The Blockchain Revolution - Decoding Digital Currencies
The Blockchain Revolution - Decoding Digital Currencies
Revolution: Decoding
Digital Currencies
After completing this reading, you should be able to:
Creating multiple copies of a digital file is easy, allowing the same digital file to be spent
twice. This makes the double-spend problem a challenge in digital money systems.
Each society member would have their own personal money printing press, which is
unlikely to work successfully if they could generate personal copies of digital money
files. Despite not being immune to the double-spend problem, physical currency can be
designed to make counterfeiting sufficiently expensive. The traditional approach to
solving the double-spend problem with digital money is to provide a reliable third party,
such as a bank, to aid in mediating the movement of value between accounts in a
ledger. Bitcoin was the first money and payment system to solve the double-spend
problem for digital money without the help of a trusted third party, and below is an
explanation of how they managed to do that:
Cryptocurrency transactions are similar to using physical cash since neither permission
nor personal information is required. By downloading a cryptocurrency wallet, anyone
with internet access can communicate with the system’s miners and generate a public
address and private key for their account. This will create a similar front-end experience
to online banking for managing money balances and initiating payment requests.
However, if the private key is lost or stolen, there is no way to recover the funds.
Native Token
To record money balances, cryptocurrency uses a monetary unit known as native
tokens. These tokens are similar to foreign currencies. However, computer algorithms,
not a country’s policymakers, determine their value. The potential for capital gains from
appreciating the value of the native token relative to the U.S. dollar often drives the
excitement around cryptocurrencies. However, the fundamentals of a cryptocurrency
that would generate continued capital gains for investors beyond the initial adoption
phase are unknown. Furthermore, while the supply of a specific cryptocurrency, such as
Bitcoin, may be limited, the supply of close substitutes may be unlimited. The total
market capitalization of cryptocurrencies will likely continue to grow. Still, this growth
may be attributed more to the creation of new cryptocurrencies than to a rise in the price
per unit of any given cryptocurrency, such as Bitcoin.
Cryptocurrency Application
Cryptocurrencies, like Bitcoin, have primarily been used as a store of value rather than
a medium of exchange due to their volatility. However, their potential use as a vehicle
currency for international remittances and their decentralized nature, which operates
independently of any government or concentration of power, makes them attractive to
some individuals and organizations. Furthermore, anyone can access Bitcoin payments
freely and without permission, provided they have an internet connection. However, it
also makes it easier for illegal activities and money laundering to occur. El Salvador’s
recent adoption of Bitcoin as a legal tender has aroused interest as a case study of how
a cryptocurrency can perform as a domestic payment system.
On the other hand, a smart contract is a computer program that details an agreement
and stores it on the blockchain. It contains information about the loan and the actions
that will be taken based on compliance. The blockchain ensures the contract’s
successful execution, removing the need for any additional parties other than the
borrower and lender.
Asset Tokenization
Asset tokenization involves the conversion of physical assets into digital tokens that can
be used on a blockchain. This allows assets such as real estate to be used as collateral
in smart contracts. However, enforcing blockchain property rights for assets that exist in
physical form remains a challenge for DeFi. Tokens also have non-financial uses, such
as granting voting rights to organizations and creating unique digital artistic images
through nonfungible tokens (NFTs), which serve as a certificate of authenticity. The key
advantage of NFTs is that they use the security of the blockchain to ensure authenticity
and security, rather than relying on signatures that can be forged.
On the other hand, decentralized exchanges (DEX) use smart contracts for peer-to-peer
trading without intermediaries, allowing traders to keep custody of their funds and
interact directly with smart contracts on a blockchain. Order books, which list buy and
sell orders for a given asset as well as their offer and bid prices, can be used to
implement DEX. CEXs operate like DEXs. However, with DEXs, smart contracts handle
the list and transactions. When all transactions are handled on a blockchain, the order
book is referred to as “on-chain.” Otherwise, it is referred to as “off-chain.” One
particular issue of concern with order books is their potential to slow execution and lack
of liquidity. DEX aggregators and automated market makers (AMM) can solve the
liquidity problem, making trades faster and cheaper. AMMs are currently the most
popular form of DEXs since they offer the best solution to liquidity problems.
Stablecoins
As discussed previously, cryptocurrencies are highly unsuitable as payment instruments
due to their extreme exchange rate volatility. A stablecoin is a cryptocurrency whose
value is linked to an external asset, such as the U.S. dollar, to make it more useful as a
payment method. To accomplish this, the stablecoin must persuade its owners that it
can be exchanged for U.S. dollars at par or at a fixed exchange rate. The aim of this
design is to increase the use of stablecoin by making it more appealing as a payment
option. One significant advantage of using stablecoin instead of a traditional bank
account is that it allows for lower-cost USD payments due to its use of blockchain
technology for more efficient account management and payment processing services,
which can be passed on to customers in the form of lower fees. It can also be viewed as
a method of avoiding certain costs by transferring the transaction outside the regulated
environment.
Regulators are also concerned about the possibility of systemic risk if a stablecoin run
leads to a fire sale of commercial paper, as well as negative economic consequences
for firms that rely on this market. Regulators face challenges when dealing with
stablecoins that are “too big to fail” and can rely on central bank support. Nonetheless,
the use of smart contracts to design more resilient financial structures may make
stablecoins “run-proof.”
Regulatory Concerns
As the world of stablecoins evolves, regulators face concerns similar to those faced by
the traditional banking industry. Banks create money by issuing deposit liabilities with a
fixed exchange rate against U.S. dollars, as well as credits held in Federal Reserve
accounts. They use low-earning liabilities to purchase high-earning assets. Commercial
banks are referred to as fractional reserve banks because they typically hold only a
small percentage of their assets as reserves. The implementation of federal deposit
insurance has largely eliminated retail bank runs. The Federal Reserve also provides
emergency lending to banks, but regulatory restrictions accompany these benefits on
bank balance sheets and business operations.
Some stablecoin issuers attempt to replicate the business models of banks or top
institutional money market funds, which can be a profitable venture. However, this
approach carries significant risks that could lead to instability. Other stablecoin issuers,
on the other hand, focus on providing payment services by holding only risk-free assets
such as U.S. Treasury securities. These stablecoins are similar to government money
market funds. Stablecoins may adhere to government regulations, hold only risk-free
assets, and generate profits via transaction fees or net interest margins. The goal is to
keep stablecoin users’ capital requirements low.
In order to prevent fraud and ensure efficient messaging systems, any system would
require strong security measures. The potential of CBDC has divided opinion, with
some strongly in favor and others less so. Theoretically, a private, public, or
private-public partnership could all be viable options. The Federal Reserve is primarily
concerned with wholesale payments, whereas the private sector typically serves the
retail sector. A CBDC could be designed to respect this division of labor by allowing free
entry into the business of “narrow banking” or by providing direct access to CBDC and
delegating retail-level processing to private firms.
Question
Consider the fictional cryptocurrency, Plutocoin, a prominent blockchain-based system
that uses a unique blend of proof-of-work (PoW) and proof-of-stake (PoS) protocols.
Joe, a software engineer, is debating whether to use Plutocoin as his primary means of
transaction instead of conventional money and payment systems.
Which of the following would be the most accurate statement for Joe to make?
Solution
B is incorrect because one of the main features of cryptocurrencies like Plutocoin is the
ability to transact without having to disclose any personal information, unlike
conventional banking systems where personal information is usually required.
● Identify and describe the benefits and limitations of crypto and decentralized
finance (DeFi) innovations.
● Describe the role of stablecoins in DeFi ecosystems and differentiate among the
types of stablecoins.
● Discuss possible advantages and disadvantages of a monetary system based on
CBDCs.
● Understand the risks posed by the centralization that occurs in DeFi ecosystems
and crypto exchanges (CEX).
● Outline the regulatory actions recommended by the BIS to manage risks in the
crypto monetary system.
The monetary system is used by people all over the world to conduct payments and
other financial transactions. The organizations and structures that surround and support
monetary exchange make up the monetary system.
The central bank, which maintains the system’s fundamental functions and issues
money, is at the center of the monetary system. Trust in the central bank ultimately
underpins confidence in the monetary system.
The majority of payments are carried out by commercial banks and other private
payment service providers (PSPs), who also provide services to customers. This
separation of roles encourages competition.
Although the central bank-centered monetary system has done a good job historically,
new demands are being placed on it by technical advancements brought on by digital
innovations such as those in the crypto universe.
Recent occurrences have shown that the crypto ideal and its actuality are different.
● The collapse of the TerraUSD stablecoin and its companion coin Luna has
highlighted the system’s fragility.
● The crypto world, in particular, lacks a nominal anchor. It has become apparent
that crypto has deeper structural limits that prevent them from achieving the
effectiveness, stability, or integrity levels necessary for a suitable monetary
system.
● It is prone to fragmentation, and scaling its applications without sacrificing
security is impossible, as shown by the high fees.
● The system’s use of unregulated intermediaries is of grave concern.
Retail, fast payment systems (FPS) and central bank digital currencies (CBDCs), and
decentralization and permissioned distributed ledger technology (DLT) are well
positioned to serve the public interest by lowering costs and increasing convenience
while upholding the integrity of the system. Faster, safer, and less expensive payments
and settlements are supported by these developments domestically and internationally.
● Safety and stability – Money must do the following three functions in order to
guarantee the security and stability of the system: a store of value, a unit of
account, and a medium of exchange.
● Accountable – Key entities that are dependent on the financial system must be
held accountable, either through particular mandates for public authorities or
through appropriate regulation and oversight for private businesses.
● Efficient – To facilitate economic transactions on a large scale and at a cheap
cost, the monetary system should be effective and enable dependable, quick
payments.
● Financial inclusion – To spread the advantages of economic activity and
encourage financial inclusion, everyone should have access to affordable, basic
payment services, particularly transaction accounts.
● User control – The system must guarantee user control over financial data and
defend privacy as a fundamental right.
● Integrity – By preventing illegal activities such as fraud, financing of terrorism,
and money laundering, the integrity of the system must be preserved.
● Adaptable – The monetary system must be aware of technological
advancements, anticipate user needs and future advances, and adapt to shifting
demands from consumers and enterprises. Additionally, it ought to promote
innovation and competitiveness.
● Open – The monetary system also needs to be open, interoperable, and
adaptable both domestically and internationally in order to better serve a world
that is becoming more connected.
The abundance of coins also highlights another crucial weakness in the structure of
cryptocurrencies, namely their fragmentation into numerous incompatible settlement
levels.
The fragmentation of the cryptocurrency market reveals its challenge. The more users
that flock to a single blockchain system, the worse the congestion and the higher the
transaction fees, which invites newer competitors who might forgo security in favor of
greater capacity.
Crypto gives a sneak preview of potential functionality. These result from the ability to
bundle transactions and carry out the automatic settlement of bundled transactions in a
conditional manner, enabling higher functionality and speed.
Many blockchains and cryptocurrency coins have emerged since the creation of Bitcoin,
most notably Ethereum, which enables the use of “smart contracts” and
“programmability.” The use of self-executing code known as “smart contracts” can
automate market processes and do away with the middlemen who were previously
needed to make choices. Smart contracts are transparent and less susceptible to
manipulation because the underlying code is open to the public and can be examined.
The ability of smart contracts to integrate many parts of a system is a key aspect. By
merging several instructions into a single, smart contract, users can conduct
complicated transactions on the same blockchain. By “tokenizing,” they can turn assets
into digital representations.
Since smart contracts cannot directly access data that is “off-chain” or outside the
specific blockchain, they depend on intermediaries to supply this information (so-called
oracles). But these modifications also bring new issues. More centralized validation
techniques are frequently used to boost capacity, which weakens security and
concentrates insiders’ benefits.
Lending. Users can make interest-bearing loans of their stablecoins to borrowers who
pledge other cryptocurrencies as security on lending sites.
Trading. Decentralized exchanges (DEXs) are venues for direct trades between holders
of cryptocurrencies or stablecoins.
Insurance. Users of DeFi insurance platforms can protect themselves against things like
improper handling of secret keys, exchange hacks, and unsuccessful smart contracts.
Due to their pegs to fiat money or other assets like gold, stablecoins are essential to the
DeFi ecosystem. They value the credibility that the asset or unit of account issued by
the central bank offers. Their primary use case is to combat the extreme price volatility
and limited liquidity of unbacked cryptocurrencies like Bitcoin. Their use also prevents
costly, frequent conversions between cryptocurrencies and bank deposits in fiat
currencies.
Asset-backed stablecoins like Binance USD and USD Coin are typically administered by
a central intermediary who invests the underlying collateral and organizes the
generation and redemption of the coins.
Algorithm stablecoins. To sustain their value in relation to the target currency or asset,
algorithmic stablecoins rely on sophisticated algorithms that automatically rebalance
supply.
The reliability of stablecoin stabilization methods heavily rests on the quality and
transparency of their reserve assets, both of which are frequently terribly deficient.
Stablecoins lack the characteristics required to support the upcoming monetary system.
● They cannot make use of the legal constraints and protections of bank deposits
or the central bank’s role as a lender of last resort.
● They must import their credibility from sovereign fiat currencies.
● They restrict liquidity and risk fracturing the monetary system.
There are increased dangers of theft and hacking in a system of rival blockchains that
are not interoperable but are supported by speculation. Interoperability refers to the
ability of users to access, share, and validate transactions across several blockchains.
Since each blockchain represents a distinct record of settlements, interoperability is not
possible in practice. To enable the movement of coins between blockchains, a few
“cross-chain bridges” have emerged. These bridges depend on a small number of
validators who, in the absence of regulation, must be believed to refrain from engaging
in unethical activity. However, a surge in hacks has coincided with the growth of these
bridges.
In contrast to the network effects that develop in conventional payment networks, the
crypto world is highly fragmented. In a conventional payment network, a platform gains
more users as more individuals use it. Trust and affordability are essential to such
platforms. Contrarily, cryptocurrency’s propensity for fragmentation and excessive fees
is a fundamental structural fault that disqualifies it from serving as the basis for the next
generation of money.
High price correlations between various cryptocurrencies and blockchains might be
caused by speculation. Increased demand drives up prices even further. Strong price
co-movement is present. When the rate of new users suddenly declines, there are
significant worries about what would happen to a system that depends on selling new
coins.
Incentives conflicts and hacking danger arise as validators become more centralized.
Authorities need to take regulatory arbitrage seriously. They should make sure that
crypto and DeFi operations adhere to the legal requirements for similar traditional
activities, operating under the guiding premise of “same activity, same risk, same
regulations.” The recent collapse of numerous stablecoins has brought attention to how
urgent the situation is.
To promote the integrity and safety of the financial and monetary systems, policies are
required. A fine or closure should be imposed on cryptocurrency exchanges that
conceal the identities of parties to transactions and disregard fundamental
know-your-customer (KYC) and other Financial Action Task Force (FATF) rules. They
could otherwise be used to dodge taxes, finance terrorists, or get around economic
restrictions. Similarly, banks and credit card firms need to demand user identity and
carry out KYC compliance.
Consumer protection laws. Investors ought to be able to invest in riskier securities, such
as cryptocurrencies, but there needs to be sufficient disclosure. This entails sound
regulation of the frequently deceptive advertising of digital assets. Front-running-like
behaviors can necessitate the application of innovative legal strategies.
It is crucial to discover regulatory entry points and close data gaps. A multitude of new
centralized intermediaries have popped up as a result of the cryptocurrency market’s
expansion. The traditional financial institutions and these centralized entities serve as a
natural entry point for regulatory responses.
The worldwide nature of crypto will necessitate collaboration across all regulatory fields.
In order to sanction non-compliant actors and platforms, authorities may need to
actively exchange information and conduct coordinated enforcement measures.
The goal is to harness the beneficial cycle of network effects by not only enabling
valuable functionalities like programmability, composability, and tokenization but also
putting them on a more secure base. Central banks are utilizing the best aspects of new
technology to serve the public good, along with their attempts to regulate the crypto
universe and address its most pressing issues.
As one of its primary functions is to issue central bank money, which acts as the basis of
the future monetary system and the unit of account in the economy, central banks are
ideally positioned to provide it.
Using its balance sheet, the central bank’s other function is to provide the means for the
ultimate finality of payments. It’s a trusted middleman who debits the account of the
ultimate payer and credits the account of the ultimate payee.
Another function of the central bank is to ensure enough liquidity available for
settlement to support the smooth operation of the payment system. L liquidity provision
ensures no bottlenecks will obstruct the smooth operation of the payment system.
Protecting the integrity of the payment system through regulation, supervision, and
oversight is the central bank’s other responsibility. The central bank is in a good position
to provide the groundwork for cutting-edge services in the private sector thanks to its
interconnected roles.
The future monetary system expands on these central bank functions and
responsibilities in order to provide room for new capabilities of central bank money and
cutting-edge services to be built on top of them. New private applications will be able to
function on more advanced technology representations of central bank money rather
than stablecoins. Thus, numerous new activities can be supported by innovations at the
central bank.
This vision includes elements at the wholesale and retail levels that make a variety of
new features possible. At the wholesale level:
Tokenization. When deposits are tokenized, they are decentralized, settled, and given a
digital representation on the distributed ledger technology (DLT) platform. This might
make it easier to exchange new technologies, including fractional ownership of stocks
and other assets, opening the door to creative financial services that go far beyond
simple payment processing.
Interoperability. Users of one platform can send messages and commands to others
that are linked to it with ease through APIs. Retail innovations encourage more
competition, decreased costs, and increased financial inclusion in this way.
Instant payments. Households and businesses can easily access retail CBDCs.
Through various interfaces and competing private Payment Service Providers, they
enable immediate payments between end users.
Data architecture. The Central Bank Digital Currencies (CBDCs) are backed by a data
architecture that includes digital identity and APIs that allow for safe data interchange,
enabling more user control over financial data.
Open platform. They facilitate lower costs in payment services by fostering efficiency
and better competition among private sector PSPs through the provision of an open
platform.
Inclusive design. Both can help financial inclusion for people who do not already have
access to digital payments through inclusive design elements.
When viewed from a distance, the world’s monetary system can be compared to a
forest, whose canopy makes cross-border and cross-currency activities possible.
Infrastructures like multi-CBDC (Central Bank Digital Currencies) platforms function as
crucial new system components in the canopy.
Innovation is crucial. For private innovation to serve the public good, the fundamentals
must be done correctly. Public infrastructures can enhance the payment system by
utilizing many of the purported advantages of cryptocurrencies without the downsides,
as demonstrated by ongoing work at central banks. How central banks may assist
interoperability and data governance is demonstrated through wholesale and retail
CBDCs as well as open banking initiatives.
Multi-CBDC systems involving several central banks and currencies can benefit from
decentralized governance. Functions such as self-executing smart contracts are
essential because they enable users to limit the settlement of their transactions to the
event that certain predefined conditions are met (programmable). Through such
automation, payments, and delivery of securities can be done only all at once or not at
all, accelerating settlement and reducing counterparty risk.
Wholesale CBDCs have the advantage of potentially being accessible to a far broader
range of intermediaries than domestic commercial banks. By allowing nonbank PSPs to
conduct CBDC transactions, competition, and vitality could increase significantly.
Payments could be finalized with wholesale CBDCs. In a digital system, establishing the
source or “provenance” of the transferred funds is necessary to ensure that payment is
genuine. Cryptography is used to conceal real names while openly displaying the
complete history of all transactions made by all parties.
One potential tokenized deposit system would include a permissioned platform that
keeps track of every transaction in tokens produced by the participating institutions.
Retail investors (depositors) would store tokens in digital wallets and send tokens
between wallets to make payments. This might take place concurrently as a result of
smart contract-enabled single atomic transactions. Digital representations of bonds and
stocks might potentially be possible with the same system.
The advantages of atomic settlement and open-source protocols can coexist peacefully,
with central banks serving as the main hubs for validation.
Retail CBDCs and Fast Payment Systems
Wholesale and retail CBDCs have a lot in common. Retail CBDCs provide consumers
and companies with digital access to money from the central bank. Retail-facing
payment services are provided by PSPs, both bank and nonbank. Thus, retail CBDCs
are occasionally referred to as “digital cash.” As transfers take place in real-time or
close to real-time, on an almost 24/7 basis, they have great speeds and availability.
Contrary to crypto, which needs high rents, has limited scalability, and is congested,
Central Bank Digital Cryptos and retail Fast Payment Systems (FPS) provide broader
use, which lowers costs and results in better services.
Retail Fast Payment Systems (FPS) have already made notable strides toward lowering
costs and promoting financial inclusion for the unbanked, particularly in Brazil, where
two-thirds of the adult population use their retail FPS Pix.
Retail CBDCs can be created to assist financial inclusion by examining retail CBDC
design elements that address particular barriers to financial inclusion, such as through
novel interfaces and offline payments. The cost of payment services for the unbanked
can be decreased by central banks through tiered CBDC wallets with simpler due
diligence for users transacting in lower values, promoting more access to digital
payments and financial services.
As every transaction in the digital economy leaves a trace, generating issues with
privacy, data misuse, and personal safety, retail Central Bank Digital Cryptos (CBDCs)
and Fast Payment Systems (FPSs) can be created with privacy protection and
improved user control over data in mind. Since there isn’t a single, comprehensive
record of every transaction in conventional payment systems, individual Payment
Service Providers (PSPs) have more control over data. Every PSP, however, only
records its own transactions. Even the central operator is unaware of all payments in
full. Thus, the promise of confidentiality by the central operator and the mix of
segregated record-keeping are used to protect the privacy of payments.
Crypto advocates claim permissionless blockchains give consumers back control over
their personal data, yet this poses serious threats to users’ privacy and integrity. Retail
FPSs and CBDCs’ underlying structures can allow users control over their personal
data while protecting their privacy and promoting consumer welfare. Additionally, central
banks can genuinely build systems in the public interest because they have no financial
interest in personal data.
Systems that provide law enforcement authorities with access to information while
maintaining the necessary legal protections can be created with clear mandates and
public accountability. These methods are currently being considered for retail CBDCs
and are already standard practice in the form of bank secrecy rules.
Retail CBDCs and FPS have the potential to enhance accountability in comparison to
the current system and the crypto universe. The role of the central bank in retail
payments needs to be discussed publicly as a result of new systems, and legal
regulations will need to be modified in order for them to operate. Private service
providers would be integrated into a strong regulatory and oversight framework under a
system based on public infrastructure.
Question
Jessie, a risk manager at a venture capital firm, is evaluating potential investments in
crypto and decentralized finance (DeFi) start-ups. She recognizes that these
technological innovations can revolutionize the financial industry. However, she must
also take into account their potential risks and limitations. As part of her analysis, she is
considering the structural integrity and robustness of the technologies powering these
potential investments.
From the following choices, which statement most accurately captures Jessie’s
concerns about the possible limitations of crypto and DeFi technologies?
Solution
The fragmentation of the crypto universe, combined with the so-called scalability
trilemma, underpins inherent limitations in blockchain systems. This is because the
proliferation of different cryptocurrencies (fragmentation) could reduce overall efficiency
and compromise interoperability. The scalability trilemma underscores that blockchain
systems can only optimize two out of the three fundamental properties: security,
scalability, and decentralization. Hence, a system may offer excellent security and
decentralization but face challenges in scaling up to accommodate large numbers of
transactions. These combined issues present significant potential limitations of
blockchain technology.
Methodological Considerations
According to BCBS (2015), effective risk governance involves mapping and measuring
risk exposures. The assessment of climate-related financial risks is similar to that of any
other risk. The only difference is that climate-related financial risks have unique features
that challenge traditional risk measurement.
Generally, physical risk drivers (physical hazards) can be associated with financial
exposures using damage functions that show how a specific risk driver affects tangible
assets. We can attribute disruptions to assets, activities, and related financial flows to
comprehensive risk models that measure financial risk parameters.
The damage function applied within a specific risk model depends on a bank’s
technological and resource capacity, the availability of relevant data, and the purpose
for which the estimation is intended. In addition, sectors, the severity of hazards, time
horizon factors, and geospatial idiosyncrasies determine specific damage functions.
As a result of their distinct characteristics, physical and transition risks are assessed
separately. Some climate change features, however, increase the probability of
dependence among these risks. Hence, they can be viewed jointly.
Exposure Granularity
Bank’s transactions with other parties may expose it to climate-related financial risks.
Banks and supervisors will have to decide the level of granularity at which to assess the
implications of climate risk drivers for these transactions. The following factors may
influence this decision:
This decision drives the selection of available approaches, which then affects a model’s
output for risk management.
On the other hand, bottom-up starts by dimensioning risk at the component level and
then aggregating these individual risks to provide a general view of risk.
Heterogeneities
Heterogeneity is an important consideration when selecting measurement approaches.
Climate-related financial risks vary by bank, depending on geographical location,
markets, sectors, political environments, and technology. The following are among the
common heterogeneities:
Sources of Uncertainty
There is uncertainty associated with estimating climate-related financial risks. As new
information is incorporated into climate models, climate sensitivity estimates typically
trend higher, suggesting an underestimation of climate-related financial risks.
We have three broad data categories needed to assess climate-related financial risk:
1. Physical and transition risk drivers data: These are needed to translate climate
risk drivers into economic risk factors (i.e., climate-adjusted economic risk
factors).
2. Vulnerability of exposures data: These link climate-adjusted economic risk factors
to exposures.
3. Financial exposure data: These are required to translate climate-adjusted
economic risk into financial risk.
Climate risk drivers determine the relevant characteristics of these data. Counterparties’
geospatial location primarily determines physical risk exposure. On the other hand, the
vulnerability of bank exposures to transition risk depends, however, on the economic
activity of counterparties within particular jurisdictions.
Physical risks can result in the destruction of property and inventory, which can affect
the economy. As a result, physical hazards should be sufficiently matched with the
location of relevant physical touchpoints in order to assess the vulnerability of exposure
to physical risks.
It may also be necessary to collect information about interconnections between retail,
corporate, and municipal borrowers in order to evaluate the impacts of deteriorating
local economic conditions due to a severe or chronic weather event on the local
economy. To assess the vulnerability of corporate counterparties’ exposure to transition
risk, data concerning their sectors and subsectors, as well as their carbon sensitivity,
are often needed.
Potential Methodologies
This section discusses conceptual modeling and risk measurement approaches that can
be used to estimate climate-related financial risks.
Input-output models estimate how shocks will affect a sector or region’s economy based
on static economic linkages among sectors and geographical locations. In the context of
climate economics, an input-output accounting framework is used to examine the
impact of policy changes such as an emissions tax or to estimate the supply chain
impacts of extreme climate events.
Computable general equilibrium (CGE) models allow policy experiments with complex
behavioral interactions between sectors and agents that cannot be solved analytically
due to their complexity. Even though some mechanisms can be explained for CGE
outcomes, the level of complexity makes it impossible to assess the overall significance
of each embedded decision rule and parameter value governing economic agents,
resulting in a significant black-box effect.
Overlapping generation (OLG) models are a more transparent and stylized approach to
analyzing long-term macroeconomic evolutions. By examining the intergenerational
distribution of consumption, these models can highlight one key shortcoming of other
approaches: the large role discount rates play in estimating the social cost of carbon.
Agent-based models (ABMs) are the most recently introduced model for measuring
climate-related impacts due to their ability to reflect uncertainty and complexity better.
An ABM is a simulation in which economic actors interact with institutions and each
other based on a set of decision-making rules imposed by the modeler.
Other broad risk measurement approaches currently being used by banks and
supervisors include risk scores, scenario analysis, stress testing, and sensitivity
analysis.
Climate risk scores rate the climate risk exposure of assets, companies, portfolios, or
even countries. In order to assign a quality score to exposures, they combine a risk
classification scheme with a set of grading criteria. Banks and supervisors can use
climate risk scores to assess the relative climate exposure of existing and take
necessary credit interventions.
Scenario analysis can help quantify tail risks and clarify climate-related uncertainties by
examining a wide range of plausible scenarios. Climate scenario analysis involves four
steps:
Sensitivity analysis is another subset of scenario analysis that examines the impact of a
specific variable on economic outcomes. Typically, one parameter is altered across
multiple scenarios, and outputs are observed to see what happens each time the
parameter is altered.
Among other new approaches developed, we have natural capital analysis and climate
value-at-risk.
Natural capital analysis evaluates the negative effects of degradation on a bank. This
process typically involves four steps:
Transition Risks
The following are observed practices among banks:
Physical Risk
● Indicators metrics used to map, measure, and monitor physical risk are intended
to identify concentrations of risk geographically and their type, probability, and
severity.
● Location-based physical risk scores have been developed for physical risk
drivers such as heat stress, wildfires, floods, and sea level rise. Indicators are
identified for each risk driver that captures changes in physical conditions. A
bank can aggregate these indicators and translate them into facility-level scores,
which can then be used to perform due diligence on clients or to evaluate
mortgages annually.
● In addition, some banks are using geospatial mapping to assess and monitor
how physical risks may affect their exposures.
Supervisory Methodologies
Supervisors use similar metrics and indicators that banks use to map, measure, and
monitor exposure to climate-related financial risk.
Transition Risks
● The impact of transition risks is often assessed on the basis of regulatory
information or ad hoc surveys.
● Bank supervisors typically use indicators for the emissions intensity, carbon
footprint, or sensitivity to climate policies of banks’ counterparties at the entity or
sectoral level for corporate portfolios, except for real estate exposures.
● We only have a few analyses for real estate exposure transition risks.
Physical Risks
● Even though the analysis of exposures to physical risks varies and its
assessments are often in their initial stage, some supervisors have managed to
identify hazards, map and measure exposures.
● Supervisors identify hazards relevant in their jurisdiction and specific regions
more vulnerable to them. Information from third parties is crucial in conducting
the above analysis. Such information includes publicly available information and
climate risk scores provided by commercial vendors.
● The use of these indicators varies in terms of hazard, geographical granularity,
and complexity. Use of flood maps, country vulnerability indicators, and individual
industrial facilities’ water stress levels
● The authorities may assess the risk exposure of individual supervised entities or
of the banking system to geographies that are more susceptible to physical risk
once salient physical risk drivers have been identified.
● Most of these exploratory exercises focus on credit risk or market risk analysis.
Climate-related financial risk scenario analyses are currently being conducted to
understand potential impacts on selected portfolios, refine methodologies, and
assess limitations and benefits. Such exercises are used to build capacity and
identify counterparties that need to be involved in the transition process.
● Banks’ transition risk analysis focuses on the impact on credit parameters for
specific sectors of counterparties. Specifically, this includes corporate exposure
to climate policies in relevant sectors.
● Using a “shadow price” as part of a transition risk sensitivity exercise or scenario
is an example. This approach involves defining a range of possible future prices
on the basis of external scenarios or internal expertise. We can then use these
“shadow prices” to evaluate the effects on financial variables and hence the
counterparty’s credit risk profile.
● Banks’ physical risk analysis focuses on corporate and household exposures
(particularly mortgages). Based on this, they infer a potential impact on
counterparty credit quality. Companies in specific sectors (such as electric
utilities) can also be affected by business interruption assumptions.
● Observed practices include focusing on sectors more sensitive to weather
patterns.
Supervisory Methodologies
● Supervisors employ scenario analysis and climate stress tests for
micro-prudential supervision and for informing macro-prudential policies.
● At the micro-prudential level, scenario analysis, and stress testing may be used
to: (i) quantify banks’ financial exposures vulnerable to specific climate risk
drivers and/or (ii) understand the vulnerability of banks’ business models under
specific climate scenarios.
● At the macro-prudential level, scenario analysis, and stress testing can be
employed to assess whether climate risks are systemic in nature and determine
their size and distribution.
Third-party Approaches
Supervisors and banks sometimes rely on comprehensive methodologies or tools
provided by third parties in addition to specific data or metrics. The same features apply
to third-party methodologies as in the context of banks and supervisors, such as
exposure mapping, scenario selection, shock introduction, and impact assessment.
● A variety of risk metrics or tools may be provided by the methodologies, including
climate VaR, PD, expected shortfalls, expected losses (EL), income predictions,
revenue/cost analysis, LTV ratios, return on equity, and climate targets.
● For physical risks, a risk indicator is often proposed in the form of a climate risk
score. Some methodologies assign a risk rating to an exposure based on the
type of hazard to which it is exposed and vulnerable. Other methodologies leave
room for different types of segmentation or aggregation strategies.
● Methodologies developed by third parties incorporate climate sensitivity or
vulnerability, such as water and energy resources, or analyze the types of
facilities that are at risk. Several methodologies consider alternative production
sources and insurance policies as well. Vulnerability is assessed by using
damage functions that describe (historical) relationships between natural disaster
magnitude and asset damage.
It may be difficult to distinguish between gross and net exposure without being able to
clearly identify and measure the hedging strategies employed by counterparties.
Counterparty-level Information
Counterparties provide lenders with proprietary non-public information in order to
develop a banking relationship and assess the counterparty’s creditworthiness. By
acquiring non-public client information via the lending relationship, the bank is able to
address some of the data gaps or quality issues on a bilateral basis. However, for small
counterparties, the availability of proprietary climate-related client data may be
qualitative rather than quantitative. Consequently, data completeness and precision
issues may materialize. Furthermore, banks rarely update data after the underwriting
processes are done. This could create gaps in climate reporting for existing exposures.
When proprietary non-public information is not readily available, banks may decide to
use public information disclosed by borrowers. It is worth noting that the quantity and
quality of public information depend on the size of the firm. Consequently, it limits the
comparability of smaller firms with large corporations.
Supervisory Reporting Data
Supervisory reports provide recurring and standardized data useful for measuring
climate risk. Their analysis could provide macro- and micro-level insights into banks’
asset portfolios. While existing data can be leveraged in combination with third-party
providers, current supervisory reporting may not provide sufficient granularity to assess
transition and physical risks.
● Uncertainty around the climate risk drivers involving both transition and physical
risk drivers hinders measurements of climate-related risks.
● Capturing the specific impacts of climate scenarios is still a challenge, and hence
there is a need to continue developing modeling frameworks to capture the
impacts of climate scenarios, including stressed variants, within an integrated
and tractable modeling framework.
● There can be issues with the comprehensiveness of modeled impacts. In
particular, capturing the impact of climate scenarios at a level of granularity
consistent with a risk classification is challenging.
Banks have limited ability to internalize negative feedback associated with their
short-term lending decisions. To capture risks over longer time horizons, banks will need
to examine the appropriateness of existing measurement approaches as well as
possible modifications.
● Identify and discuss the categories of potential risks associated with the use of AI
by financial firms and describe the risks that are considered under each category.
● Describe the four core components of AI governance and recommended
practices related to each.
● Explain how issues related to interpretability and discrimination can arise from
the use of AI by financial firms.
● Describe practices financial firms can adopt to mitigate AI risks.
AI risks refer to the potential ills that may cause harm to organizations, consumers, or
society at large. Such risks may originate from:
According to the Artificial Intelligence/Machine Learning Risk & Security Working Group
(AIRS), potential risks of AI can be categorized into data-related risks, AI/ML attacks,
risks related to testing and trust, and compliance (people) risks.
The effectiveness of any AI/ML system depends on the data used to train it and the
scenarios considered during the training. Sadly, training the system on all possible
scenarios and data is not always possible. For example, if we were to develop a model
that seeks to predict the occurrence of a major financial crisis, we would only have data
gathered from past crises. Even then, history shows that past financial crises were not
preceded by the exact same conditions or scenarios. There have always been unique
situations and “surprise” factors. In the end, we would develop a model that enjoys a
certain degree of accuracy, but it would be far from perfect.
Therefore, learning limitation is a key issue that’s often discussed during risk reviews
and brainstorming sessions that precede the deployment of an AI system.
b. Data Quality
Poor data quality limits the learning capacity of AI/ML systems leading to inaccurate or
unreliable output. Furthermore, poor data quality also negatively impacts future
decisions and inferences. Poor data may lead to inaccurate predictions and even failure
to achieve the intended objectives.
If an attacker is able to infer the data used to train the AI/ML system, they may gain
access to sensitive data used to train the model, thereby compromising the privacy of
the system as a whole. We have two major types of data privacy attacks: membership
inference and model inversion attacks.
Data poisoning refers to the contamination of the data used to train the AI/ML system.
Data poisoning may increase the error rate and thus negatively impact the learning
process and the overall output. “Label-flipping’’ and “frog-boil’’ attacks are examples of
attacks under this category.
c. Adversarial Inputs
Some AI systems use inputs from external systems or users. These AI systems
interpret such input and undertake some actions, such as classifying the data. An
adversary could potentially deploy malicious algorithms designed to bypass the AI
system classifier. Most adversarial attacks usually aim to deteriorate the performance of
classifiers on specific tasks by essentially “fooling” the machine learning algorithm. Such
malicious inputs are referred to as adversarial inputs.
d. Model Extraction
In a model extraction attack, a malicious user attempts to steal the model itself. The
adversary first accesses the prediction API of the target model and then queries to
extract information about the model’s vital components. The goal is to use this
information to gradually train a pseudo model that works pretty much like the target
model. Attempts can then be made to sell the pseudo model. In some cases, the
adversary may take time to study the model even more closely with the aim of launching
further attacks on the parent AI system.
a. Incorrect Output
Certain AI/ML systems are inherently dynamic and prone to changes over time. In
particular, the output may evolve over time and differ significantly from the output
produced in the early stages of implementation. This poses a real challenge to the
testing and validation of the AI/ML system. It may not be possible to carry out reliable
tests for all the scenarios, combinations, and permutations of the available data.
b. Lack of Transparency
Although AI/ML systems have been with us for a while, they have still been considered
an emerging technology with which most people are not yet fully conversant. Some
people have a very different understanding of how these systems work, a situation that
has led to persistent trust issues. It is believed, for example, that AI systems work out
problems in a ‘’black box’’ that isn’t open to scrutiny.
c. Bias
Biased AI outcomes can also lead to legal, regulatory, reputational, and operational
risks.
Compliance
Policy Non-compliance
Definitions
Definitions of AI/ML may vary from one organization to another depending on the
organization’s culture, environment, and adoption. The first step toward sound and
robust AI governance should include a clear definition of what constitutes AI (and what
doesn’t). This definition is vital since it provides the foundation and a clear
understanding of the other AI governance components.
The definitions and the supporting documentation should also clearly indicate how an
organization’s stakeholders identify with the AI definitions. Such stakeholders include
senior management, system developers, and legal, compliance, and information
security officers.
Inventory
An AI inventory is simply a centralized repository that helps an organization keep track
of all AI systems in use and monitor associated risks. An inventory describes the role of
each AI system deployed, its uses, and any restrictions on such use. Inventories can
also provide a list of data elements that constitute each AI/ML system.
Policies
In some cases, the use of AI systems can be governed on the basis of existing policies
and standards. However, there may be a need for the formulation of new policies and
standards or some modification of the existing ones to ensure that AI is deployed
appropriately.
It’s difficult to discuss AI policies and standards without mentioning ethical principles
and accepted norms. It should be noted that ethical principles for AI have been
discussed in the financial industry for a long time. As a result of these discussions, the
financial industry has developed a binding set of principles. Indeed, some institutions
have gone as far as publicizing the principles by which they abide. These principles
have had positive impacts on organizations and should therefore be developed further.
Framework
A robust AI governance framework is important as it helps organizations learn, govern,
monitor, and develop the AI system. The first part of an AI governance framework might
involve the identification of key stakeholders, formalized in the Center of Excellence
(CoE), working group, or council. The stakeholders for various groups and departments
collectively form what we call a ‘coalition.’ With such groups, best practices, sharing of
knowledge, and guidance on the use of AI systems can be achieved. Such efforts, in
most cases, bear fruits when close links are established with technology, data
engineers, and business line stakeholders.
● Data ethics.
● Privacy rights.
● Suitability of the training data used.
● Safety of the dataset.
● Supervisory roles.
● Data development (whether internal or external).
It should be noted that identifying the potential AI/ML risks helps formulate an
operational risk and control framework. Once potential risks have been identified, a gap
analysis can be established against existing controls. The number of participating
control owners depends on an institution’s control library. Thorough planning and a
structured approach are necessary to achieve the gap analysis. The gap analysis
results are then used to create new or improved controls to mitigate the identified AI/ML
risks.
In most cases, existing governance is designed for scenarios where the degree of
human involvement is high. The accuracy, consistency, and efficiency of the existing
processes may be improved by reducing or removing interventions.
Discrimination in AI
AI may lead to a discriminatory and unfairly biased outcome if not implemented
appropriately. Sources of such poor implementation include biased data, poor AI system
training, or the use of alternative AI systems or data sources that could potentially be
used to generate better outcomes for certain disadvantaged groups. An AI system that
may cause unfairly biased outcomes is likely to cause regulatory non-compliance issues
and legal and reputational risk.
Existing Legal and Regulatory Framework
Discrimination in areas that affect our day-to-day life, e.g., housing, lending, etc., is
prohibited by both federal and state statutes.
Traditional data inputs, for example, credit bureau attributes, have a lower probability of
causing disparate impact. This is because they are thoroughly vetted prior to approval
and publication for use by lenders. On the other hand, non-traditional data, for example,
rental payments, may raise more disparate impact concerns as compared to traditional
data. Such data usually raises coverage and accuracy concerns.
As an example, assume that a lending model takes a loan applicant’s shopping habits
into account, particularly whether they buy goods at a discount store. At first thought,
this might look like an objective variable because it can reasonably be viewed as a
measure of wealth and, therefore, a predictor of repayment. But if the system goes
ahead to capture the store’s location, it may unintentionally capture a race effect
because different neighborhoods have different racial makeups. In this scenario,
shopping as a variable may serve as a proxy for the neighborhood, which in turn acts as
a proxy for race.
Interpretability/Explainability
Inconsistent Explanations
Unlike traditional linear systems, the same training data may be used for training
multiple AI/ML systems. Although the output from such systems is likely to be similar,
each model is likely to have a unique logical explanation as to how the AI output was
generated. The presence of different logical explanations for the same outcome can
ignite debate and serious discussions among the system’s developers and monitoring
teams.
In some more complicated systems, neither the developer nor the user has a clear
understanding of the decision made or whether it is right or wrong. Thus, the
interpretability of high-impact AI/ML decisions is a huge source of risk. If there are
doubts over the correctness of an AI-driven decision that has a major impact on
individuals or the organization as a whole, there will be attempts to improve the model
or even replace it entirely to mitigate the effects.
Security Audit
Malicious actors could potentially misuse AI/ML. Interpretability is vital in ensuring that
AI/ML systems are protected as security evolves in the AI/ML world. The red team or
white-hat hacking audits in testing AI/ML systems may apply post hoc explanation
techniques in attacks against AI/ML systems.
Regulatory Compliance
Several legal regulations may require the use of interpretable systems, post hoc
explanations, and the documentation they facilitate. Such legal regulations include the
Equal Credit Opportunity Act, the Fair Credit Reporting Act, and the EU. General Data
Privacy Regulation and so on.
Accuracy drift could worsen your model, while data drift, on the other hand, helps
businesses to understand the change in the characteristics of the data at runtime.
Addressing Discrimination in AI
The review of input variables and systems for evidence of discrimination in most lending
organizations is done by compliance, fair lending, and system governance teams.
Technological advances can enable the automation of most of these tasks.
Nevertheless, a human-centric approach may be required for a fair AI. It is not possible
for an automated process to fully substitute the experience and knowledge of a
well-informed team reviewing the AI system for discrimination bias. Therefore, it is
important that the first line of defense against discrimination in AI should include some
manual review.
Variables that cause discrepancies are excluded from the systems. Other tested
variables are used in their places. However, these methods have been shown to have
low rates of success in complex AI/ML systems.
Strong traditional technology and cyber control could be used for effective AI-based risk
mitigation. The use of strong information security practices and watermarking could help
mitigate model extraction attacks. Watermarking involves training the AI/ML system to
produce unique output for a given input.
Practice Question
A financial firm has deployed a sophisticated AI system for credit scoring. Recently, the
firm’s IT department detected anomalous system behaviors. The anomaly report
showed that certain borrowers’ credit scores had been unusually boosted during the
model’s retraining phase. On further investigation, it was found that the scores were
manipulated through the subtle addition of incorrect labels to the training data. The IT
department suspects an orchestrated attack to distort the system’s learning process.
Which of the following potential AI/ML attacks is the firm most likely experiencing?
Training data poisoning attack typically involves the contamination of the AI/ML
system’s training data in a way that negatively influences its learning process or output.
In the given scenario, incorrect labels were subtly added to the training data during the
model’s retraining phase. This is a clear indication of a Training Data Poisoning Attack
aimed at manipulating the system’s learning process and consequently altering the
borrowers’ credit scores.
● Identify and describe the benefits and limitations of crypto and decentralized
finance (DeFi) innovations.
● Describe the role of stablecoins in DeFi ecosystems and differentiate among the
types of stablecoins.
● Discuss possible advantages and disadvantages of a monetary system based on
CBDCs.
● Understand the risks posed by the centralization that occurs in DeFi ecosystems
and crypto exchanges (CEX).
● Outline the regulatory actions recommended by the BIS to manage risks in the
crypto monetary system.
The monetary system is used by people all over the world to conduct payments and
other financial transactions. The organizations and structures that surround and support
monetary exchange make up the monetary system.
The central bank, which maintains the system’s fundamental functions and issues
money, is at the center of the monetary system. Trust in the central bank ultimately
underpins confidence in the monetary system.
The majority of payments are carried out by commercial banks and other private
payment service providers (PSPs), who also provide services to customers. This
separation of roles encourages competition.
Although the central bank-centered monetary system has done a good job historically,
new demands are being placed on it by technical advancements brought on by digital
innovations such as those in the crypto universe.
Recent occurrences have shown that the crypto ideal and its actuality are different.
● The collapse of the TerraUSD stablecoin and its companion coin Luna has
highlighted the system’s fragility.
● The crypto world, in particular, lacks a nominal anchor. It has become apparent
that crypto has deeper structural limits that prevent them from achieving the
effectiveness, stability, or integrity levels necessary for a suitable monetary
system.
● It is prone to fragmentation, and scaling its applications without sacrificing
security is impossible, as shown by the high fees.
● The system’s use of unregulated intermediaries is of grave concern.
Retail, fast payment systems (FPS) and central bank digital currencies (CBDCs), and
decentralization and permissioned distributed ledger technology (DLT) are
well-positioned to serve the public interest. They do so by lowering costs and increasing
convenience while upholding the integrity of the system. Faster, safer, and less
expensive payments and settlements are supported by these developments
domestically and internationally.
The abundance of coins also highlights another crucial weakness in the structure of
cryptocurrencies, namely their fragmentation into numerous incompatible settlement
levels.
The fragmentation of the cryptocurrency market reveals its challenge. The more users
flock to a single blockchain system, the worse the congestion and the higher the
transaction fees. Consequently, this invites newer competitors who might forgo security
in favor of greater capacity.
Crypto gives a sneak preview of potential functionality. These result from the ability to
bundle transactions and carry out the automatic settlement of bundled transactions in a
conditional manner, enabling higher functionality and speed.
In order to make the system self-sustaining, miners and validators receive financial
rewards for carrying out their duties in accordance with the rules. Cryptocurrency
rewards can be received in the form of transaction fees or from rentals earned by
“staking” one’s coins in a blockchain that uses proof-of-stake. The more frequently a
node acts as a validator, and the higher the rents are, the higher the stake.
Many blockchains and cryptocurrency coins have emerged since the creation of Bitcoin,
most notably Ethereum, which enables the use of “smart contracts” and
“programmability.” The use of self-executing code known as “smart contracts” can
automate market processes and do away with the middlemen who were previously
needed to make choices. Smart contracts are transparent and less susceptible to
manipulation because the underlying code is open to the public and can be examined.
The ability of smart contracts to integrate many parts of a system is a key aspect. Users
can conduct complicated transactions on the same blockchain by merging several
instructions into a single, smart contract. By “tokenizing,” they can turn assets into
digital representations.
Since smart contracts cannot directly access data that is “off-chain” or outside the
specific blockchain, they depend on intermediaries to supply this information (so-called
oracles). But these modifications also bring new issues. More centralized validation
techniques are frequently used to boost capacity, which weakens security and
concentrates insiders’ benefits.
Trading: Decentralized exchanges (DEXs) are venues for direct trades between holders
of cryptocurrencies or stablecoins.
Insurance: Users of DeFi insurance platforms can protect themselves against things like
improper handling of secret keys, exchange hacks, and unsuccessful smart contracts.
Due to their pegs to fiat money or other assets like gold, stablecoins are essential to the
DeFi ecosystem. They value the credibility that the asset or unit of account issued by
the central bank offers. Their primary use case is to combat the extreme price volatility
and limited liquidity of unbacked cryptocurrencies like Bitcoin. Their use also prevents
costly, frequent conversions between cryptocurrencies and bank deposits in fiat
currencies.
Asset-backed stablecoins like Binance USD and USD Coin are typically administered by
a central intermediary who invests the underlying collateral and organizes the
generation and redemption of the coins.
Algorithm stablecoins. To sustain their value in relation to the target currency or asset,
algorithmic stablecoins rely on sophisticated algorithms that automatically rebalance
supply.
The reliability of stablecoin stabilization methods heavily rests on the quality and
transparency of their reserve assets, both of which are frequently terribly deficient.
Stablecoins lack the characteristics required to support the upcoming monetary system.
● They cannot make use of the legal constraints and protections of bank deposits
or the central bank’s role as a lender of last resort.
● They must import their credibility from sovereign fiat currencies.
● They restrict liquidity and risk fracturing the monetary system.
Structural Limitations of Crypto
The inherent limits of permissionless blockchains, which eventually result in system
fragmentation, congestion, and excessive costs, are a problem for cryptocurrencies.
Transactions are recorded on the blockchain by self-interested validators.
There are increased dangers of theft and hacking in a system of rival blockchains that
are not interoperable but are supported by speculation. Interoperability refers to the
ability of users to access, share, and validate transactions across several blockchains.
Since each blockchain represents a distinct settlement record, interoperability is not
possible in practice. To enable the movement of coins between blockchains, a few
“cross-chain bridges” have emerged. These bridges depend on a small number of
validators who, in the absence of regulation, must be believed to refrain from engaging
in unethical activity. However, a surge in hacks has coincided with the growth of these
bridges.
In contrast to the network effects that develop in conventional payment networks, the
crypto world is highly fragmented. In a conventional payment network, a platform gains
more users as more individuals use it. Trust and affordability are essential to such
platforms. Contrarily, cryptocurrency’s propensity for fragmentation and excessive fees
is a fundamental structural fault that disqualifies it from serving as the basis for the next
generation of money.
Incentives conflicts and hacking danger arise as validators become more centralized.
Authorities need to take regulatory arbitrage seriously. They should make sure that
crypto and DeFi operations adhere to the legal requirements for similar traditional
activities, operating under the guiding premise of “same activity, same risk, same
regulations.” The recent collapse of numerous stablecoins has brought attention to how
urgent the situation is.
Policies are required to promote the integrity and safety of the financial and monetary
systems. A fine or closure should be imposed on cryptocurrency exchanges that
conceal the identities of parties to transactions and disregard fundamental
know-your-customer (KYC) and other Financial Action Task Force (FATF) rules. They
could otherwise be used to dodge taxes, finance terrorists, or get around economic
restrictions. Similarly, banks and credit card firms need to demand user identity and
carry out KYC compliance.
Consumer protection laws. Investors ought to be able to invest in riskier securities, such
as cryptocurrencies, but there needs to be sufficient disclosure. This entails sound
regulation of the frequently deceptive advertising of digital assets. Front-running-like
behaviors can necessitate the application of innovative legal strategies.
It is crucial to discover regulatory entry points and close data gaps. A multitude of new
centralized intermediaries has popped up as a result of the cryptocurrency market’s
expansion. The traditional financial institutions and these centralized entities serve as a
natural entry point for regulatory responses.
The worldwide nature of crypto will necessitate collaboration across all regulatory fields.
In order to sanction non-compliant actors and platforms, authorities may need to
actively exchange information and conduct coordinated enforcement measures.
The goal is to harness the beneficial cycle of network effects by not only enabling
valuable functionalities like programmability, composability, and tokenization but also
putting them on more secure bases. Central banks are utilizing the best aspects of new
technology to serve the public good, along with their attempts to regulate the crypto
universe and address its most pressing issues.
Using its balance sheet, the central bank’s other function is to provide the means for the
ultimate finality of payments. It’s a trusted middleman who debits the account of the
ultimate payer and credits the account of the ultimate payee.
Another function of the central bank is to ensure enough liquidity available for
settlement to support the smooth operation of the payment system. L liquidity provision
ensures no bottlenecks will obstruct the smooth operation of the payment system.
The central bank’s other responsibility is to protect the payment system’s integrity
through regulation, supervision, and oversight. The central bank is in a good position to
provide the groundwork for cutting-edge services in the private sector thanks to its
interconnected roles.
The future monetary system expands on these central bank functions and
responsibilities in order to provide room for new capabilities of central bank money and
cutting-edge services to be built on top of them. New private applications will be able to
function on more advanced technology representations of central bank money rather
than stablecoins. Thus, innovations at the central bank can support numerous new
activities.
This vision includes elements at the wholesale and retail levels that make a variety of
new features possible. At the wholesale level:
Programmability. It can facilitate transactions between financial intermediaries and
provide new capabilities. Using permissioned distributed ledger technology (DLT),
CBDC transactions allow programmability and settlement, enabling transactions to be
conducted automatically when predetermined conditions are met.
A wider range of financial intermediaries. New capabilities not only enable a far larger
range of financial intermediaries to participate in transactions but also allow for an
increase in the types of transactions.
Tokenization. When deposits are tokenized, they are decentralized, settled, and given a
digital representation on the distributed ledger technology (DLT) platform. This might
make it easier to exchange new technologies, including fractional ownership of stocks
and other assets, opening the door to creative financial services that go far beyond
simple payment processing.
Interoperability. Users of one platform can send messages and commands to others
that are linked to it with ease through APIs. Retail innovations encourage more
competition, decreased costs, and increased financial inclusion in this way.
Instant payments. Households and businesses can easily access retail CBDCs.
Through various interfaces and competing private Payment Service Providers, they
enable immediate payments between end users.
Data architecture. The Central Bank Digital Currencies (CBDCs) are backed by a data
architecture that includes digital identity and APIs that allow for safe data interchange,
enabling more user control over financial data.
Open platform. They facilitate lower costs in payment services by fostering efficiency
and better competition among private sector PSPs through the provision of an open
platform.
Inclusive design. Both can help financial inclusion for people who do not already have
access to digital payments through inclusive design elements.
When viewed from a distance, the world’s monetary system can be compared to a
forest, whose canopy makes cross-border and cross-currency activities possible.
Infrastructures like multi-CBDC (Central Bank Digital Currencies) platforms function as
crucial new system components in the canopy.
Innovation is crucial. For private innovation to serve the public good, the fundamentals
must be done correctly. Public infrastructures can enhance the payment system by
utilizing many of the purported advantages of cryptocurrencies without the downsides,
as demonstrated by ongoing work at central banks. How central banks may assist
interoperability and data governance is demonstrated through wholesale and retail
CBDCs as well as open banking initiatives.
Multi-CBDC systems involving several central banks and currencies can benefit from
decentralized governance. Functions such as self-executing smart contracts are
essential because they enable users to limit the settlement of their transactions to the
event that certain predefined conditions are met (programmable). Through such
automation, payments, and delivery of securities can be done only all at once or not at
all, accelerating settlement and reducing counterparty risk.
Wholesale CBDCs have the advantage of potentially being accessible to a far broader
range of intermediaries than domestic commercial banks. By allowing nonbank PSPs to
conduct CBDC transactions, competition, and vitality could increase significantly.
Payments could be finalized with wholesale CBDCs. In a digital system, establishing the
source or “provenance” of the transferred funds is necessary to ensure that payment is
genuine. Cryptography is used to conceal real names while openly displaying the
complete history of all transactions made by all parties.
One potential tokenized deposit system would include a permissioned platform that
keeps track of every token transaction the participating institutions produce. Retail
investors (depositors) would store tokens in digital wallets and send tokens between
wallets to make payments. This might occur concurrently as a result of smart
contract-enabled single atomic transactions. Digital representations of bonds and stocks
might potentially be possible with the same system.
In autonomous ecosystems, programmable CBDCs might also facilitate
machine-to-machine payments. Machines can manage their own budgets and make
direct purchases from one another for goods and services. Their integration will
enhance the need for programmable money and smart contracts, lowering any
settlement risk. For instance, this might result in huge efficiency savings in the goods
logistics industry, where transactions are still primarily paper-based and can take
several days.
The advantages of atomic settlement and open-source protocols can coexist peacefully,
with central banks serving as the main hubs for validation.
Contrary to crypto, which needs high rents, has limited scalability, and is congested,
Central Bank Digital Cryptos and retail Fast Payment Systems (FPS) provide broader
use, which lowers costs and results in better services.
Retail Fast Payment Systems (FPS) have already made notable strides toward lowering
costs and promoting financial inclusion for the unbanked, particularly in Brazil, where
two-thirds of the adult population use their retail FPS Pix.
Retail CBDCs can be created to assist financial inclusion by examining retail CBDC
design elements that address particular barriers to financial inclusion, such as through
novel interfaces and offline payments. The cost of payment services for the unbanked
can be decreased by central banks through tiered CBDC wallets with simpler due
diligence for users transacting in lower values, promoting more access to digital
payments and financial services.
As every transaction in the digital economy leaves a trace, generating issues with
privacy, data misuse, and personal safety, retail Central Bank Digital Cryptos (CBDCs)
and Fast Payment Systems (FPSs) can be created with privacy protection and
improved user control over data in mind. Since there isn’t a single, comprehensive
record of every transaction in conventional payment systems, individual Payment
Service Providers (PSPs) have more control over data. Every PSP, however, only
records its own transactions. Even the central operator is unaware of all payments in
full. Thus, the promise of confidentiality by the central operator and the mix of
segregated record-keeping are used to protect the privacy of payments.
Crypto advocates claim permissionless blockchains give consumers back control over
their personal data, yet this poses serious threats to users’ privacy and integrity. Retail
FPSs and CBDCs’ underlying structures can allow users control over their personal
data while protecting their privacy and promoting consumer welfare. Additionally, central
banks can genuinely build systems in the public interest because they have no financial
interest in personal data.
Systems that provide law enforcement authorities with access to information while
maintaining the necessary legal protections can be created with clear mandates and
public accountability. These methods are currently being considered for retail CBDCs
and are already standard practice in the form of bank secrecy rules.
Retail CBDCs and FPS have the potential to enhance accountability in comparison to
the current system and the crypto universe. The role of the central bank in retail
payments needs to be discussed publicly as a result of new systems, and legal
regulations will need to be modified in order for them to operate. Private service
providers would be integrated into a strong regulatory and oversight framework under a
system based on public infrastructure.
Principles for the Effective
Management and
Supervision of
Climate-related Financial
Risks
After completing this reading, you should be able to:
Financial risks associated with climate change can affect banks regardless of their size.
Therefore, banks should think about how climate-related risks affect their operations
and evaluate how financially significant these risks are. They must manage the financial
risks associated with climate change in a way that is appropriate for the scope and
complexity of their operations and the level of risk that each bank is willing to take.
Risks associated with the climate can have extensive effects. The distinct
characteristics of these risks, such as potential transmission channels, the intricacy of
the impact on the economy and financial sector, and uncertainty related to climate
change, should be considered.
The effects of climate change might manifest throughout a wide range of time and are
expected to get worse with time. A bank’s typical two- to three-year capital planning
horizon may not be long enough to account for all climate-related risks. Given how
unpredictable the timing of these risks is, banks should approach building their risk
management capabilities with caution and flexibility.
Banks should continually expand their knowledge and skills about financial risks
associated with climate change in line with the risks they confront. Further, banks
should make sure they have the resources set aside to manage these risks.
Corporate Governance
Principle 1: Banks should create and implement a robust approach for comprehending
and evaluating the potential effects of climate-related risk drivers. Banks should
consider significant financial risks associated with climate change that could arise
across a range of time frames and incorporate these risks into their overall business
plans.
When creating and implementing their business plans, banks should take material
physical and transition risk factors into account. This includes understanding and
assessing how these risks may affect how resilient a bank’s business model is over the
short, medium, and long terms. The board and senior management ought to be involved
in pertinent phases of the procedure. Besides, the managers and staff at the bank ought
to be made aware of the board’s strategy.
A bank’s strategy and risk management frameworks should consider the serious
financial risks associated with climate change. Besides, the board and senior
management should decide whether changing remuneration practices is necessary.
Banks’ risk management plans should be in line with their declared goals and
objectives. The board and senior management should make sure that their internal
strategy and risk appetite declarations are in line with any disclosed climate-related
strategies and commitments.
Banks need to make sure that the board and senior management are aware of the
financial risks associated with climate change and have the knowledge and experience
necessary to handle those risks.
Banks should clearly define and assign duties and responsibilities related to recognizing
and managing climate-related financial risks in their organizational structure and make
sure relevant business units have enough resources to carry out these obligations.
Principle 3: Banks should develop the proper policies and procedures and implement
them across the entire organization to achieve successful management of
climate-related financial risks.
All relevant activities and business units should implement policies, methods, and
controls that include management of major climate-related financial risks.
The quality of underlying data, the risk governance framework, the business and risk
profile, and the overall internal control structures and systems should all be
independently reviewed and objectively assured by the internal audit function.
Banks should develop procedures to assess how climate-related financial risks that
could materialize within their capital planning horizons will affect their solvency.
It is equally important for banks to determine if climate-related financial risks could result
in net cash outflows or the depletion of liquidity buffers. Banks can do this by
considering extreme yet possible scenarios and including those risks in their internal
liquidity management strategies.
The incorporation of climate-related financial risks that have been deemed material also
entails the incorporation of physical and transition risks that are pertinent to a bank’s
business model, exposure profile, and business strategy. These ought to be evaluated
for inclusion in their stress testing programs as data over appropriate time horizons.
As the methodology and data used to analyze climate-related financial risks continue to
develop over time and analytical gaps are closed, it is believed that these risks will likely
be continuously incorporated into banks’ internal capital and liquidity adequacy
evaluations.
The board and senior management should make sure that a bank’s risk appetite
structure clearly defines and addresses climate-related financial risks, where applicable.
To begin with, banks should routinely conduct thorough assessments of the financial
risks associated with climate change. They should establish such risks’ definitions and
thresholds for materiality, including the risks posed by concentrations in particular
sectors and geographical areas. Banks need to identify important risk indicators that are
appropriate for their regular monitoring and escalation procedures.
Further, banks should think about risk-reduction strategies. Among others, such
strategies could include setting internal caps for the many kinds of significant financial
risks related to climate change to which banks are exposed.
Lastly, banks should keep an eye on future developments. They should work to
understand and manage the impacts of climate-related risk drivers on other material
risks because there may yet be undiscovered channels for transmitting these risks to
traditional financial risk categories.
To make it easier to identify and report risk exposures, concentrations, and developing
concerns, a bank’s risk data aggregation capabilities should incorporate climate-related
financial risks. It should have mechanisms in place to guarantee the accuracy and
reliability of the gathered data. In addition, a bank should have systems in place to
gather and aggregate financial risk data connected to climate across the entire
company.
In order to better understand their transition strategies and risk profiles, banks should
think about actively engaging customers and counterparties and gathering more
information. In the absence of trustworthy or comparable information, banks may
consider adopting reasonable substitutes and assumptions.
Considering the dynamic nature of financial risks associated with climate change, banks
should determine an acceptable frequency for updating internal risk reporting.
To assess, track, and report financial risks associated with climate change, banks
should establish qualitative and quantitative measures and indicators. Any restrictions
that impede this should be made clear to the relevant stakeholders.
Banks should have carefully thought-out credit policies and procedures to address
significant climate-related credit risks. These include appropriate policies and
procedures to recognize, quantify, assess, track, report, and manage or lessen the
effects of significant climate-related risk drivers.
Banks should determine the risk factors related to climate change that are most likely to
have an impact on the value of the financial instruments in their portfolios. Besides, they
should assess the likelihood that losses will occur and the potential for increased
volatility and set up efficient procedures to limit or mitigate the resulting effects.
An analysis of a sudden shock scenario could be a helpful tool for better understanding
and evaluating the relevance of climate-related financial risks to a bank’s trading book.
Among other factors, such evaluation focuses on variation in liquidity across assets
exposed to climate-related risk and the speed at which exposures could reasonably be
closed out.
Banks may consider how the cost and accessibility of hedges could change when
assessing their mark-to-market exposure to climate-related risks.
Principle 10: The influence of climate-related risk drivers on banks’ liquidity risk profiles
should be understood, and banks should make sure that their systems and procedures
for managing liquidity risk consider significant financial risks associated with climate
change.
Banks should evaluate the effects of financial risks related to climate change on net
cash outflows or the value of the assets that make up their liquidity buffers. Banks
should take these effects into account when calibrating their liquidity buffers and when
developing their frameworks for managing liquidity risk.
Principle 11: Banks need to be aware of how climate-related risk factors affect their
operational risk and take the necessary steps to account for these risks if they are
significant. This comprises risk factors relating to the climate that could increase the risk
of strategic, reputational, and regulatory compliance.
When creating business continuity plans, banks should consider the material
climate-related risks that could have a significant impact on their operations and their
capacity to continue delivering essential services.
Banks should evaluate how climate-related risk drivers affect other risks, such as
strategic, reputational, regulatory compliance, and liability risks. Banks should take such
risks into consideration as part of their risk management and strategy-setting
operations.
Scenario Analysis
Principle 12: Banks should utilize scenario analysis to evaluate the adaptability of their
business models and strategies to a variety of scenarios and assess their impact on the
company’s overall risk profile. A variety of significant time horizons should be
considered when evaluating these.
The goal of climate scenario analysis should be in line with a bank’s overall goals for
managing climate risk. The scenario analysis may include examining how the bank’s
strategy and the shift to a low-carbon economy will be affected, as well as measuring
the bank’s vulnerability to these risks and calculating exposures and potential losses.
Banks should develop the capacity and knowledge necessary to carry out climate
scenario analyses that are proportional to their size, complexity, and business model.
Consequently, larger, more complicated banks should have stronger analytical
capabilities.
Scenario analysis should use a variety of time horizons, from short- to long-term. Risk
analysis can be conducted over shorter time periods with less uncertainty, while longer
time frames will have higher levels of uncertainty.
Climate scenario analysis is a very dynamic field, and the methods employed are
expected to change quickly. Models and findings from climate scenario analysis should
be challenged and reviewed frequently by a variety of internal or external specialists.
Machine Learning and AI
for Risk Management
After completing this reading, you should be able to:
● Explain the distinctions between the two broad categories of machine learning
and describe the techniques used within each category.
● Analyze and discuss the application of AI and machine learning techniques in the
following areas:
● Credit risk.
● Market risk.
● Operational risk.
● Regulatory compliance.
● Describe the role and potential benefits of AI and machine learning techniques in
risk management.
● Identify and describe the limitations and challenges of using AI and machine
learning techniques in risk management.
Machine learning is a branch of artificial intelligence (AI) that uses algorithms to identify
patterns in a data set and then make decisions, just like humans. It aims to imitate how
humans learn, gradually improving its predictive power and accuracy. Machine learning
is premised on the realization that machines can learn without being programmed to
perform specific tasks. Machine learning algorithms use statistical methods to uncover
key insights within a data set and then make relevant classifications or predictions.
In recent years, machine learning has gained a strong foothold in the financial industry,
particularly banking and insurance. It has been used to decide the amount of money to
lend to customers, provide warning signals to traders, detect fraud, and improve
compliance with rules and regulations. This chapter explores ways machine learning
and AI can improve risk management by leveraging the large volume of data available.
We also look at the core machine learning techniques which can be applied to improve
risk management.
Machine learning falls into two broad categories: supervised and unsupervised machine
learning.
Supervised Learning
Supervised learning is a machine learning technique where models are trained using
labeled data. The goal is to find the mapping function that maps the input variable (X)
with the output variable (Y).
Y = f(x)
The word “supervised” comes from the fact that the algorithms used aren’t left to
deduce the relationship between X and Y on their own. Instead, the machine is trained
using data that are already labeled. It’s pretty much like providing the machine with
some questions that are already tagged with the correct answers and then asking it to
find the answers to untagged but similar questions.
One advantage of machine learning regression over traditional regression is that we can
include a larger number of independent variables that can be discarded automatically if
they lack any explanatory power. For example, LASSO regression eliminates variables
with zero regression power. In contrast, Ridge regression gives lower weights to
variables that are highly correlated with other variables in a model. We can also begin
with zero power for all variables and gradually add the variables found to have
explanatory power.
Consider a scenario where you’re modeling credit repayment risk as the dependent
variable. Among the independent variables, you have (I) owns a house, (II) owns a car,
and (III) has bank savings. Each of these variables represents different aspects of a
person’s financial status and can potentially influence their credit repayment risk.
In a real-world dataset, there might be many such variables, making the analysis
complex and computationally intensive. This is where PCA comes in. Rather than
working with all these variables independently, PCA identifies the commonalities among
these variables and combines them into a smaller set of synthesized variables – the
‘principal components.’
In our example, PCA could combine the three original variables into a single variable –
asset ownership. This new variable captures the shared variance among the original
variables, thereby encapsulating the underlying construct of ‘financial stability’ that they
collectively represent. By doing so, PCA enables a more efficient and manageable
analysis without sacrificing too much valuable information.
It’s important to note, however, that the results of PCA must be interpreted cautiously.
The original meaning of the variables can get lost or distorted in the PCA process, and
the principal components might not always have a clear or intuitive meaning.
Classification
Classification involves grouping data into labeled classes. For example, when modeling
the likelihood of default, we could have two categories: Potential defaulters and
non-defaulters. The model would then be trained on how to classify the data into one of
the two classes in an accurate manner. In binary classification, the model works with
just two labels – 0 and 1 (yes and no). In the case of multi-class classification, the
model classifies data into more than one class.
Unsupervised Learning
In unsupervised learning, models are not supervised or trained using labeled data.
Instead, models find hidden patterns and insights from the given data without human
intervention. The goal is to identify previously undetected patterns and discover the
internal structure of a data set without predefined output categories. Unsupervised
learning methods are used to perform more complex processing tasks compared to
supervised learning. For example, a bank could create an algorithm to scrutinize
customer accounts and identify those with similarities. This could help the bank develop
a product that specifically targets those account holders.
One area where clustering is applied is the detection of spam emails. If an email looks
like others deemed spam, it is also likely to be spam.
There are several clustering approaches, but the most popular one is k-means
clustering. Under k-means clustering, the desired number of clusters, k, is
predetermined. The algorithm is then tasked with clustering the data into the k groups
through an iterative process. A larger k means you’ve got smaller groupings with more
granularity, while a lower k means larger groupings with less granularity. Iteration is
aimed at maximizing the difference in means between determined groups. Each group
or cluster has its own centroid (central focal point). If we have two clusters, A and B,
and a data point Y is closer to the centroid (mean) of A than B, then Y is put in cluster A.
Dimensionality Reduction
Dimensionality reduction is used to analyze and obtain a better representation of data.
The data set should have less redundant information at the end of the process, but the
important parts may be emphasized. In practice, this technique is used to hive off a
section of a large amount of data for closer scrutiny.
One area where machine learning has proved extremely useful is the credit risk analysis
of credit default swaps. This is because, in the CDS market, there are many uncertain
elements involved in the determination of the likelihood of a default (credit) event and
the estimation of the cost of default in case a default materializes. In a 14-year study
conducted between 2001 and 2014 involving CDSs of different maturities and rating
groups, nonparametric machine learning models outperformed traditional benchmark
models regarding prediction accuracy. The nonparametric machine learning models
also performed better in terms of suggesting the most practical hedging tools.
Banks are increasingly relying on machine learning to make better consumer and SME
lending decisions.
Market Risk
Market risk emanates from exposure to the financial market, including investing and
trading in various assets such as stocks and bonds. Machine learning has been used in
several market risk management areas:
● Stress testing market risk models to discover hidden or emerging risks: One of
the risks that come with the use of models to analyze market risk is that such
models can be incomplete, false, invalid, or even incorrectly specified in terms of
parameters. Machine learning can reveal whether the models used have any of
these issues. Machine learning techniques can also be used to scan for
unsuitable assets in trading models. For example, yields.io offers an AI-driven
algorithm that provides real-time model monitoring, model testing for deviations,
and model validation.
● Understanding the impact of a firm’s trading activities on market pricing: AI and
clustering techniques have been used by large trading firms to look for ways to
reduce transaction costs associated with large trades that have the potential to
move the market price, particularly in illiquid markets.
● Providing real–time warnings to traders: A combination of neural networks and
decision trees can be used to provide traders with real-time warnings of
impending changes in underlying trading patterns.
Operational Risk
Operational risk concerns itself with risks emanating from both internal and external
operational breakdowns. Such risks are attributable to people (e.g., strikes and
go-slows), systems, frauds, neglected procedures, or natural disasters. In recent years,
operational risks have become more complex and frequent, prompting firms to explore a
path toward artificial intelligence and machine learning-based solutions.
● Identify, measure, estimate, and assess the impact of operational risk exposures.
● Identify effective risk mitigation strategies.
● Find instruments that can facilitate shifting or trading risk.
AI and machine learning can be effective tools against fraud. This happens when firms
automate routine tasks to minimize human error. Besides, machine learning and AI can
be employed in processing unstructured data to screen out relevant content or negative
news and evaluate the extent of interconnectedness among individuals to assess how
prone they might be to an external attack. Further, AI tools can be used to monitor
individual traders by combining trade data and their electronic and voice
communications records. Lastly, AI tools can single out alerts that need a more urgent
response.
Regulatory Compliance
Any firm that wants a sound risk management system must comply with all risk
management regulations. To help with compliance, most firms have turned to RegTech
– a subset of fintech that focuses on technologies that can facilitate the delivery of
regulatory requirements more efficiently and effectively compared to the existing
traditional capabilities. AI is an excellent RegTech tool because it allows for continuous
monitoring of firm activities. This way, the firm has access to real-time insights that help
it avoid compliance breaches rather than dealing with the consequences of breaches
after they have occurred.
● Availability of suitable data: Although multiple AI and machine learning tools with
the ability to read all types of data have been developed, firms have been slow to
organize their internal data in a way that makes its analysis and processing
simple and straightforward. In some cases, data is held by different departments
(silos) or systems. In fact, sometimes, sharing such data with other internal
departments is restricted. In other cases, firms do not record important data but
merely keep it as “informal knowledge.”
● Availability of skilled staff: There’s an overall shortage of skilled employees who
can work with AI and machine learning tools. In the same vein, staff training is a
painstaking, time-consuming exercise that has so far failed to keep up with the
development of new AI solutions. However, there have been efforts to overcome
this problem, notably by creating learning campuses that solely focus on AI and
machine learning techniques. For example, Goldman Sachs has set up a
campus in India aiming to train more than 7,000 individuals on how to use these
tools effectively.
● Accuracy of machine learning solutions: There’s no doubt that AI and machine
learning solutions can help improve risk management. Nevertheless, not all the
underlying tools are effective. Some have been found to suggest unrealistic or
inaccurate solutions that cannot be implemented. As such, continuous monitoring
and constant evaluation have to accompany the use of all machine learning
solutions. Firms have to incorporate human input at various stages instead of
giving algorithms full control (from data gathering to decision-making).
● Transparency and ethics: As good as AI and machine learning tools can be,
there seems to be a consensus that some of the underlying solutions are not as
transparent as firms and regulatory authorities would want. One of the most
contentious solutions is deep learning, where models work out the output in a
black box system. If a firm cannot clearly demonstrate how certain decisions are
made, it would be difficult to convince regulatory authorities that the models
being used are valid and ethically sound.
Question
In the context of the Credit Default Swap (CDS) market, a financial institution is
contemplating the use of artificial intelligence (AI) and machine learning techniques to
manage its credit risk. Which of the following statements is correct regarding the
application of these techniques?
A. AI and machine learning techniques are best suited for evaluating and improving the
liquidity of CDS instruments in the secondary market.
B. AI and machine learning techniques are primarily useful for enhancing customer
interactions in the context of the CDS market.
C. The use of AI and machine learning in the CDS market is most valuable for
improving audit trails and ensuring regulatory compliance.
D. Employing AI and machine learning techniques can improve the prediction accuracy
of credit events and default costs in the CDS market.
Solution
While AI and machine learning techniques can have a range of applications within
financial markets, in the Credit Default Swap (CDS) market specifically, their primary
value stems from their potential to handle the complexity and uncertainty of assessing
credit risk. These technologies, particularly models involving deep learning, can
enhance the prediction accuracy of credit events (i.e., the likelihood of a default) and the
estimation of default costs. This predictive capability is vital for managing risk and
making informed investment decisions in the CDS market.
● Describe climate-related risk drivers and explain how those drivers give rise to
different types of risks for banks.
● Compare physical and transition risk drivers related to climate change.
● Assess the potential impact of different microeconomic and macroeconomic
drivers of climate risk.
● Describe and assess factors that can amplify the impact of climate-related risks
on banks as well as potential mitigants for these risks.
● Physical risks.
● Transition risks.
Physical Risks
Physical risks are tied to weather and climatic changes that impact the economy. They
can be subdivided further into acute risks, which come about due to extreme weather
events, or chronic risks associated with long-term progressive shifts in climate. Acute
physical risks include wildfires, heatwaves, floods, storms, hurricanes, typhoons, and
cyclones. Chronic physical risks include rising sea levels, ocean acidification, and rising
temperatures. Prolonged periods of high temperatures can also lead to desertification.
Physical climate risks may occur with a significant time lag. What’s more, severity differs
from one event to another. Human activity and day-to-day decisions, to an extent, affect
exposure to physical risks. Nevertheless, it’s impossible to control the location, timing,
and magnitude of specific physical events.
Transition Risks
Transition risks refer to societal disruptions arising from adjustments towards a
low-carbon economy. Migration to a low-carbon economy comes with a host of changes
that impact not just working conditions but also the products manufactured.
Banks have been caught up in these risks, a situation that has given them the incentive
to deploy risk-monitoring tools in an attempt to mitigate or eliminate risk effects.
However, the sheer scale and synchronous nature of transition-related changes mean it
isn’t easy to keep up, and the impact can be greater than previously anticipated. It is
noteworthy that transition risk drivers vary from one economy to another depending on
the existing levels of technology and mechanization.
Climate Policies
In recent years, countries worldwide have put a lot of effort toward finding solutions to
risks resulting from climate change. Through the Paris Agreement, an international
treaty that enjoys the support of 191 countries (and the European Union), nations have
pledged to take a host of measures and enact policies that reduce GHG emissions and
adopt low-carbon economies. Some countries have gone as far as barring the
importation of certain products while setting deadlines for the manufacture of certain
local goods. For example, the UK has pledged to reduce greenhouse gas emissions by
at least 100% of 1990 levels (net zero) by 2050.
Technology
There’s been a sustained push around the world to replace old technology with new
technology and tools that emit little greenhouse gases. For example, counties are
encouraging automobile producers to ditch the production of gas-dependent cars in
favor of electric models, which emit less carbon into the atmosphere. The problem is
that some of the proposed technological changes might force companies to ditch proven
long-term business models and adopt the use of resources that may become more
expensive over time. On the upside, firms that are quick to adopt the changes stand to
benefit from public goodwill and favorable government policies. The government can
also impose taxes on the use of certain resources.
Investor Sentiment
Investors are increasingly factoring climate risks into their investment decisions, a trend
that may reflect pressure from non-governmental organizations and environmental
groups. Indeed, some of the world’s largest asset managers are already incorporating
climate change into investment decision-making and investment approaches. For
corporations directly impacted by climate change, both their bond and equity offerings
will be subject to valuation and re-valuation as investors change their assessment of the
underlying climatic risks.
Consumer Sentiment
Adapting to a low-carbon economy requires a change in human behavior.
Climate-friendly consumption would, for example, lead to more climate-friendly
transportation, manufacturing, and energy use. Evidence indicates that there is a shift in
consumer behavior already underway. Clients of retail banks may ask that their savings
or investments be directed to institutions with more eco-friendly policies or projects that
contribute to the environment. A growing awareness of, and explicit demand for,
climate-friendly financial products and investment could spur corporations and banks to
change their business strategies, notwithstanding potential regulatory or supervisory
approaches. In the same vein, investors’ and consumers’ expectations of hazards (e.g.,
flooding), climate policies, or technological changes may lead to changes in their
preferences and consequently impact the price of assets.
Microeconomic Channels
Microeconomic transmission channels refer to the causal chains by which climate risk
drivers affect various individual counterparties doing business with banks, potentially
exposing banks and the entire financial system to climate-related financial risk. They
include the direct effects of climate change on banks, particularly events that disrupt
operations and the ability of banks to raise funds for day-to-day business. In addition,
they include the indirect effects on name-specific assets such as bonds, single-name
CDS, and equities.
Macroeconomic transmission channels are the avenues through which climate risk
drivers affect macroeconomic factors such as inflation, labor productivity, GDP, and
economic growth. These factors may, in turn, have an effect on the economy in which
banks operate.
The following are various microeconomic transmission channels and the financial risk
they create:
Credit Risk
Households
● Severe weather can damage bank-funded property. This, in turn, increases the
probability of default non-performing asset ratios and lowers bank equity ratios.
● Banks using residential real estate as collateral for mortgages may see their
credit risk increase if such property is damaged by adverse weather or rising sea
levels.
Corporates
● There’s evidence that severe weather events (physical risks) reduce corporate
profitability and potentially increase credit risk to lenders.
● Agricultural entities funded by banks can be hit by high temperatures and
precipitation, leading to low yields and problems repaying debt.
Government Policy
● Transitioning toward a low-carbon economy may lower the productivity and
profitability of corporates, affecting their creditworthiness.
Technological Change
● Carbon-intensive technologies may be subjected to heavy taxation to discourage
their use. Thus, any firm that continues to rely on such technologies may find
itself unable to compete against those that quickly adopt newer, more efficient
technology. Credit-related losses may be higher for banks exposed to companies
that cannot adapt to carbon-neutral economies.
Sentiment
As more and more consumers embrace less carbon-intensive products, producers that
stick with the high GHS emission products may see a decline in sales. As such, banks
exposed to such producers may see an increase in credit risk.
Market Risk
● Physical and transition risks can alter or reveal new information about future
economic conditions that will affect the price and value of financial assets. This
may result in downward price shocks and an increase in market volatility.
● Climate risk could also lead to a breakdown of long-established correlations
between financial assets. This would render hedging methods ineffective and
reduce the ability of banks to manage their market risks.
Liquidity Risk
● Banks’ liquidity risk may be affected directly as a result of climate risk drivers,
either through their ability to raise funds or liquidate assets or indirectly as a
result of customer demands liquidity.
● Households and corporations affected by physical risks may withdraw deposits or
borrow funds to cover recovery and other cash-flow needs. Such actions may put
a bank under unprecedented liquidity pressure for banks.
Operational Risk
Physical Risk
● Banks’ operational ability may be reduced if physical hazards destroy
transportation and communication infrastructure.
● Banks and corporations may also see increased legal and regulatory compliance
risks resulting from transition risks.
Macroeconomic Channels
When considering macroeconomic factors, climate risk is expected to have the greatest
impact on credit and market risks.
Financial Amplifiers
Certain financial amplifiers have the potential to increase the impact of climate-related
financial risks on banks. The materialization of climate-related risks on bank balance
sheets might be amplified by behavioral choices within the financial system and
interactions with the real economy. A good example of a financial amplifier is the
absence of insurance or its unaffordability. If bank-funded assets aren’t insured, damage
caused by climate-related events could result in a loss for the bank and result in a
difficult recovery plan for the borrower.
Multiple Channels
Some risk drivers may impact banks through more than one transmission channel, a
situation that amplifies climate-related financial risks. Notably, the interaction between
microeconomic and macroeconomic transmission channels can worsen an already dire
situation. An example of this would be where a physical risk results in the destruction of
houses, thereby affecting the creditworthiness of a bank’s customers while also
impacting the aggregate credit risk for banks.
Mitigants
Mitigants can mitigate and offset banks’ exposure to climate-related financial risks
through proactive and reactive actions. Proactive actions are the pre-emptive steps
banks take to reduce their vulnerability to climate-related risks. Good examples would
be diversification and strategic asset allocation. A bank might increase investment in
sustainable companies, particularly those that have embraced less carbon-intensive
business practices and technology.
Reactive actions include actions taken as a response to climate risks already embedded
in balance sheet exposures. They include insurance and reinsurance, hedging,
securitization, and asset sales that enable a bank to reduce its exposure to high-risk
assets.
Question
Consider a multinational corporation, EarthSpan Inc., which has its manufacturing units
in a coastal region prone to cyclones and its largest consumer base in a highly
developed country committed to implementing stringent green policies. Given the
company’s present context, EarthSpan Inc. faces an assortment of climate change
risks. As a risk manager, you’ve been asked to analyze these risks. Which of the
following combinations accurately describes the physical and transition risks EarthSpan
Inc. may encounter?
Solution
Physical risks associated with climate change relate to changes in weather and climate
patterns that directly affect economies and organizations. EarthSpan Inc., having its
manufacturing units in a cyclone-prone region, faces a physical risk of infrastructure
damage due to cyclones. This risk, categorized as an acute physical risk, is derived
from extreme weather events.
Transition risks are those that arise from the societal shift towards a low-carbon
economy. These risks encompass changes in technology, policy, and societal behavior
towards a more eco-friendly stance. With its largest consumer base in a country
implementing stringent green policies, EarthSpan Inc. could face a transition risk of
technological obsolescence, as the shift towards renewable energy technology may
outdate their current manufacturing processes.