014. The increase in activation probability of state collapse, terrorist attacks, illicit trade and migration show the negative effects of the failure of global governance, especially inaction of certain international bodies, like the Security Council of the United Nations. Technological risks are becoming more influential as well due to the increase of private data leaks. In each year from 2013 to 2017, the significance of economic threats decreases, while geopolitical and societal risks become more detrimental. All those analytic results are consistent with empirical observations. The quantitative analysis of our method creates a basis for developing tools for predictions of future risk network evolution and for guidance how to reduce damages caused by future risk cascades.

Acknowledgments

The authors thank Dr. Noemi Derzsy for helpful discussion of this work in its preliminary stages.

Funding

This work was supported in part by the Army Research Laboratory under Cooperative Agreement Number W911NF-09-2-0053 (the Network Science CTA), by the Army Research Office grant no. W911NF-16-1-0524, and by DTRA Award No. HDTRA1-09-1-0049. The views and conclusions contained in this document are those of the authors.

Availability of data and materials

Data are available online via WEF website, see bibliography.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Literature
go back to reference Battiston, S, Puliga M, Kaushik R, Tasca P, Caldarelli G (2012) Debtrank: Too central to fail? financial networks, the fed and systemic risk. Sci Rep 2:541.ADSCrossRef Battiston, S, Puliga M, Kaushik R, Tasca P, Caldarelli G (2012) Debtrank: Too central to fail? financial networks, the fed and systemic risk. Sci Rep 2:541.ADSCrossRef
go back to reference Brown, A, Patterson DA (2001) Embracing failure: A case for recovery-oriented computing (ROC) In: High Performance Transaction Processing Symposium, vol 10, 3–8.. USENIX, Berkeley. Brown, A, Patterson DA (2001) Embracing failure: A case for recovery-oriented computing (ROC) In: High Performance Transaction Processing Symposium, vol 10, 3–8.. USENIX, Berkeley.
go back to reference Cox, DR, Miller HD (1977) The Theory of Stochastic Processes. CRC Press, Florida.MATH Cox, DR, Miller HD (1977) The Theory of Stochastic Processes. CRC Press, Florida.MATH
go back to reference Dempster, AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the EM Algorithm. J R Stat Soc B 39(1):1–38.MathSciNetMATH Dempster, AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the EM Algorithm. J R Stat Soc B 39(1):1–38.MathSciNetMATH
go back to reference Dobson, I, Carreras BA, Lynch VE, Newman DE (2007) Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization. Chaos 17(2):026103.ADSCrossRefMATH Dobson, I, Carreras BA, Lynch VE, Newman DE (2007) Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization. Chaos 17(2):026103.ADSCrossRefMATH
go back to reference Havlin, S, Kenett DY (2015) Cascading failures in interdependent economic networks In: Proceedings of the International Conference on Social Modeling and Simulation, Plus Econophysics Colloquium 2014, 87–97.. Springer, Berlin.CrossRef Havlin, S, Kenett DY (2015) Cascading failures in interdependent economic networks In: Proceedings of the International Conference on Social Modeling and Simulation, Plus Econophysics Colloquium 2014, 87–97.. Springer, Berlin.CrossRef
go back to reference Gai, P, Kapadia S (2010) Contagion in financial networks In: P. R. Soc. A, vol 466, 2401–2423.. The Royal Society, London. Gai, P, Kapadia S (2010) Contagion in financial networks In: P. R. Soc. A, vol 466, 2401–2423.. The Royal Society, London.
go back to reference Kenett, DY, Huang X, Vodenska I, Havlin S, Stanley HE (2015) Partial correlation analysis: Applications for financial markets. Quan Fin 15(4):569–578.MathSciNetCrossRef Kenett, DY, Huang X, Vodenska I, Havlin S, Stanley HE (2015) Partial correlation analysis: Applications for financial markets. Quan Fin 15(4):569–578.MathSciNetCrossRef
go back to reference Kenett, DY, Preis T, Gur-Gershgoren G, Ben-Jacob E (2012) Dependency network and node influence: Application to the study of financial markets. Int J Bifurcation Chaos 22(07):1250181.CrossRef Kenett, DY, Preis T, Gur-Gershgoren G, Ben-Jacob E (2012) Dependency network and node influence: Application to the study of financial markets. Int J Bifurcation Chaos 22(07):1250181.CrossRef
go back to reference Lin, X, Moussawi A, Korniss G, Bakdash JZ, Szymanski BK (2017) Limits of risk predictability in a cascading alternating renewal process model, vol 7. Sci Rep, 6699.. Nature Publishing Group, London. Lin, X, Moussawi A, Korniss G, Bakdash JZ, Szymanski BK (2017) Limits of risk predictability in a cascading alternating renewal process model, vol 7. Sci Rep, 6699.. Nature Publishing Group, London.
go back to reference Majdandzic, A, Podobnik B, Buldyrev SV, Kenett DY, Havlin S, Stanley HE (2014) Spontaneous recovery in dynamical networks. Nat Phys 10(1):34.CrossRef Majdandzic, A, Podobnik B, Buldyrev SV, Kenett DY, Havlin S, Stanley HE (2014) Spontaneous recovery in dynamical networks. Nat Phys 10(1):34.CrossRef
go back to reference Moussawi, A, Derzsy N, Lin X, Szymanski BK, Korniss G (2017) Limits of predictability of cascading overload failures in spatially-embedded networks with distributed flows. Sci Rep 7:11729.ADSCrossRef Moussawi, A, Derzsy N, Lin X, Szymanski BK, Korniss G (2017) Limits of predictability of cascading overload failures in spatially-embedded networks with distributed flows. Sci Rep 7:11729.ADSCrossRef
go back to reference Niu, X, Moussawi A, Derzsy N, Lin X, Korniss G, Szymanski BK (2017) Evolution of the global risk network mean-field stability point In: International Workshop on Complex Networks and Their Applications, 1124–1134.. Springer. Niu, X, Moussawi A, Derzsy N, Lin X, Korniss G, Szymanski BK (2017) Evolution of the global risk network mean-field stability point In: International Workshop on Complex Networks and Their Applications, 1124–1134.. Springer.
go back to reference Oppenheimer, D, Ganapathi A, Patterson DA (2003) Why do internet services fail, and what can be done about it? In: USENIX Symposium on Internet Technologies and Systems, vol 67.. USENIX, Berkeley. Oppenheimer, D, Ganapathi A, Patterson DA (2003) Why do internet services fail, and what can be done about it? In: USENIX Symposium on Internet Technologies and Systems, vol 67.. USENIX, Berkeley.
go back to reference Pastor-Satorras, R, Castellano C, Van Mieghem P, Vespignani A (2015) Epidemic processes in complex networks. Rev Mod Phys 87(925):141–153.MathSciNet Pastor-Satorras, R, Castellano C, Van Mieghem P, Vespignani A (2015) Epidemic processes in complex networks. Rev Mod Phys 87(925):141–153.MathSciNet
go back to reference Pawitan, Y (2001) In All Likelihood: Statistical Modelling and Inference Using Likelihood. Oxford University Press, Oxford.MATH Pawitan, Y (2001) In All Likelihood: Statistical Modelling and Inference Using Likelihood. Oxford University Press, Oxford.MATH
go back to reference Raddant, M, Kenett DY (2016) Interconnectedness in the global financial market. Office of Financial Research, U.S. Department of Treasury, Paper No. 16-09, pp. 1-37. Raddant, M, Kenett DY (2016) Interconnectedness in the global financial market. Office of Financial Research, U.S. Department of Treasury, Paper No. 16-09, pp. 1-37.
go back to reference Szymanski, BK, Lin X, Asztalos A, Sreenivasan S (2015) Failure dynamics of the global risk network. Sci Rep 5:10998.ADSCrossRef Szymanski, BK, Lin X, Asztalos A, Sreenivasan S (2015) Failure dynamics of the global risk network. Sci Rep 5:10998.ADSCrossRef
Metadata
Title
Evolution of threats in the global risk network
Authors
Xiang Niu
Alaa Moussawi
Gyorgy Korniss
Boleslaw K. Szymanski
Publication date
01-12-2018
Publisher
Springer International Publishing
Published in
Applied Network Science / Issue 1/2018
Electronic ISSN: 2364-8228
DOI
https://doi.org/10.1007/s41109-018-0077-0

Other articles of this Issue 1/2018

Applied Network Science 1/2018 Go to the issue

Premium Partner