Risk Analysis: Technology Outstrips Firms' Abilities to Use It

February 2010
Securities Industry News;2/22/2010, Vol. 22 Issue 4, p18
Trade Publication
The article explains why risk analytics technology has been developed to a point where it has outpaced the abilities of financial services firms to use it. Risk analytics is used for two main purposes, for risk management and safeguarding shareholders' interests and for monitoring unexpected and potentially disastrous events that could damage an economic system. A history of the development of the technology for risk analysis which was based on the development of and advances in computers is presented.


Related Articles

  • Driving Business Results with Technology In 2009. Sraeel, Holly // Bank Technology News;Jan2009, Vol. 22 Issue 1, p8 

    The article reports on the significant role played by technologies in enhancing the performance of the financial services industry in the U.S. It reveals that adopting innovation by banks will help them to efficiently assess risk and address the challenges brought by the financial crisis. Also,...

  • The mechanics of managing IT risk*. Charette, Robert N. // Journal of Information Technology (Routledge, Ltd.);Dec96, Vol. 11 Issue 4, p373 

    Presents the tutorial on the process and activities involved in performing risk management. Application of risk management to information technology (IT) projects; Mechanics involved in managing IT risk; Activities in risk analysis.

  • Project Risk Management. Lehman, Bill // Mortgage Banking;Feb2007, Vol. 67 Issue 5, p99 

    The article reports on the significance of risk management towards technology projects within the financial services industry in the U.S. Risk analysis has been considered as one of the important aspect in dealing with risks within the mortgage business. Several types of risks have been...

  • Risk management is an investment priority for financial services.  // Fairfield County Business Journal;4/28/2003, Vol. 42 Issue 17, p5 

    Focuses on the plans of financial services providers to spend large amounts on information technology (IT) for risk management. Emphasis on addressing complex issues about risk management; Development of initiatives to deliver necessary support; Factors considered in IT budgeting.

  • The role of systems and applications monitoring in operational risk management. A. Edmiston // BT Technology Journal;Jan2007, Vol. 25 Issue 1, p68 

    Abstract  Operational risk management is a reflection of the need for enterprises to demonstrate that they are prepared for all eventualities, through monitoring day-to-day operational risks.IT is an area that is critical to modern enterprises and consequently carries with it the capacity...

  • Addressing Information Security Risks by Adopting Standards. Al-Ahmad, Walid; Mohammad, Bassil // International Journal of Information Security Science;Jun2013, Vol. 2 Issue 2, p28 

    Modern society depends on information technology in nearly every facet of human activity including, finance, transportation, education, government, and defense. Organizations are exposed to various and increasing kinds of risks, including information technology risks. Several standards, best...

  • Calculating the risk equation. Barwise, Mike // Computer Weekly;1/16/2003, p30 

    Focuses on the significance of correct risk assessment in the information technology sector's security management. Ambiguities related to risk assessment; Use of precise classification of risk in security management; Steps for evaluating the assets of an enterprise for determination of the...

  • Avoiding the pitfalls of risk. Steen, Margaret // InfoWorld;12/22/97-12/29/97, Vol. 19 Issue 51/52, p75 

    Focuses on the need for information technology managers to include risk assessment and management program to their projects. Problems encountered by an organization with risk management; Ways on how to assess and manage risks.

  • Analyzing and Prioritizing Risk in IT Security: Methods for Gathering Information in a Dynamic Environment. Guglielmo, Gabe // Commercial Law Bulletin;Jul/Aug2004, Vol. 19 Issue 4, p20 

    Presents tips for analyzing and prioritizing risk in information technology security in the field of commercial law in the U.S. Gathering of critical risk information; Risk assessment; Monitoring of internal usage of the system.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics