Terms Beginning With 't'

Tail risk

  • January 07, 2020
  • Team Kalkine

Additional risk of an asset or portfolio of assets moving more than 3 standard deviations from its current price, rising from the events that have a small probability of occurring, and occur at both ends of a normal distribution curve.

Condition in which potential loss from the risk is not enough to spend money on it to avoid the risk. Such cases emerge when the risk is either too less or very unlikely to occur.  

What are accounts payable? Accounts payable is the amount of cash a company is liable to pay to its suppliers and clear dues. As current liabilities of the company, accounts payable is required to be settled over the next twelve months.  It also shows the obligations of the business over the next year. Accounts payable is required to be repaid in a short period, depending on the relationship with suppliers. It is essentially a kind of short term debt, which is necessary to honour to prevent default.  As a part of the company’s working capital, it is widely used in analysing the cash flow of the business and cash flow trends over a period. Accounts payable may also depict the bargaining power of the company with its vendor and suppliers.  A vendor or supplier may give the customer longer credit period to settle the cash compared to other customers. The customer here is the company, which will incur accounts payable after buying goods on credit from the vendor.  There could be many reasons why the vendor is providing a more extended credit period to the firm such as long term relationship, bargaining power of the firm, strategic needs of the vendor, the scale of goods or services.  By maintaining a more extended repayment period to supplier and shorter cash realisation period from the customer, the company would be able to improve the working capital cycle and need funds to support the business-as-usual.  However, prudent working capital management calls for not overtly stretching the payable days as it might lead to dissatisfaction of supplier. Also, investors tend to closely watch the payable days cycle to determine the financial health of the business. When the financial conditions of a firm deteriorate, the management tend to delay the payment to their suppliers. What is accounts payable turnover ratio? Accounts payable turnover ratio shows the capability of a firm to pay cash to its customer after credit purchases. It is counted as an essential ratio to analyse the cash management attribute of the firm and its relationship with vendors or suppliers.  It is calculated by dividing purchases by average accounts payable.  Purchases by the company are calculated as the sum of the cost of sales and net inventory in a given period:  Now let’s understand this the help of an example. Let us suppose, Cost of sales of Company XYZ for the period was $60,000, and XYZ began with inventories worth $21000 and ended at $15000. Accounts payable at the beginning was $20000, and $15000 at the end.  Now the purchases will be $66000 (60000+21000-15000). The average accounts payable will be $17500. Therefore, the accounts payable turnover ratio will be 3.77x.  Dividing the number of weeks in a year by the accounts payable turnover ratio will give the number of weeks the company takes on average to settle its payables. In this case, it will be around 13.8 weeks (52/3.77). 

What is the Dark Web?  The dark web is one such portion of the World Wide Web which is not accessible by regular search engines. The dark web is considered a hotbed for criminal activities, and it is much more than that. Various websites exist on an encrypted network inside the dark web. Standard web browsers and programs cannot find these websites. Once inside the dark web, different sites and pages can be accessed like one does on the web. Scientists believe that the internet we see is only 4% of the entire ocean of the web, meaning the 96% consists of the "Deep and Dark Web".  The user interface used in the dark web is usually internet-based, but it utilises special software which is not part of the standard ones. There are dozens of web browsers to surf the internet, but they all work in the same way. These standard browsers use ports and protocols to request, transfer and view data on the Internet. The website you access may look familiar, but as you enter, it may be illegal or something familiar but otherwise not monitored by anyone else. Therefore, the deep web and the dark web are famous for being anonymous. Also read: Cyber Espionage Campaign: Strings that tie China, Australia and the US How to access dark web browser? In order to access a few areas which are restricted, the user may need a password and a process to follow. A special software called TOR (The Onion Router) or the Freenet has these non-standard connections. These browsers are unlike standard internet browsers and have a process to access. They allow the users to browse around the dark web and are focused on keeping the user identity anonymous. If hacked or accessed, the regular web browser can easily provide user information such as who the user is and whereabouts. Though the dark web is providing 100% anonymity, federal agencies have been successful in tracking down criminal activities on the dark web. It is often said that the person you are talking to on the dark web could either be an FBI agent or a criminal. Image: Kalkine   What happens inside the world of the dark web?  The dark web is famous for allowing sinister activities, but many users go on the dark web to access information which otherwise may not be accessible on standard internet. Such as users from extremely oppressive governments who cut access to the world for their citizens. Unfortunately, such confidential environments also provide open platforms to criminals, terrorists and other such individuals involved in illegal activities.   Hence, experts advise users to not access the dark web even out of curiosity as it is a lawless environment. There have been many incidents where innocent, curious users were trapped and forced to get involved in criminal activities or their digital devices hacked and compromised without their knowledge.  A study conducted by a University of Surrey researcher Dr Michael McGuires in 2019, Into the Web of Profit, shows that the dark web has become worse in recent times. Since 2016 of all the listings on the dark web suggested, 60% could harm companies. Everything illegal and criminal can be found on the dark web, it also has other legitimate options such as chess clubs or book clubs, but because of the anonymity, the user will not know whom he/she is interacting with. Inside the dark web, anonymity and lawless nature make the crimes which exist otherwise in our society hard to trace.  The payment procedure inside the dark web is also different from the World Wide Web. Most often, Bitcoin and Monero cryptocurrency are used for the transactions.    RELATED READ: Knock Knock! Cybercriminal at Your Doorstep   What’s the difference between the deep web and dark web? The dark web is part of the entire deep web and is hidden from regular browsing access. Most people confuse the deep web and the dark web as one entity. It is not. The deep web content includes anything hidden and restricted behind the security wall such as content which otherwise requires paywall or sign-in or blocked by the author. Content which cannot be easily accessible on regular internet such as medical records, membership websites, paid content are available on the deep web; hence it is also called Invisible Web.  No one really knows the total size of the internet, but the experts believe that the standard World Wide Web consists of only 4% internet, the deep web consists of 90% and dark web consists of 6% of the entire internet.  ALSO READ: Technology has changed the way we work amid the COVID-19 crisis: A look at in-demand technologies Image: Kalkine     Also read: It happens again, NZX being bullied by Cyber-attackers- Down for the fourth day   What kind of risk companies face due to the dark web?  The Into the Web of Profit report listed below threats various organisations around the world are facing, especially the ones who have weak or insufficient cybersecurity measures.   Malware attacks Distributed denial of service (DDoS) attacks Botnets Trojan, keyloggers, exploits  Espionage  Credentials access  Phishing  Refunds Customer data Operational data Financial data Intellectual property/ trade secrets    Also read: Cybersecurity and the Requirement of a Resilient Environment in Australia  Are there advantages and disadvantages to the dark web?  The dark web provides complete anonymity, the users get complete privacy to perform any activity, be it illegal or legal. Many countries in the world still have authoritarian regimes offering no civil rights to their people. To such oppressed lot, the dark web provides an opportunity to access news, information, data and also express their views. The dark web is also a perfect place for law agencies to map criminal activities while being undercover. It is also easy to commit gruesome crimes through the dark web as it is complicated and lawless. Criminals can easily use the dark web to compromise someone's privacy, steal data or private information or even hire someone to commit murder.  Do internet users need to be concerned about the dark web?  The simple answer is no unless the user is using the dark web. Study says that most young people visit the dark web out of curiosity. They do not want to indulge in any criminal activity but want to see how the hidden and secret world of the dark web operates. And that is where the possibility of the electronic device IP address getting hacked by other criminals to perform their criminal activities lies.  The earliest use of darknet dates back to the year 2000. Freenet was created at the University of Edinburgh based on a student research paper. Ian Clark wrote the paper in 1999 on the possibility of such an encrypted internet base. Freenet was created to oppose censorship and provide a platform for free speech. The most powerful dark web is TOR, and it was created by the United States government to have a secure encrypted communication in case of emergency and complete disaster. Even today, many law agencies are secretly active inside the world of the dark web to gain access in the criminal world and stay one step ahead.

What is Data Mining? Data mining is a process that facilitates the extraction of relevant information from a vast dataset. The process helps to discover a new, accurate and useful pattern in the data to derive helpful pattern in data and relevant information from the dataset for organization or individual who requires it. Key Features of data mining include: Based on the trend and behaviour analysis, data mining helps to predict pattern automatically. Predicts the possible outcome. Helps to create decision-oriented information. Focuses on large datasets and databases for analysis. Clustering based on findings and a visually documented group of facts that were earlier hidden. How does data mining work? The first step of the data mining process includes the collection of data and loading it into the data warehouse. In the next step, the data is stored and managed on cloud or in-house servers. Business analyst, data miners, IT professionals or the management team then extracts these data from the sources and accordingly access and determine the way they want to organize the data. The application software performs data sorting based on user’s result. In the last step, the user presents the data in the presentable format, which could be in the form of a graph or table.         Image Source: © Kalkine Group 2020 What is the process of data mining? Multiple processes are involved in the implementation of data mining before mining happens. These processes include: Business Research: Before we begin the process of data mining, we must have a complete understanding of the business problem, business objectives, the resources available plus the existing scenario to meet these requirements. Having a fair knowledge of these topics would help to create a detailed data mining plan that meets the goals set up by the business. Data Quality Checks: Once we have all the data collected, we must check the data so that there are no blockages in the data integration process. The quality assurance helps to detect any core irregularities in the data like missing data interpolation. Data Cleaning: A vital process, data cleaning costumes a considerable amount of time in the selection, formatting, and anonymization of data. Data Transformation: Once data cleaning completes, the next process involves data transformation. It comprises of five stages comprising, data smoothing, data summary, data generalization, data normalization and data attribute construction. Data Modelling: In this process, several mathematical models are implemented in the dataset. What are the techniques of data mining? Association: Association (or the relation technique) is the most used data mining technique. In this technique, the transaction and the relationship between the items are used to discover a pattern. Association is used for market basket analysis which is done to identify all those products which customer buy together. An example of this is a department store, where we find those goods close to each other, which the customers generally buy together, like bread, butter, jam, eggs. Clustering: Clustering technique involves the creation of a meaningful object with common characteristics. An example of this is the placement of books in the library in a way that a similar category of books is there on the same shelf. Classification: As the name suggests, the classification technique helps the user to classify and variable in the dataset into pre-defined groups and classes. It uses linear programming, statistics, decision tree and artificial neural networks. Through the classification technique, we can develop software that can be modelled so that data can be classified into different classes. Prediction: Prediction techniques help to identify the dependent and the independent variables. Based on the past sales data, a business can use this technique to identify how the business would do in the future. It can help the user to determine whether the business would make a profit or not. Sequential Pattern: In this technique, the transaction data is used and though this data, the user identifies similar trends, pattern, and events over a period. An example is the historical sales data which a department store pulls out to identify the items in the store which customer purchases together at different times of the year. Applications of data mining Data mining techniques find their applications across a broad range of industries. Some of the applications are listed below: Healthcare Education Customer Relationship Management Manufacturing Market Basket Analysis Finance and Banking Insurance Fraud Detection Monitoring Pattern Classification Data Mining Tools Data mining aims to find out the hidden, valid and all possible patterns in a large dataset. In this process, there are several tools available in the market that helps in data mining. Below is a list of ten of the most widely used data mining tools: SAS Data mining Teradata R-Programing Board Dundas Inetsoft H3O Qlik RapidMiner Oracle BI

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. OK