P2P 金融下的中小企业融资互联网金融外文文献翻译最新译文

合集下载

中小企业的融资问题外文翻译(可编辑)

中小企业的融资问题外文翻译(可编辑)

中小企业的融资问题外文翻译外文翻译the Financing problems of Small and medium sized enterprisesMaterial Source: ////0>. Author: ModiglianiA thriving SME sector is crucial to spurring growth and reducing poverty in developing and transition economies. But financial institutions often avoid small and medium sized enterprises, sensing?understandably?that the transaction costs of financing them will be excessively high. What Small and medium sized enterprises need is not to be left without access to capital, but approached on a new model that combines early-stage equity investment and performance-enhancing technical assistance, writes Bert van deer Avert, CEO of Small Enterprise Assistance Funds SEAF. This US- and Dutch-based NGO manages a network of 14 commercially driven investment funds worldwide with total assets of $140 million, and has developed a unique “equity plus assistance” approach to Small and medium sized enterprises investing.Small and medium sized enterprises Sara widely credited with generating the highest rates of revenue and employment growth in virtually all economies. In transition and developing countries open to foreign direct investment, they also tend to pay disproportionately more in taxesand social security contributions than either their larger and smaller counterparts. Larger enterprises, especially multinationals, often find a way to reduce their tax obligations through transfer pricing, royalty payments, and negotiated tax holidays. Microenterprises, on the other hand, often fall in the informal sector, neither paying taxes nor making social security contributions.Yet if Small and medium sized enterprises constitute a critical dimension of growth and development and are often well positioned to achieve high revenue and profit growth, why have private and public financing institutions alike tended to avoid investing in them?The reasons are multiple and, for the most part, understandable. For private investors, the amount of work required to invest relatively small sums into several SMEs seems unattractive compared to the work needed to support fewer investments in larger companies. Moreover, investing in local Small and medium sized enterprises also often involves working with entrepreneurs who are less familiar with conventional financing relationships, business practices, and the English language than principals of larger firms. Accordingly, most private capital would much prefer to invest in a few large-asset There are broader issues to be considered as well, including the lack of transparency in local legal systems and governments that make investing in these countries difficult at best. enterprises in fields such as pharmaceuticals,telecommunications or privatized industry rather than in smaller companies with relatively few assets, low capitalization and a perceived greater vulnerability to market conditions. Public development institutions can also encounter high administrative costs in making small and medium sized enterprises investments. These can be coupled with perceptions that local Small and medium sized enterprises entrepreneurs may not be trustworthy, and that working with them might bring fewer visibly “developmental” benefits than targeting more poverty-focused fields such as microfinance Local commercial banks too are often biased in favor of large corporate borrowers with considerable assets. This has meant that even the lines of credit local banks receive from development institutions for on-lending to Small and medium sized enterprises are often under-utilized. Small and medium sized enterprises entrepreneurs’ lack of experience in accounting and other areas of financial documentation make it difficult for banks or other potential sources to assess their creditworthiness and cash flows, again hindering the provision of financing. Combined, these factors have largely left what should be the most dynamic sector of the economy in developing countries lacking the capital it needs to realize its potential.SEAF believes that the investment levels it takes, coupled with its focused efforts on increase value after investments, and allows it to invest at relatively attractive multiples. This offers an array ofpotential exit possibilities. By contrast, many conventional Emerging market private equity investors have had disappointing records in achieving exits over the last four years. SEAF’s approach to early-stage investing in SMEs thus may one day be seen as one of the more appropriate means of investing in developing countries. In the meantime, SEAF is achieving its developmental objectives by rapidly increasing the revenues, productivity, and employment growth of its investee Small and medium sized enterprises.The financial sector infrastructure will need to change to accommodate the substantial financing requirements of new activities and industries. Going forward, while financial institutions would need to transform to remain innovative and responsive to demands of their customers, efforts need to be directed to facilitate financing by non-banks for high-risk ventures. These include financing for knowledge-intensive and technology-intensive start-up enterprises where only ideas intangible collateral are principal assets. As such, these knowledge-intensive and technology-intensive enterprises will need alternative forms of financing to complement traditional financing sources. These alternative modes of financing include among others, venture capital and credit enhancements such as financial guarantee insurance and agriculture insurance.The financial infrastructure that supports Small and medium sizedenterprises in Serbia is undeveloped. Up to now, small and medium sized enterprises and entrepreneurs have financed their operations out of their own resources because financial markets in Serbia were isolated and lacked the support of international financial institutions. The local financial sector in the former Yugoslavia was designed to support large scale, socially owned enterprises ? otherwise known as the “Pillars of Development.” B anks, especially large-scale socially owned banks, had a redistributive function imposed on them by the state, and they dealt solely with large-scale, socially owned enterprises. In addition, the Fund for Development of the Republic of Serbia disbursed its funds to the same target group. Capacity to repay the banks or the Fund was not a criterion for credit approval.Economists have not always fully appreciated the importance of a healthy financial system for economic growth or the role of financial conditions in short-term economic dynamicsAs a matter of intellectual history, the reason is not difficult to understandDuring the first few decades after World War II, economic theorists emphasized the development of general equilibrium models of the economy with complete markets; that is, in their analyses, economists generally abstracted from market "frictions" such as imperfect information or transaction costsBut without such frictions, financial markets have little reason to existFor example, with complete markets and if we ignore taxes, we know that whether acorporation finances itself by debt or equity is irrelevant the Modigliani-Miller theorem.The former economic and political system did not support the development of financial instruments for Small and medium sized enterprises. Cooperation with SMEs focused on a few selected companies, while sole traders were almost completely excluded from credit transactions with the banking sector. SME owners and citizens completely lost their trust in the banks and channeled their savings into the grey economy, to banks abroad, or kept their savings at home. Only payments effected through the National Payment Bureau functioned properly for Small and medium sized enterprises.译文中小企业的融资问题资源来源:////. 作者:詹姆斯?沃尔芬森中小企业的蓬勃发展对促进经济增长,减少发展中国家的贫穷和经济转型具有重要意义。

最新中小企业融资英文文献资料

最新中小企业融资英文文献资料

中小企业融资英文文献An Analysis on Credit Guarantee System of Small and Medium-sized Enterprises in China AbstractAt presentthere are still many constraints in the further development of SMEsmall and medium—sized enterprises in ChinaAnd especially the financing development of SME has become a bottle neckwhich was caused by the unsound credit guarantee system for SMEBased on China’s SME guarantee system and its problemsthe thesis puts forward proposals to perfect guarantee system for China’s SME with norma l analysisIn order to make guarantee system play its due roleit is necessary to establish different modes of credit guarantee institutions in accordance with the actual situationto found SME credit guarantee funds and its supplementary systemto adjust the operation mode of guarantee funds and to improve legal protection of the credit guarantee system 对中国中小企业信用担保体系的分析摘要目前中国中小企业的进一步发展仍然受到很多约束尤其是中小企业融资问题已经成为制约的瓶颈。

互联网金融安全中英文对照外文翻译文献

互联网金融安全中英文对照外文翻译文献

互联网金融安全中英文对照外文翻译文献中英文对照外文翻译文献(文档含英文原文和中文翻译)Database Security in a Web Environment IntroductionDatabases have been common in government departments and commercial enterprises for many years. Today, databases in any organization are increasingly opened up to a multiplicity of suppliers, customers, partners and employees - an idea that would have been unheard of a few years ago. Numerous applications and their associated data are now accessed by a variety of users requiring different levels of access via manifold devices and channels – often simultaneously. For example:• Online banks allow customers to perform a variety of banking operations - via the Internet and over the telephone – whilst maintaining the privacy of account data.• E-Commerce merchants and their Service Providers must store customer, order and payment data on their merchant server - and keep it secure.• HR departments allow employees to update their personal information –whilst protecting certain management information from unauthorized access.• The medical profession must protect the confidentiality of patient data –whilst allowing essential access for treatment.• Online brokerages need to be able to provide large numbers of simultaneous users with up-to-date and accurate financial information.This complex landscape leads to many new demands upon system security. The global growth of complex web-based infrastructures is driving a need for security solutions that provide mechanisms to segregate environments; perform integrity checking and maintenance; enable strong authentication andnon-repudiation; and provide for confidentiality. In turn, this necessitates comprehensive business and technical risk assessment to identify the threats,vulnerabilities and impacts, and from this define a security policy. This leads to security definitions throughout the infrastructure - operating system, database management system, middleware and network.Financial, personal and medical information systems and some areas of government have strict requirements for security and privacy. Inappropriate disclosure of sensitive information to the wrong parties can have severe social, legal and regulatory consequences. Failure to address the basics can result in substantial direct and consequential financial losses - witness the fraud losses through the compromise of several million credit card numbers in merchants’ databases [Occf], plus associated damage to brand-image and loss of consumer confidence.This article discusses some of the main issues in database and web server security, and also considers important architecture and design issues.A Simple ModelAt the simplest level, a web server system consists of front-end software and back-end databases with interface software linking the two. Normally, the front-end software will consist of server software and the network server operating system, and the back-end database will be a relational orobject-oriented database fulfilling a variety of functions, including recording transactions, maintaining accounts and inventory. The interface software typically consists of Common Gateway Interface (CGI) scripts used to receive information from forms on web sites to perform online searches and to update the database.Depending on the infrastructure, middleware may be present; in addition, security management subsystems (with session and user databases) that address the web server’s and related applications’ requirements for authentication, accesscontrol and authorization may be present. Communications between this subsystem and either the web server, middleware or database are via application program interfaces (APIs)..This simple model is depicted in Figure 1.Security can be provided by the following components:• Web server.• Middleware.• Operating system.. Figure 1: A Simple Model.• Database and Database Management System.• Security management subsystem.The security of such a system addressesAspects of authenticity, integrity and confidentiality and is dependent on the security of the individual components and their interactions. Some of the most common vulnerabilities arise from poor configuration, inadequate change control procedures and poor administration. However, even if these areas are properlyaddressed, vulnerabilities still arise. The appropriate combination of people, technology and processes holds the key to providing the required physical and logical security. Attention should additionally be paid to the security aspects of planning, architecture, design and implementation.In the following sections, we consider some of the main security issues associated with databases, database management systems, operating systems and web servers, as well as important architecture and design issues. Our treatment seeks only to outline the main issues and the interested reader should refer to the references for a more detailed description.Database SecurityDatabase management systems normally run on top of an operating system and provide the security associated with a database. Typical operating system security features include memory and file protection, resource access control and user authentication. Memory protection prevents the memory of one program interfering with that of another and limits access and use of the objects employing techniques such as memory segmentation. The operating system also protects access to other objects (such as instructions, input and output devices, files and passwords) by checking access with reference to access control lists. Security mechanisms in common operating systems vary tremendously and, for those that are lacking, there exists special-purpose security software that can be integrated with the existing environment. However, this can be an expensive, time-consuming task and integration difficulties may also adversely impact application behaviors.Most database management systems consist of a number of modules - including database querying and database and file management - along with authorization, concurrent access and database description tables. Thesemanagement systems also use a variety of languages: a data definition language supports the logical definition of the database; developers use a data manipulation language; and a query language is used by non-specialist end-users.Database management systems have many of the same security requirements as operating systems, but there are significant differences since the former are particularly susceptible to the threat of improper disclosure, modification of information and also denial of service. Some of the most important security requirements for database management systems are: • Multi-Level Access Control.• Confidentiality.• Reliability.• Integrity.• Recovery.These requirements, along with security models, are considered in the following sections.Multi-Level Access ControlIn a multi-application and multi-user environment, administrators, auditors, developers, managers and users – collectively called subjects - need access to database objects, such as tables, fields or records. Access control restricts the operations available to a subject with respect to particular objects and is enforced by the database management system. Mandatory access controls require that each controlled object in the database must be labeled with a security level, whereas discretionary access controls may be applied at the choice of a subject.Access control in database management systems is more complicated than in operating systems since, in the latter, all objects are unrelated whereas in a database the converse is true. Databases are also required to make accessdecisions based on a finer degree of subject and object granularity. In multi-level systems, access control can be enforced by the use of views - filtered subsets of the database - containing the precise information that a subject is authorized to see.A general principle of access control is that a subject with high level security should not be able to write to a lower level object, and this poses a problem for database management systems that must read all database objects and write new objects. One solution to this problem is to use a trusted database management system.ConfidentialitySome databases will inevitably contain what is considered confidential data. For example, it could be inherently sensitive or its source may be sensitive, or it may belong to a sensitive table, thus making it difficult to determine what is actually confidential. Disclosure is also difficult to define, as it can be direct, indirect, involve the disclosure of bounds or even mere existence.An inference problem exists in database management systems whereby users can infer sensitive information from relatively insensitive queries. A trivial example is a request for information about the average salary of an employee and the number of employees turns out to be just one, thus revealing the employee’s salary. However, much more sophisticated statistical inference attacks can also be mounted. This highlights the fact that, although the data itself may be properly controlled, confidential information may still leak out.Controls can take several forms: not divulging sensitive information to unauthorized parties (which depends on the respective subject and object security levels), logging what each user knows or masking response data. The first control can be implemented fairly easily, the second quickly becomesunmanageable for a large number of users and the third leads to imprecise responses, and also exemplifies the trade-off between precision and security. Polyinstantiation refers to multiple instances of a data object existing in the database and it can provide a partial solution to the inference problem whereby different data values are supplied, depending on the security level, in response to the same query. However, this makes consistency management more difficult.Another issue that arises is when the security level of an aggregate amount is different to that of its elements (a problem commonly referred to as aggregation). This can be addressed by defining appropriate access control using views.Reliability, Integrity and RecoveryArguably, the most important requirements for databases are to ensure that the database presents consistent information to queries and can recover from any failures. An important aspect of consistency is that transactions execute atomically; that is, they either execute completely or not at all.Concurrency control addresses the problem of allowing simultaneous programs access to a shared database, while avoiding incorrect behavior or interference. It is normally addressed by a scheduler that uses locking techniques to ensure that the transactions are serial sable and independent. A common technique used in commercial products is two-phase locking (or variations thereof) in which the database management system controls when transactions obtain and release their locks according to whether or not transaction processing has been completed. In a first phase, the database management system collects the necessary data for the update: in a second phase, it updates the database. This means that the database can recover from incomplete transactions by repeatingeither of the appropriate phases. This technique can also be used in a distributed database system using a distributed scheduler arrangement.System failures can arise from the operating system and may result in corrupted storage. The main copy of the database is used for recovery from failures and communicates with a cached version that is used as the working version. In association with the logs, this allows the database to recover to a very specific point in the event of a system failure, either by removing the effects of incomplete transactions or applying the effects of completed transactions. Instead of having to recover the entire database after a failure, recovery can be made more efficient by the use of check pointing. It is used during normal operations to write additional updated information - such as logs, before-images of incomplete transactions, after-images of completed transactions - to the main database which reduces the amount of work needed for recovery. Recovery from failures in distributed systems is more complicated, since a single logical action is executed at different physical sites and the prospect of partial failure arises.Logical integrity, at field level and for the entire database, is addressed by the use of monitors to check important items such as input ranges, states and transitions. Error-correcting and error-detecting codes are also used.Security ModelsVarious security models exist that address different aspects of security in operating systems and database management systems. For example, theBell-LaPadula model defines security in terms of mandatory access control and addresses confidentiality only. The Bell LaPadula models, and other models including the Biba model for integrity, are described more fully in [Cast95] and [Pfle89]. These models are implementation-independent and provide a powerfulinsight into the properties of secure systems, lead to design policies and principles, and some form the basis for security evaluation criteria.Web Server SecurityWeb servers are now one of the most common interfaces between users and back-end databases, and as such, their security becomes increasingly important. Exploitation of vulnerabilities in the web server can lead to unforeseen attacks on middleware and backend databases, bypassing any controls that may be in place. In this section, we focus on common web server vulnerabilities and how the authentication requirements of web servers and databases are met.In general, a web server platform should not be shared with other applications and should be the only machine allowed to access the database. Using a firewall can provide additional security - either between the web server and users or between the web server and back-end database - and often the web server is placed on a de-militarized zone (DMZ) of a firewall. While firewalls can be used to block certain incoming connections, they must allow HTTP (and HTTPS) connections through to the web server, and so attacks can still be launched via the ports associated with these connections.VulnerabilitiesVulnerabilities appear on a weekly basis and, here, we prefer to focus on some general issues rather than specific attacks. Common web server vulnerabilities include:• No policy exists.• The default configuration is on.• Reusable passwords appear in clear.• Unnecessary ports available for network services are not disabled.• New security holes are not tracked. Even if they are, well-known vulnerabilities are not always fixed as the source code patches are not applied by system administrator and old programs are not re-compiled or removed.• Security tools are not used to scan the network for weaknesses and changes or to detect intrusions.• Faulty and buggy software - for example, buffer overflow and stack smashingAttacks• Automatic directory listings - this is of particular concern for the interface software directories.• Server root files are generally visible or accessible.• Lack of logs and bac kups.• File access is often not explicitly configured by the system administrator according to the security policy. This applies to configuration, client, administration and log files, administration programs, and CGI program sources and executables. CGI scripts allow dynamic web pages and make program development (in, for example, Perl) easy and rapid. However, their successful exploitation may allow execution of malicious programs, launching ofdenial-of-service attacks and, ultimately, privilege escalation on a server.Web Server and Database AuthenticationWhile user, browser and web server authentication are relatively well understood [Garf97], [Ghos98] and [Tree98], the introduction of additional components, such as databases and middleware, raise a number of authentication issues. There are a variety of options for authentication in a simple model (Figure 1). Firstly, both the web server and database management system can individually authenticate a user. This option requires the user to authenticatetwice which may be unacceptable in certain applications, although a singlesign-on device (which aims to manage authentication in a user-transparent way) may help. Secondly, a common approach is for the database to automatically grant user access based on web server authentication. However, this option should only be used for accessing publicly available information. Finally, the database may grant user access employing the web server authentication credentials as a basis for its own user authentication, using security management subsystems (Figure 1). We consider this last option in more detail.Web-based communications use the stateless HTTP protocol with the implication that state, and hence authentication, is not preserved when browsing successive web pages. Cookies, or files placed on user’s machine by a web server, were developed as a means of addressing this issue and are often used to provide authentication. However, after initial authentication, there is typically no re authentication per page in the same realm, only the use of unencrypted cookies (sometimes in association with IP addresses). This approach provides limited security as both cookies and IP addresses can be tampered with or spoofed.A stronger authentication method, commonly used by commercial implementations, uses digitally signed cookies. This allows additional systems, such as databases, to use digitally signed cookie data, including a session ID, as a basis for authentication. When a user has been authenticated by a web server (using a password, for example), a session ID is assigned and is stored in a security management subsystem database. When a user subsequently requests information from a database, the database receives a copy of the session ID, the security management subsystem checks this session ID against its local copy and, if authentication is successful, user access is granted to the database.The session ID is typically transmitted in the clear between the web server and database, but may be protected by SSL or even by physical security measures. The communications between the browser and web servers, and the web servers and security management subsystem (and its databases), are normally protected by SSL and use a web server security API that is used to digitally sign and verify browser cookies. The communications between the back-end databases and security management subsystem (and its databases) are also normally protected by SSL and use a database security API that verifies session Ids originating from the database and provides additional user authorization credentials. The web server security API is generally proprietary while, for the database security API, many vendors have adopted standards such as the Generic Security Services API (GSS-API) or CORBA [RFC2078] and [Corba].Architecture and DesignSecurity requirements for designing, building and implementing databases are important so that the systems, as part of the overall infrastructure, meet their requirements in actual operation. The various security models provide an important insight into the design requirements for databases and their management systems.Secure Database Management System ArchitecturesIn multi-level database management systems, a variety of architectures are possible: trusted subject, integrity locked, kernels and replicated. Trusted subject is used by most of the leading database management system vendors and can be integrated in existing products. Basically, the trusted subject architecture allows users to access a database via an un trusted front-end, a trusted database management system and trusted operating system. The operating systemprovides physical access to the database and the database management system provides multilevel object protection.The other architectures - integrity locked, kernels and replicated - all vary in detail, but they use a trusted front-end and an un trusted database management system. For details of these architectures and research prototypes, the reader is referred to [Cast95]. Different architectures are suited to different environments: for example, the trusted subject architecture is less integrated with the underlying operating system and is best suited when a trusted path can be assured between applications and the database management system.Secure Database Management System DesignAs discussed above, there are several fundamental differences between operating system and database management system design, including object granularity, multiple data types, data correlations and multi-level transactions. Other differences include the fact that database management systems include both physical and logical objects and that the database lifecycle is normally longer.These differences must be reflected in the design requirements which include:• Access, flow and infer ence controls.• Access granularity and modes.• Dynamic authorization.• Multi-level protection.• Polyinstantiation.• Auditing.• Performance.These requirements should be considered alongside basic information integrity principles, such as:• Well-formed transactions - to ensure that transactions are correct and consistent.• Continuity of operation - to ensure that data can be properly recovered, depending on the extent of a disaster.• Authorization and role management – to ensure that distinct roles are defined and users are authorized.• Authenticated users - to ensure that users are authenticated.• Least privilege - to ensure that users have the minimal privilege necessary to perform their tasks.• Separation of duties - to ensure that no single individual has access to critical data.• Delegation of authority - to ensure that the database management system policies are flexible enough to meet the organization’s requirements.Of course, some of these requirements and principles are not met by the database management system, but by the operating system and also by organizational and procedural measures.Database Design MethodologyVarious approaches to design exist, but most contain the same main stages. The principle aim of a design methodology is to provide a robust, verifiable design process and also to separate policies from how policies are actually implemented. An important requirement during any design process is that different design aspects can be merged and this equally applies to security.A preliminary analysis should be conducted that addresses the system risks, environment, existing products and performance. Requirements should then beanalyzed with respect to the results of a risk assessment. Security policies should be developed that include specification of granularity, privileges and authority.These policies and requirements form the input to the conceptual design that concentrates on subjects, objects and access modes without considering implementation details. Its purpose is to express information and process flows in a complete and consistent way.The logical design takes into account the operating system and database management system that will be used and which of the security requirements can be provided by which mechanisms. The physical design considers the actual physical realization of the logical design and, indeed, may result in a revision of the conceptual and logical phases due to physical constraints.Security AssuranceOnce a product has been developed, its security assurance can be assessed by a number of methods including formal verification, validation, penetration testing and certification. For example, if a database is to be certified as TCSEC Class B1, then it must implement the Bell-LaPadula mandatory access control model in which each controlled object in the database must be labeled with a security level.Most of these methods can be costly and lengthy to perform and are typically specific to particular hardware and software configurations. However, the international Common Criteria certification scheme provides the added benefit of a mutual recognition arrangement, thus avoiding the prospect of multiple certifications in different countries.ConclusionThis article has considered some of the security principles that are associated with databases and how these apply in a web based environment. Ithas also focused on important architecture and design principles. These principles have focused mainly on the prevention, assurance and recovery aspects, but other aspects, such as detection, are equally important in formulating a total information protection strategy. For example, host-based intrusion detection systems as well as a robust and tested set of business recovery procedures should be considered.Any fit-for-purpose, secure e-business infrastructure should address all the above aspects: prevention, assurance, detection and recovery. Certain industries are now starting to specify their own set of global, secure e-business requirements. International card payment associations have recently started to require minimum information security standards from electronic commerce merchants handling credit card data, to help manage fraud losses and associated impacts such as brand-image damage and loss of consumer confidence.网络环境下的数据库安全简介数据库在政府部门和商业机构得到普遍应用已经很多年了。

小微企业融资外文文献翻译

小微企业融资外文文献翻译

小微企业融资外文文献翻译the XXX credit to small and medium enterprises (SMEs)。

However。

micro enterprises (MEs) which are smaller than SMEs。

have been XXX。

using a path XXX finance。

such as family and friends。

due to the lack of access to formal finance。

Path dependence is also evident。

XXX finance.翻译:乌干达的小微企业融资:路径依赖和其他融资决策的决定因素XXX:Winifred XXX-XXX博士摘要:发展中国家的融资文献主要关注正规金融机构向中小型企业(SMEs)提供信贷的角色。

然而,小微企业(MEs)比SMEs更小,却被忽视了。

本文使用路径依赖框架,研究了乌干达小微企业的融资决策,识别了影响它们获得融资的因素。

研究发现,由于缺乏正规融资渠道,小微企业严重依赖非正规融资来源,如家人和朋友。

路径依赖也很明显,过去的融资决策和与非正规融资来源的关系影响了当前的融资决策。

本研究建议政策应着重改善小微企业获得正规融资的渠道,并促进金融素养,减少对非正规融资来源的依赖。

Access to credit is crucial for small and medium enterprises (SMEs) and micro enterprises。

as they are considered to be the main drivers of economic growth。

In e countries。

XXX role than SMEs。

XXX-agricultural self-XXX。

XXX due to the way they are XXX。

P2P金融模式互联网金融外文文献翻译最新译文

P2P金融模式互联网金融外文文献翻译最新译文

文献出处:Aronson J. The research of P2P model of financial [J] Value Creation in E-Business Management, 2016,12(5):85-95.原文The research of P2P model of financialAronson JAbstractThe development of the Internet financial, constantly create new financial model, P2P is one of the new financial model, the development of rapid direct threat to the commercial Banks in the financial world's dominance. In P2P explosive savage growth process, however, there are regulatory or incomplete system, risk control measures is not mature, P2P financial platform collapse would happen often, this leads to the development of P2P is in trouble Based on this, this paper introduces the P2P concepts and the reasons on the basis of the financial model, analyzes the difficulties faced by the current P2P financial model, and accordingly put forward the development of P2P financial model.Keywords: P2P financial mode; The theoretical analysis; Measures1 IntroductionThe wide application of Internet technology, when science and technology combined with financial, gives rise to some emerging Internet model, P2P has greatly reduced the transaction cost, satisfy the customer demand for financial, especially the working class and the small and medium-sized enterprise loan demand. But so far, due to the lack of innovation mode of financial supervision, to information asymmetry, imperfect credit system construction, and low security of adverse effect caused by funds, hindered the healthy and orderly development of P2P.For Internet financial can inject vigor, continuing for the financial sector to the real economy better service, we must strengthen the industry regulation, establish effective credit evaluation system and P2P platform to establish effective risk control system.So-called peer-to-peer (P2P), is the abbreviation of English Peer to Peer, meaning "person-to-person", refers to the directly by third-party Internet platform of money lending financing behavior, is a kind of direct financing behavior of individualto individual. It originated in Britain, and later to the United States, Germany and other countries, China introduced in 2007.In our country, its typical model is: the network credit companies provide a platform, by borrowing free bids, brokered transactions. Money lenders to obtain interest income with the risk; Money borrowed people due to repay the principal, the network credit charge intermediary company.Peer-to-peer (P2P) the causes of financial mode mainly lies in the fact that Internet technology rapidly Exhibition. With the development of Internet, the scope of its popularization in our country is more and more widely, new technology and new business forms appear constantly, and gradually extended to the financial sector, the financial and the Internet fusion degree in the process of deepening, the financial industry got the booming development, at the same time, also produced a P2P financial mode; Fill the shortcoming in traditional financial business function in our country at present. Let those be bank financial products and loan threshold shut out of the working class and the small and medium-sized enterprises can also have the opportunity to enjoy the financial services. Working class a large body of demand for money have great demand; Other small and medium-sized enterprises (SEM) in many places the arrested development, mainly due to small and medium-sized enterprises (smes) in bank loans difficult, loans due to the high cost. In order to promote the development of their own, small and medium-sized enterprises to seek other financing mode, which promote the generation of the P2P financial model.2 The status quo of P2P financial model2.1 P2P financial models lack of effective supervisionRelative to the early start of online banking, online securities and so on in the form of financial regulatory policy relatively incomplete, relatively mature management framework. But P2P financial mode in 2012 entered the blowout outbreak period. But the Internet financial regulatory agencies and related regulatory policy did not keep up with the pace of its rapid development, for the development of P2P is also hinder the role. Should be further follow relevant regulations to meet the constantly enrich and expand the urgent needs of the emerging financial forms. The lack of regulation for a long time, has been out of the grey zone and regulatory gap,there are low barriers to entry, lending money monitoring vacancy, credit evaluation system is not sound, and many other problems.The industry has been in a savage growth state, run, capital chain rupture and collapse phenomenon appeared frequently. ack of legal norms, unclear regulatory policy, business operation is not standard to causes such as the chaos of industry management.2.2 Domestic credit system construction is not perfectThe Internet in the financial, financial credit system is the basis of the healthy and standardizing development of the financial industry, the Internet. But the current construction of credit system is not perfect, personal credit record includes only with bank lending behavior and maintain within the Banks, other financial institutions can't call society.P2P network platform loan borrowers can only through an indirect way to verify information and the judgment through the subjective experience of auditors. Abroad in the implementation of a P2P financial model, the comparison of perfect personal credit system construction, when making loans, personal credit can achieve effective query, which leads the P2P financial mode constantly development and improvement. Internet financial enterprise credit reporting database is not perfect in our country, is not included in the central bank credit reporting system, for both the management difficulty is big, no effective mechanism and discipline and punishment.2.3 Information asymmetry cause malicious default riskOf the Internet financial transactions, payments and services are completed on the Internet, virtualization of trading, trading process is not transparent and so on have made the financial risk more diversified and uncontrolled. Of new trading patterns of this for the disclosure of the information has the certain difficulty, in P2P financial mode, due to information asymmetry, P2P platform there may be a risk, the truth of the borrower to provide information due to the master of P2P platform borrowing history data is limited, its credit rating system is also unable to grasp the situation of the borrowers, the condition of the fake information or the borrower. Once appear, default or delay balance, due to recover the cost is higher, lenders are hard to take back the principal and interest of the person failed to perform its obligations due to lending and lead to potential financial damage is one of the reasons that hinder thedevelopment of P2P.3 The implement measures3.1 Encourage innovation to strengthen the basis of industry regulationDue to P2P long-term financial platform is in a state of lack of regulation, resulting in a variety of financial risk problems occur unceasingly, serious impact on the development of P2P financial, based on this, as soon as possible, perfect the construction of Internet financial regulation legal system in our country, should provide a clear and transparent legal environment, including the market access supervision, operation supervision and exit regulatory measures to standardize the development of the P2P network platform. But don't like management of traditional financial institutions, so as not to stifle financial innovation. Perfect financial market system, pratt &whitney financial development, encourage financial innovation, rich level financial markets and products. Regulators want reasonable grasp the boundaries of innovation and strength, not to hinder the sustainable development of financial innovation, whether it be a financial product innovation, and financial service innovation. To strengthen management and ensure that financial security is very necessary, cut can not manage, weaken the vitality of financial innovation.3.2 promoting the construction of credit evaluation systemA severe credit system can restrain people daily financial activity. Therefore, in a constantly enrich financial transaction way to meet the demand of investment and financing of all social strata at the same time, the credit system construction also needs to be perfect and connectivity. At present, the central bank has started the construction of personal credit system, however, the central bank alone is not enough to build personal credit system, and will result in incomplete information system, therefore, in the process of building the personal credit system in the future, should attract more participants, to establish the perfect credit system, make scientific evaluation to the borrower's credit rating, for P2P platform provides necessary judgment. In addition, P2P financial platform should also set up its own credit system, establish a customer database, regular update of customer information in a database, at the same time, guarantee the comprehensiveness and accuracy of the new customerinformation, and effective to evaluate the customer's credit.3.3 P2P platform to strengthen risk control abilityP2P business at the core of the pricing power is in the team's own risk, the risk management ability is the core of the P2P company competitiveness. establish a risk control function is clear, for policy making, the characteristics of customer data mining, overdue customers, study and so on carries on the effective management, to standardize the front-end marketing, China audit, background collection each work orderly. At the same time, digital risk control model is established and the score card system is the effective measure to standardize P2P scientific management, with a complete set of scientific management methods, to cure it to risk control examination and approval decision engines and business process, to guide the business for examination and approval of risk control. Second, compared with the traditional financial institutions such as Banks, Internet financial firms can take advantage of big data analytics, cloud computing technology to manage customer credit evaluation and customer information, above is actually a credit evaluation system and risk control measures of innovation. Third, should attach importance to small and scattered plays important role in reducing risk, network platform, in the face of the large capital demand loan can be systemic forced to spread risk, is more than a sum of money into different sum, scattered the people who need loans to lend, risk can be effectively diluted. Fourth, guarantee qualification can be introduced with a third party professional guarantee companies provide guarantee, in case of bad debts by guarantee company compensation, in order to ensure safe operation, to ensure the safety of information and capital of investors. by using the combined risk of internal and external control means, in view of information asymmetry and capital safety is low in the strong guarantee.Era development is irreversible, the subversion and innovation of the Internet continues, because the P2P financial pattern in the global new things, the speed of development and the construction of the corresponding system is not perfect, resulting in the development of P2P financial face a lot of trouble. despite the difficulties, the game between the various arms intensified, but it's true that the development of P2Pinjected new vitality into the financial sector, in order to promote the healthy and orderly development of P2P, needs to explore the path to promote the development of P2P financial, P2P platform in the process of operation gradually improve risk control ability, ensure the safety of the funds. These efforts will make P2P financial mode gradually towards standardization and legalization, make it effectively fill the shortcoming in traditional financial business function at present, the future will be better able to make the financial service for the real economy, support the national strategic transformation of the economic structure.译文P2P金融模式研究Aronson J摘要互联网金融的发展,不断地创新出新型的金融模式,P2P就是其中一种新型金融模式,其发展的迅速直接威胁到商业银行在金融界的主导地位。

P2P金融风险管控中英文对照外文翻译文献

P2P金融风险管控中英文对照外文翻译文献

P2P金融风险管控中英文对照外文翻译文献P2P金融风险管控中英文对照外文翻译文献(文档含英文原文和中文翻译)译文:P2P 金融下的中小企业融资摘要中小企业融资难是世界性难题。

文章介绍了互联网金融的概念,重点概括了 P2P 金融在科技和金融创新融合方面的发展,综合了现在学术界对 P2P 金融研究的五大方向方面的各种观点和见解。

指出了当前 P2P 金融发展的突出问题风险控制,并对互联网金融的大趋势进行了分析。

关键词: P2P金融; 金融创新; 风险管控1引言从企业发展的历史看,大型企业都来源于中小企业。

中小企业是国民经济中最具活力的部分,往往走在技术发展的最前端,在高科技产业、清洁能源、绿色经济等方面都有很好的业绩,在经济转型中发挥着巨大作用。

中小企业融资难是世界性难题。

这些中小企业融资环境和渠道狭窄,有 60% 以上无法获得银行贷款。

目前,科技型企业又有轻资产的特点,融资困境,成为困扰可持续发展的巨大瓶颈。

2 互联网金融的概念近两年来,互联网金融呈现井喷式发展, 2014 年以来,互联网金融板块表现强势。

当前经济领域存在两个特别矛盾的现象,一是中小企业在企业总数中占比很大,但普遍存在融资难的问题; 二是民间闲散资金多,但除了股市和房市,往别的领域投资很难。

而以互联网、大数据、云计算为基础和高度契合市场引领的互联网金融的发展,对于解决这两个难题,更好地为实体经济,尤其是中小企业发展创造良好的金融环境,也为中国在国际竞争当中实现弯道超车起到重要作用。

互联网金融除了掌握客户端外,还便于做好上游资本供给方、下游资本使用方点与点的整合,结合互联网的其中特质( P2P) 及金融的本质( 资本) 。

依托互联网金融的发展,金融供给能力得以提高,包容性得以增强,可以动员更多的金融资源,覆盖面更广,覆盖度更多,满足更分散、更多元化的需求。

互联网金融最狭隘的概念就是 P2P( Peer-to-Peer Lend-ing) 金融平台,P2P 模式的核心是: 在这个具有资质的网站平台上,借款人发出借贷信息,并提供借贷项目的具体情况、借款人的相关诚信及经济实力等有关信息; 投资人根据平台上提供的信息,进行决策,最后做出向借款人发放贷款的决定。

互联网金融P2P网络借贷外文翻译文献

互联网金融P2P网络借贷外文翻译文献

文献信息:文献标题:Evaluating credit risk and loan performance in online Peer-to-Peer (P2P) lending(点对点(P2P)网络借贷的信用风险与贷款绩效评估)国外作者:Riza Emekter, Yanbin Tu, Benjamas Jirasakuldech, Min Lu 文献出处:《Applied Economics》, 2015, 47(1):54-70字数统计:英文3063单词,15818字符;中文5110汉字外文文献:Evaluating credit risk and loan performance in onlinePeer-to-Peer (P2P) lendingAbstract Online Peer-to-Peer (P2P) lending has emerged recently. This micro loan market could offer certain benefits to both borrowers and lenders. Using data from the Lending Club, which is one of the popular online P2P lending houses, this article explores the P2P loan characteristics, evaluates their credit risk and measures loan performances. We find that credit grade, debt-to-income ratio, FICO score and revolving line utilization play an important role in loan defaults. Loans with lower credit grade and longer duration are associated with high mortality rate. The result is consistent with the Cox Proportional Hazard test which suggests that the hazard rate or the likelihood of the loan default increases with the credit risk of the borrowers. Finally, we find that higher interest rates charged on the highrisk borrowers are not enough to compensate for higher probability of the loan default. The Lending Club must find ways to attract high FICO score and high-income borrowers in order to sustain their businesses.Key words: Peer-to-Peer lending; credit grade; FICO score; default riskI.IntroductionWith the advent of Web 2.0, it has become easy to create online markets and virtual communities with convenient accessibility and strong collaboration.One of the emerging Web 2.0 applications is the online Peer-to-Peer (P2P) lending marketplaces, where both lenders and borrowers can virtually meet for loan transactions. Such marketplaces provide a platform service of introducing borrowers to lenders, which can offer some advantages for both borrowers and lenders. Borrowers can get micro loans directly from lenders, and might pay lower rates than commercial credit alternatives. On the other hand, lenders can earn higher rates of return compared to any other type of lending such as corporate bonds, bank deposits or certificate of deposits. One of the problems in online P2P lending is information asymmetry between the borrower and the lender. That is, the lender does not know the borrower's credibility as well as the borrower does. Such information asymmetry might result in adverse selection (Akerlof, 1970) and moral hazard (Stiglitz and Weiss, 1981). Theoretically, some of these problems can be alleviated by regular monitoring, but this approach poses a challenge in the online environment because the borrowers and the buyers do not physically meet. Fostering and enhancing the lender's trust in the borrower can also be implemented to mitigate adverse selection and moral hazard problems. In the traditional bank-lending markets, banks can use collateral, certified accounts, regular reporting, and even presence of the board of directors to enhance the trust in the borrower. However, such mechanisms are difficult to implement in the online environment which will incur a significant transaction cost.To reduce lending risks associated with information asymmetry, current online P2P lending has the following arrangements. First, the Lending Club screens out any potential high-risk borrowers based on the FICO score. The minimum FICO score to be able to participate is 640. Second, the typical size of the loans produced in this market is small, which is under $35 000 at the Lending Club. Therefore, these loans are essentially microloans which pose a relatively small loss in case of default. Third, the market maker offers matchmaking systems which can be used to generate portfolio recommendations and minimize lending risks. Fourth, if a borrower fails to pay, the market maker will report the case to a credit agency and hire a collectionagency to collect the funds on behalf of the lender. Although there are certain structures imposed in the online P2P that help to minimize the risk, this form of lending is inherently associated with greater amount of risk compared to the traditional lending.The purpose of this article is to evaluate the credit risk of borrowers from one of the largest P2P platforms in the United States provided by the Lending Club, which help lenders to make more informed decisions about the risk and return efficiency of loans based on the borrowers' grade. There are two related research questions this article will address: (1) What are some of the borrowers' characteristics that help determine the default risk? and (2) Is the higher return generated from the riskier borrower large enough to compensate for the incremental risk? Lenders can allocate their investments more efficiently if they know what characteristics of the borrower affect the default risk. Each borrower is classified by credit grade with corresponding borrowing rate assigned by the Lending Club. To make an efficient allocation, a lender should know whether the higher interest rates set for high-risk borrowers are sufficient to compensate the lenders for the higher probabilities of a potential loss.Our findings suggest that borrowers with high FICO score, high credit grade, low revolving line utilization and low debt-to-income ratio are associated with low default risk. This finding is consistent with the studies by Duarte et al. (2012) who report that borrowers with a trustworthy characteristic will have better credit scores but low probability of default. This result also suggests that besides the loan applicants' social ties and friendship as reported by Freedman and Jin (2014) and Lin et al. (2013), the four factors discussed above are also important in explaining the default risk. When comparing with US national borrowers, the results show that the Lending Club should continue to screen out the borrowers with lower FICO score and attract the highest FICO score borrowers in order to significantly reduce the default risk. In relating the risk to the return, it shows that higher interest rate charged for the riskier borrower is not significant enough to justify the higher default probability. Our finding here is consistent with the study by Berkovich (2011) who reports that high quality loans offer excess return.II.Literature ReviewThree main streams of research have emerged in response to the growing popularity of P2P lending. The first stream of research examines the reasons for the emergence of online P2P lending. The second stream of research focuses on determining the factors that explain the funding success and default risk. The last stream of research investigates the performance of online P2P loan for a given level of the risk.Peer group lending has been emerging in local communities and has attracted the research in this area. Conlin (1999) develops a model to explain the existence of peer group micro-lending programmes in the United States and Canada. He finds that peer groups enable fixed costs to be imposed on the entrepreneurs while minimizing the programme's overhead costs. Ashta and Assadi (2008) investigate whether Web 2.0 techniques are integrated to support the advanced social interactions and associations with lower costs for P2P lending. Hulme and Wright (2006) study a case of online P2P lending house, Zopa, in the United Kingdom. They suggest that the emergence of online P2P lending is a direct response to social trends and a demand for new forms of relationship in financial sector under the new information age.There is extant literature that identifies the factors determining the funding success and default risk. Using the Canadian micro-credit data, Gomez and Santor (2003) find that group lending offers lower default rates than conventional individual lending does. Study by Iyer et al. (2009) shows that lenders can evaluate one third of credit risk using both hard and soft data about the borrower. Lin et al. (2013) analyse the role of social connections in evaluating credit risk and discover that strong social networking relationship is an important factor that determines the borrowing success and lower default risk. Lin et al. (2013) further report that applicants' friendship could increase the probability of successful funding, lower interest rates on funded loans, and these borrowers are associated with lower ex post default rates at Prosper. The importance of social ties in determining loans funded is also examined by Freedman and Jin (2014). The result shows that borrowers with social ties are more likely tohave their loans funded and receive lower interest rates. However, they also find evidence of risks to lenders regarding borrower participation in social networks.Several other studies examine whether certain borrowers' characteristics and personal information determine the success of loan funding and default risk. Herzenstein et al. (2008) show that borrowers' financial strength, their listing and publicizing efforts, and demographic attributes affect likelihood of funding success. Study by Duarte et al. (2012) further argues that borrowers who appear more trustworthy have better credit score with higher probabilities of having their loans funded and default less often. Larrimore et al. (2011) demonstrate that borrowers who use extended narratives, concrete descriptions and quantitative words have positive impact on funding success. However, humanizing personal details or loan justifi cations have negative influences on funding success. Qiu et al. (2012) further reveal that in addition to personal information and social capital, other variables, including loan amount, acceptable maximum interest rate and loan period set by borrowers, significantly influence the funding success or failure.Galak et al. (2011) further show that lenders tend to favour individual over group borrowers and borrowers who are socially proximate to themselves. They also find that lenders prefer the borrowers who are more like themselves in terms of gender, occupation and first name initial. More interestingly, Gonzalez and Loureiro (2014) have similar findings: (1) when perceived age represents competence, attractiveness has no effect on loan success; (2) when lenders and borrowers are of the same gender, attractiveness might lead to a loan failure (i.e., the ‘beauty is beastly' effect) and (3) loan success is sensitive to the relative age and attractiveness of lenders and borrowers. Herzenstein et al. (2011) find that herding in the loan auction is positively related to its subsequent performance, that is whether borrowers pay the money back on time.III.DataIn this section, the loan applicants' data is first described, followed by loan distribution based on loan purposes, credit grade and loan status and it ends with thedetailed descriptive statistics of the loan applicants. This study uses 61 451 loan applications in the Lending Club from May 2007 to June 2012 obtained from . Over the study period, the Lending Club lent about $713 million to borrowers. To address the borrowers' behaviour in online P2P lending, we first examine the main reasons for borrowing money from others. Table 1 lists the borrowers' self-claimed reasons summarized in the Lending Club. Almost 70% of loan requested are related to debt consolidation or credit card debts with a total loan amount requested of approximately $387 million and $108 million, respectively. The number of loan applications for education, renewable energy and vacation contribute less than 1% of total loans with the total loan requested ranging from 1 to 3 million. The borrowers state that their preferences to borrow from the Lending Club are lower borrowing rate and inability to borrow enough money from credit cards. The second purpose for borrowing is to pay home mortgage or to re-model home.Table 1. Loan distributions by loan purpose (May 2007–June 2012)Notes: The data is obtained from 61 451 loan applicants in the Lending Club, , from May 2007 to June 2012.The loan-seeking persons are asked to provide the reasons for requesting loans.The Lending Club uses the borrower's FICO credit scores along with other information to assign a loan credit grade ranging from A1 to G5 in descending credit ranks to each loan. The detailed procedure is as follows: after assigning a base score based on FICO ratings, the Lending Club makes some adjustments depending on requested loan amount, number of recent credit inquiries, credit history length, total open credit account, currently open credit accounts and revolving line utilization todetermine the final grade, which in turn determines the interest rate on the loan.Table 2 reports the loan distribution by credit grade. The majority of borrowing requests have grades between A1 and E5. The Highest loan amounts requested are from borrowers with ‘B' credit grade, which contribute 29.56% of total amount of loans requested. The total number of applicants for this ‘B' credit grade group is 18 707, which represents total loans of approximately $210 million. The lowest loan amounts requested are from borrowers with the lowest ‘G' credit grade which accounts for 1.53% of total loans. There are only 608 loan applicants for this lowest credit rating ‘G' group and it represents approximately $11 million in total loan value. According to the Lending Club's policy, a loan credit grade is used to determine the interest rate and the maximum amount of money that a borrower can request. The higher the loan grade, the lower the interest rate. A borrowing request with a low grade renders a higher interest rate as a compensation for a high risk held by lenders. Table 2. Loans distribution by credit grades (May 2007–June 2012)Notes: The Lending Club uses the borrowers’ FICO credit scores along with other information to classify a loan from Grade A1 to G5 in descending credit risk. Therefore, A1 credit grade represents the highest credit quality/low-risk borrowers, whereas G5 credit grade represents the lowest credit quality/ high-risk borrowers. Total amount of loans requested as a percentage of total loan is 19.35% for credit grade group ‘A’, 29.56% for ‘B’, 19.94% for ‘C’, 14.84% for ‘D’, 10.15% for ‘E’, 4.59% for ‘F’ and 1.53% for ‘G’.Finally, Panel A of Table 3 shows the loan status for all the loan requests on 20 July 2012. Overall, the default rate is 4.60% with total losses of approximately $29 million. Another 2.45% of total loan requests which constitute $18.6 million could be potentially lost because the borrowers are late in making payment within 30 days or 120 days and not paying the normal instalments. 17.98% of the loans are fully paid with an approximate value of $108 million. The $557 million loans are in current status account for 74.91% of total loans. Naturally, loans with a lower grade demonstrate a higher default rate. Therefore, study on risk management on P2P lending is relevant for the lenders to optimize their investment portfolios. Panel B of Table 3 reports the loan status for the matured loans. The overall loss rate is much higher for matured loans. Among 4904 matured loans, 914 loans are charged-off, which represent 18.6%. The total loss is $5.5 million which represents 13% of all matured loans amount. Less than 1% of the matured loans are late in terms of making payment with the unpaid balance of approximately $27 000. 80.77% or $33 million of matured loans are fully paid.Table 3. Loan distribution by the loan status (May 2007–June 2012)Table 4 reports the general characteristics and credit history of the online P2P loan applicants from the Lending Club. Based on our sample of 61 451 loanapplicants, the average monthly interest charged on a loan is 12.34%. On average, 471 days passed from the issue date of the loan. The average credit grade of a borrower is 25, which corresponds to credit category between B and C. The average size of a typical loan is $11 604 and the average monthly payment is $351. The borrower in general pays back $4384 a month and has $7873 left to be paid. The average ratio of the remaining balance to total loans is 63%.Examining the borrowers' characteristics, it shows that the mean income of a borrower from the Lending Club is $5796 with the debts to income ratio of 0.1381. On average, a borrower has 9.56 open credit lines and 22 total credit lines, carries $14 315 average revolving credit balance and almost half (51.6%) of his or her credit limit. In the last six months, there is 1 credit inquiry requested by an average borrower. Average FICO score category of a typical borrower is 3.48, which corresponds to a FICO score between 680 and 750.Table 4. Descriptive statistics (May 2007–June 2012)Notes: Credit Grade is the grade assigned by the Lending Club based on the FICOrano credit rating information along with other information. Credit Grade ‘1’ is the loan category of ‘G’ which is the riskiest class of loans. Credit Grade ‘7’ is the loan category of ‘A’ which is the lowest risk borrowers. FICOrano is the credit rating of the borrowers rated by credit card companies. FICO 6 corresponds to borrowers with the FICO score above 780, FICO 5 corresponds to FICO score between 750–779, FICO 4 = 714–749, FICO 3 = 679–713, FICO 2 = 660–678 and FICO 1 = 640–659, respectively.IV.ConclusionsCredit risk is an important concern for the P2P loans. This study employs the data from the Lending Club to evaluate the credit risk of the P2P online loans. We findthat credit score, debt-to-income ratio, FICO score and revolving line utilization play an important role in determining loan default. The credit categorization used by the Lending Club successfully predicts the default probability with one exception of next lowest credit grade ‘F'. In general, higher credit grade loan is associated with lower default risk.The mortality risk also increases with the maturity of the loans. Loans with lower credit grade and longer duration are associated with high mortality rate. The Cox Proportional Hazard Test results show that as the credit risk of the borrowers increases, so does the likelihood of loan being default. However, the higher interest rate currently charged for the riskier borrower is not significant enough to justify the higher default probability. This suggests that the lenders would be better off to lend only to the safest borrowers in the highest grade category of 7 or Grade A. Increasing spreads on riskier borrower may lead to a more severe adverse selection resulting in higher default risk.The Lending Club lenders should either extend credits only to the highest grade borrower or try to find more creative ways to lower the default rate among current borrowers. When comparing with the US national consumers, borrowers with relatively higher income and potentially higher FICO scores do not participate in the P2P market. Creating incentives to attract these types of borrowers would have a significant potential to decrease the default risk in this market.中文译文:点对点(P2P)网络借贷的信用风险与贷款绩效评估摘要近年来点对点(P2P)网络借贷开始兴起。

小微企业融资外文文献翻译

小微企业融资外文文献翻译

小微企业融资外文文献翻译小微企业融资外文文献翻译(文档含中英文对照即英文原文和中文翻译)原文:Micro Enterprise Finance in Uganda: Path Dependence and Other and Determinants of Financing DecisionsDr. Winifred Tarinyeba- KiryabwireAbstractAccess to finance literature in developing countries focuses onaccess to credit constraints of small and medium enterprises (SMEs) micro enterprises because they are considered the drivers of economic growth. However, in low income countries, micro enterprises play a much more significant role than SMEs because of their contribution to non-agricultural self-employment. The predominant use of informal credit rather than formal credit shows that the manner in which micro enterprises are formed and conduct their businesses favors the former over the latter. In addition, other factors such as lengthy credit application procedures, negative perceptions about credit application processes make informal credit more attractive. On the other hand specific factors such as business diversification, the need to acquire business inputs or assets than cannot be obtained using supplier credit are associated with a tendency to use formal credit.IntroductionIt well established that in markets where access to credit is constrained, it is the smaller businesses that have the most difficulty accessing credit. Various policy interventions have been made to improve access to credit including reforming the information and contractual frameworks, macro-economic performance, competitiveness in the financial system, and regulatory frameworks that enablefinancial institutions to develop products for SMEs such as leasing and factoring. Over the past ten years, policy makers in developing and low income countries have focused on microfinance as an intervention to bridge the access to credit gap and improve access to credit for those than cannot obtain credit from mainstream financial institutions such as commercial banks. However, despite, the use of what are often termed as “innovative lending” methods that are designed to ease access to credit, such as use of group lending and other collateral substitutes, micro enterprises continue to rely heavily on informal finance as opposed to formal credit. While other studies have focused broadly on factors that inhibit access to credit, this article seeks to throw some light on specific characteristics of micro enterprises that make them more inclined to use informal credit, as well as specific factors that are more associated with use of formal credit. The former are what I term as path dependence factors.The majority of micro enterprises operate as informally established sole proprietorships. This finding is consistent with the literature on micro enterprises, particularly the fact that they operate in the informal sector. However, nearly all of the enterprises had some form of trading license issued by the local government of the area in whichthey operate. The license identifies the owner of the business and its location, and is renewable every financial year. Most respondents did not understand the concept of business incorporation and thought that having a trading license meant that they were incorporated. Several factors can be attributed to the manner in which micro enterprises are established. First, proprietors generally understand neither the concept of incorporation nor the financial and legal implications of establishing a business as a legal entity separate from its owner. Second, the majority of micro enterprises start as spontaneous business or economic opportunities, rather than as well-thought out business ventures, particularly businesses that operate by the road side, or in other strategic areas, such as telephone booths that operate along busy streets. The owners are primarily concerned with the economic opportunity that the business presents rather than with the formalities of establishing the business. Third, rule of law issues also explain the manner in which businesses generally are established and financed. Although a mechanism exists for incorporating businesses in Uganda, the process and the legal and regulatory burdens, associated with formalizing a business, create costs that, in most cases, far outweigh the benefits or even the economic opportunity created by the business.Commenting on the role of law in determining the efficiency of the economic activities it regulates, Hernando De Soto argues that if laws impede or disrupt economic efficiency, they not only impose unnecessary costs of accessing and remaining in the formal system, but costs of operating informally as well. The former include the time and cost of registering a business, taxes and complying with bureaucratic procedures. On the other hand, the costs of informality include costs of avoiding penalties, evading taxes and labor laws and costs that result from absence of good laws such as not inadequate property rights protection, inability to use the contract system, and inefficiencies associated with extra contractual law.Businesses in Uganda are registered by the Registrar of Companies under the Company’s Act. The office of the Registrar of Companies is located in the capital city of Kampala and this imposes a burden on businesses that operate in other parts of the country that would wish to be registered. However, remoteness of the business registration office was not the primary inhibitor because the tendency not to register was as pronounced in businesses close to the registration office, as it was in those that were remotely placed. In addition, the following fees are required to incorporate a company: a name search andreservation fee of Ugshs. 25,000 ($12.50), stamp duty of 0.5% of the value of the share capital, memorandum and articles of association registration fee of Ugshs. 35,000 ($17.5), and a registration fee ranging from Ugshs. 50,000 to 4,000,000 ($25 to 2000).Legal systems characterized by low regulatory burden, shareholder and creditor rights protection, and efficient bankruptcy processes are associated with incorporated businesses and increased access to finance. On the other hand, inadequate legal protection is associated with limited business incorporation, low joint entrepreneurial activity, and higher financing obstacles. These impediments are what De Soto refers to as the mystery of legal failure. He argues that although nearly every developing and former communist nation has a formal property system, most citizens cannot gain access to it and their only alternative is to retreat with their assets into the extra legal sector where they can live and do business.译文乌干达小微企业融资路径依赖和融资的决定性因素Dr. Winifred Tarinyeba- Kiryabwire摘要通过查阅发展中国家的金融文献,我们往往可以发现由于中小企业是推动发展中国家经济增长的主要动力源,其金融问趣则主要侧重于中小企业的融资受限方面。

网络金融风险中英文对照外文翻译文献

网络金融风险中英文对照外文翻译文献

网络金融风险中英文对照外文翻译文献网络金融风险中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:How to guard against financial risks networkFirst, the definition of network financeNetwork Finance is a computer network for the technical support of the financial activities and related activities in general, is a network of information technology and product of the combination of modern finance, but it is not a simple combination of the two, but a financial industry and even all industries An operating mechanism, is the future of enterprise system development. Narrowly understood, refers to the financial network of financial service providers based on the host to the Internet or communications network for the media, through the financial data and business processes embedded software platform, user interface terminal mode of operation of the new financial ; from a broad understanding of the concept of network finance their mode of operation also includes matching network of financial institutions, networks and related financial markets, regulatory and other external environment. Including: e-money, online banking, online payment, network security and network insurance.Second, the network of financial riskNetwork mainly engaged in the financial settlement of electronic money and electronic virtual financial services, in addition to traditional financial activities which exist in the process of credit risk, liquidity risk, interest raterisk, currency risk and market risk, from a technical, businessand legal perspective, There are the following specific risks:1. Technology risk(1) hacker attacks. The operation of the network must rely on financial transactions, computer and Internet, all transactions are stored in the computer, the transmission of online information is easy to become a large network of "hacker" attack. In addition, Web access is a form of Internet service, is also a network of financial institutions trading and services platform, but it depends on TCP / IP protocol, there are many security vulnerabilities. This gives hackers broke into financial institutions through the network to create the conditions for the system. Hackers only need to use loopholes in the system itself, "only need to modify a few settings " you can allow financial institutions to a standstill.(2) technology selection risk. To carry out financial business networks, they must choose a proven technology solutions to support. Once there is choice, there will be a result of selection for the same mistakes which led to the risk. One possibility is to choose the technology system and client terminal software compatibility due to poor speed of information transmission interruption or reduction, another risk is that of technical alternatives have been eliminated, resulting in relatively backward technology, the network out of date, leading to enormous technical and Lossof business opportunities. Financial terms of the network, technology choice may lose all of the market failure, or even lose the basis for survival.2. Business risks.(1) operational risk. Operational risk from the system reliability, stability and security caused major defects in thepossibility of potential loss may come from the negligence of online financial customers, may also come from the financial security system network and its products, design flaws and operational errors . Operational risk relates primarily to authorize the use of online financial accounts, the network of financial risk management systems, networks, financial institutions and the exchange of information among customers, true and false recognition of electronic money.(2) the risk of market signals. Market risk is due to signal asymmetric information network of financial institutions led to the face of adverse selection and moral hazard arising from business risks. Such as Internet banking customers can not identify the risk level of the Internet at a disadvantage, online customers may use their hidden information and action to make the network to their advantage at the expense of the interests of the decision-making banks and leaving because of adverse public comment on Internet Banking Risk of losing customers and sources of funding risks.(3) credit risk. Reputation risk is the network of financial institutions can not create good customer relations, can not establish their own good reputation, and thus can not engage in financial business. Once the virtualnetwork of financial institutions to provide financial services can not achieve the expected level of the public, or adverse reactions in the community, or network security system of financial institutions have been destroyed to forma network of financial credit risk.3. Legal risks. The legal risks of financial networks, mainly from two aspects: First, violation of relevant laws, regulations and system requirements, and online transactions failed to complywith the provisions of the relevant rights and obligations. These laws and regulations, including consumer protection laws, financial disclosure system, privacy protection, intellectual property protection law and currency system. Second, the lack of network financial law. China Internet Finance still in its infancy, is still quite a lack of appropriate laws and regulations. Therefore, using the Internet to provide or receive financial services, signed an economic contract rights and obligations in the face considerable legal risk, vulnerable to undue disputes, not only increase the cost of online financial transactions, and even affect the Development of the financial health of the network.Third, improve the network to prevent and control financial risks Point of the network of financial risks, involving a wide range of interests, it is necessary to perfect legal environment, strengthening access management, a sound regulatory system, adjust the regulatory strategy and other aspects, a multi-pronged, comprehensive treatment.1. Improve the legal system.(1) legislative efforts to increase the network of financial, clear the network of financial rights and obligations of relevant subjects.(2) to develop rules of fair trade network. In the identification and validation of digital signatures, transactions preservation of evidence, the transaction and both parties share responsibility for the protection of personal information of consumers to make detailed provisions to ensure transaction security, digital evidence when disputes arise and transactions in a real and effective personal Privacy.2. Enhanced market access management.(1) The status of the technology infrastructure as one of theconditions of market access. Financial services applications for operating the network of financial institutions not only a considerable scale of network equipment, but also need to have confirmed the legality of trading partners, to prevent tampering with trading information and prevent information leakage and other aspects of key technologies.(2) to develop rigorous internal control system. Publicity for the network of financial services, information disclosure, and system design have institutional arrangements, the establishment of a network of financial institutions or a new business, the must have sound risk identification, identification, management, risk cover and disposal programs.(3) to develop and improve the types of transactions operating procedures. Applications to open accounts for customers, customerauthorization statement, the general development of trading procedures, rules to prevent illegal trading and online financial transaction system against criminal activities.(4) the implementation of the network type of financial business management. Development of classification standards, banking and financial services capabilities and the ability to credit rating, thus a variety of services on the network to carry out the financial restrictions and permits.3. Improve the regulatory system.(1) improve the network of financial risk monitoring systems. The establishment of "national (network) Financial Risk Management Committee."(2) to strengthen collaborative supervision. "Committee" of the member units and other relevant regulatory authorities to share information resources among each other and opening uptheir own information database, and regularly informed of their supervision, promote joint supervision, supervision of financial risks to improve network accuracy and timeliness.(3) to strengthen international cooperation in financial supervision network. Meanwhile, the network with international cooperation in financial supervision to strengthen the network of bank borrowing way illegal tax evasion, money laundering and other acts, the way the use of Internet banking transnational smuggling, illegal arms trafficking activities such as arms and drug trafficking, illegal attack on the use of Internet banking othersites internet bank hackers, and other international criminal activities a full range of monitoring, the formation of the network can effectively protect the financial health of the global network operations and is responsible for the supervision of the financial system.4. Adjust the control strategy.(1) and improve the modernization level of financial supervision network. In the practice, we should have complete control of the network of financial institutions to improve the business operation of the network capacity and the forecast level of financial risk, and enhance macro-control of the systematic and forward-looking, but also to strengthen financial supervision and standardization of network construction, improve the network of financial supervision modern and scientific level.(2) improve the network of financial and non-site inspection of the site content system. On-site inspection should focus on the technical elements to be checked.(3) the establishment of mandatory information disclosure system. Follow the "open, fair and just" principle, developmentof financial services than the traditional more stringent information disclosure rules, norms, disclosure of the content, format, frequency and responsibilities and so on, through the financial statements, disclosure of the online publicity and other means of financial networks business information.(4) Innovative forms of regulation. Take full advantage of informationsuperiority, the establishment of real-time tracking and monitoring systems, strengthen monitoring, while also taking on the network "rules, patrol checks," the way the operational status of the network and whether the financial "irregularities" carry out spot checks found that, in a timely manner to correct or take punitive measures.5. Building security system.(1) accelerate research and development with China's own intellectual property rights of advanced information technology. Including computer equipment, communications equipment, system software, encryption algorithms, from the protection of national financial security and national economic security perspective to improve network security.(2) improving the network operating environment. Computer networks and centers to strengthen the management of the engine room, increase physical security measures for computer input, and enhance computer systems of key technologies and key equipment against attacks, anti-virus capabilities, maintenance of computer hardware security, ensure network banks rely on network hardware The normal operation of the environment safe.(3) secure access. On the one hand through the network of physical and logical isolation means isolation, and physicalresources to unauthorized users isolated from each other, on the other hand through the application ofthe authentication and grading systems such as login authorization to restrict access to unauthorized users.。

中小企业融资中英文对照外文翻译文献

中小企业融资中英文对照外文翻译文献

中小企业融资中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:Financing of SMEsJan Bartholdy, Cesario MateusOriginally Published in“Financing of SMEs”.London business review.AbstractThe main sources of financing for small and medium sized enterprises (SMEs) are equity, trade credit paid on time, long and short term bank credits, delayed payment on trade credit and other debt. The marginal costs of each financing instrument are driven by asymmetric information and transactions costs associated with nonpayment. According to the Pecking Order Theory, firms will choose the cheapest source in terms of cost. In the case of the static trade-off theory, firms choose finance so that the marginal costs across financing sources are all equal, thus an additional Euro of financing is obtained from all the sources whereas under the Pecking Order Theory the source is determined by how far down the Pecking Order the firm is presently located. In this paper, we argue that both of these theories miss the point that the marginal costs are dependent of the use of the funds, and the asset side of the balance sheet primarily determines the financing source for an additional Euro. An empirical analysis on a unique dataset of Portuguese SME’s confirms that the composition of the asset side of the balance sheet has an impact of the type of financing used and the Pecking OrderTheory and the traditional Static Trade-off theory are For SME’s the main sources of financing are equity (internally generated cash), trade credit, bank credit and other debt. The choice of financing is driven by the costs of the sources which is primarily determined by costs of solving the asymmetric information problem and the expected costs associated with non-payment of debt. Asymmetric information costs arise from collecting and analysing information to support the decision of extending credit, and the non-payment costs are from collecting the collateral and selling it to recover the debt. Since SMEs’ management and shareholders are often the same person, equity and internally generated funds have no asymmetric information costs and equity is therefore the cheapest source.2. Asset side theory of SME financingIn the previous section we have suggested that SME’s in Portugal are financed using internal generated cash, cheap trade credits, long and short-term bank loans and expensive trade credits and other loans. In this section the motives behind the different types of financing are discussed.2.1. Cheap Trade creditsThe first external financing source we will discuss is trade-credits. Trade credits are interesting since they represent financial services provided by non-financial firms in competition with financialintermediaries. The early research within this area focused on the role of trade credits in relation to the credit channel or the so called “Meltzer” effect and in relation to the efficiency of monetary policy. The basic idea is that firms with direct access to financial markets, in general large well known firms, issue trade credits to small financially constrained firms . The more recent research breaks the role of trade credits into a strategic motive and financial motive for issuing and using these credits.Strategic motivesThe first theory centers on asymmetric information regarding the firm’s products. Trade credits are offered to the buyers so that the buyer can verify the quantity and quality before submitting payments. By offering trade finance the supplier signals to the buyers that they offer products of good quality. Since small firms, in general, have no reputation then these firms are forced to use trade credits to signal the quality of their products. The use of trade credits is therefore driven by asymmetric information of the products and is therefore more likely to be used by small firms, if the buyer has little information about the supplier, or the products are complicated and it is difficult to asses their quality.The second strategic motive is pricing. Offering trade finance on favorable terms is the same as a price reduction for the goods. Thus firms can use trade credits to promote sales without officially reducing prices or use them as a tool for price discrimination between different buyers.Trade credits are most advantageous to risky borrowers since their costs of alternative financing are higher than for borrowers with good credit ratings. Thus trade credits can be used as tool for direct price discrimination but also as an indirect tool (if all buyers are offered the same terms) in favor of borrowers with a low credit standing.Trade credits are also used to develop long term relationships between the supplier and the buyers. This often manifests itself by the supplier extending the credit period in case the buyer has temporary financial difficulties. Compared to financial institutions suppliers have better knowledge of the industry and are therefore better able to judge whether the firm has temporary problems or the problems are of a more permanent nature.The last motive in not strictly a strategic motive but is based on transactions costs. Trade credits are an efficient way of performing the transactions since it is possible to separate between delivery and payment. In basic terms the truck drive r delivering the goods does not have to run around to find the person responsible for paying the bills. The buyer also saves transactions costs by reducing the amount of cash required on“hand” .Financing motivesThe basis for this view is that firms compete with financial institutions in offering credit to other firms. The traditional view offinancial institutions is that they extend credit to firms where asymmetric information is a major problem. Financial institutions have advantages in collecting and analyzing information from, in particular, smaller and medium sized firms that suffer from problems of asymmetric information. The key to this advantage over financial markets lies in the close relationship between the bank and the firm and in the payment function. The financial institution is able to monitor the cash inflow and outflows of the firm by monitoring the accounts of the firm.But with trade credits non-financial firms are competing with financial institutions in solving these problems and extending credit. How can non-financial institutions compete in this market? Petersen and Rajan [1997] briefly discusses several ways that suppliers may have advantages over financial institutions. The supplier has a close working association with the borrower and more frequently visit s the premises than a financial institution does. The size and timing of the lenders orders with the supplier provides information about the conditions of the borrowers business. Notice that this information is available to the supplier before it is available to the financial institution since the financial institution has to wait for the cash flow associated with the orders. The use of early payment discounts provides the supplier with an indication of problems with creditworthiness in the firm. Again the supplier obtains the information before the financial institution does. Thus the supplier maybe able to obtain information about the creditworthiness faster and cheaper than the financial institution.The supplier may also have advantages in collecting payments. If the supplier has at least a local monopoly for the goods then the ability to withhold future deliveries is a powerful incentive for the firm to pay. This is a particular powerful threat if the borrower only accounts for a small fraction of the suppliers business. In case of defaults the supplier can seize the goods and in general has a better use for them than a financial intermediary sizing the same goods. Through its sales network the supplier can sell the reclaimed goods faster and at a higher price than what is available to a financial intermediary. These advantages, of course, depend on the durability of the goods and how much the borrower has transformed them.If asymmetric information is one of the driving forces the explanation of trade credits then firms can use the fact that their suppliers have issued them credits in order to obtain additional credit from the banks. The banks are aware that the supplier has better information thus the bank can use trade credits as signal of the credit worthiness of the firm.That trade credits are in general secured by the goods delivered also puts a limit on the amount of trade credits the firm can obtain, thus the firm cannot use trade credits to finance the entire operations of the firm.In summary the prediction is that the level of asymmetric information is relatively low between the providers of trade credit and the borrowers due to the issuer’s general knowledge of the firm and the industry. In the empirical work below the variables explaining the use of trade credit are credit risk factors and Cost of Goods Sold. Since these trade credits are secured by the materials delivered to the firm, firms cannot “borrow” for more than the delivery value of the goods and services.2.2 Bank loansBanks have less information than providers of trade credit and the costs of gathering information are also higher for banks than for providers of trade credit. Providers of trade credits also have an advantage over banks in selling the collateral they have themselves delivered, but due to their size and number of transactions banks have an advantage in selling general collateral such as buildings, machinery etc. Banks therefore prefer to issue loans using tangible assets as collateral, also due to asymmetric information, they are less likely to issue loans to more opaque firms such as small and high growth firms. Banks are therefore willing to lend long term provided that tangible assets are available for collateral. In the empirical work below tangible assets and credit risk variables are expected to explain the use of long-term bank loans and the amount of long-term bank loans are limited by the value of tangibleassets.The basis for issuing Short Term Bank Loans is the comparative advantages banks have in evaluating and collecting on accounts receivables, i.e. Debtors. It is also possible to use Cash and Cash equivalents as collateral but banks do not have any comparative advantages over other providers of credit in terms of evaluating and collecting these since they consist of cash and marketable securities. In terms of inventories, again banks do not have any comparative advantages in evaluating these. Thus, we expect the amounts of debtors to be the key variable in explaining the behaviour of Short Term Bank Loans.ConclusionsCurrently there exist two theories of capital structure The Pecking Order Theory where firms first exhaust all funding of the cheapest source first, then the second cheapest source and so on. The differences in funding costs are due to adverse selection costs from asymmetric information. The second theory is the Tradeoff Theory where firms increase the amount of debt as long as the benefits are greater than the costs from doing so. The benefits of debt are tax-shields and “positive agency costs” and the costs of debt are the e xpected bankruptcy costs and the “negative agency costs”. In both of these theories, the composition of the asset side of the balance sheet is not important and in this paper, thatproposition is strongly rejected. So the main conclusion is that the composition of the asset side of the balance sheet influences the composition of the liability side of the balance sheet in terms of the different types of debt used to finance the firm, or that the use of the funds is important in deciding the type of financing available.We further argue that it is asymmetric information and collateral that determines the relationship between the asset side and liability side of the balance sheet. The theory works reasonable well for Cheap Trade Credits and Long Term Bank Loans but the tests for Short Term Bank Loans are disappointing.译文:中小企业融资摘要中小企业融资的主要来源有:股权融资、按时兑现的贸易信贷融资、中长期银行信贷融资、延迟兑现的贸易信贷融资以及其他债务融资,每种融资方式的边际成本取决于与其滞纳金相关的信息不对称成本和交易成本。

P2P互联网金融外文翻译文献

P2P互联网金融外文翻译文献

P2P互联网金融外文翻译文献随着信息技术的迅猛发展,互联网金融作为一种新兴的金融模式在全球范围内迅速崛起。

P2P 互联网金融作为其中的重要组成部分,引起了广泛的关注和研究。

本文旨在对相关的外文文献进行翻译和梳理,以加深对 P2P 互联网金融的理解。

P2P 互联网金融,即 peertopeer lending,是指个人通过互联网平台向其他个人或企业提供贷款的一种金融模式。

与传统金融机构不同,P2P 平台主要依靠互联网技术和大数据算法来实现借贷双方的匹配和风险管理。

在众多外文文献中,学者们对 P2P 互联网金融的发展历程、特点、优势和风险进行了深入的探讨。

一些研究指出,P2P 互联网金融的出现打破了传统金融机构的垄断,为投资者提供了更多的投资选择,同时也为借款人提供了更便捷、高效的融资渠道。

例如,在某些国家,由于传统银行贷款审批流程繁琐、门槛较高,许多中小企业和个人难以获得资金支持。

而 P2P 平台通过简化审批流程、降低门槛,使得这些群体能够更容易地获得所需资金,从而促进了经济的发展。

然而,P2P 互联网金融也并非完美无缺。

一方面,由于缺乏有效的监管和规范,一些 P2P 平台存在欺诈、跑路等风险,给投资者带来了巨大的损失。

另一方面,P2P 平台的信用评估体系尚不完善,难以准确评估借款人的信用风险,从而增加了平台的坏账率。

此外,网络安全问题也是P2P 互联网金融面临的一大挑战。

一旦平台遭受黑客攻击,用户的个人信息和资金安全将受到严重威胁。

为了应对这些风险和挑战,国外的一些研究提出了相应的对策和建议。

首先,政府应加强对 P2P 互联网金融的监管,建立健全相关法律法规,明确平台的准入标准和运营规范。

其次,P2P 平台应加强自身的风险管理能力,完善信用评估体系,提高风险识别和控制能力。

同时,平台还应加大对网络安全的投入,采取有效的安全措施保障用户的信息和资金安全。

在对 P2P 互联网金融的研究中,国外学者还运用了多种研究方法和模型。

中小企业融资外文文献翻译

中小企业融资外文文献翻译

外文文献:Financing of SMEsAbstractThe main sources of financing for small and medium sized enterprises (SMEs) are equity, trade credit paid on time, long and short term bank credits, delayed payment on trade credit and other debt. The marginal costs of each financing instrument are driven by asymmetric information and transactions costs associated with nonpayment. According to the Pecking Order Theory, firms will choose the cheapest source in terms of cost. In the case of the static trade-off theory, firms choose finance so that the marginal costs across financing sources are all equal, thus an additional Euro of financing is obtained from all the sources whereas under the Pecking Order Theory the source is determined by how far down the Pecking Order the firm is presently located. In this paper, we argue that both of these theories miss the point that the marginal costs are dependent of the use of the funds, and the asset side of the balance sheet primarily determines the financing source for an additional Euro. An empirical analysis on a unique dataset of Portuguese SME’s confirms that the composition of the asset side of the balance sheet has an impact of the type of financing used and the Pecking Order Theory and the traditional Static Trade-off theory are rejected.For SME’s the main sources of financing are equity (internally generated cash), trade credit, bank credit and other debt. The choice of financing is driven by the costs of the sources which is primarily determined by costs of solving the asymmetric information problem and the expected costs associated with non-payment of debt. Asymmetric information costs arise from collecting and analysing information to support the decision of extending credit, and the non-payment costs are from collecting the collateral and selling it to recover the debt. Since SMEs’ managementand shareholders are often the same person, equity and internally generated funds have no asymmetric information costs and equity is therefore the cheapest source.2. Asset side theory of SME financingIn the previous section we have suggested that SME’s in Portugal are financed using internal generated cash, cheap trade credits, long and short-term bank loans and expensive trade credits and other loans. In this section the motives behind the different types of financing are discussed.2.1. Cheap Trade creditsThe first external financing source we will discuss is trade-credits. Trade credits are interesting since they represent financial services provided by non-financial firms in competition with financial intermediaries. The early research within this area focused on the role of trade credits in relation to the credit channel or the so called “Meltzer” effect and in relation to the efficiency of monetary policy. The basic idea is that firms with direct access to financial markets, in general large well known firms, issue trade credits to small financially constrained firms . The more recent research breaks the role of trade credits into a strategic motive and financial motive for issuing and using these credits.Strategic motivesThe first theory centers on asymmetric information regarding the firm’s products. Trade credits are offered to the buyers so that the buyer can verify the quantity and quality before submitting payments. By offering trade finance the supplier signals to the buyers that they offer products of good quality. Since small firms, in general, have no reputation then these firms are forced to use trade credits to signal the quality of their products. The use of trade credits is therefore driven by asymmetric information of the products and is therefore more likely to be used by small firms, if the buyer has little information about the supplier, or the products are complicated and it is difficult to asses their quality.The second strategic motive is pricing. Offering trade finance on favorable terms is the same as a price reduction for the goods. Thus firms can use trade credits to promote sales without officially reducing prices or use them as a tool for pricediscrimination between different buyers. Trade credits are most advantageous to risky borrowers since their costs of alternative financing are higher than for borrowers with good credit ratings. Thus trade credits can be used as tool for direct price discrimination but also as an indirect tool (if all buyers are offered the same terms) in favor of borrowers with a low credit standing.Trade credits are also used to develop long term relationships between the supplier and the buyers. This often manifests itself by the supplier extending the credit period in case the buyer has temporary financial difficulties. Compared to financial institutions suppliers have better knowledge of the industry and are therefore better able to judge whether the firm has temporary problems or the problems are of a more permanent nature.The last motive in not strictly a strategic motive but is based on transactions costs. Trade credits are an efficient way of performing the transactions since it is possible to separate between delivery and payment. In basic terms the truck drive r delivering the goods does not have to run around to find the person responsible for paying the bills. The buyer also saves transactions costs by reducing the amount of cash required on“hand” .Financing motivesThe basis for this view is that firms compete with financial institutions in offering credit to other firms. The traditional view of financial institutions is that they extend credit to firms where asymmetric information is a major problem. Financial institutions have advantages in collecting and analyzing information from, in particular, smaller and medium sized firms that suffer from problems of asymmetric information. The key to this advantage over financial markets lies in the close relationship between the bank and the firm and in the payment function. The financial institution is able to monitor the cash inflow and outflows of the firm by monitoring the accounts of the firm.But with trade credits non-financial firms are competing with financial institutions in solving these problems and extending credit. How can non-financial institutions compete in this market? Petersen and Rajan [1997] briefly discussesseveral ways that suppliers may have advantages over financial institutions. The supplier has a close working association with the borrower and more frequently visit s the premises than a financial institution does. The size and timing of the lenders orders with the supplier provides information about the conditions of the borrowers business. Notice that this information is available to the supplier before it is available to the financial institution since the financial institution has to wait for the cash flow associated with the orders. The use of early payment discounts provides the supplier with an indication of problems with creditworthiness in the firm. Again the supplier obtains the information before the financial institution does. Thus the supplier may be able to obtain information about the creditworthiness faster and cheaper than the financial institution.The supplier may also have advantages in collecting payments. If the supplier has at least a local monopoly for the goods then the ability to withhold future deliveries is a powerful incentive for the firm to pay. This is a particular powerful threat if the borrower only accounts for a small fraction of the suppliers business. In case of defaults the supplier can seize the goods and in general has a better use for them than a financial intermediary sizing the same goods. Through its sales network the supplier can sell the reclaimed goods faster and at a higher price than what is available to a financial intermediary. These advantages, of course, depend on the durability of the goods and how much the borrower has transformed them.If asymmetric information is one of the driving forces the explanation of trade credits then firms can use the fact that their suppliers have issued them credits in order to obtain additional credit from the banks. The banks are aware that the supplier has better information thus the bank can use trade credits as signal of the credit worthiness of the firm.That trade credits are in general secured by the goods delivered also puts a limit on the amount of trade credits the firm can obtain, thus the firm cannot use trade credits to finance the entire operations of the firm.In summary the prediction is that the level of asymmetric information is relatively low between the providers of trade credit and the borrowers due to theissuer’s general knowledge of the firm and the ind ustry. In the empirical work below the variables explaining the use of trade credit are credit risk factors and Cost of Goods Sold. Since these trade credits are secured by the materials delivered to the firm, firms cannot “borrow” for more than the delive ry value of the goods and services.2.2 Bank loansBanks have less information than providers of trade credit and the costs of gathering information are also higher for banks than for providers of trade credit. Providers of trade credits also have an advantage over banks in selling the collateral they have themselves delivered, but due to their size and number of transactions banks have an advantage in selling general collateral such as buildings, machinery etc. Banks therefore prefer to issue loans using tangible assets as collateral, also due to asymmetric information, they are less likely to issue loans to more opaque firms such as small and high growth firms. Banks are therefore willing to lend long term provided that tangible assets are available for collateral. In the empirical work below tangible assets and credit risk variables are expected to explain the use of long-term bank loans and the amount of long-term bank loans are limited by the value of tangible assets.The basis for issuing Short Term Bank Loans is the comparative advantages banks have in evaluating and collecting on accounts receivables, i.e. Debtors. It is also possible to use Cash and Cash equivalents as collateral but banks do not have any comparative advantages over other providers of credit in terms of evaluating and collecting these since they consist of cash and marketable securities. In terms of inventories, again banks do not have any comparative advantages in evaluating these. Thus, we expect the amounts of debtors to be the key variable in explaining the behaviour of Short Term Bank Loans.2.3. Expensive trade credit and other loansAfter other sources of finance have been exhausted firms can delay payment on their trade credits. However, this is expensive since it involves giving up the discount and maybe incurs penalty payments. Also the use of this type of credit can havereputational costs and it may be difficult to obtain trade credit in the future. The nature of the costs, of course, depends on the number of suppliers, if there is only one supplier then these costs can be rather high whereas if the firm can obtain the same goods and services from other suppliers then these costs are not particularly high.Other debt is composed of credit card debt, car loans etc. that are dearer than bank loans. Again, the variables determining this type of debt are financial health and performance. Below, however, we do not have any good information regarding these types of loans and what they consists of thus we pay little attention to them in the empirical work.ConclusionsCurrently there exist two theories of capital structure The Pecking Order Theory where firms first exhaust all funding of the cheapest source first, then the second cheapest source and so on. The differences in funding costs are due to adverse selection costs from asymmetric information. The second theory is the Tradeoff Theory where firms increase the amount of debt as long as the benefits are greater than the costs from doing so. The benefits of debt are tax-shields and “positive agency costs” and the costs of debt are the expected bankruptcy costs and the “negative agency costs”. In both of these theories, the composition of the asset side of the balance sheet is not important and in this paper, that proposition is strongly rejected. So the main conclusion is that the composition of the asset side of the balance sheet influences the composition of the liability side of the balance sheet in terms of the different types of debt used to finance the firm, or that the use of the funds is important in deciding the type of financing available.We further argue that it is asymmetric information and collateral that determines the relationship between the asset side and liability side of the balance sheet. The theory works reasonable well for Cheap Trade Credits and Long Term Bank Loans but the tests for Short Term Bank Loans are disappointing.中文译文:中小企业融资摘要中小企业融资的主要来源有:股权融资、按时兑现的贸易信贷融资、中长期银行信贷融资、延迟兑现的贸易信贷融资以及其他债务融资,每种融资方式的边际成本取决于与其滞纳金相关的信息不对称成本和交易成本。

P2P网络借贷外文文献翻译最新

P2P网络借贷外文文献翻译最新

外文文献翻译原文及译文文献出处:Jensen Fabian. The research of P2P online lending [J] Business Research, 2017, 9(3):31-41.原文The research of P2P network LendingJensen FabianAbstractMicro, small and medium enterprises is facing with financing difficulties,rural poor areas also lack of financial services,which has always been plagued policy makers of the two factors, also seriously restricted the economic development and hinder the two factors in the construction of a fair society. After the positive study of the relevant departments and academia,finally figured out "small loan company" this kind of small financial institutions,in order to the transfusion organization become the rural development and small and medium-sized enterprises (SME).Practice has proved that this kind of form does have some effect on the solution of the problem, but microfinance companies ’丨not deposit-taking’’policy, and become a big obstacle to influence its development. This makes the tighter credit environment,capital requirements of small and medium-sized enterprises and the vulnerable groups are far from satisfied. At the same time, the abnormal social folk capital abundant, high inflation,the stock market is tanking, strictlycontrol the real estate market economy, these funds need find investment breakthrough,and so a new kind of folk lending model,P2P network borrowing appeared.Keywords: P2P lending, Microfinance, Private lending1 IntroductionP2P lending (Peer - to - Peer lending) is an emerging in recent years the personal of personal credit model lending companies through the online platform set both a deaL Commitment to funding "connect”form of folk lending is emerging and increasingly prosperous. Is funding needs, while there is a desire to invest, such companies have to do is by their structures, network platform for the idle private capital looking for matches. And such companies provide essentially is a P2P (Peer to Peer or Person to Person, (individual financial information services for individuals) it is actually a kind of new flow of private capital. Platform itself the role of information intermediary,information disclosure, credit rating,fund settlement, overdue collection services, platform profit mainly comes from the customer to pay fees. In 2005, ZOPA,in London, the first microfinance website to personal online,pulled open the prelude of the P2P lending. After ten years of operation, a total of 750 million pounds of matching network. The platform Prosper2014 years accumulative total turnover of about $2.5 billion.P2Pnetwork, in countries such as Britain and the United States has been aloan in addition to the traditional savings and investment channels of the alternative (Slavin,2007).The success of the European and American practice for P2P network gradually towards the world.P2P lending in this form is in recent years the development of the abnormal rapidly, mainly because the form meets demand from both sides of the capital supply and demand of current economic situation. On the one hand, for money supply,in the face of high inflation and low bank deposits, bank deposit income is very small. At the same time, the stock market in the past two years is bad,real estate and gold investment door abuse is too high, and the current situation of risk is not small. In the face of all these various traditional investment present situation of the market situation is not optimistic, a large number of civilian capital urgently needs to find new breakthrough.P2P lending this form seems to be in order to meet the urgent demand, because this kind of investment model is unfolding the following several aspects: the advantages of high returns, basic around 20% annual return. Door, and the low just registered in relevant websites can become money lenders. High transparency, money lenders can according to the web site provides information about capital demanders object,to choose our willing to lend the money to lend,borrowers will provide regular use of funds, guarantee for capital lendersunderstand the usage and safety.2The origin of the P2P lending and the statusDue to the development of the P2P lending is less than 10 years, so the early literature focuses on introducing the origin and development of the network lending. Ferichs and Schumann (2008) mentioned that in 2005 the first lending site zopa,founded in the UK. Borrowing from a wide variety of network platforms appear in succession.Agarwal and Hauswald (2008) points out that facing the risk of moral hazard and adverse selection under asymmetric information, based on assumptions, such as disposable abandonment and anonymous trading orthodox financial institutions will be in accordance with the new market basic principles to be followed in the classical theory to its lending of small and medium-sized enterprises and farmers to provide collateral or guarantee. So those are unable to provide collateral poor farmers and small and medium-sized enterprises will be excluded from the formal financial institutions, in the end they will have to enter the network to meet the demand of their own money lending market. Slavin (2007) pointed out: the P2P loans in the United States and Britain has developed into a kind of savings and investment alternatives. Berger and Gleisner (2009) referred to in the United States first lending site prosper,com was established in 2006 in February,Germany’s first lending site was established in February 2007, at present, due to the legal system is different in different countries, almost all of the network platform lending operations are limited in the range of their own country. Ashta and Assadi (2009) research has shown that the type of online peer-to-peer lending platform and operation mode has its own features,in general they can be divided into two categories - for-profit and nonprofit platform, platform of for-profit business generally confined to the domestic, and non-profit platform to do business on a global scale. Both lenders is the biggest difference between the original and different requirements for earnings. For-profit platform lenders will risk requires a reasonable return for oneself, and non-profit lenders on the platform of general income does not make the request,they just want to ’’d o n a t e”part of his property,in order to help the poor people of the world.3The model of P2P network lendingPlatform is divided into two categories: basic for-profit and the for-profit (Ashta & Assadi,2009).Here the ’’p r o f i t”refers to the investment platform for investors- Investors profit type platform, hope by lending money to get match the economic benefits of risk. Non-profit platform of investors, the investment behavior is to help others, does not pay attention to taking economic returns. Nowadays the most profit type platforms are within the scope of its business,subject to regulatoryrequirements of the host countries (Berger, 2009)-Non-profit type platform is generally not subject to regional restriction, can operate on a global scale. The typical platform subdivided into three categories: public welfare,pure intermediary type and compound type mediation, after two classes are for-profit platform. The practice platform for the main service object as low-income people is in less developed areas. Simple mediation type platform only play the role of information intermediary, not to interfere in the user transaction. Compound intermediary platform to provide information service but also act as supervisors, joint chasing people, such as rate-setters role.3.1Public welfareKiva,founded in 2005, is an organization in Europe and the wealthy investors offering loans to small businesses in developing countries not for-profit P2P network platform. Basic obtained by raising its operating funds for small borrowers to provide low-interest loans and intermediary service free of charge. Because of the different national legal policy,Kiva f s business need to cooperate with local microfinance institutions (MFI),through its as a middleman to supervise and repay the loan (Ashta & Assadi,2009).3.2Simple mediation typeProsper in lending transactions only simple information intermediaryrole,through information disclosure and credit ratings provide the basis for both freedom of choice,Prosper after the deal itself is no longer involved in lending transactions. The entire Prosper platform has social security number, personal id number, bank accounts and personal credit scoring more than 520 American citizens can ’’l o a n s.First i t’s borrowing set similar EBay M double blind auction model This approach based on borrowing the preference,and strives to achieve the borrower loan conditions and investors' investment speed the acceptance and balance each other,by dynamic game to get the best interest rates (Chen et al”2014).3.3Composite mediation typeZOPA, as the ancestor of P2P network credit platform, has always been considered one of the most successful P2P network model, most scholars attribute the success to perfect risk control system. First,ZOPA .among cooperation with credit rating Company,it is according to its credit rating to determine the borrower's credit rating, and arrange it into the corresponding segment of the market, for investors to choose from. Second, ZOPA, almost all engage in transactions and related affairs. In addition to providing information to act as watchdogs,check the legality of the borrower loan procedures,completeness,supervise the borrower repayment on time,etc. ZOPA, provides a more real andtransparent financial services,at the same time,effective risk control measures can make the risk lower than traditional financial institutions.4The influence factors of P2P lendingNetwork, as it were, to borrow a thing has attracted the attention of many scholars since its birth, Klafft (2008) study that due to network lending type is a new thing, the lender lack the experience of the anonymous Internet loans, this will increase the risk of lending to network. Rothschild believes in a just grew up in the imperfect market, the researchers only indirectly through study the behavior of the borrower characteristics to obtain information about the development of the network of borrowing. But according to the behavior characteristics of the borrower and the study of the relationship lending to network events are not unified conclusion at present, such as those for borrowers loan application in the attached photos of research conclusions and even on the contrary,some research results such as Andrews (2008),it is concluded that the race, gender, personal characteristics such as little impact on the success rate of borrowing.Everett (2008) studies have found that if the loan borrowers in the group have acquaintances or merely know, makes the default rate be significantly decreased. Although Davis (2001) points out that the loan team a lack of clear ownership, while no significant characteristics andunified management decision-making mechanism, these decide whether people will join loan group is a random act. But as long as the team was able to set up loan,it can play the role of will be very important. D a t t a’s (2008) is one of the study found that the loan group leader role according to the relevant information to the t e a m’s members within the group of borrowers,and they do so power or is selfless attitude or is in order to get the corresponding reward. From this level, the loan group leaders mainly depends on the action of collecting and processing information to provide Suggestions for group members, through these behaviors, they in fact take on the role of the monitoring process of loan repayment, and in this way it indirectly promote the circulation of money lending website. According to e x p e r t’s research,in addition to loan group have a way to have obvious effect on reducing loan default rates that is to the network of group lending. This approach originated in the social network theory.5ConclusionsAfter the development history of P2P loans, theoretical basis and the development of P2P enterprise situation analysis of the P2P lending, we can find it is a full of potential and worth to continue to develop and put into lending to emerging patterns, especially considering it in solving the small micro enterprise financing difficulties and poor areas have played a huge role,need the government to make active efforts more,measures assoon as possible, in the right support and guide the development of this model.P2P网络借贷研宄Jensen Fabian摘要中小微企业融资难,贫闲地区农村缺乏金融服务,这一直是网扰政策制定者的两个因素,也是严重制约了经济发展、阻碍公平社会建设的两个因素。

中小企业融资英文文献

中小企业融资英文文献

中小企业融资英文文献Title: Financing Options for Small and Medium-sized EnterprisesIntroduction:Small and medium-sized enterprises (SMEs) play a crucial role in driving economic growth, job creation, and innovation. However, one of the major challenges faced by SMEs is accessing adequate financing. This article aims to explore various financing options available for SMEs, highlighting their advantages and disadvantages.1. Traditional Bank Loans:Traditional bank loans have long been the primary source of financing for SMEs. They offer a fixed amount of capital, typically with a defined repayment period and interest rate. Bank loans provide stability and reliability, making them suitable for long-term investments and capital expenditures. However, the loan application process can be time-consuming and require a strong credit history, which may be challenging for some SMEs.2. Equity Financing:Equity financing involves raising capital by selling shares or ownership stakes in the company to investors. This type of financing is especially beneficial for high-growth potential SMEs. Equity investors provide not only financial resources but also expertise and industry connections. However, SMEs need to dilute their ownership and share profits with investors, which may limit their control over business decisions.3. Venture Capital (VC):Venture capital firms invest in SMEs with high growth potential in exchange for equity. VC funding is especially attractive for innovative startups and technology-driven enterprises. Apart from financial support, venture capitalists often provide valuable guidance and mentorship. However, securing VC funding can be highly competitive, and SMEs often have to demonstrate a unique and scalable business model to attract investors.4. Crowdfunding:Crowdfunding platforms allow SMEs to raise funds from a large number of individuals through online campaigns. It provides an opportunity for SMEs to engage with their target audience and build a loyal customer base. In return for their contributions, supporters may receive rewards or early access to the company's products or services. However, the success of a crowdfunding campaign depends on the SME's ability to effectively market their project and generate interest.5. Government Grants and Subsidies:Many governments offer grants and subsidies to support SMEs. These funds are typically targeted towards specific sectors or industries and aim to encourage innovation and economic growth. Government programs vary across countries, and SMEs must meet certain eligibility criteria. While government funding can provide a significant financial boost, the application process can be complex, and the availability of funds may be limited.6. Supplier Financing:Supplier financing involves negotiating extended payment terms with suppliers, allowing SMEs to free up working capital and manage cash flow. This form of financing is particularly useful for businesses with low credit ratings or limited access to traditional loans. However, SMEs need to establish strong relationships with their suppliers to negotiate favorable terms.Conclusion:In conclusion, small and medium-sized enterprises have various financing options available to them. It is crucial for SMEs to assess their specific needs and goals when considering different financing sources. Combining multiple financing options may also be a viable strategy for addressing diverse funding requirements. By exploring these options, SMEs can overcome financing challenges and continue to contribute to economic growth and development.。

互联网金融外文文献翻译 2

互联网金融外文文献翻译 2

外文出处:DeBonisR, Silvestrini A. Internet finance and its influence ontraditional banking [J]. Applied FinancialEconomics, 2016,3(5):409-425.原文Internetfinanceanditsinfluenceontraditionalbanking DeBonisR, SilvestriniAA b stractsWith the rapid development of information technology, Internet financialmodel graduallyrise.ThispapersummarizestheInternetfinancialmodelonthebasisofth e concept, features and functions of Internet financial model in strategy,customer channels,financing, pricingand financial disintermediation of the impact of the tra di ti o nal c om mercial bank. T his paper a r g ue s t hat Inte rne t financ i al m ode l in the short term will not stand in the way of commercial bank's traditional business modelandprofit,butinthelongtermcommercialBanksshoulduseoftheInternetfinancial model,in order to obtain the new development. At the same time, the sustainedandhealthy development of the Internet industry to rely on Internet financialenterprises e lf-di s c i pli ne,posit i ve i nnovat i on,but a lsoattrac t m orec us t ome rs,strengt he nt h e construction ofsystemsecurity.Key words: Financial innovation; Internet financial; FinancialdisintermediationAt p r e s ent, m obi le payment, online ba nking, m obil e ba nki ng and financ i al businessinChina'sbooming financialinnovationssuchascloud,thusformedanew kind of financial model -- the Internet finance. Big data era and brand creation,spread tothedevelopmentoffinancialinstitutionsisbothachallengeandopportunity.Alo ng with the development of the Internet financial, emerging Internet traditionalfinancialcompanies and financial institutions will be a fierce competition, the future mayeven change thetraditional financial management mode and operationpattern. The Inter net financial concepts, features andfunctions Theconcept of the Inter net financial.After years of development, Internet companies stay in business does not providetechnicalsupporttofinancialinstitutionsandservicelevel,thedataaccumulated through the depth of mining information, to expand our business to thefinancial sector,buildfinancialmodelsandInternetbecometheemergingfieldofcombining inf orm a ti on technol o g ya ndca pi ta l.I nt e rne tfina n ci a lmodelisdiffer e ntfromindirectfinancing of commercial bank, it is also different from directfinancing capital market'sthirdfinancialfinancingmodel.Fromthe perspectiveofthe financingmode of Internet financial mode in essence is a kind of direct financing mode. Butcompared withthetraditionalmodeofdirectfinancing,Internetfinancingmodelhasalarge am ount ofinforma t ion,l ow e r transa c tioncost s,hig he ffic i en c y,et c.Adoptappropria t eth e Internet finance is a kind of financial model in the information age. Theauthor believesthattheInternetfinanceisbasedonmoderninformationtechnologyin financia l activities, with functions of financing, payment and transactionintermediary.Thecharacteristicsofthe Internetfinancial.Availabili t y of f i nancia l resources. Financia l exclusi on is defined as: people i nthefinancialsystemlackaconditioninwhichthe share of financial services,includingthesocialvulnerablegroupsinthelackofwaysormethodsiscloseto financialinstitutions,aswellasintheuseoffinancialproductsorfinancialservicesexist difficulties and obstacles. The current management mode,thetraditionalcom m ercia l Banks un able t o effi ci ent ly deal with small comp ani es, and part ofth eindividual customer's business requirements, lead to the financial exclusion of certaincustomers .Internet financial mode, the customer can break through the geographical restrictions, on the Internet looking for financial resources, alleviate thefinancialexclusion, enhance the level of socialwelfare.Trading the relative information. The traditional financing mode, thefinancial institutionstoobtaininvestmententerprises,especiallysmallmicroenterprise inform ation cost is higher, income and cost does not match. Internetfinancial generationanddisseminationofinformation throughsocial network, any enterpriseandindividualinformationwillcontactwithothersubjects.Bothpartiestocollect inform ation via the Internet, can be more comprehensive understanding of a businessor personal financial and credit situation, reduce the information asymmetry. Whenloandefault object, Internet financial enterprises through public default and reducing rating information, increase the cost ofdefault.The allocation of resources to mediation. The traditionalfinancing mode, the money s upplyand de m and both s i des inform a ti on often don't m a t c h.Capitaldemanders can't get the money in time to support at the same time, capitalsuppliers also can't find good investment projects. Internet financial mode, the money supply anddemandbothsidesnolongerneedtheintermediaryinstitutionssuchasBanksor exch angeset,canbedonethroughthenetworkplatformtoinformationscreening,ma t chi ng, pricing and tra di ng, di sintermediation effect isobvious.The Inter net financialfunction.The platform function Financial enterprises establish the platform ofnetwork financial via the Internet, customers can choose the suitable financial products,justmove your fingers, which can carry out payment, loan, investment, financialactivities,s uc h as convenient and quick, from running er r ands, and w a iti ng f or c us tome r.The allocation of resources(i.e.,financing) function. Internet financialisessentiallyawayofdirectfinancing.Internetfinancialmode,wecaneasilycheck counter party transaction records; To find the right risk management tools andriskdiversification; In-depth analysis the data by information technology,comprehensiveand i n-depth master competitors in form atio n, improve the effi c iency ofr e s o urce allocation.Asthe Internetfinancialmodel,the conceptof"sincethe financial"arisesatthehistoricmoment.3,paymentfunction.Internetfinancial mode, between merchants and customers to pay by a third party to complete, convenient,efficient,lower cost. The third party payment or will weaken the commercial bank, the statusofthe traditional payment platform. At present, the people's bank of China for about200third-party payment companies issued payment business license. In 2012, our country third party online payment market size of 3.8trillion.Information gatheringand processing.Traditional financialmode, theinformationresourcesdispersed,confuseddataisdifficult toeffectivelyhandlethe application. Internet financial mode, people use"cloudcomputing"principle,information asymmetry, thepyramid can be flattened, realize the standardizationofdata, structured, increasing the service efficiency of the data.Second, the Internet's influence on the traditional commercial bankingfinancial mode to review the financial strategy, to adapt to the challenges of the Internet fina nc ial model. The emergence of the Int e rnet f i nancial m o delfor s m al l andmedium-sized bank provides an opportunity to competewith the big Banks. If you canmakegooduseofthismodel,thepositiveinnovation,willcatchupwiththebig Banks in some emerging business, the formation of competitiveness. Traditional bankingmaybebecauseoftheInternet financialmodelchangeinthecompetitive la n dscape.SomeInternetcom pa niesha v enots a ti s fyon lydo t hird-pa rtyonl i nepayment platform, but with the advantages of data accumulation andinformation mining,directlytothesupplychain,smallmicroenterprisecreditfinancingexpansi on,the future may impact the core of the traditional banking business, rob Bankscustomerresources,alternative physical channels, overturning traditionalbankma na gement mode and profitable w ay.The development of banking customer andchannelThe customer is the basis ofcommercial Banks and other financial institutionsto the business. Internet financial model for commercial Banks to expand thecustomerbase. In 2012, the global Internet users up to 2012 people; Chinese Internet users is565 m i ll i on (2), the numbe r of onlin e s hoppi ng, 193 million (3).U nde r the modeof Internetfinancial,commercialBankscanbecombinedwithits ownstrategy,on theonehand,toattractnewcustomers;Ontheotherhand,increase customer adhesiveness, close business relationship with clients. Internet financial mode, thebank may change to traditional target audience and traditional physicalnetworkadvantages weakening, the pursuit of diversification personalized service of smalland medium-sized enterprises and individual customers more inclined to participate in a variety of financial transactions via the Internet. Commercial Banks willchange traditionalvaluecreationandrealizationway,abletoprovidefast,lowcostservicesoffin ancial institutionsto get marketfavor.Improve efficiency of resource allocation, effectively solve the smallmicroenterprise financing difficult problem.Internet financial companies with large data, cloud computing, and microlending technology. These three technologies can make a comprehensive understandingofthe Internetfinancialinstitutionsthebusinesspracticesofsmallbusinessesandindividual custom e rs and c redit ra ting, and esta bl ish a database and ne t w o rk c r edit sys t em. Inthecredit review, investors will network trading and credit history as a referenceand analysisindicators.Loanobjectsuchasadefault,financialfirmsstillcanusethe Internetnetworkplatformtocollectandpublishinformation,increasingdefaultcost,red ucetheriskofinvestors,intheserviceofsmallandmedium-sizedenterprise fina n cin g, a nd personal l oans has a unique advantage. T here f or e, t he Int e r n etfi n an c ialmodelcangobeyondthetraditionalfinancingwayofresourceallocationeffic iency,significantlyreducetransactioncosts,stronglysupportthedevelopmentofthereal economy. Thepricediscoveryfunction,andpromote themercerizationofinterest rate.Int e rne t fi nan c ial m ode l ca n obj e ctivel y r e fle c t the mar ke ts uppl y a nd d e mand bothsidespricepreferences, commercial Banks and other financial institutionsrespond to interest rate marketization.Debit offer Internet financial as a trading platform, funds, credit on the basis of the liquidity preference choice, risk factors,such as loan object, the two sides bargaining to clinch a deal, tradingmarketcom pl et e ly. W i t h m arket-ori ented inter es t r a te, financialinstituti ons ca nnotcompletelydependontheguidanceofthecentralbank'sbenchmarkrate,shouldtaketheinitiativetofindbenchmarkinterestratesinthemarket .TheInternetmode,financial institutions, financial market interest rate movements can be done viatheInternet, determine specific customer base interest rates. If can also in-depthstudyofdatamining,canevenformcompletelydeterminedbythemarket"rateindex",soas to improve the loanpricing.To speed up financial disintermediation.Traditional Banks inthe financial business,mainly ACTS as afinancialintermediaryfunction. Internet financial will acceleratefinancial disintermediation,make the funds of commercial Banks intermediary function marginalized. IntheInternet financial mode, Internet companies to provide financial search platform forcapitalsupplyanddemand,asmoneyinformationintermediaryrole.Fromthe perspectiveoffinanc ing,capitalsupplyanddemandbothsidesusingsearchplatform fortradingobject,afterthefinanci ngdealisdonebybothsides.Fromtheperspective of t h e pa y third-party payme nt pla t form, ca n provide c us t ome r s wit h paying,automatic collecting and transfer the remittance and settlement and paymentservices,with the traditional bank payment form instead.Third, the Internet financial mode development trendand strategy of commercialBanks.Overall,theInternetfinancial institutions development speed is fast,b ut the vol umeisre lat ive ly smal l,s h ort-te rm w ou ldnots ha kecomm e rcialbank's traditional business model and profit way. Sustained and healthy development ofthe financialindustry,theauthorthinksthat,theInternet,needtopayattentiontothe following four points: first, the Internet financial enterprises shouldself-discipline,business development can notdrill loophole legal and regulatory loopholes, shouldbeto support the rea l e c onomy as the start i ng point. Sec ond, the I nternet f inanci a l enterprisesshouldactivelyinnovation,andconstantlygraftfunctionof financialservicesandinformationtechnology,explorenewbusinessareas,complementarywith th e traditional financial business model. Again, the Internet financial enterprises touseits own resources,breakthe geographical boundaries,attract morecustomers,opera t in g a s "ma k ing a fool of. Fina l ly, the Inte rne t fi nan c ial enterpr i sesshould strengthentheconstructionofsystemsecurity,toensurethesafetyof capital,informationofthetrader. Fromthesocialenvironment, peopleshould give the Internet financial enterprises more open and tolerant attitude. Under the premiseofguarantee the financial stability and security, relevant departments can considertobreak through the geographical, trade restrictions, encourage financialindustry competition, safeguardsocial financial ecologicalenvironment.Traditional model of commercial Banks in the Internet age still mercialBanks'capitalstrength,cognitiveandhighcreditstanding,perfectinfrastructure,physicaloutletsarewidelydistributed, entitybank can establish the trust of the tangible. In addition to providing traditional commercial bankloanbusiness, wealth depository and provide payment and settlement business media, alsoforthesocietytoprovideliquidityinsurance,supportnormaleconomicactivity.Some financial business needs professional experience judgment, informationtechnology cannot completely replace the face the vigorous development of the Internet financial bus i ness, comme rc ia l B a nks and other financi a l i ns t i tut i ons should pa y c l osea t te nt ionto the development of the Internet financial trends, changing the conceptof development, actively adjust strategy. Commercial Banks to use the Internet financial mode, can deep integration of Internet technology and the bank's corebusiness,improve customer service quality, expand the service channels, improve the level of business, t o ada pt to the Int e rnet fina ncia l model to the impac t of t he tradi t iona l financial pattern, obtain new development. Based on comparative advantage, in support, service the real economy At the same time, create value for shareholders.译文互联网金融以及它对传统银行业的影响作者:伯尼斯;席尔瓦尼摘要随着信息技术的快速发展,互联网金融模式逐渐兴起。

P2P视频点播系统外文翻译文献

P2P视频点播系统外文翻译文献

P2P视频点播系统外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:Recent Advances in Peer-to-Peer Media Streaming SystemsABSTRACTRecently, there is great interest in using the peer-to-peer (P2P) network in media streaming. A great number of P2P media streaming systems have been developed. In this paper, we first give a brief survey on some key techniques and algorithms in the field of P2P streaming research. We also analyze the market view of P2P streaming media service, and give a brief descrip-tion about the current mainstream P2P streaming systems deployed in China.I.INTRODUCTIONThe rapid development of the Internet has changed the conven-tional ways that people access and consume information.Besides sending and receiving e-mails, browsing web pages, and downloading data files, people also hope to call telephone, watch movie and TV, and conduct other entertainments via the same Internet. The ideal objective is that anyone can access anything (contents) from anywhere at any time. It is commonly conceived that the next generation Internet should be a multi-media communication network based on the core of IP protocol. Besides traditional data services, other multimedia contents such as voice, image, and video, would also be delivered over the same IP network, among which the streaming media service will play a very more important role.Streaming media enables real-time and continuous delivery of video and audio data in a fashion of “flow”, i.e., once the sender begins to transmit, the receiver can start playback almost at the same time while it is receiving media data from the sender, instead of waiting for the entire media file to be ready in the local storage. Unlike normal data file, a streaming media file is huge, thus requires high channel bandwidth. Moreover, streaming media also carries stringent demand in the timing of packet delivery. The large size of the streaming media as well as its delivery timing requirement causes a streaming media server to be expensive to set up and run. In traditional client/server-based media streaming systems, all clients access the same server resource. In this scenario, on the one hand, the processing power, storage capacity, and I/O throughput of the server may become the bottleneck; on the other hand, large number of long-distance network connections may also lead to traffic congestion, thus cannot afford better quality of service (QoS) comparable with that of other tradi-tional Internet services, such as WWW and FTP, and cannot meet the performance requirements of large-scale real-time media streaming applications, especially in the aspects of scalability, adaptability, fault-tolerance and robustness. To address these problems, recently researchers have pro-posed many solutions, such as IP multicast and CDN (content delivery network). However, both of them need supports from special hardware. For IP multicast network, large-scale multicast-capable routers must be redeployed in the Internet. For content delivery network, a large number of CDN servers should be placed at the network edge, close to any receiver, and cooperate with each other to distribute multimedia data. The costs of infrastructure setup and administration are expensive, and cannot resolve the problems fundamentally. In recent years, Peer-to-Peer (P2P) networking technology has gained tremendous attention from both academy and industry. In a P2P system, peers communicate directly with each other for the sharing and exchange of data as well as other resources such as storage and CPU capacity, each peer acts both as a client who consumes resources from other peers, and also as a server who provides service for others. P2P systems can benefit from their following characteristics: adaptation, self-organization, load-balancing, fault-tolerance, availability through massive replication, and the ability to pool together and harness large amounts of resources. For example, file-sharing P2P systems distribute the main cost of sharing data - bandwidth and storage - across all the peers in the network, thereby allowing them to scale without the need for powerful and expensive servers. P2P systems are originally applied in network file sharing, and have achieved great success, such as Napster, Gnutella, Emule, and BitTorrent. However, different from general P2P file sharing, P2P media streaming poses more stringent timing and resource requirements for real-time media data transmis-sion and rendering, therefore it is needed to provide more restricted functions in the respects of resource management, scheduling, and control. Various P2P media streaming systems have been proposed and developed recently. Even inChina, nowadays there are about more than a dozen of P2P streaming applications de-ployed in the Internet. In this paper, we first give a brief survey on some key research issues and algorithms of P2P streaming systems, and then analyze and summarize the current status and development trend of P2P streaming market in China.II. RESEARCH PROGRESS OF P2P MEDIA STREAMINGA simple and straightforward way of P2P streaming implemen-tation is to use the technique of application-layer multicast (ALM). With ALM, all peer nodes are self-organized into a logical overlay tree over the existing IP network and the stream-ing data are distributed along the overlay tree. The cost of providing bandwidth is shared among the peer nodes, reducing the burden of the media server. In application-layer multicast, data packets are replicated and forwarded at end hosts, instead of at routers inside the network. Compared with IP multicast, application-layer multicast has several advantages. On the one hand, since there is no need for supports from routers, it can be deployed gradually based on the current Internet infrastructure; on the other hand, application-layer multicast is more flexible than IP multicast, and can adapt different distribution demands of various upper level applications.Thus, how to construct and maintain an efficient ALM-based overlay network has became one of the key problems of P2P streaming research. To address this problem, mainly three questions should be answered. The first relates to the P2P network architecture, i.e., what topologies should the overlay network be constructed? The second concerns routing and scheduling of media data, i.e., once the overlay topology is determined, how to find and select appropriate upstream peers from which the current peer receives the needed media data? The third is membership management, i.e., how to manage and adapt the unpredictable behaviors of peer joining and departure?Recently, several P2P streaming systems and algorithms have been proposed to address the above issues. From the view of network topology, current systems can be classified into three categories approximately: tree-based topology, forest-based (multi-tree) topology, and mesh topology. In the following we give a brief summarization of P2P streaming techniques accord-ing to this classification.2.1 Tree-based topologyThe typical model of tree-based P2P streaming system is PeerCast. In PeerCast, nodes are organized as a single multicast tree, where the parent provide service only directly to its sons.The node joining and departure strategies used in PeerCast are simple. For node joining, a new node n first request services from the root node S. If the S has enough resources, it provides service for n directly; otherwise, S redirects the request of n to one of its sons. The son then repeats this process, until the parent of n is found. Since each node only maintains the information of its parent and sons, unbalanced tree may be constructed.Generally, there exist four route selection strategies in PeerCast: random selection, round-robin selection, smart selection accord-ing to physical placement, and smart selection according to bandwidth. To achieve a balanced multicast tree, custom routing policy should be chosen carefully for individual peer node.ZIGZAG is another tree-based P2P streaming system which can construct more balancedmulticast tree. ZIGZAG organizes receivers into a hierarchy of bounded-size clusters and builds the multicast tree based on that. The connectivity of this tree is enforced by a set of rules, which guarantees that the tree always has aheigh O and a node degree O(k), where N is the number of receivers and k is a constant. Furthermore, the effects of network dynamics such as unpredictable receiver behaviors are handled gracefully without violating the rules. This is achieved requiring a worst-case control overhead of O receiver and O(k) for an average receiver.Other tree-based P2P streaming systems also include NICE, Overcast , and Bayeux .2.2 Forest-based topologyConventional tree-based multicast is inherently not well matched to a cooperative environment. The reason is that in any multicast tree, the burden of duplicating and forwarding multicast traffic is carried by the small subset of the peers that are interior nodes in the tree. Most of the peers are leaf nodes and contribute no resources. This conflicts with the expectation that all peers should share the forwarding load.To address this problem, forest-based architecture is beneficial, which constructs a forest of multicast trees that distributes the forwarding load subject to the bandwidth con-straints of the participating nodes in a decentralized, scalable, efficient and self-organizing manner. A typical model of forest-based P2P streaming system is SplitStream. The key idea of SplitStream is to split the original media data into several stripes, and multicast each stripe using a separate tree. Peers join as many trees as there are stripes they wish to receive and they specify an upper bound on the number of stripes that they are willing to forward. The challenge is to construct this forest of multicast trees such that an interior node in one tree is a leaf node in all the remaining trees and the bandwidth constraints speci-fied by the nodes are satisfied. This ensures that the forwarding load can be spread across all participating peers. For example, if all nodes wish to receive k stripes and they are willing to forward k stripes, SplitStream will construct a forest such that the forwarding load is evenly balanced across all nodes while achieving low delay and link stress across the system.Striping across multiple trees also increases the resilience to node failures. SplitStream offers improved robustness to node failure and sudden node departures like other systems that exploit path diversity in overlays. SplitStream ensures that the vast majority of nodes are interior nodes in only one tree. Therefore, the failure of a single node causes the temporary loss of at most one of the stripes (on average). With appropriate data encodings, applications can mask or mitigate the effects of node failures even while the affected tree is being repaired.Besides SplitStream, there are many other forest-based systems. Examples include building mesh-based tree (Narada and its extensions, and Bullet ), leveraging layered coding (PALS ), and multiple description coding (CoopNet ).2.3 Mesh topologyIn conventional tree-based P2P streaming architectures, at the same time a peer can only receive data from a single upstream sender. Due to the dynamics and heterogeneity of network bandwidths, a single peer sender may not be able to contribute full streaming bandwidth to a peer receiver. This may cause serious performance problems for media decoding and rendering, since the received media frames in some end users may be incomplete.In forest-based systems, each peer can join many different multicast trees, and receive data from different upstream senders. However, for a given stripe of a media stream, a peer can only receive the data of this stripe from a single sender, thus results in the same problem like the case of singletree.Multi-sender scheme is more efficient to overcome these problems. In this scheme, at the same time a peer can select and receive data from a different set of senders, each contributing a portion of the streaming bandwidth. In addition, different from the multi-tree systems, the sender set members may change dynamically, due to their unpredictable online/offline status changes, and the time-variable bandwidth and packet-loss rate of the Internet. Since the data flow has not a fixed pattern, every peer can send and also receive data from each other, thus the topology of data plane likes mesh. The main challenges of mesh topology are how to select the proper set of senders and how to cooperate and schedule the data sending of different senders.Examples of mesh-based multi-sender P2P streaming system include CollectCast, GnuStream , and DONet(CoolStreaming).CollectCast puts its emphasis mainly on the judicious selec-tion of senders, constant monitoring of sender/network status, and timely switching of senders when the sender or network fails or seriously degrades. CollectCast operates entirely at the appli-cation level but infers and exploits properties (topology and performance) of the underlying network. Each CollectCast session involves two sets of senders: the standby senders and the active senders. Members of the two sets may change dynamically during the session. The major properties of CollectCast include the following: (1) it infers and leverages the underlying network topology and performance information for the selection of senders. This is based on a novel application of several network performance inference techniques; (2) it monitors the status of peers and connections and reacts to peer/connection failure or degradation with low overhead; (3) it dynamically switches active senders and standby senders, so that the collective network performance out of the active senders remains satisfactory.GnuStream is a receiver-driven P2P streaming system which is built on top of Gnutella. It features multi-sender bandwidth aggregation, adaptive buffer control, peer failure or degradation detection and streaming quality maintenance. GnuStream is aware of the dynamics and heterogeneity of P2P networks, and leverages the aggregated streaming capacity of individual peer senders to achieve full streaming quality. GnuStream also per-forms self-monitoring and adjustment in the presence of peer failure and bandwidth degradation.Recently, DONet implemented a multi-sender model by introducing a simpler and straightforward data-driven design, which does not maintain an even more complex structure. Thecore of DONet is the data-centric design of streaming overlay, and the Gossip-based data schedule and distribution algorithm.In the data-centric design of DONet, a node always forwards data to others that are expecting the data, with no prescribed roles like father/child, internal/external, and upstreaming/downstreaming, etc. In other words, it is the availability of data that guides the flow directions, while not a specific overlay structure that restricts the flow directions. This data-centric design is suitable for overlay with high dynamic nodes.Gossip algorithms have recently become popular solutions to multicast message dissemination in P2P systems. In a typical gossip algorithm, a node sends a newly generated message to a set of randomly selected nodes; these nodes do similarly in the next round, and so do other nodes until the message is spread to all. The random choice of gossip targets achieves resilience to random failures and enables decentral-ized operations. Similar to the related work, DONet employs a gossiping protocol membership management. The data sched-ule and distribution method used inDONet is also partially motivated by the gossip concept. It uses a smart partner selection algorithm and a low-overhead scheduling algorithm to intelligently pull data from multiple partners, which greatly reduces redundancy. Experiments show that, compared with a tree-based overlay, DONet can achieve much more continuous streaming with comparable delay.III. P2P STREAMING IN CHINASince the first practical P2P streaming media system was born, P2P streaming service has experienced a significant growth in China, especially in the year 2005 and 2006. According to a market report, over more than 12,000,000 Internet users have accessed P2P streaming service or downloaded P2P streaming software in China. It is predicted that by the end of the year 2006, this number can take a growth to above 25,000, 000. Facing such a large pre-profitable market, till now there are at least over 15 organizations that are providing P2P or likely streaming services. With the most representative, PPlive, PPstream, Mysee, ROX and UUsee have taken over 80% of the current market share. In the rest of this section, we will analyze the market view of P2P streaming media service, and then give a brief introduction to the current mainstream P2P media streaming systems deployed in China.There are three reasons which cause P2P media streaming service so popular in China in recent years. Firstly, thanks to the rapid advance of audio and video compression technologies, users can easily have access to streaming media in a very low bit rate. More and more multimedia productions, TV clips, and movies are full of the whole Internet. This makes the P2P streaming service providers easier to get enough media sources for service than before. With the various and abundant supply of media contents, service providers can attract more and more clients. The larger the client number, the easier to make test of software and services. Secondly, compared with the traditional way of watching video from the Internet, such as VOD, users can get more satisfied quality of service in current bandwidth-limited network environment. Finally, by the growth of users’s network access bandwidth, they demand on more luxury experience, not simply on text and pictures, but more on fluent and high-definition videos. Users’ trend makes a large roomage for P2P streaming service to grow.Although P2P streaming service has achieved a considerable user experience and definitely it would have a bright future, there are still several issues need to pay attention to. First, current service providers have not found any distinct business models yet. Currently, almost all P2P solution vendors are providing TV program/movie broadcastings free of charge. Obviously, it is not practical for the service provider to charge the users in the time of promoting the service. In the starting period, developing user numbers and gaining subscribers are the key points but earning profits. Second, P2P streaming service providers should face the challenge of copyright. As we’ve just mentioned, some P2P vendors provide TV/movie broadcasting using third party contents without checking their legal status. For long term development, service providers must make cooperation with content providers to make a twin win. ThirdlyP2P streaming service providers must face the sur-veillance from the Internet service providers (ISPs) and govern-mental authorities. On the one hand, the purpose of P2P is to maximize the usage of bandwidth resource, however, to the opposite, the bandwidth spewing caused by such applications often makes the ISPs feel intolerable. ISPs usually take rejec-tive actions, such as limiting the application bandwidth or even blocking the application from running on the Internet. However, limiting orblocking is not the most proper way to solve the problem, and the conflicts between the ISPs and P2P streaming service providers will be in existence for a certain while. On the other hand, being regarded as a new media trend on the web, governmental authorities must take surveillance on P2P stream-ing service to guarantee the orderliness of the industry. By the two sides of surveillance, P2P streaming service providers must play the game prudentially., invested by Soft Bank HK, which is acknowl-edged as the number one in terms of subscribers in China, was founded in the early 2005. PPlive has very stable playing quality, and it seldom changes the player’s state to buffering during playing. When watching a new channel, the average waiting time from searching to playing is about 35s to 55s. PPlive provides over 200 channels, categorized by Provincial TV stations, Sports, Cartoon, Entertainment, HK films, Gaming, Movies etc, but very few programs of overseas TV stations. PPlive currently only supports broadcasting, and almost all the program bit rate is between 300kbps~400kbps with media codec like Windows Media Video (.wmv) or Real Media (.rm). Its program timetable is both shown on the website and displayed at the client player. Advertising commercials is supported by the client. Worth to be mentioned, PPlive broadcasted Supergirl Contests in 2005 and it was reported that the concurrent online users hit a record of 500k for the final contest. Though the popular users it has, some contents PPlive provides are lack of copyright, which may be a hidden trouble for its long term development.PPstream, which is founded by two engineers in Sichuan Province, was announced also in the year 2005. Compared with PPlive, PPstream has similar functions but higher connecting speed. Usually when opening a new channel, the average waiting time is about 25s~45s, and its watching fluency is also as good as PPlive. PPstream provides around 90 channels, categorized by Phoenix TV, Wenguang TV, Sports, Entertainment, Movie, TV drama series, Gaming & cartoon, Music and radio channel, and etc. PPstream currently broadcasts Windows Media Video coded QVGA and CIF quality videos with bit rate around 300kbps~440kbps. Its client software supports channel list and timetable shown aside the player, advertising commercials are also supported. It has been reported that PPstream will have cooperation with some ISPs for higher performance, and its market policy seems more steady and long-ranged.Mysee, invested by aurora, which was founded in late 2005, is regarded as a later comer. But Mysee grows quickly in the year 2006. Now, by numbers of media reports, it is very famous on the Internet. Mysee supplies the same video codec like PPstream, but sometimes the connecting speed and playing quality may not be as good as that of PPstream and PPlive. It currently broadcasts around 90 channels which are categorized by news, movie, TV drama series, sports, entertainment, music, information, Cartoon and science. Mysee does not provide a client application player to view programs, all the channels are viewed in the Microsoft IE browser, channel list and timetable are both displayed on its website. This way may be easy for the service provider to arrange contents that recommended to the user, but lack of user glutinosity. It is reported that Mysee has near one year good cooperation with and Hunan TV station for video broadcasting. It can be predicted that with preponderance in cooperating with TV stations and ICPs, Mysee would earn a more considerable market share.Roxbeam, used to be called CoolStreaming, is regarded as the first practical P2P streaming software. CoolStreaming was devel-oped in late 2004. It gave a reliable model of P2P streaming. But CoolStreaming was forced to close down due to law suits regarding the content in early 2005. Currently Roxbeam is supported by SoftBank Japan. It not only supplies P2P streaming service,but integrates online community called LeiKe and chatting services into the client software. Users can watch not only broadcasting program but short video clips via the VOD service. Roxbeam tries to provide various video recourses to its user, and its goal is not simply providing a P2P streaming service, but to provide an online video sharing and communication platform. Obviously, Roxbeam has an even grander blueprint, but whether this blueprint can come true is to be proved by the market.UUsee, which is invested by SIG, formed in mid 2005, is also a new power in the P2P streaming service. Having good relationship with CCTV, UUsee has more preponderance than other companions on program copyrights, which can help them much in living broadcast of large-scale activities and programs.UUsee provides about 100 channels on its client player which is categorized by UUsee recommendation, entertainment, sports, movies, TV drama, fashion, cartoon, gaming, science, social news, civil TV stations and etc, channel list and time table are shown friendly on the client player. UUsee also provides thousands of VOD programs on its website, which can effec-tively increase its adhesive ability to the users. By the newest data collection from ACNielsen, during the living broadcast of CCTV’s 2006 Spring Festival Celebration, the UU see’s user number at the peak time has met the amount of 400,000, which is the largest number from the authority’s report. By the daily reach statistic from (http://www. ), in the recent half year, UUsee and PPlive take the first two chairs in the competition, followed with PPstream and Mysee, Roxbeam takes the last. It could be judged that the World Cup in June and Super Girl from May to September contribute more audiences to the Service providers.Other P2P streaming service providers like QQLive, Pcast, TVants, Poco, 51TV and so on are doing the same contribution to this market. Chance is equal to every competitor, whether they can achieve all depends on the market choice.IV. CONCLUSIONRecently, P2P streaming has attracted a lot of attentions from both academy and industry. Various P2P media streaming algorithms have been studied, and the systems have been developed. Nowadays about more than a dozen of P2P streaming systems have been deployed in China. In this paper, we first give a brief survey on the progress of P2P streaming research, bring forward some fundamental problems for P2P streaming application development, and review several solu-tions ever proposed to address the problems. Furthermore, we study the factors which can impact the trends of P2P stream-ing market, and make a brief summary for the current P2Pstreaming market progress in China.译文:P2P视频点播系统的最新进展高文,霍龙慑,付强摘要近年来,人们对使用P2P视频点播系统越来越感兴趣,并开发出了大量的P2P媒介瞬时系统。

互联网金融外文翻译文献

互联网金融外文翻译文献

文献信息:文献标题:INTERNET FINANCE: DIGITAL CURRENCIES AND ALTERNATIVE FINANCE LIBERATING THE CAPITAL MARKETS(互联网金融:数字货币和替代金融解放资本市场)国外作者:Kim Wales文献出处:《Journal of Governance and Regulation》, 2015,4(1):190-201 字数统计:英文2505单词,13427字符;中文4405汉字外文文献:INTERNET FINANCE:DIGITAL CURRENCIES AND ALTERNATIVE FINANCE LIBERATING THE CAPITAL MARKETS Abstract This article discusses how the sudden shift in policy reform and innovation has the potential to liberate the financial markets. The economic potential of internet finance is beginning to take hold across the capital markets as industries like Peer–to–Peer Lending, Equity and Debt based Crowdfunding and virtual currencies and cryptocurrencies which are types of digital currency are quickly transforming the way businesses are being financed. From borrowing and lending, buying and selling securities, to conducting wire transfers internationally, these innovations are creating a new class and generation of investors will source investments opportunities. Helping institutions and governments assess risks and manage performance in order to determine where to deploy capital; and showing signs of lessening the inequality gap. Following the neolithic agricultural revolution and the industrial revolution, this new revolution will enable more people to access financial services in less traditional ways, especially the unbanked world with its huge potential. These new financial opportunities, such as peer – to -peer (P2P) lending, will be discussed and examined, and we will stress how they can allow people to bypasscurrent barriers in the global economy. We conclude by arguing that all these developments, energized by the efforts of innovators and entrepreneurs, have the potential to radically transform the world in which we live, while promoting the core values of industrialized societies including democracy, capital formation, sustainability, and equality without solely relying on tax increases.Key Words:Internet Finance, Digital Currencies, Capital Markets, Alternative FinanceIntroductionThe way we do business is being revolutionized. There is decreasing trust of traditional banks, mainly due to the aftershocks of the 2008 financial crisis and the string of scandals that has affected banks reputation since then, including the LIBOR interest rate rigging scandal, money laundering, high risk lending and tax evasion. As access to traditional funding becomes more elusive and as more and more people join the ranks of the “unbanked,” it is clear that new ways of creating business, job and capital, in a more equitable way must be found. And indeed, an economic revolution is underway, which is radically transforming the financial ecosystem, via emerging technologies, changing legislation, and alternative funding mechanisms.Barriers in the Global EconomyKendall and V oorhies (2014) note that in some countries, “the most important buffers against crippling financial setbacks are financial tools such as personal savings, insurance, credit, or cash transfers from family and friends. Yet these are rarely available because most of the world’s poor lack access to even the most basic banking services.” In addition, Webber (2014) notes that the World Bank calculates that about 75% “of the world’s poor is unbanked,” amounting to roughly 2.5 billion people who are unable to access any banking services. These unbanked people are often reliant on “a patchwork of informal and often precarious arrangements to manage their financial lives.”However, “technology and new business models are beginning to shape differenttypes of business finance and funding” available across the globe [Vistage(2013)], especially in developing countries. For instance, 75% of Kenyans now have mobile banking services, while in Brazil basic banking transactions are now available at local shops [Webber (2014)].But while the ‘unbanked’ are increasingly being served in developing countries, Webber (2014) notes that inclusion in traditional banking services is becoming more problematic in the EU and US: The Alliance for Financial Inclusion, a global network of policymakers, reported that there are “58 million people in the EU without bank access and another 92 million are ‘underserved’ – having access, say, to just one bank while in the US, nearly 10 million households are believed to be outside of the formal banking system.”Increasingly, the wealthy are being relied upon to redirect investment dollars toward emerging growth companies through different types of incentives and new funding models, however understanding the new range of financial services and means of access will be ‘challenging” but important for all involved [Vistage(2013)]. In particular, understanding the important differences between the huge range of finance and funding options available – from bank lending to crowd-sourced funding to microfinance to private equity and venture capital – is a challenge, but will be fundamental for business leaders, emerging growth companies and investors as they consider their place in the economic equation. At the same time, as I have written in an earlier paper, it is also important that average working class individuals are also given the chance to take advantage of these new investment and financing opportunities [Wales(2014)].Maney (2013) says that the world is undergoing a third revolution (following on from the Neolithic Agricultural Revolution and the Industrial Revolution), and this is a very apt description. Humankind’s collective knowledge is being aggregated and disseminated and is increasingly allowing complete access to the surge of universal information and we all have the ability to connect with almost everyone on the planet [Maney(2013)]. Democratization of the capital markets with financial and investment products such as securities based crowdfunding, peer-to-peer lending (P2P), Bitcoinand more -- in parallel -- with technological advances on the Internet, social media, and the smartphone have all equally revolutionized the way that we do things. This new revolution, started in the developing world, will enable more people to access financial services in less traditional ways. These new financial opportunities, such as peer to peer (P2P) lending and bitcoin will now be discussed in turn.Dawn of a New Era: P2P and the CrowdIn recent years, peer-to-peer lending has attracted borrowers and lenders that had been displaced by the banks. The “new normal’ in this sea of change is leveraging networks of social capital, better known as “the crowd” to infuse the money needed into a company in order to start, grow or sustain its practice.According to the Small Business Administration, recovering is continuing in both “borrowing and lending conditions”, although recovery is slower for smaller firms. Unfortunately, businesses have experienced a downturn in their financial position, which has made securing funds from banks very difficult during a time of increasing financial regulation. This is reflected in a number of studies into small business lending over the last few years.The New York Federal Reserve regularly surveys small business owners regarding “their needs and experiences,” in order to gauge the credit environment, and in the. April/May 2012 survey, 544 small businesses participated. The feedback from the survey indicates that “the recent drop in lending may be due in part to weaker firms self-selecting out of the credit market”: about two- thirds of the participants did not apply for any financing, and half of these respondents did not do so because they feared their applications would be declined. Participants also reported “higher denial rates” for microloans than for loans of higher amounts, suggesting that the demand for microloans is there.Oxfam’s (2014) report into global economic inequality stated that a mere 1% of the global population controls almost half of the global wealth. Furthermore, this 1% owns $110 trillion which is 65 times the combined wealth of the “poorest 3.5 billion people,” the 85 richest people own the same as the combined total wealth of thebottom 50% of the global population, and 70% of the population reside in countries where “economic inequality has increased in the last 30 years”. These statistics emphasize the fact that there is a disproportionate amount of capital not making its way into the hands of “the crowd” as well as the difficulty of gaining access to that capital.History illustrates that during periods of radical change, it took two world wars to shift the economy [Piketty(2014)]. Now inequality is rising back to pre-1915 war levels. According to Piketty (2014), this should be counteracted via global tax on wealth or similar measures.While here we agree on the inequality rise, I submit that wealth inequality could improve naturally through advances in technology and the democratization of capital under the umbrella of “internet finance” rather than through fiscal policy alone.Globally, peer – to – peer platforms originated an estimated $70 billion in 2014. Yet, these loans only make up a small portion of the total number of small business loans [Eavis(2014)]. In the first quarter of 2014, banks lent a total of $291 billion to small businesses, according to FDIC figures, while in contrast, US P2P lending platform, Prosper Marketplace originated over $3 billion of loans on platform as of 1Q2015. As of the 2014, Peer – to – Peer Lending (Debt) originated $11 billion in loans in the U.S., $56 billion in China and $5.6 billion in Europe in 2014, respectively. These numbers are projected to double by the end of 2015.Mobile bankingMobile banking is becoming increasingly popular and its applications have the “potential to encourage financial discipline in even more effective ways”[Kendall and V oorhies (2014)] Mobile banking has three advantages over traditional banking models, which can also be translated for primary and secondary markets [Kendall and V oorhies (2014)]:—Mobile transactions are virtually free. Counter services at financial institutions make up most of the routine bank costs, however, with mobile banking, the same transactions can be made with little or no cost to the financial institutions or mobileservice providers, and by extension those servicing transactions within the primary and secondary markets.—These mobile transactions create huge amounts of data, “which banks and other providers can use to develop more profitable servers and even substitute for traditional credit scores (which can be hard for those without formal records or financial histories to obtain)”. Over time, there will be an emergence of mobile ratings agencies that will assist entrepreneurs and investors to overcome this hurdle in the primary and secondary markets.—Mobile platforms operate in real time, allowing instantaneous account information, messaging and new services sign up.Digital Currency: the case of virtual and crypto currenciesDigital currency businesses are now proliferating with $350 million invested by venture capitalist in 2014 and $230 million invested the year prior. For a moment, let’s explore how the crypto currency, Bitcoin could transform financial markets, by serving as a catalyst for capital formation, especially in underserved regions like Africa and Haiti, which are in dire need of banking facilities and access to capital and technology like blockchain is beginning to serve as the backbone infrastructure for the movement of currencies.Bitcoin is currency that can be traded internationally and anonymously, and because it is a decentralized digital currency, there are no fees, government regulation, and oversight by banks and government-backed securities [Pagliery (2014a)].Five years after its introduction, Bitcoin is among the most studied and traded financial products. Bitcoin payments occur peer-to-peer with no administrator and this cryptocurrency is now a popular form of digital currency. A number of top investors support this digital currency (including, for example, Marc Andreessen and the Winklevoss twins). Merchants see Bitcoin with favor because of its lower fees when compared with credit cards, and the fact that fees are paid by the purchaser and not by the vendor. However, Bitcoin has also been quite volatile so far and has been subject to intense scrutiny by governments.Indeed, last year the bitcoin exchange, Mt. Gox, collapsed, which raised questions regarding “the security of investing in a virtual currency that isn’t regulated by governments”[Vaishampayan (2014)]. However, other players, such as SecondMarket, created a new, and more secure, bitcoin exchange and launched a Bitcoin Investment Trust.There is an excellent and potentially revolutionary opportunity to incorporate cryptocurrencies like Bitcoin into products such as crowdfunding platforms and mobile-enabled platforms that could serve the unbanked, underserved, and the emerging middle class, who represent well over 2 billion people worldwide. $90 billion a year is spent by this population on alternative services such as check cashers and payday loans [Schutte (2014)] and they struggle to obtain the financing, beyond limited microfinance opportunities, to create businesses. Creating value for this segment of the population could be very exciting if social capital and technology are leveraged properly.Bitcoin could be used for remittances, liquidity access to cash, and credit for frontier and emerging countries.ConclusionThe world is embarking upon a new economic revolution. Institutional market making may become a profession of the past as the democratization of capital is being driven more and more by retail investors. The catalyst for this phenomenon originated in the global economic recession. Unemployment, while going down, is till a problem, and interest rates remain at historic lows of almost zero percent while startup and emerging growth companies find it difficult to raise capital via traditional avenues.Start-ups are major job creators (small firms created 65% of new jobs in the US between 1993 and 2009), but they aren’t getting the funding to remain operational.2.5 billion people are unbanked [Chaia et al (2010)] while over 2 billion are living on less than $2 a day. With all of the global resources, it is hard to understand why the wealth disparity gap continues to increase in the 21st century with 1% of thepopulation controlling over 50% of the world’s wealth.On April 5, 2012, President Barack Obama signed into legislation The Jumpstart Our Business Startups Act (JOBS Act), igniting a change to 80-year-old securities laws while spurring a changing of the guards globally and enabling the democratization of the capital markets. Technological advances such as Web 3.0, social capital, smartphones and mobile technology, and Bitcoin are fueling this economic revolution. This revolution is also known as “frictionless capitalism”, a term coined by Bill Gates in 1994, in his book, The Road Ahead, which suggests a new generation of internet companies are innovating to find ways of reducing friction within the internet economy. I will take this thought one step further and propose that the internet is becoming the new industrial network where we can connect with one another directly allowing for advances in creating “frictionless labor markets.”As these examples show, a new economic revolution has the potential to disrupt social and capital norms. Every aspect of life will be transformed due to the interrelated nature of the ecosystem because increased activity in one part of the ecosystem spurs an increase in activity in others.I conclude by arguing that all these developments, energized by the efforts of innovators and entrepreneurs, have the potential to radically transform the world in which we live, while promoting the core values of industrialized societies including democracy, capital formation, sustainability, and equality. A brave new world of business and finance, which is more equal and fairer, is just around the corner.中文译文:互联网金融:数字货币和替代金融解放资本市场摘要本文讨论了政策改革和创新的突然转变是如何解放金融市场的。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

文献出处: Waitz M. The small and medium-sized enterprise financing under P2P finance [J]. Journal of Business Research, 2016, 8(6): 81-91.原文The small and medium-sized enterprise financing under P2P financeWaitz MAbstractSmall and medium-sized enterprise financing difficult is worldwide difficult problem. Article introduces the concept of the Internet financial, mainly summarized the P2P financial in the development of financial innovation and integration of science and technology, a combination of academic research on P2P financial now of the five directions of various views and opinions. Points out the current P2P financial problems in the development of risk control, and analyses the trend of the Internet financial.Keywords: P2P financial; Financial innovation; Risk control1 IntroductionLook from the history of enterprise development, a large enterprise originate from small and medium-sized enterprises. Small and medium-sized enterprises (smes) is the most dynamic part of the national economy, often walk in the forefront of technology development, in the high-tech industry, clean energy, green economy, etc, have good performance, play an important role in the economic transformation. Small and medium-sized enterprise financing difficult is worldwide difficult problem. These small and medium-sized enterprise financing environment and narrow channels, more than 60% are unable to get a bank loan. At present, science and technology enterprises and the characteristics of light assets, financing difficulties, become a huge bottleneck of sustainable development.2 The concept of the Internet financialIn the past two years, the Internet financial show explosive growth, since 2014, the Internet financial sector performance strength. Current economic field exists the phenomenon of two special contradiction, one is the small and medium-sizedenterprises in the total number of enterprises accounted for a large, but the universal problems of financing difficulties; Second, folk idle capital, but in addition to the stock market and housing market, it is difficult to invest in other areas. And on the basis of the Internet, cloud computing, big data and highly fit market leads the development of the Internet financial, to solve these two problems, better serve the real economy, especially small and medium-sized enterprise development to create a good financial environment, but also for China's overtaking play an important role in the implementation of international competition corners.Internet financial besides master client, also facilitate completes the upstream suppliers, downstream capital use party, the integration of point and point, combining with the characteristics of the Internet (P2P) and the nature of financial (capital).Based on the development of the Internet financial, financial supply ability is improved, inclusive to strengthen, can mobilize more financial resources, broader, more coverage, more decentralized, more diversified needs.The Internet the most narrow financial concept is P2P (Peer - to - Peer Lend - ing) financial platform, the core of the P2P model is: on the web site has a qualification platform, the borrower credit information, and provide the loan project specific situation, the borrower's integrity and economic strength and other related information; Investors according to the platform to provide information, make decisions, and finally made a decision of to make loans to borrowers.P2P finance is a new kind of financial model, through the Internet and large data, make to minimize the asymmetric information, this new financing channels, for individuals and businesses to provide great convenience, is a beneficial supplement of the existing banking system. Peer-to-peer (P2P) had a great influence on financial business in China. Traditional banking business model, mainly is the savings and loan business, P2P entirely new business models, deconstructs the traditional banking business model, breaking the monopoly of state-owned Banks, to a certain extent, in the form of fragmentation added to the drawback of the market.P2P financial innovation of science and technology and financial integration development, the release of the science and technology system reform and the doubledividend of financial reform, to introduce more financial products to serve the scientific and technological innovation, support the development of science and technology enterprises, solve to create light assets of small and mid-sized enterprise multidimensional financing difficulties; Also is helpful for financial innovation, find new investment direction, in order to obtain a higher return on investment.In 2005, the world's first P2P Zopa, a financial company (Zone of Possi - ble Agreement) was founded in London. In 2006, the United States, the first a P2P financial company Prosper founded in California. In 2007, our country the first P2P finance company established on credit, at present, the P2P financial firms more than more than 300, traded as high as more than 200 one hundred million. Financial risk is a highly amplified industry, P2P financial with convenient Internet natural attributes, but relative to the traditional financial institutions, financial in the Internet's openness also determines the P2P web site platform, information security, etc, could be affected by a great deal of challenges, risk control will be more pressure.3 The five direction of current P2P financial3.1 What is: it is subversive or supplementaryHas view: P2P financial is the innovation of the Internet with the traditional financial integration, at present is still in the stage of integration, there are a lot of problems, problems are not terrible, problems can also be seen as a contradiction, the process to solve the problem, is to promote the process of developing a new thing, this is the necessary stage P2P financial growth. To correctly treat the present P2P financial problems and drawbacks: a guide; Second, we must avoid risk. Only in this way, will lead to financial and the Internet have more innovation, to the prosperity of the rational.3.2 What: high-end service grassroots or serviceComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. Has view: is a multi-level capital market, the P2P finance is one of the components, compared with traditional financial companies, should follow the development way of differentiation and mainly for the financing difficulties of small and medium-sized enterprise service. View: P2P financial if theservice object, mostly low risk customers, then there will be a problem, must do a certain size, can have a better economic returns, and to do a certain size, must put the human cost, time cost and the cost of capital, the same small P2P financial companies, will form a lot of pressure, therefore, some P2P financial enterprises gradually became the "pool", big customers, lending if big client management problems, is easy to appear P2P financial risk, and even lead to P2P financial business owners "run". So P2P financial enterprises, should do more small loans, don't dabble in big customers, big customer risk is too big, not P2P financial companies can undertake. And do more small loans, the cost is lower than the bank, have a competitive advantage.3.3 How to do: innovation mode of risk preventionComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. The argument goes, the Internet technology and the integration of financial haven't reached a very reasonable, scientific, P2P financial there will be many new problems. And when the P2P financial after reaching a certain size, risk control will be the key to the healthy development of the P2P financial. If the P2P financial regulation, also will become a important test of P2P regulators wisdom. Have a view is: to the P2P financial risk control, should start from to the customer credit, credit reporting system perfect, to both sides of the docking loans, although to do so is very hard, but can avoid many risks, guarantee the healthy development of the financial industry, the P2P.At the same time, to clear the main body of industry regulations, for the convenience of management, appendage management should be implemented.3.4 Who is going to do: working in the financial sector or non-financial areasComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. The argument goes, P2P financial done by a team with a finance background is better; Due to the P2P finance is based on the Internet, with Internet gene, so the team should have the knowledge and skills of specialized personnel to participate in the Internet. View: P2P financial can be developed from the traditional financial transformation, also can by Internet companies innovation, finally formation of the team, must have both the financial and investment knowledge, andthe Internet. Knowledge of finance and investment aspects of the personnel, in accordance with the rules of the financial industry control risk; The persons with Internet knowledge, according to the rules of the network industry big data analysis, selected customers for sales, customer maintenance, at the same time do a good job in network security. View: P2P financial represents the future direction of financial development, some commercial Banks now also vigorously develop P2P financial, but at the same time to prevent the transfer of risk to the banking system, increased regulation of lending to P2P network platform.3.5 How to pipe: cross-border development and supervised respectivelyHas view: P2P financial, in essence, is still a financial, compared with the traditional industry, is only the change of the financial model, so must be regulated. If not strengthen supervision, can appear the problem such as run, adverse to the healthy development of the industry, and easy to bring serious social problems, affect social stability. View: in research regulation, there should be a state investment fund, to support the top in the field of technology innovation.P2P financial as a new financial form, to the top ahead of research and development, to prevent the banking system similar to the problem now. The argument goes: Europe, the United States based on large data of individual credit reporting system is relatively developed, can effectively prevent fraud. One is to establish individual credit system as soon as possible. The second is to establish P2P lending related laws and regulations as soon as possible. Three is to strengthen self-discipline of the P2P lending industry. Four is entry qualifications have to be very clear, the implementation system of archival filing registration.译文P2P 金融下的中小企业融资Waitz M摘要中小企业融资难是世界性难题。

相关文档
最新文档