Risk Practices

Latest Articles

2013-03-22 by: James Bone Categories: Risk Practices Basel III: Regulatory Capital Rule Final Draft

You must be logged in to view this document. Click here to login

free_20765 5 euro bill

In this NPR, the agencies are proposing to revise their risk-based and leverage capital
requirements consistent with agreements reached by the Basel Committee on Banking
Supervision (BCBS) in “Basel III: A Global Regulatory Framework for More Resilient Banks and Banking Systems” (Basel III). The proposed revisions would include implementation of a new common equity tier 1 minimum capital requirement, a higher minimum tier 1 capital requirement, and, for banking organizations subject to the advanced approaches capital rules, a supplementary leverage ratio that incorporates a broader set of exposures in the denominator measure.

Additionally, consistent with Basel III, the agencies are proposing to apply limits on a banking organization’s capital distributions and certain discretionary bonus payments if the banking organization does not hold a specified amount of common equity tier 1 capital in addition to the amount necessary to meet its minimum risk-based capital requirements. This NPR also would establish more conservative standards for including an instrument in regulatory capital. As discussed in the proposal, the revisions set forth in this NPR are consistent with section 171 of the Dodd-Frank Act, which requires the agencies to establish minimum risk-based and leverage capital requirements.

2013-03-21 by: James Bone Categories: Risk Practices Avoiding Integrity Land Mines by Ben W. Heineman, Jr.

You must be logged in to view this document. Click here to login

As the chief legal officer at GE for nearly 20 years, I was part of the senior management group that sought to fuse high performance with high integrity. No one was more demanding about hitting financial targets than Jack Welch or his successor, Jeff Immelt. But both knew that employees up and down the ranks face the temptation to make the numbers by fudging the accounts, cutting corners, or worse. Unconstrained, these internal pressures—made more intense by corruption in emerging markets, demanding customers, and unscrupulous competitors—can lead to corrupt capitalism.

The changes in laws, regulations, stakeholder expectations, and media scrutiny that have taken place over the past decade can now make a major lapse in integrity catastrophic. Fines, penalties, and settlements are counted in the hundreds of millions (or billions) of dollars, not the millions or tens of millions of a decade ago. And worse, in some cases (as Enron and Arthur Andersen demonstrated)—a company can actually implode.


2013-02-22 by: James Bone Categories: Risk Practices Dealing in Security – Continuity Management by Mike Bennet and Vinay Gupta

You must be logged in to view this document. Click here to login



2013-02-03 by: James Bone Categories: Risk Practices State of the Media: The Social Media Report 2012 – Nielsen

You must be logged in to view this document. Click here to loginfree_244054  computer key board


Social media and social networking are no longer in their infancy. Since the emergence of the first social
media networks some two decades ago, social media has continued to evolve and offer consumers
around the world new and meaningful ways to engage with the people, events, and brands that matter
to them. Now years later, social media is still growing rapidly and has become an integral part of our
daily lives. Today, social networking is truly a global phenomenon.


by: James Bone Categories: Risk Practices Physician Alignment Tools

free_57281 images for thegrcbluebook shadow of man

You must be logged in to view this document. Click here to login


In today’s ultra-competitive marketplace, both hospitals and physicians are
increasingly seeking practical ways to align with one another. An ASC partnership
may be the answer for physicians set on retaining their independence
2013-01-29 by: James Bone Categories: Risk Practices IBM Brain Chip: Computers Think; Act like Humans

IBM Brain chip Computers Think like humans

Systems built with these chips won’t be programmed the same way traditional computers are today, a IBM rep said in a press statement. Rather, cognitive computers are expected to learn through experiences, find correlations, create hypotheses, and remember – and learn from – the outcomes, mimicking the brains structural and synaptic plasticity.
IBM has been awarded $21 million dollars from the Defense Advanced Research Projects Agency (DARPA) to fund the second phase of the initiative, the Systems of Neuromorphic Adaptive Plastic Scalable Electronics (SyNAPSE) project.
If successful, SyNAPSE will develop computing systems that are able to make decisions based on collected data, something that is far out of reach for today’s computers. For example, the statement said, a cognitive computer could record and report metrics based on global water levels and issue a Tsunami warning based on its decision making.

You must be logged in to view this document. Click here to login

2013-01-28 by: James Bone Categories: Risk Practices Advances in Terrorism Analysis by Michael R Greenberg & L Anthony Cox Jr.

You must be logged in to view this document. Click here to login

Defending a country against terrorist threats raises new challenges and opportunities for
risk analysis, different from those that are familiar from risk analysis of natural disasters
and complex technological systems. Terrorists can be informed, deceived, deterred, or
distracted – options that are not available for managing the risks from hurricanes or
unreliable systems and workers.

This special issue of Risk Analysis: An International Journal examines recent progress in understanding, modeling, and managing the threats from terrorism, emphasizing some of the most useful and important papers on this subject published in the journal over the past five years. We hope to prepare similar special issues on other timely and important subjects, so please tell us of your ideas about how to use this special “virtual” issue format to maximize reader benefits.

2013-01-26 by: James Bone Categories: Risk Practices Provider Directory Solutions: Market Assessment and Opportunities Analysis

You must be logged in to view this document. Click here to login

free_186042 images for thegrcbluebook handshakeDeveloping, populating, and maintaining the “ideal” provider directory solution is a complex proposition, with many details to consider; however, it is important to take a step back and consider the business drivers and customer needs first. In doing so, let’s imagine we are a business conducting a careful market analysis—ultimately, we need to answer the following question. Is there is a real demand for a new kind of provider directory solution, such that we are willing to put capital at risk to develop it?
In HIE there has been a constant tension between the worthy goal of total data liquidity (making the right health data available to treating clinicians and public health experts, at the right place and time) and viable, long-term business models (coming up with services that deliver enough business value that customers are willing to pay for them). Policymakers need to be cautious of creating artificial demand in the near- to mid-term for services that may not be viable in the long-term. At the same time, a short-term financial “spark” may be just what certain technologies need to achieve scale and prove the value that will lead to sustainability.

by: James Bone Categories: Risk Practices Master Data Management withing HIE Infrastructures: A Focus on Master Patient Indexing Approaches

You must be logged in to view this document. Click here to login

free_59647 images for thegrcbluebook working on laptopHaving the right patient data, at the right place, at the right time is the goal of health information exchange (HIE). This starts with accurately capturing and coordinating a patient’s identity across multiple disparate organizations. If the information presented at the point of care is matched with the wrong patient, it is not only unusable, it is also dangerous for the patient. Delivering the right patient information is crucial to realizing the benefits of HIE. In the absence of a unique national identification number or some other unified way of identifying people and organizations, master data management (MDM), much science, and a bit of art, makes this important work possible.


MDM and master patient indexing (MPI) have developed over the last twenty years to offer organizations from banks to large retailers to health organizations a more consistent understanding of their customers’ identities and activities across diffuse networks and disparate systems. MDM solutions, which are integrated with other mission-critical systems, typically utilize two approaches to link peoples’ identities across multiple silos of data. Deterministic matching approaches attempt to line up different pieces of demographic information, such as last names or Social Security numbers, across source systems to look for exact matches. Probabilistic matching approaches, which are more sophisticated, attempt to deal in a more nuanced way with the inevitably error-filled, unstable nature of identifying information in source systems. Hybrid approaches may also be used.

by: James Bone Categories: Risk Practices HIE Driven Subscription and Notification Services: Market Assessment and Policy Considerations

You must be logged in to view this document. Click here to login

free_204285 images for thegrcbluebook woman poses with hands crossedAs infrastructures to enable varying types of health information exchange activity are increasingly deployed by hospitals, health systems, and regional/statewide exchange organizations, new opportunities to support powerful notification solutions become possible. Within this briefing, notifications (or alerts) will be defined loosely as messages that are pushed to interested parties within the confines of existing laws and regulations.

The technical methods and standards to push those messages, the processes to define who should receive them or who can “subscribe” to them, the content of the messages, and the rights of the patient who is the subject of the message will be discussed below. Each of these issues adds independent layers of technical, legal, policy, and workflow complexity; however, as with many topics related to health information exchange, there are solutions available. While these solutions may not be perfect, they are progressive and should be embraced. Many of them are deployed today in various HIE domains at varying levels of maturity and adoption.