Show simple item record

Artificial intelligence and the fifth phase of political risk management: An application to regulatory expropriation

dc.contributor.authorHemphill, Thomas A.
dc.contributor.authorKelley, Keith J.
dc.date.accessioned2021-09-08T14:35:55Z
dc.date.available2022-10-08 10:35:53en
dc.date.available2021-09-08T14:35:55Z
dc.date.issued2021-09
dc.identifier.citationHemphill, Thomas A.; Kelley, Keith J. (2021). "Artificial intelligence and the fifth phase of political risk management: An application to regulatory expropriation." Thunderbird International Business Review 63(5): 585-595.
dc.identifier.issn1096-4762
dc.identifier.issn1520-6874
dc.identifier.urihttps://hdl.handle.net/2027.42/169299
dc.description.abstractUsing the context of regulatory expropriation, this article extends political risk management theories, forecasting methodologies (employing artificial intelligence, machine learning, and data analytics), and human intelligence evaluation tools useful for multinational enterprise executives in their planning and decision‐making responsibilities. The article identifies three key areas where artificial intelligence will specifically assist managers in analyzing and mitigating risks: (a) earlier identification of risks, (b) precision in risk assessment, and (c) identification of unknown unknown risk correlations. These three categories also represent how artificial intelligence and its application to political risk assessment will evolve in the fifth phase of political risk management, and why it is of particular relevance to risks such as regulatory expropriation. Using the example of an oil exploration joint venture between Russian TNK and BP, and reflecting political and public policy indicators of regulatory expropriation, this political risk management framework and its hypothetical development are illustrated.
dc.publisherWiley Subscription Services, Inc., A Wiley Company
dc.subject.otherhuman intelligence
dc.subject.otherartificial intelligence
dc.subject.otherforeign direct investment
dc.subject.otherpolitical risk management
dc.subject.otherregulatory expropriation
dc.titleArtificial intelligence and the fifth phase of political risk management: An application to regulatory expropriation
dc.typeArticle
dc.rights.robotsIndexNoFollow
dc.subject.hlbsecondlevelAmerican and Canadian Studies
dc.subject.hlbtoplevelHumanities
dc.subject.hlbtoplevelSocial Sciences
dc.description.peerreviewedPeer Reviewed
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/169299/1/tie22222.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/169299/2/tie22222_am.pdf
dc.identifier.doi10.1002/tie.22222
dc.identifier.sourceThunderbird International Business Review
dc.identifier.citedreferenceNewcombe, A. P. ( 2007 ). The boundaries of regulatory expropriation in international law. Transnational Dispute Management, 4 Retrieved from https://www.transnational-disputemanagement.com/journal-browse-issues-toc.asp?key=19
dc.identifier.citedreferenceJarvis, D. S. L., & Griffiths, M. ( 2007 ). Learning to fly: The evolution of political risk analysis. Global Society, 21 ( 1 ), 5 – 21.
dc.identifier.citedreferenceJorion, P. ( 2009 ). Risk management lessons from the credit crisis. European Financial Management, 15 ( 5 ), 923 – 933.
dc.identifier.citedreferenceKennedy, C. ( 1988 ). Political risk management: A portfolio planning model. Business Horizons, 31 ( 6 ), 26 – 33.
dc.identifier.citedreferenceKramer, A. E. ( 2010 ). BP’s natural gas joint venture in Russia is in bankruptcy. The New York Times, June 3, B5.
dc.identifier.citedreferenceKrstevska, A. ( 2012 ). Early warning systems: Testing in practice. IUP Journal of Financial Risk Management, 9 ( 2 ), 7 – 22.
dc.identifier.citedreferenceKyj, M. J., & Kyj, L. S. ( 2010 ). A relational framework for analyzing ventures in cognitive environments: Illustrations from the TNK‐BP experience. Journal of East‐West Business, 16 ( 4 ), 340 – 360. https://doi.org/10.1080/10669868.2010.534021
dc.identifier.citedreferenceLee, K. F. ( 2018 ). AI superpowers: China, Silicon Valley, and the new world order. New York, NY: Houghton Mifflin Harcourt Publishing.
dc.identifier.citedreferenceMakridakis, S., Hogarth, R. M., & Gaba, A. ( 2009 ). Forecasting and uncertainty in the economic and business world. International Journal of Forecasting, 25 ( 4 ), 794 – 812.
dc.identifier.citedreferenceNanalyze. ( 2019 ). Alternative data for predicting geopolitical risk. Retrieved from https://www.nanalyze.com/2019/07/alternative-data-geopolitical-risk/
dc.identifier.citedreferenceNiiler, E. ( 2020 ). An AI epidemiologist sent the first warnings of the Wuhan virus. Wired, January 25. Retrieved from https://www.wired.com/story/ai-epidemiologist-wuhan-public-health-warnings/
dc.identifier.citedreferenceNikiema, S. H. ( 2013 ). Compensation for expropriation. Manitoba, Canada: International Institute for Sustainable Development.
dc.identifier.citedreferenceOECD. ( 2018 ). Policy framework for investment: Expropriation laws and review processes. Retrieved from https://www.oecd.org/investment/toolkit/policyareas/investmentpolicy/expropriationlawsandreviewprocesses.htm
dc.identifier.citedreferenceOxford Analytica. ( 2018 ). How are leading companies managing today’s political risks? 2018 survey and report (produced for Willis towers Watson). Oxford, England: Oxford Analytica.
dc.identifier.citedreferencePredata. ( 2020 ). Products. Retrieved from https://predata.com/our-company/
dc.identifier.citedreferenceRice, C., & Zegart, A. ( 2018a ). Managing 21st century political risk. Harvard Business Review, 96 ( 3 ), 130 – 138.
dc.identifier.citedreferenceRice, C., & Zegart, A. B. ( 2018b ). Political risk: How businesses and organizations can anticipate global insecurity. New York, NY: Hachette Book Group.
dc.identifier.citedreferenceSchaffer, R., Agusti, F., Dhooge, L. J., & Earle, B. ( 2012 ). International business law and its environment ( 8th ed. ). South‐Western Cengage Learning: Mason, OH.
dc.identifier.citedreferenceUnited Nations Conference on Trade and Development (UNCTAD). ( 2012 ). Expropriation: A sequel. UNCTAD Series on Issues in International Investment Agreements II, July, New York and Geneva.
dc.identifier.citedreferenceWebb, A. ( 2019 ). The big nine: How the tech titans and their thinking machines could warp humanity. New York, NY: Public Affairs.
dc.identifier.citedreferenceWhitehead, J. C. ( 2016 ). Plasma–catalysis: The known knowns, the known unknowns and the unknown unknowns. Journal of Physics D: Applied Physics, 49 ( 24 ), 1 – 24.
dc.identifier.citedreferenceWu, D. D., Chen, S. H., & Olson, D. L. ( 2014 ). Business intelligence in risk management: Some recent progresses. Information Sciences, 256, 1 – 7.
dc.identifier.citedreferenceWyss, J. ( 2017 ). Venezuelan government controls more than 500 businesses—And most are losing money. Miami Herald, March 14. Retrieved from https://www.miamiherald.com/news/nation-world/world/americas/venezuela/article138402248.html
dc.identifier.citedreferenceIsakof, P. D. ( 2013 ). Defining the scope of indirect expropriation for international investment. Global Business Law Review, 3 ( 2 ), 189 – 209.
dc.identifier.citedreferenceAgrawal, A., Gans, J., & Goldfarb, A. ( 2018 ). Prediction machines: The simple economics of artificial intelligence. Boston, MA: Harvard Business Review Press.
dc.identifier.citedreferenceAlon, I., Gurumoorthy, R., Mitchell, M. C., & Steen, T. ( 2006 ). Managing micro‐political risk: A cross‐sectional study. Thunderbird International Business Review, 48 ( 5 ), 623 – 642.
dc.identifier.citedreferenceAlon, I., & McKee, D. L. ( 1999 ). Towards a macro‐environmental model of international franchising. Multinational Business Review, 7 ( 1 ), 76 – 82.
dc.identifier.citedreferenceBP/TNK‐BP. ( 2010 ). FT.Com. Retrieved from http://libproxy.umflint.edu/login?url=https://www-proquest-com.libproxy.umflint.edu/trade-journals/bp-tnk/docview/759013994/se-2?accountid=14584
dc.identifier.citedreferenceBremmer, I. ( 2005 ). Managing risk in an unstable world. Harvard Business Review, 83 ( 6 ), 51 – 60.
dc.identifier.citedreferenceBremmer, I., & Keat, P. ( 2010 ). The fat tail: The power of political knowledge for strategic investing. New York, NY: Oxford University Press.
dc.identifier.citedreferenceBughin, J., Seohg, J., Manyika, J., & Chui, M. ( 2018 ). Notes from the AI frontier: Modeling the impact of AI on the world economy. September, Discussion Paper, McKinsey Global Institute. Retrieved from https://www.mckinsey.com/~/media/McKinsey/FeaturedInsights/ArtificialIntelligence/NotesfromthefrontierModelingtheimpactofAIontheworldeconomy/MGI-Notes-from-the-AI-frontier-Modeling-the-impact-of-AI-on-the-world-economy-September-2018.ashx
dc.identifier.citedreferenceCampisi, J. M. ( 2016 ). Reconsidering political risk in developed economies. Journal of Political Risk, 4 ( 8 ) Retrieved from https://www.jpolrisk.com/re-considering-political-risk-analysis-in-developed-economies/
dc.identifier.citedreferenceCarone, T. E. ( 2019 ). Future automation: Changes to lives and to businesses. Singapore: World Scientific.
dc.identifier.citedreferenceCastell, M. R. F., & Dacuy, L. B. ( 2009 ). Exploring the use of exchange market pressure and RMU deviation indicator for early warning system (EWS) in the ASEAN+3 region. DLSU Business and Economics Review, 18 ( 2 ), 1 – 30.
dc.identifier.citedreferenceChokshi, N. ( 2020 ). 3 major U.S. airlines suspend China flights over coronavirus. The New York Times, January 31. Retrieved from https://www.nytimes.com/2020/01/31/business/china-flights-suspended.html
dc.identifier.citedreferenceEscarcena, S. L. ( 2014 ). Indirect expropriation in international law. Cheltenham, UK: Edward Elgar Publishing Limited.
dc.identifier.citedreferenceExpert System. ( 2016 ). What is cognitive analytics?. Retrieved from https://expertsystem.com/what-is-cognitive-analytics
dc.identifier.citedreferenceFagella, D. ( 2019 ). What is machine learning? Emerj: The AI: Research and Advisory Company. Retrieved from https://emerj.com/ai-glossary-terms/what-is-machine-learning/
dc.identifier.citedreferenceFagersten, B. ( 2015 ). Political risk and the commercial sector: Aligning theory and practice. Risk Management, 17 ( 1 ), 23 – 39.
dc.identifier.citedreferenceFeils, D. J., & Sabac, F. M. ( 2000 ). The impact of political risk on the foreign direct investment decision: A capital budgeting analysis. The Engineering Economist, 45 ( 2 ), 129 – 143.
dc.identifier.citedreferenceGalletto, M. ( 2016 ). What is data management? NG Data, March 31. Retrieved from https://www.ngdata.com/what-is-data-management/
dc.identifier.citedreferenceGarbade, M. ( 2018 ). A simple introduction to natural language processing. Medium October 15. Retrieved from https://becominghuman.ai/a-simple-introduction-to-natural-language-processing-ea66a1747b32
dc.identifier.citedreferenceGeoQuant. ( 2017 ). Political risk done right: A GeoQuant white paper. Retrieved from https://GeoQuant.com/GeoQuantWhitePaper.pdf
dc.identifier.citedreferenceGhoshal, S. ( 1987 ). Global strategy: An organizing framework. Strategic Management Journal, 8 ( 5 ), 425 – 440.
dc.identifier.citedreferenceHenisz, W. J., & Zeiner, B. A. ( 2010 ). The hidden risks in emerging markets. Harvard Business Review, 88 ( 4 ), 88 – 95.
dc.identifier.citedreferenceIntel. ( 2015 ). Big data in the cloud: Converging technologies. Intel IT Center, Retrieved from http://blic/us/en/documents/product-briefs/big-data-cloud-technologies-brief.pdf
dc.identifier.citedreferenceJarvis, D. S. L. ( 2008 ). Conceptualizing, analysing and measuring political risk: The evolution of theory and method. Lee Kuan Yew School of Public Policy, National University of Singapore, Research Paper No. LKYSPP08‐004, Retrieved from http://ssrn.com/abstract=1162541
dc.working.doiNOen
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.