10,756
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

The role of data analytics within operational risk management: A systematic review from the financial services and energy sectors

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 374-402 | Received 08 Dec 2020, Accepted 05 Feb 2022, Published online: 27 Feb 2022

References

  • Abbass, W., Baina, A., & Bellafkih, M. (2020). Evaluation of security risks using Apriori algorithm [Paper presentation]. 13th International Conference on Intelligent Systems: Theories and Applications, SITA 2020.
  • Abidemi, B. M., Kayode, A. B., Favour-Bethy, T. A., & Otasowie, I. (2014). A bayesian network model for risk management in cyber situation [Paper presentation]. World Congress on Engineering and Computer Science 2014, WCECS 2014.
  • Actuaries Institute. (2020). Pandemic briefing: Addressing COVID-19 impacts on non-financial risks in FCRs. https://actuaries.logicaldoc.cloud/download-ticket?ticketId=9c78fa88-27f4-444e-ba00-5762b561952e
  • Ahmed, N., & Abraham, A. (2015). Modeling cloud computing risk assessment using ensemble methods [Paper presentation]. 4th World Congress on Information and Communication Technologies, WICT 2014.
  • Akinosho, T. D., Oyedele, L. O., Bilal, M., Ajayi, A. O., Delgado, M. D., Akinade, O. O., & Ahmed, A. A. (2020). Deep learning in the construction industry: A review of present status and future innovations. Journal of Building Engineering, 32, 101827. https://doi.org/10.1016/j.jobe.2020.101827
  • Akter, S., Michael, K., Uddin, M. R., McCarthy, G., & Rahman, M. (2022). Transforming business using digital innovations: The application of AI, blockchain, cloud and data analytics. Annals of Operations Research, 308(1–2), 7–39. https://doi.org/10.1007/s10479-020-03620-w
  • Amoako, R., Buaba, J., & Brickey, A. (2020). Identifying risk factors from MSHA accidents and injury data using logistic regression. Mining, Metallurgy and Exploration, 38(1), 1–19.
  • Araz, O. M., Choi, T. M., Olson, D. L., & Salman, F. S. (2020). Role of analytics for operational risk management in the era of big data. Decision Sciences, 51(6), 1320–1346. https://doi.org/10.1111/deci.12451
  • Aria, M., & Cuccurullo, C. (2017). bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. https://doi.org/10.1016/j.joi.2017.08.007
  • Arumugam, S., Gupta, S., Patra, B., Rajan, S., & Agarwal, S. (2016). Revealing patterns within the drilling reports using text mining techniques for efficient knowledge management [Paper presentation]. 2016 SPE Eastern Regional Meeting, ERM 2016. https://doi.org/10.2118/184062-MS
  • Ashley, M. (2020). Risk heat maps have failed us… now what? https://www.linkedin.com/pulse/risk-heat-maps-have-failed-us-now-what-mike-ashley/
  • Australian Business Deans Council. (2019). 2019 Australian Business Deans Council (ABDC) journal quality list.
  • Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253(1), 1–13. https://doi.org/10.1016/j.ejor.2015.12.023
  • Aven, T., & Flage, R. (2020). Foundational challenges for advancing the field and discipline of risk analysis. Risk Analysis: An Official Publication of the Society for Risk Analysis, 40(S1), 2128–2136.
  • Azar, A., & Mostafaee Dolatabad, K. (2019). A method for modelling operational risk with fuzzy cognitive maps and Bayesian belief networks. Expert Systems with Applications, 115, 607–617. https://doi.org/10.1016/j.eswa.2018.08.043
  • Aziz, S., & Dowling, M. (2019). Machine learning and AI for risk management. In T. Lynn, J. G. Mooney, P. Rosati, & M. Cummins (Eds.), Disrupting finance (pp. 33–50). Palgrave Pivot.
  • Azvine, B., Cui, Z., Majeed, B., & Spott, M. (2007). Operational risk management with real-time business intelligence. BT Technology Journal, 25(1), 154–167. https://doi.org/10.1007/s10550-007-0017-5
  • Basel Committee on Banking Supervision. (2006). International convergence of capital measurement and capital standards: A revised framework, comprehensive version. Bank for International Settlements.
  • Basel Committee on Banking Supervision. (2010). Basel III: A global regulatory framework for more resilient banks and banking systems. Bank for International Settlements.
  • Basel Committee on Banking Supervision. (2020). Governors and Heads of Supervision announce deferral of Basel III implementation to increase operational capacity of banks and supervisors to respond to Covid-19. Bank for International Settlements.
  • Bouveret, A. (2019). Estimation of losses due to cyber risk for financial institutions. Journal of Operational Risk, 14(2), 1–20. https://doi.org/10.21314/JOP.2019.224
  • Bromiley, P., McShane, M., Nair, A., & Rustambekov, E. (2015). Enterprise risk management: review, critique, and research directions. Long Range Planning, 48(4), 265–276. https://doi.org/10.1016/j.lrp.2014.07.005
  • Buehler, K., Freeman, A., Hulme, R. (2008). The risk revolution (Working Paper).
  • Bzdok, D., Altman, N., & Krzywinski, M. (2018). Statistics versus machine learning. Nature Methods, 15(4), 233–234.
  • Cao, L., Dong, X., & Zheng, Z. (2016). E-NSP: Efficient negative sequential pattern mining. Artificial Intelligence, 235, 156–182. https://doi.org/10.1016/j.artint.2016.03.001
  • Caron, F., Vanthienen, J., & Baesens, B. (2012). Rule-based business process mining: Applications for management [Paper presentation]. 1st International Symposium on Management Intelligent Systems, Salamanca., IS-MiS 2012.
  • Caron, F., Vanthienen, J., & Baesens, B. (2013). A comprehensive investigation of the applicability of process mining techniques for enterprise risk management. Computers in Industry, 64(4), 464–475. https://doi.org/10.1016/j.compind.2013.02.001
  • Centers for Disease Control and Prevention. (2017). Historical mine disasters. https://www.cdc.gov/niosh/mining/statistics/minedisasters.html
  • Chavez-Demoulin, V., Embrechts, P., & Hofert, M. (2016). An extreme value approach for modeling operational risk losses depending on covariates. Journal of Risk and Insurance, 83(3), 735–776. https://doi.org/10.1111/jori.12059
  • Choi, T.-M., Chan, H. K., & Yue, X. (2017). Recent development in big data analytics for business operations and risk management. IEEE Transactions on Cybernetics, 47(1), 81–92.
  • Choi, T.-M., & Lambert, J. H. (2017). Advances in risk analysis with big data. Risk Analysis: An Official Publication of the Society for Risk Analysis, 37(8), 1435–1442.
  • Chollet, F. (2018). Deep learning with Python. Manning Publications Co.
  • Chu, C. Y., Park, K., & Kremer, G. E. (2020). A global supply chain risk management framework: An application of text-mining to identify region-specific supply chain risks. Advanced Engineering Informatics, 45, 101053. https://doi.org/10.1016/j.aei.2020.101053
  • COSO. (2004). Enterprise risk management – integrated framework. Committee of Sponsoring Organizations of the Treadway Commission.
  • COSO. (2017). Enterprise risk management – integrating with strategy and performance. Committee of Sponsoring Organizations of the Treadway Commission.
  • COSO. (2020). Guidance on enterprise risk management. Committee of Sponsoring Organizations of the Treadway Commission. Retrieved 23 March from https://www.coso.org/Pages/erm.aspx
  • da Silva, J. B. N., Senna, P., Chousa, A., & Coelho, O. (2020). Data mining and operations research techniques in supply chain risk management: A bibliometric study. Brazilian Journal of Operations & Production Management, 17(3), 14. https://doi.org/10.14488/BJOPM.2020.029
  • Dickinson, G. (2001). Enterprise risk management: Its origins and conceptual foundation. The Geneva Papers on Risk and Insurance – Issues and Practice, 26(3), 360–366. https://doi.org/10.1111/1468-0440.00121
  • Dicuonzo, G., Galeone, G., Zappimbulso, E., & Dell'Atti, V. (2019). Risk management 4.0: The role of big data analytics in the bank sector. International Journal of Economics and Financial Issues, 9(6), 40–47. https://doi.org/10.32479/ijefi.8556
  • Dong, M., Nassif, A. B., & Li, B. (2019). A data-driven residential transformer overloading risk assessment method. IEEE Transactions on Power Delivery, 34(1), 387–396. https://doi.org/10.1109/TPWRD.2018.2882215
  • Dutta, K., & Perry, J. (2006). A tale of tails: An empirical analysis of loss distribution models for estimating operational risk capital.
  • Eckle, P., & Burgherr, P. (2013). Bayesian data analysis of severe fatal accident risk in the oil chain. Risk Analysis: An Official Publication of the Society for Risk Analysis, 33(1), 146–160.
  • El Bouchti, A., Chakroun, A., Abbar, H., & Okar, C. (2017). Fraud detection in banking using deep reinforcement learning [Paper presentation]. 7th International Conference on Innovative Computing Technology, INTECH 2017.
  • Embrechts, P., Mizgier, K. J., & Chen, X. (2018). Modeling operational risk depending on covariates: An empirical investigation. Journal of Operational Risk, 13(3), 17–46. https://doi.org/10.21314/JOP.2018.212
  • Eryilmaz, M. (2018). Enterprise risk management: Past, today and future. In M. Rusev, E. Straus, C. Avcikurt, A. Soykan, & B. Parlak (Eds.), Social science researches in the globalizing world (pp. 244–254). St. Kliment Ohridski University Press.
  • European Commission Non-Financial Reporting Directive. (2014). Directive 2014/95/EU C.F.R. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014L0095
  • Evans, J. (2020). Pandemic briefing: Risk management implications of coronavirus (COVID-19) – for management. https://actuaries.logicaldoc.cloud/download-ticket?ticketId=82acb23f-9164-4e4c-8621-72f4161d1a13
  • Fagundes, M. V. C., Teles, E. O., Vieira de Melo, S. A. B., & Freires, F. G. M. (2020). Decision-making models and support systems for supply chain risk: Literature mapping and future research agenda. European Research on Management and Business Economics, 26(2), 63–70. https://doi.org/10.1016/j.iedeen.2020.02.001
  • Fang, L., Wei, L., Yi, G., & Jiang, L. (2017). Research of potential safety hazard investigation and risk control system for mine enterprise [Paper presentation]. 2nd IEEE International Conference on Computational Intelligence and Applications, ICCIA 2017.
  • Fedushko, S., Ustyianovych, T., & Gregus, M. (2020). Real-time high-load infrastructure transaction status output prediction using operational intelligence and big data technologies. Electronics, 9(4), 668. https://doi.org/10.3390/electronics9040668
  • Forrester, J. W. (1961). Industrial dynamics. M.I.T. Press.
  • Groth, K. M., Denman, M. R., Darling, M. C., Jones, T. B., & Luger, G. F. (2020). Building and using dynamic risk-informed diagnosis procedures for complex system accidents. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 234(1), 193–207. https://doi.org/10.1177/1748006X18803836
  • Groth, K. M., & Bensi, M. (2018). Commentary on use of model-augmented data analytics for improved operational efficiency of nuclear power plants [Paper presentation]. 14th Probabilistic Safety Assessment and Management, PSAM 2018.
  • Gudivada, V. N. (2017). Data analytics: Fundamentals. In A. Apon, M. Chowdhury, & K. Dey (Eds.), Data analytics for intelligent transportation systems (pp. 31–67). Elsevier Inc.
  • Guo, S., Liu, Y., He, J., Yang, T., He, G., Guo, S., Zhao, J., & Yang, H. (2017). A spot check information management system of wind farm [Paper presentation]. ASME 2017 Power Conference Joint with ICOPE 2017, POWER 2017-ICOPE 2017, Collocated with the ASME 2017 11th International Conference on Energy Sustainability, the ASME 2017 15th International Conference on Fuel Cell Science, Engineering and Technology, and the ASME 2017 Nuclear Forum. https://doi.org/10.1115/POWER-ICOPE2017-3308
  • Güven, S., Murthy, K., Shwartz, L., & Paradkar, A. (2016). Towards establishing causality between change and incident [Paper presentation]. 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016.
  • Hajakbari, M. S., & Minaei-Bidgoli, B. (2014). A new scoring system for assessing the risk of occupational accidents: A case study using data mining techniques with Iran's Ministry of Labor data. Journal of Loss Prevention in the Process Industries, 32, 443–453. https://doi.org/10.1016/j.jlp.2014.10.013
  • Hamedifar, H., Spitzenberger, C., Stahl, C., Brown, A., Nilberg, B., Demay, V., & Aspholm, O. (2015). Terminal and transportation risk assessment for LNG export in North America [Paper presentation]. Offshore Technology Conference, 2015, OTC 2015. https://doi.org/10.4043/26020-MS
  • Hao, C. (2013). ARMS: An advanced operational risk management system for commercial banks [Paper presentation]. 2013 3rd International Conference on Intelligent System Design and Engineering Applications, Hong Kong. ISDEA 2013
  • Harmantzis, F., & Malek, M. (2004). Security risk analysis and evaluation [Paper presentation]. 2004 IEEE International Conference on Communications, Paris.
  • Hassini, N., & Zouairi, S. (2011). Bayesian decision-making for industrial production facilities and processing [Paper presentation]. Saudi International Electronics, Communications and Photonics Conference 2011, Riyadh. SIECPC 2011
  • Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning: Data mining, inference, and prediction (2nd ed.). Springer.
  • Haustein, K., Widzyk-Capehart, E., Beitz, A., & Hainsworth, D. (2008). NexsysTM: A Realtime Risk Management System for Mine Safety [Paper presentation]. Queensland Mining Industry Health & Safety Conference 2008.
  • Hayne, K. M. (2019). Final report: Royal commission into misconduct in the banking, superannuation and financial services industry.
  • He, B. H., & Song, G. F. (2009). Knowledge management and data mining for supply chain risk management [Paper presentation]. International Conference on Management and Service Science, Wuhan., MASS 2009.
  • Hegde, J., & Rokseth, B. (2020). Applications of machine learning methods for engineering risk assessment – A review. Safety Science, 122, 104492. https://doi.org/10.1016/j.ssci.2019.09.015
  • Hosseini, S., & Ivanov, D. (2020). Bayesian networks for supply chain risk, resilience and ripple effect analysis: A literature review. Expert Systems with Applications, 161, 113649. https://doi.org/10.1016/j.eswa.2020.113649
  • Huang, Z. M., Cong, Q. S., & Hu, J. B. (2012). Information system risk auditing model based on process mining [Paper presentation]. 2012 19th Annual International Conference on Management Science and Engineering, Dallas, TX., ICMSE 2012.
  • IBISWorld. (2021). Global biggest industries by revenue in 2021. IBISWorld https://www.ibisworld.com/global/industry-trends/biggest-industries-by-revenue/
  • International Actuarial Association. (2021). About the IAA. International actuarial association. Retrieved 14 July from https://www.actuaries.org/iaa/IAA/About_the_IAA/IAA/About_the_IAA/About_the_IAA/Vision_Mission.aspx?hkey=5f039c31-0926-46b1-becc-14dff02287b7
  • ISO (2009). Risk management - Principles and guidelines. (Vol. ISO 31000:2009, pp. 24). International Organization for Standardization.
  • ISO (2016). Petroleum, petrochemical and natural gas industries - Collection and exchange of reliability and maintenance data for equipment. (Vol. ISO 14224:2016, pp. 272). International Organization for Standardization.
  • ISO (2018). Risk management - Guidelines. (Vol. ISO 31000:2018, pp. 16). International Organization for Standardization.
  • Jans, M., Lybaert, N., & Vanhoof, K. (2010a). Data mining and economic crime risk management. Surveillance technologies and early warning systems: Data mining applications for risk detection (pp. 205–227). IGI Global.
  • Jans, M., Lybaert, N., & Vanhoof, K. (2010b). Internal fraud risk reduction: Results of a data mining case study. International Journal of Accounting Information Systems, 11(1), 17–41. https://doi.org/10.1016/j.accinf.2009.12.004
  • Johnson, T. (2010). Conceptual mapping of risk management to data mining [Paper presentation]. 3rd International Conference on Emerging Trends in Engineering and Technology, Goa., ICETET 2010.
  • Johnston, J., & Guichard, A. (2015). New findings in drilling and wells using big data analytics [Paper presentation]. Offshore Technology Conference 2015, OTC 2015. https://doi.org/10.4043/26021-MS
  • Kaplan Higher Education. (2019). Operational risk management (FIN219) [Course Content].
  • Kenett, R. S., & Salini, S. (2010). Measures of association applied to operational risks. In R. S. Kenett & Y. Raanan (Eds.), Operational risk management: A practical approach to intelligent data analysis (pp. 149–167). John Wiley and Sons.
  • KPMG US & The Risk Management Association. (2018). Operational risk management excellence report (Executive report).
  • KPMG. (2021). Risks and opportunities for mining.
  • Lacković, I. D., Kovšca, V., & Vincek, Z. L. (2020). A review of selected aspects of big data usage in banks’ risk management. Journal of Information and Organizational Sciences, 44(2), 317–330. https://doi.org/10.31341/jios.44.2.7
  • Lambrigger, D., Shevchenko, P., & Wüthrich, M. (2007). The quantification of operational risk using internal data, relevant external data and expert opinions. The Journal of Operational Risk, 2(3), 3–27. https://doi.org/10.21314/JOP.2007.030
  • Lee, D., Kim, J. G., & Kim, K. J. (2013). A study on abnormal event correlation analysis for convergence security monitor. Cluster Computing, 16(2), 219–227. https://doi.org/10.1007/s10586-011-0191-6
  • Leidner, J. L., & Schilder, F. (2010). Hunting for the black swan: Risk mining from text [Paper presentation]. 48th Annual Meeting of the Association for Computational Linguistics, Uppsala., ACL 2010.
  • Leite, S. R. (2019). Prediction analysis of forced shutdowns in Brazilian Type I hydropower plants [Paper presentation]. 2019 14th Iberian Conference on Information Systems and Technologies, New York.
  • Leo, M., Sharma, S., & Maddulety, K. (2019). Machine learning in banking risk management: A literature review. Risks, 7(1), 29. https://doi.org/10.3390/risks7010029
  • Leveson, N. (2004). A new accident model for engineering safer systems. Safety Science, 42(4), 237–270. https://doi.org/10.1016/S0925-7535(03)00047-X
  • Li, H., Lan, N. W., & Huang, X. N. (2020). Application research of fault diagnosis in conventional island of nuclear power plant based on support vector machine [Paper presentation]. 4th International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, ISNPP 2019.
  • Liang, W., Sari, A., Zhao, G., McKinnon, S. D., & Wu, H. (2020). Short-term rockburst risk prediction using ensemble learning methods. Natural Hazards, 104(2), 1923–1946. https://doi.org/10.1007/s11069-020-04255-7
  • Lien, C. C. (2012). The application of crisp and fuzzy decision trees to monitor insurance customer database. Information, 15(9), 3871–3876.
  • Lien, C. C., Ho, C. C., & Tsai, Y. M. (2011). Applying fuzzy decision tree to infer abnormal accessing of insurance customer data [Paper presentation]. 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, Shanghai., ICNC'11.
  • Linnenluecke, M. K., Marrone, M., & Singh, A. K. (2020). Conducting systematic literature reviews and bibliometric analyses. Australian Journal of Management, 45(2), 175–194. https://doi.org/10.1177/0312896219877678
  • Liu, T. B., & Liu, S. P. (2016). Fraud detection model & application for credit card acquiring business based on data mining technology [Paper presentation]. Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science, Paris.
  • Marquez, A. C., Del Castillo, A. C., & Fernandez, J. F. G. (2020). Integrating artificial intelligent techniques and continuous time simulation modelling. Practical predictive analytics for energy efficiency and failure detection. Computers in Industry, 115, 15.
  • Mazumder, R. K., Salman, A. M., & Li, Y. (2021). Failure risk analysis of pipelines using data-driven machine learning algorithms. Structural Safety, 89, 102047. https://doi.org/10.1016/j.strusafe.2020.102047
  • McKibbin, W., & Fernando, R. (2021). The global macroeconomic impacts of COVID-19: Seven scenarios. Asian Economic Papers, 20(2), 1–30. https://doi.org/10.1162/asep_a_00796
  • McKinsey & Company, & Operational Riskdata eXchange Association. (2017). The future of operational risk.
  • McNeil, A. J., Frey, R., & Embrechts, P. (2015). Quantitative risk management: Concepts, techniques and tools (Revised ed.). Princeton University Press.
  • Middleton, S. E., & Sabeur, Z. A. (2011). Knowledge-based service architecture for multi-risk environmental decision support applications. Environmental Software Systems: Frameworks of Eenvironment.
  • Milana, D., Darena, M. S., Bettio, N., Cerruti, C., Siliprandi, G., Fidanzi, A., Cerioli, P., Silvestri, G., Tarasconi, F., Caserio, M., Botros, M., & Gabrielli, M. L. (2019). Natural language understanding for safety and risk management in oil and gas plants [Paper presentation]. Abu Dhabi International Petroleum Exhibition and Conference 2019, ADIP 2019. https://doi.org/10.2118/197668-MS
  • Milkau, U., & Bott, J. (2018). Active management of operational risk in the regimes of the “Unknown”: What can machine learning or heuristics deliver? Risks, 6(2), 41.
  • Mišić, V. V., & Perakis, G. (2020). Data analytics in operations management: A review. Manufacturing & Service Operations Management, 22(1), 158–169. https://doi.org/10.1287/msom.2019.0805
  • Mittnik, S., & Starobinskaya, I. (2010). Modeling Dependencies in Operational Risk with Hybrid Bayesian Networks. Methodology and Computing in Applied Probability, 12(3), 379–390. https://doi.org/10.1007/s11009-007-9066-y
  • Modarres, M., Kaminskiy, M. P., & Krivtsov, V. (2016). Reliability engineering and risk analysis: A practical guide (3rd ed.). Taylor & Francis Group.
  • Mohaghegh, Z., Kazemi, R., & Mosleh, A. (2009). Incorporating organizational factors into probabilistic risk assessment (PRA) of complex socio-technical systems: A hybrid technique formalization. Reliability Engineering & System Safety, 94(5), 1000–1018. https://doi.org/10.1016/j.ress.2008.11.006
  • Monish, H., & Pandey, A. C. (2020). A comparative assessment of data mining algorithms to predict fraudulent firms [Paper presentation]. 10th International Conference on Cloud Computing, Data Science and Engineering, Confluence 2020.
  • Moura, R., Beer, M., Patelli, E., Lewis, J., & Knoll, F. (2017). Learning from accidents: Interactions between human factors, technology and organisations as a central element to validate risk studies. Safety Science, 99, 196–214. https://doi.org/10.1016/j.ssci.2017.05.001
  • Nagarajan, R., Scutari, M., & Lèbre, S. (2013). Bayesian networks in R with applications in systems biology (1st ed.). Springer.
  • Nagashree, N., Tejasvi, R., & Swathi, K. C. (2018). An early risk detection and management system for the cloud with log parser. Computers in Industry, 97, 24–33.
  • Nateghi, R., & Aven, T. (2021). Risk analysis in the age of big data: The promises and pitfalls. Risk Analysis: An Official Publication of the Society for Risk Analysis, 41(10), 1751–1758.
  • Neil, M., Fenton, N., & Tailor, M. (2005). Using Bayesian networks to model expected and unexpected operational losses. Risk Analysis, 25(4), 963–972. https://doi.org/10.1111/j.1539-6924.2005.00641.x
  • Neil, M., Häger, D., & Andersen, L. B. (2009). Modeling operational risk in financial institutions using hybrid dynamic Bayesian networks. The Journal of Operational Risk, 4(1), 3–33. https://doi.org/10.21314/JOP.2009.057
  • Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559–569. https://doi.org/10.1016/j.dss.2010.08.006
  • Nugent, T., & Leidner, J. L. (2017). Risk mining: Company-risk identification from unstructured sources [Paper presentation]. 16th IEEE International Conference on Data Mining Workshops, ICDMW 2016.
  • Nwafor, C. N., Nwafor, O. Z., & Onalo, C. (2019). The use of business intelligence and predictive analytics in detecting and managing occupational fraud in Nigerian banks. Journal of Operational Risk, 14(3), 95–120.
  • Ocelewicz, L., Lewis, J., Steele, C. (2021). Conduct risk: Delivering an effective framework. https://home.kpmg/uk/en/home/insights/2017/09/conduct-risk-delivering-an-effective-framework.html
  • Onoda, T., Ito, N., & Yamasaki, H. (2006). Unusual condition mining for risk management of hydroelectric power plants [Paper presentation]. 6th IEEE International Conference on Data Mining, Hong Kong.
  • Onoda, T., Ito, N., & Yamasaki, H. (2009). Interactive trouble condition sign discovery for hydroelectric power plants [Paper presentation]. 15th International Conference on Neuro-Information Processing, Auckland., ICONIP 2008.
  • Operational Riskdata eXchange Association. (2020). Annual banking loss report. Operational Riskdata eXchange Association.
  • O'Shea, N., Pence, J., Mohaghegh, Z., & Kee, E. (2015). Physics of failure, predictive modeling & data analytics for LOCA frequency [Paper presentation]. 61st Annual Reliability and Maintainability Symposium, RAMS 2015.
  • Palshikar, G. K., & Apte, M. (2013). Financial security against money laundering: A survey. In B. Akhgar & H. Arabnia (Eds.), Emerging trends in ICT security (pp. 577–590). Elsevier Inc.
  • Parhizi, S., Shahrabi, J., & Pariazar, M. (2009). A new accident investigation approach based on data mining techniques. Journal of Applied Sciences, 9(4), 731–737. https://doi.org/10.3923/jas.2009.731.737
  • Pence, J., Farshadmanesh, P., Kim, J., Blake, C., & Mohaghegh, Z. (2020). Data-theoretic approach for socio-technical risk analysis: Text mining licensee event reports of U.S. nuclear power plants. Safety Science, 124, 104574. https://doi.org/10.1016/j.ssci.2019.104574
  • Pence, J., Mohaghegh, Z., Ostroff, C., Kee, E., Yilmaz, F., Grantom, R., & Johnson, D. (2014). Toward monitoring organizational safety indicators by integrating probabilistic risk assessment, socio-technical systems theory, and big data analytics [Paper presentation]. 12th International Probabilistic Safety Assessment and Management Conference, PSAM 2014.
  • Pence, J., Sakurahara, T., Zhu, X. F., Mohaghegh, Z., Ertem, M., Ostroff, C., & Kee, E. (2019). Data-theoretic methodology and computational platform to quantify organizational factors in socio-technical risk analysis. Reliability Engineering & System Safety, 185, 240–260. https://doi.org/10.1016/j.ress.2018.12.020
  • Persona, A., Battini, D., Faccio, M., Bevilacqua, M., & Ciarapica, F. E. (2006). Classification of occupational injury cases using the regression tree approach. International Journal of Reliability, Quality and Safety Engineering, 13(02), 171–191. https://doi.org/10.1142/S0218539306002197
  • Peters, G. W., Clark, G., Thirlwell, J., & Kulwal, M. (2018). Global perspectives on operational risk management and practice: A survey by the Institute of Operational Risk (IOR) and the Center for Financial Professionals (CeFPro). Journal of Operational Risk, 13(4), 47–88. https://doi.org/10.21314/JOP.2018.215
  • Peters, G. W., Shevchenko, P. V., & Wüthrich, M. V. (2009). Dynamic operational risk: Modeling dependence and combining different sources of information. The Journal of Operational Risk, 4(2), 69–104. https://doi.org/10.21314/JOP.2009.059
  • Pika, A., van der Aalst, W. M. P., Fidge, C. J., ter Hofstede, A. H. M., & Wynn, M. T. (2013). Profiling event logs to configure risk indicators for process delays [Paper presentation]. 25th International Conference on Advanced Information Systems Engineering, Valencia., CAiSE 2013.
  • PwC. (2017). Risk in review: Managing risk from the front line.
  • Qazi, A., Quigley, J., & Dickson, A. (2015). Supply chain risk management: Systematic literature review and a conceptual framework for capturing interdependencies between risks [Paper presentation]. 5th International Conference on Industrial Engineering and Operations Management, IEOM 2015.
  • Rahmes, M., Wilder, K., Yates, H., & Fox, K. (2013). Near real time discovery and conversion of open source information to a reward matrix [Paper presentation]. 17th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida., WMSCI 2013.
  • Rajesh, R. (2020a). A grey-layered ANP based decision support model for analyzing strategies of resilience in electronic supply chains. Engineering Applications of Artificial Intelligence, 87, 103338. https://doi.org/10.1016/j.engappai.2019.103338
  • Rajesh, R. (2020b). A novel advanced grey incidence analysis for investigating the level of resilience in supply chains. Annals of Operations Research, 308(1-2), 441–490. https://doi.org/10.1007/s10479-020-03641-5
  • Rasmussen, J. (1990). Human error and the problem of causality in analysis of accidents. Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences, 327(1241), 449–462.
  • Rasmussen, J. (1997). Risk management in a dynamic society: A modelling problem. Safety Science, 27(2–3), 183–213. https://doi.org/10.1016/S0925-7535(97)00052-0
  • Reason, J. (1990). Human error. Cambridge University Press.
  • Reason, J. (2000). Human error: Models and management. BMJ (Clinical Research ed.), 320(7237), 768–770.
  • Risk Leadership Network. (2021). Why join the risk leadership network? Risk Leadership Network. Retrieved 30 June from https://www.riskleadershipnetwork.com/why-join
  • Rodriguez-Ulloa, R. (2018). Systemic methodology for risks evaluation and management in the energy and mining sectors (SYSMEREM-EMS) using Bayesian networks. Journal of Decision Systems, 27(sup1), 191–200. https://doi.org/10.1080/12460125.2018.1468157
  • Saaty, T. L., & Peniwati, K. (2008). Group decision making: Drawing out and reconciling differences. RWS Publications.
  • Safe Work Australia. (2020). Work-related traumatic injury fatalities, Australia. S. W. Australia.
  • Sanchez-Pi, N., Martí, L., Molina, J. M., & Garcia, A. C. B. (2014). High-level information fusion for risk and accidents prevention in pervasive oil industry environments. Highlights of practical applications of heterogeneous multi-agent systems: The Paams Collection.
  • Sanchez-Pi, N., Martí, L., Molina, J. M., & Garcia, A. C. B. (2015). Contextual pattern discovery in ambient intelligent application. International Journal of Imaging and Robotics, 15(4), 165–178.
  • Sanford, A., & Moosa, I. (2012). A Bayesian network structure for operational risk modelling in structured finance operations. Journal of the Operational Research Society, 63(4), 431–444. https://doi.org/10.1057/jors.2011.7
  • Sanford, A., & Moosa, I. (2015). Operational risk modelling and organizational learning in structured finance operations: A Bayesian network approach. Journal of the Operational Research Society, 66(1), 86–115. https://doi.org/10.1057/jors.2013.49
  • Satoh, N., & Samejima, M. (2019). Risk words suggestion for information security audit by Bayesian inference. Electronics and Communications in Japan, 102(1), 42–48. https://doi.org/10.1002/ecj.12133
  • SCImago (n.d). SJR – SCImago Journal & Country Rank. Retrieved 15 December 2019 from http://www.scimagojr.com
  • Setiono, R., Mues, C., & Baesens, B. (2006). Risk management and regulatory compliance: A data mining framework based on neural network rule extraction [Paper presentation]. 27th International Conference on Information Systems, Milwaukee, WI., ICIS 2006.
  • Shafiee, M., Animah, I., Alkali, B., & Baglee, D. (2019). Decision support methods and applications in the upstream oil and gas sector. Journal of Petroleum Science and Engineering, 173, 1173–1186. https://doi.org/10.1016/j.petrol.2018.10.050
  • Shayboun, M., Kifokeris, D., & Koch, C. (2020). Machine learning for analysis of occupational accidents registration data [Paper presentation]. 36th Annual Conference on Association of Researchers in Construction Management, ARCOM 2020.
  • Shevchenko, P. V. (2015). Operational risk. In H. K. Baker & G. Filbeck (Eds.), Investment risk management (pp. 119–140). Oxford University Press.
  • Silva, J. F., & Jacinto, C. (2012). Finding occupational accident patterns in the extractive industry using a systematic data mining approach. Reliability Engineering & System Safety, 108, 108–122. https://doi.org/10.1016/j.ress.2012.07.001
  • Sjöblom, O., Murtola, L. M., Heimonen, J., Kauhanen, L., Laippala, V., Lundgren-Laine, H., Salakoski, T., & Salanterä, S. (2013). Using cluster analysis to identify weak signals of lethal trends in aviation and healthcare documentation. International Journal of Networking and Virtual Organisations, 13(1), 66–80. https://doi.org/10.1504/IJNVO.2013.058442
  • Standards Australia. (1995). AS/NZS 4360-1995 risk management (Vol. AS/NZS 4360-1995).
  • Stojadinovic, S., Svrkota, I., Petrovic, D., Denic, M., Pantovic, R., & Milic, V. (2012). Mining injuries in Serbian underground coal mines – A 10-year study. Injury, 43(12), 2001–2005. https://doi.org/10.1016/j.injury.2011.08.018
  • The Institute of Internal Auditors. (2013). The three lines of defense in effective risk management and control. https://na.theiia.org/standards-guidance/Public%20Documents/PP%20The%20Three%20Lines%20of%20Defense%20in%20Effective%20Risk%20Management%20and%20Control.pdf
  • Thomson Reuters. (2010). TIMELINE-Major offshore accidents in the global oil industry. https://www.reuters.com/article/idUSN13272386
  • Tubis, A. A., Werbińska-Wojciechowska, S., Góralczyk, M., Wróblewski, A., & Ziętek, B. (2020). Cyber-attacks risk analysis method for different levels of automation of mining processes in mines based on fuzzy theory use. Sensors, 20(24), 7210–7223. https://doi.org/10.3390/s20247210
  • Udo, M., & Jürgen, B. (2018). Active management of operational risk in the regimes of the “unknown”: what can machine learning or heuristics deliver? Risks, 6(2).
  • Urabe, Y., Yamanishi, K., Tomioka, R., & Iwai, H. (2011). Real-time change-point detection using sequentially discounting normalized maximum likelihood coding [Paper presentation]. Advances in Knowledge Discovery and Data Mining, Pt Ii: 15th Pacific-Asia Conference, Berlin., Pakdd 2011.
  • Venables, W. N., & Ripley, B. D. (2002). Modern applied statistics with S (4th ed.). Springer.
  • Vishnu, C. R., Sridharan, R., & Kumar, P. N. R. (2019). Supply chain risk management: Models and methods. International Journal of Management and Decision Making, 18(1), 31–75. https://doi.org/10.1504/IJMDM.2019.096689
  • Wang, Y., Li, G., Li, J., & Zhu, X. (2018). Comprehensive identification of operational risk factors based on textual risk disclosures [Paper presentation]. 6th International Conference on Information Technology and Quantitative Management, ITQM 2018.
  • Wang, Y., Li, J., & Zhu, X. (2017). A method of estimating operational risk: loss distribution approach with piecewise-defined frequency dependence [Paper presentation]. 5th International Conference on Information Technology and Quantitative Management, ITQM 2017.
  • Wei, L., Li, G., Zhu, X., Sun, X., & Li, J. (2019). Developing a hierarchical system for energy corporate risk factors based on textual risk disclosures. Energy Economics, 80, 452–460. https://doi.org/10.1016/j.eneco.2019.01.020
  • Wei, Y. C., Wu, W. C., & Chu, Y. C. (2018). Performance evaluation of the recommendation mechanism of information security risk identification. Neurocomputing, 279, 48–53. https://doi.org/10.1016/j.neucom.2017.05.106
  • World Economic Forum. (2021). Fourth industrial revolution. Retrieved 25 June from https://www.weforum.org/focus/fourth-industrial-revolution
  • Wu, Q., Liu, Y. Z., Liu, D. H., & Zhou, W. F. (2011). prediction of floor water inrush: The application of GIS-based AHP vulnerable index method to Donghuantuo Coal Mine, China. Rock Mechanics and Rock Engineering, 44(5), 591–600. https://doi.org/10.1007/s00603-011-0146-5
  • Wu, W. (2020). Construction of ecological monitoring and early warning system in coal mine based on big data analysis. Fresenius Environmental Bulletin, 29(5), 3564–3570.
  • Wu, Y., Wang, X., & Zhang, Z. (2015). A high risk association rule mining algorithm for the petroleum industry. Journal of Information and Computational Science, 12(12), 4633–4642. https://doi.org/10.12733/jics20106385
  • Wu, Z. G., Zhang, X. Y., Xiao, C. G., & Chen, W. (2019). Applications of data mining in conventional island of nuclear power plant [Paper presentation]. 3rd International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, ISNPP 2018.
  • Xiaorong, C., Yan, W., & Xin, G. (2009). Network security risk assessment based on association rules [Paper presentation]. 2009 4th International Conference on Computer Science and Education, Nanning., ICCSE 2009.
  • Xiaoyun, W., & Danyue, L. (2010). Hybrid outlier mining algorithm based evaluation of client moral risk in insurance company [Paper presentation]. 2010 2nd IEEE International Conference on Information Management and Engineering, Chengdu., ICIME 2010. https://doi.org/10.1109/ICIME.2010.5478070
  • Xie, X. C., Fu, G., Xue, Y. J. Y., Zhao, Z. Q., Chen, P., Lu, B. J., & Jiang, S. (2019). Risk prediction and factors risk analysis based on IFOA-GRNN and apriori algorithms: Application of artificial intelligence in accident prevention. Process Safety and Environmental Protection, 122, 169–184. https://doi.org/10.1016/j.psep.2018.11.019
  • Yin, Q., Yang, J., Tyagi, M., Zhou, X., Hou, X., & Cao, B. (2021). Field data analysis and risk assessment of gas kick during industrial deepwater drilling process based on supervised learning algorithm. Process Safety and Environmental Protection, 146, 312–328. https://doi.org/10.1016/j.psep.2020.08.012
  • Zhang, K., Wu, X., Niu, R., Yang, K., & Zhao, L. (2017). The assessment of landslide susceptibility mapping using random forest and decision tree methods in the Three Gorges Reservoir area, China. Environmental Earth Sciences, 76(11), 405. https://doi.org/10.1007/s12665-017-6731-5
  • Zhu, X., Li, J., Chen, J., Yanghuo, Y., Gao, L., Feng, J., Wu, D., & Xie, Y. (2014). A nonparametric operational risk modeling approach based on Cornish-Fisher expansion. Discrete Dynamics in Nature and Society, 2014, 1–8. https://doi.org/10.1155/2014/839731