Financial Institutions of Emerging Economies: Contribution to Risk Assessment
Abstract
1. Introduction
- Threat Likelihood (TL) and Threat Impact (Ti)
- Vulnerability Likelihood (VL) and Vulnerability Impact (Vi)
2. Materials and Methods
2.1. Research Design Overview
- Parameter definition and assumptions.
- Model construction using Bayesian networks.
- Validation via expert scenarios and simulated data.
- TL: Threat Likelihood;
- Ti: Threat Impact;
- VL: Vulnerability Likelihood;
- Vi: Vulnerability Impact.
- Variable Definitions and Hypotheses
- Research Hypotheses
- Hypothesis Testing Framework
2.2. Experimental Scenarios and Inference Tests
- All four parameters (Ti, TL, Vi, VL) are used to compute risk scores.
- A full Bayesian network structure is used for inference.
- Risk estimates:
- Vi is excluded from test if Ti alone accounts for impact.
- The network simplifies to
- A conditional probability table (CPT) based on
- ○
- Expert judgment (Cernisevs 2024);
- ○
- Empirical distributions (Cernisevs 2024).
- Continuous variables (e.g., Ti and Vi) are discretized for computational tractability.
- Data Sources
- Bayesian Inference and Learning
- Learning Parameters. We use both real-world and simulated datasets to explain CPTs using frequency-based learning. For instance, it is possible to use the obtained proportions to understand the probability that Vi will be high considering Ti, TL, and VL.
- Inference and Scoring. We use Bayesian inference to investigate the posterior probabilities of different levels of risk. We look at the full and reduced models (without Vi) and see how well they predict (Mean Absolute Error, RMSE), how hard they are to understand (Bayesian Information Criterion), and how well they are structured (edge confidence from bootstrapping).
- Validation and Sensitivity Analysis
- Tools and Implementation
- Support for conditional probability tables (CPTs) built in;
- Algorithms for learning structure that are built in, such as Hill Climbing and constraint-based search;
- The availability of inference engines like Variable Elimination and Belief Propagation.
- TL_High → Ti_High.
- VL_High → Ti_High.
- Ti_High → Vi_High.
- TL_High → Vi_High.
- VL_High → Vi_High.
3. Results
- Hypothesis Evaluation Criteria
Result Assessment
- High sensitivity to variations in TL and VL, especially when Ti was high.
- Stability in risk estimation whether Vi was included or replaced by Ti as its proxy.
- Risk scores ranged from 5.3 (low risk) to 91.2 (critical risk), with most values clustering between 35 and 65, indicating a nonlinear mapping of parameters to risk.
- A comparative plot of predicted risk scores between the full and reduced models shows near-linear agreement (R2 = 0.96), reinforcing the conclusion that Vi may be substitutable by Ti in many cases.
4. Discussion
- Value-at-Risk (VaR) and Conditional Value-at-Risk (CVaR) can be applied directly to the posterior distribution of risk scores, enabling quantification of both threshold exceedance probabilities and expected shortfall beyond that threshold (Rockafellar and Uryasev 2002, 2000).
- Entropic Value-at-Risk (EVaR), introduced by (Ahmadi-Javid 2012), provides a tighter and more conservative bound on tail risk by exploiting moment-generating functions. Our Bayesian inference engine naturally produces the conditional probabilities needed for EVaR evaluation.
- Expectile Risk Measures (ERM) (Ziegel 2016) can be integrated with our framework to capture asymmetries in loss distributions and to support scenario-specific stress testing.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A. Step-by-Step Example
- TL = Threat Likelihood ∈ {Low (<0.5), High (≥0.5)}.
- VL = Vulnerability Likelihood ∈ {Low, High}.
- Ti = Threat Impact ∈ {Normal, Stress}.
- Vi = Vulnerability Impact ∈ {Low (<60), High (≥60)}.
- -
- If VL = Low and Ti = Normal: P(Vi = High) = 0.10.
- -
- If VL = Low and Ti = Stress: P(Vi = High) = 0.50.
- -
- If VL = High and Ti = Normal: P(Vi = High) = 0.40.
- -
- If VL = High and Ti = Stress: P(Vi = High) = 0.80.
= P(Vi = High|VL = High, Ti = Stress) × P(Ti = Stress|TL = High).
P(Vi = High|VL = High, Ti = Normal) × P(Ti = Normal|TL = High).
= 0.80 × 0.70 + 0.40 × 0.30.
= 0.56 + 0.12.
= 0.68.
= 0.50 × 0.30 + 0.10 × 0.70
= 0.15 + 0.07
= 0.22,
References
- Agarwal, Sumit, and Jian Zhang. 2020. FinTech, Lending and Payment Innovation: A Review. Asia-Pacific Journal of Financial Studies 49: 353–67. [Google Scholar] [CrossRef]
- Ahmadi-Javid, A. 2012. Entropic Value-at-Risk: A New Coherent Risk Measure. Journal of Optimization Theory and Applications 155: 1105–23. [Google Scholar] [CrossRef]
- Al-Labadi, Luai, Vishakh Patel, Kasra Vakiloroayaei, and Clement Wan. 2021. Kullback–Leibler Divergence for Bayesian Nonparametric Model Checking. Journal of the Korean Statistical Society 50: 272–89. [Google Scholar] [CrossRef]
- Andrews, Kenneth R. 1971. The Concept of Corporate Strategy. Homewood: Dow Jones-Irwin. [Google Scholar]
- Ankan, Ankur, and Abinash Panda. 2015. pgmpy: Probabilistic Graphical Models Using Python. Paper presented at the 14th Python in Science Conference (SCIPY 2015), Austin, TX, USA, July 6–12; pp. 6–11. [Google Scholar] [CrossRef]
- Ankan, Ankur, and Johannes Textor. 2024. Pgmpy: A Python Toolkit for Bayesian Networks. Journal of Machine Learning Research 25: 1–8. [Google Scholar]
- Ansoff, H. Igor. 1965. Corporate Strategy: An Analytic Approach to Business Policy for Growth and Expansion. Columbus: McGraw-Hill. [Google Scholar]
- Aven, Terje. 2016. Risk Assessment and Risk Management: Review of Recent Advances on Their Foundation. European Journal of Operational Research 253: 1–13. [Google Scholar] [CrossRef]
- Cernisevs, Olegs. 2024. Regional Dimension in European Union: Shaping Key Performance Indicators for Financial Institutions. Doctoral thesis, Rīga Stradiņš University, Riga, Latvia. [Google Scholar]
- Cernisevs, Olegs, Yelena Popova, and Dmitrijs Cernisevs. 2023a. Business KPIs Based on Compliance Risk Estimation. Journal of Tourism and Services 14: 222–48. [Google Scholar] [CrossRef]
- Cernisevs, Olegs, Yelena Popova, and Dmitrijs Cernisevs. 2023b. Risk-Based Approach for Selecting Company Key Performance Indicator in an Example of Financial Services. Informatics 10: 54. [Google Scholar] [CrossRef]
- Cheimonidis, Pavlos, and Konstantinos Rantos. 2025. A Dynamic Risk Assessment and Mitigation Model. Applied Sciences 15: 2171. [Google Scholar] [CrossRef]
- Cox, Louis. 2008. Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks. Risk Analysis: An Official Publication of the Society for Risk Analysis 28: 1749–61. [Google Scholar] [CrossRef] [PubMed]
- da Silva, Claudio Junior Nascimento, Denise Xavier Fortes, and Rogério Patrício Chagas do Nascimento. 2017. ICT Governance, Risks and Compliance—A Systematic Quasi-Review. Paper presented at the 19th International Conference on Enterprise Information Systems, Porto, Portugal, April 26–29; Setúbal: SCITE-PRESS—Science and Technology Publications, pp. 417–24. [Google Scholar] [CrossRef]
- Dawson, Richard J. 2015. Handling Interdependencies in Climate Change Risk Assessment. Climate 3: 1079–96. [Google Scholar] [CrossRef]
- Dhar, Vasant, and Roger M. Stein. 2016. FinTech Platforms and Strategy. Communications of the ACM 60: 32–35. [Google Scholar] [CrossRef]
- ESMA. 2022. Monitoring Environmental Risks in EU Financial Markets. Paris: ESMA. [Google Scholar]
- Fülöp, Melinda Timea, Dan Ioan Topor, Constantin Aurelian Ionescu, Sorinel Căpușneanu, Teodora Odett Breaz, and Sorina Geanina Stanescu. 2022. Fintech accounting and Industry 4.0: Future-proofing or threats to the accounting profession? Journal of Business Economics and Management 23: 997–1015. Available online: https://journals.vilniustech.lt/index.php/JBEM/article/view/17695 (accessed on 7 October 2022). [CrossRef]
- Gao, Lei, Ying Wang, and Jing Zhao. 2023. (How) Does Mutual Fund Dual Ownership Affect Shareholder and Creditor Conflict of Interest? Evidence from Corporate Innovation. Journal of Risk and Financial Management 16: 287. [Google Scholar] [CrossRef]
- Getoor, Lise, Nir Friedman, Daphne Koller, and Benjamin Taskar. 2001. Learning Probabilistic Models of Relational Structure. ICML 1: 170–77. [Google Scholar]
- Getoor, Lise, Nir Friedman, Daphne Koller, and Benjamin Taskar. 2002. Learning Probabilistic Models of Link Structure. Journal of Machine Learning Research 3: 679–707. [Google Scholar]
- Giboney, Justin Scott, Bonnie Brinton Anderson, Geoffrey A. Wright, Shayna Oh, Quincy Taylor, Megan Warren, and Kylie Johnson. 2023a. Barriers to a Cybersecurity Career: Analysis across Career Stage and Gender. Computers & Security 132: 103316. [Google Scholar] [CrossRef]
- Giboney, Justin Scott, Ryan M. Schuetzler, and G. Mark Grimes. 2023b. Know Your Enemy: Conversational Agents for Security, Education, Training, and Awareness at Scale. Computers & Security 129: 103207. [Google Scholar] [CrossRef]
- Grassi, Stefano. n.d. A Decision Support System for Credit Risk Assessment Using Bayesian Networks. Preprint. Available online: https://www.researchgate.net/publication/390577527_A_Decision_Support_System_for_Credit_Risk_Assessment_Using_Bayesian_Networks. (accessed on 21 June 2025).
- Griffin, Naomi N., Gerardo Uña, Majid Bazarbash, and Alok Verma. 2023. Fintech Payments in Public Financial Management: Benefits and Risks. IMF Working Papers. Washington, DC: International Monetary Fund, vol. 2023, p. 1. [Google Scholar] [CrossRef]
- Kaddumi, Thair, and Qais Adib Al-Kilani. 2022. Operational Risks and Financial Performance—The Context of the Jordanian Banking Environment. Journal of Southwest Jiaotong University 57: 338–49. [Google Scholar] [CrossRef]
- Khan, Ashraf, and Majid Malaika. 2021. Central Bank Risk Management, Fintech, and Cybersecurity. IMF Working Papers. Washington, DC: International Monetary Fund, vol. 2021, p. 1. [Google Scholar] [CrossRef]
- Kuerbis, Brenden, and Farzaneh Badiei. 2017. Mapping the Cybersecurity Institutional Landscape. Digital Policy, Regulation and Governance 19: 466–92. [Google Scholar] [CrossRef]
- Ledwaba, Lehlogonolo, and H. S. Venter. 2017. A Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security. Paper presented at the 50th Hawaii International Conference on System Sciences, Hawaii, HI, USA, January 4–7. [Google Scholar]
- Ledwaba, Lehlogonolo P. I., Gerhard P. Hancke, Hein S. Venter, and Sherrin J. Isaac. 2018. Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices. IEEE Access 6: 9303–23. [Google Scholar] [CrossRef]
- Libouban, Romane, Eva Mercier, Thomas Chaussepied, Bérénice Batut, Anthony Bretaudeau, and Gildas Le Corguillé. 2024. Misconceptions about Galaxy Debunked by the (French) Galaxy Community. Paper presented at JOBIM 2024, Toulouse, France, June 25–28. [Google Scholar]
- Liu, Zi-Yuan, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, and Qin-Wen Su. 2022. Extension of Elliptic Curve Qu–Vanstone Certificates and Their Applications. Journal of Information Security and Applications 67: 103176. [Google Scholar] [CrossRef]
- Luo, Sha, Jiteng Ma, Chuanting Zhang, Shuping Dang, and Raed Shubair. 2024. Federated Learning for Microwave Filter Behavior Prediction. IEEE Microwave and Wireless Technology Letters 34: 255–58. [Google Scholar] [CrossRef]
- Macher, Georg, Eric Armengaud, Eugen Brenner, and Christian Kreiner. 2016. A Review of Threat Analysis and Risk Assessment Methods in the Au-tomotive Context. Paper presented at 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21–23; pp. 130–41. [Google Scholar]
- Manzoor, Sumaira, Yuri Goncalves Rocha, Sung-Hyeon Joo, Sang-Hyeon Bae, Eun-Jin Kim, Kyeong-Jin Joo, and Tae-Yong Kuc. 2021. Ontology-Based Knowledge Representation in Robotic Systems: A Survey Oriented toward Applications. Applied Sciences 11: 4324. [Google Scholar] [CrossRef]
- McAllester, David, Michael Collins, and Fernando Pereira. 2008. Case-Factor Diagrams for Structured Probabilistic Modeling. Journal of Computer and System Sciences 74: 84–96. [Google Scholar] [CrossRef]
- Mersch, Yves. 2019. Lending and Payment Systems in Upheaval: The Fintech Challenge. Paper presented at 3rd Annual Conference on Fintech and Digital Innovation, Brussels, Belgium, February 26; Frankfurt am Main: European Central Bank. [Google Scholar]
- Nadler, Asaf, Ron Bitton, Oleg Brodt, and Asaf Shabtai. 2022. On the Vulnerability of Anti-Malware Solutions to DNS Attacks. Computers & Security 116: 102687. [Google Scholar] [CrossRef]
- Popova, Yelena. 2021. Economic Basis of Digital Banking Services Produced by FinTech Company in Smart City. Journal of Tourism and Services 12: 86–104. [Google Scholar] [CrossRef]
- Popova, Yelena, and Olegs Cernisevs. 2022. Smart City: Sharing of Financial Services. Social Sciences 12: 8. [Google Scholar] [CrossRef]
- Popova, Yelena, Olegs Cernisevs, and Sergejs Popovs. 2024. Impact of Geographic Location on Risks of Fintech as a Representative of Financial Institutions. Geographies 4: 753–68. [Google Scholar] [CrossRef]
- Popova, Yelena, Olegs Cernisevs, and Sergejs Popovs. 2025. Contribution to Modern Economic Region Theory: Factor of Intangible Digital Resources. Geographies 5: 8. [Google Scholar] [CrossRef]
- Rastogi, Shailesh, Arpita Sharma, Geetanjali Pinto, and Venkata Mrudula Bhimavarapu. 2022. A Literature Review of Risk, Regulation, and Profitability of Banks Using a Scientometric Study. Future Business Journal 8: 1–17. [Google Scholar] [CrossRef]
- Rockafellar, R. Tyrrell, and Stanislav Uryasev. 2000. Optimization of Conditional Value-at-Risk. Journal of Risk 2: 21–41. [Google Scholar] [CrossRef]
- Rockafellar, R. Tyrrell, and Stanislav Uryasev. 2002. Conditional Value-at-Risk for General Loss Distributions. Journal of Banking & Finance 26: 1443–71. [Google Scholar] [CrossRef]
- Rossebo, Judith E. Y., Scott Cadzow, and Paul Sijben. 2007. eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. Paper presented at the Second International Conference on Availability, Reliability and Security (ARES’07), Vienna, Austria, April 10–13; Piscataway: IEEE, pp. 925–33. [Google Scholar] [CrossRef]
- Sadeghi, Hojatollah, and Farhad Javan. 2024. The Evaluation of Tourist Villages of Iran in Terms of Geophysical Vulnerability Using Fuzzy Scenarios. Journal of Rural Research 15: 85–100. Available online: https://jrur.ut.ac.ir/article_100498.html (accessed on 15 June 2025).
- Sanchez-Zurdo, Javier, and Jose San-Martín. 2024. A Country Risk Assessment from the Perspective of Cybersecurity in Local Entities. Applied Sciences 14: 12036. [Google Scholar] [CrossRef]
- 2019. Special Announcement. Risk Management and Insurance Review 22: 441. [CrossRef]
- Teece, David J. 2010. Business Models, Business Strategy and Innovation. Long Range Planning 43: 172–94. [Google Scholar] [CrossRef]
- Ucedavélez, Tony, and Marco M. Morana. 2015. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Hoboken: John Wiley & Sons, Inc. 664p. [Google Scholar]
- Ziegel, Johanna F. 2016. Coherence and Elicitability. Mathematical Finance 26: 901–18. [Google Scholar] [CrossRef]
Parameter | Description | Type | Role |
---|---|---|---|
TL | Likelihood that a threat source will attempt to exploit a system | Probabilistic (prior) | Independent |
VL | Likelihood that a vulnerability will be successfully exploited | Probabilistic (conditional) | Independent |
Ti | Expected impact (damage or cost) if the threat is realized | Continuous or categorical | Independent |
Vi | Severity of the vulnerability’s consequences if exploited | Continuous or categorical | Dependent |
R | Risk | Computed | Dependent |
Parameters | Description | Criteria |
---|---|---|
Mean Absolute Error (MAE) | Average of absolute differences between predicted and true values | Bad > 1.0 |
Acceptable 0.5–1.00 | ||
Good 0.2–0.5 | ||
Excellent < 0.2 | ||
Root Mean Square Error (RMSE) | Square root of average squared errors; penalizes larger errors more | Bad > 1.5 |
Acceptable 0.8–1.50 | ||
Good 0.4–0.8 | ||
Excellent < 0.4 | ||
Bayesian Information Criterion (BIC) | Penalized likelihood that discourages overly complex models | Bad > 5000 |
Acceptable 2000–5000 | ||
Good 500–2000 | ||
Excellent < 500 | ||
Akaike Information Criterion (AIC) | Similar to BIC, less strict penalty; used for model comparison | Bad > 4800 |
Acceptable 1800–4800 | ||
Good 400–1800 | ||
Excellent < 400 | ||
Log-Likelihood | Measures how likely the observed data is under the model | Bad < −3000 |
Acceptable −3000–−1000 | ||
Good −1000–−200 | ||
Excellent > −200 | ||
KL-Divergence (KL-D) | Difference between predicted and true probability distributions | Bad > 1.0 |
Acceptable 0.5–1.0 | ||
Good 0.1–0.5 | ||
Excellent < 0.1 | ||
Pearson’s r | Measures linear correlation between variables | Bad < 0.3 |
Acceptable 0.3–0.5 | ||
Good 0.5–0.7 | ||
Excellent > 0.7 | ||
Conditional Entropy (H(X|Y) | Conditional entropy, denoted as H(X | Y), quantifies the amount of uncertainty remaining in a random variable X after knowing another variable Y | Bad > 1.5 |
Acceptable 1.0–1.5 | ||
Good 0.5–1.00 | ||
Excellent < 0.5 | ||
Marginal Entropy (H(X)) | Marginal entropy, denoted H(X), quantifies the uncertainty or randomness of a single random variable X, without conditioning on any other variable | Bad < 0.3 |
Acceptable 0.3–0.5 | ||
Good 0.5–0.75 | ||
Excellent > 0.75 | ||
Edge Probability (P) | Edge probability refers to the estimated probability that a directed edge (i.e., dependency) exists between two nodes (variables) in the network | Bad < 0.5 |
Acceptable 0.5–0.7 | ||
Good 0.7–0.9 | ||
Excellent > 0.9 | ||
Mutual Information (MI)–I(X;Y) | Mutual information (MI) measures how much information two variables share—in other words, how much knowing one variable reduces the uncertainty about the other | Bad < 0.1 |
Acceptable 0.1–0.3 | ||
Good 0.3–0.8 | ||
Excellent > 0.8 |
Hypothesis | Bayesian Network Metrics |
---|---|
H1 |
|
H2 |
|
H3 |
|
Parameter | Mean | Std. Dev | Min | Max |
---|---|---|---|---|
TL | 0.54 | 0.18 | 0.10 | 0.95 |
VL | 0.47 | 0.21 | 0.005 | 0.99 |
Ti | 62.1 | 19.8 | 10 | 100 |
Vi | 59.3 | 22.4 | 5 | 100 |
Min | Max | Mean | Std. Dev |
---|---|---|---|
5.3 | 91.2 | 50.07 | 14.54 |
Very Low (0–20) | Low (20–35) | Medium (35–65) | High (65–80) | Critical (>80) |
---|---|---|---|---|
7 | 69 | 353 | 58 | 13 |
Metric | Hypothesis | Full Model (RA) | Reduced Model (RB) | Difference | Assessment |
---|---|---|---|---|---|
Pearson’s r (Ti, Vi) | H1 | 0.83 | - | - | Excellent |
Conditional Entropy H(Vi|Ti) | H1 | 0.87 | - | - | Good |
Marginal Entropy H(Vi) | H1 | 2.3 | - | - | Excellent |
Edge Probability P(Ti→Vi) | H1 | 0.92 | - | - | Excellent |
Mean Absolute Error (MAE) | H2 | 6.2 | 6.7 | +0.5 | Good |
Root Mean Square Error (RMSE) | H2 | 8.1 | 8.6 | +0.5 | Good |
Bayesian Information Criterion (BIC) | H2 | 1504.7 | 1452.3 | −52.4 | Excellent |
KL-Divergence (RA‖RB) | H2 | - | - | 0.41 | Good |
Mutual Information I(Ti;Vi) | H3 | 1.34 | - | - | Excellent |
Mutual Information I(TL;VL) | H3 | 0.98 | - | - | Excellent |
Mutual Information I(TL;Ti) | H3 | 1.01 | - | - | Excellent |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Popova, Y.; Cernisevs, O.; Popovs, S.; Kalimoldayev, A. Financial Institutions of Emerging Economies: Contribution to Risk Assessment. Risks 2025, 13, 167. https://doi.org/10.3390/risks13090167
Popova Y, Cernisevs O, Popovs S, Kalimoldayev A. Financial Institutions of Emerging Economies: Contribution to Risk Assessment. Risks. 2025; 13(9):167. https://doi.org/10.3390/risks13090167
Chicago/Turabian StylePopova, Yelena, Olegs Cernisevs, Sergejs Popovs, and Almas Kalimoldayev. 2025. "Financial Institutions of Emerging Economies: Contribution to Risk Assessment" Risks 13, no. 9: 167. https://doi.org/10.3390/risks13090167
APA StylePopova, Y., Cernisevs, O., Popovs, S., & Kalimoldayev, A. (2025). Financial Institutions of Emerging Economies: Contribution to Risk Assessment. Risks, 13(9), 167. https://doi.org/10.3390/risks13090167