The art of financial network science, part II

posted in: Viewpoints | 0

The second annual Financial Risk & Network Science seminar was held on September 9 at the University of Cambridge Judge Business School, in partnership between the Centre and Risk Journals.

As with last year, there was a great display of varied and colourful financial network visualisations on show. Network diagrams present vast amounts of data in a single picture. The human eye sees patterns in this data – we easily perceive density clusters, structure and shape, but not detail. The images are too complex to see many individual data points, but that is the point. Most diagrams convey the form and hierarchical structure of the data. It provides a high-level map of the topography. This is what Kimmo Soramaki, the Editor-in-Chief of the Journal of Network Theory in Finance, calls “Financial Cartography”.

We are keen to promote and encourage visualisation techniques as a way of helping people understand complex patterns of data in the comprehension of financial networks.

This year, it is our aim to award a prize — the Cambridge Centre for Risk Studies Prize for Financial Network Visualisation — for the best network visualisation presented at the Conference on 9 September. The winning image will be reproduced as a large-scale framed poster for the presenter and their institution.

Who do you think is a real contender for the 2015 prize? Let us know via Twitter or in the comments.

Click the image to view the presentation. A PDF of all the entries can be viewed here.

 
A
B
C
D
1gatkowski14salidas11schwendner12flood05
2mutnikas02soramaki04mutnikas03fiedor09
3rancan07silvestri15jelonek17schwendner13
4mutikas18Daniel Ladley; A Network Analysis of the 1873 Financial Crisiscrs06shaghaghi20
5paddrik19bougheas10ruffini08  


Tamara Evan

Tamara Evan

Tamara Evan is the head of Geopolitical Research at the Centre for Risk Studies, Cambridge Judge Business School. She supports the Centre’s work on geopolitical and technological risks and heads research into the emerging threat of cyber terrorism to infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.