P2P金融风险管控中英文对照外文翻译文献
金融体系中英文对照外文翻译文献
金融体系中英文对照外文翻译文献(文档含英文原文和中文翻译)Comparative Financial Systems1 What is a Financial System?The purpose of a financial system is to channel funds from agents with surpluses to agents with deficits. In the traditional literature there have be en two approaches to analyzing this process. The first is to consider how agents interact through financial markets. The second looks at the operation offinancial intermediaries such as banks and insurance companies. Fifty years ago, the financial system co uld be neatly bifurcated in this way. Rich house-holds and large firms used the equity and bond markets,while less wealthy house-holds and medium and small firms used banks, insurance companies and other financial institutions. Table 1, for example, shows the ownership of corporate equities in 1950. Households owned over 90 percent. By 2000 it can be seen that the situation had changed dramatically.By then households held less than 40 percent, nonbank intermediaries, primarily pension funds and mutual funds, held over 40 percent. This change illustrates why it is no longer possible to consider the role of financial markets and financial institutions separately. Rather than intermediating directly between households and firms, financial institutions have increasingly come to intermediate between households and markets, on the one hand, and between firms and markets,on the other. This makes it necessary to consider the financial system as anirreducible whole.The notion that a financial system transfers resources between households and firms is, of course, a simplification. Governments usually play a significant role in the financial system. They are major borrowers, particularlyduring times of war, recession, or when large infrastructure projects are being undertaken. They sometimes also save significant amounts of funds. For example, when countries such as Norway and many Middle Eastern States have access to large amounts of natural resources (oil), the government may acquire large trust funds on behalf of the population.In addition to their roles as borrowers or savers, governments usually playa number of other important roles. Central banks typically issue fiat money and are extensively involved in the payments system. Financial systems with unregulated markets and intermediaries, such as the US in the late nineteenth century, often experience financial crises.The desire to eliminate these crises led many governments to intervene in a significant way in the financial system. Central banks or some other regulatory authority are charged with regulating the banking system and other intermediaries, such as insurance companies. So in most countries governments play an important role in the operation of financialsystems. This intervention means that the political system, which determines the government and its policies, is also relevant for the financial system.There are some historical instances where financial markets and institutions have operated in the absence of a well-defined legal system, relyinginstead on reputation and other im plicit mechanisms. However, in most financial systems the law plays an important role. It determines what kinds ofcontracts are feasible, what kinds of governance mechanisms can be used for corporations, the restrictions that can be placed on securities and so forth. Hence, the legal system is an important component of a financial system.A financial system is much more than all of this, however. An important pre-requisite of the ability to write contracts and enforce rights of various kinds is a system of accounting. In addition to allowing contracts to be written, an accounting system allows investors to value a company more easily and to assess how much it would be prudent to lend to it. Accounting information is only one type of information (albeit the most important) required by financial systems. The incentives to generate and disseminate information are crucial features of a financial system.Without significant amounts of human capital it will not be possible for any of these components of a financial system to operate effectively. Well-trained lawyers, accountants and financial professionals such as bankers are crucial for an effective financial system, as the experience of Eastern Europe demonstrates.The literature on comparative financial systems is at an early stage. Our survey builds on previous overviews by Allen (1993), Allen and Gale (1995) and Thakor (1996). These overviews have focused on two sets of issues.(1)Normative: How effective are different types of financial system atvarious functions?(2) Positive: What drives the evolution of the financial system?The first set of issues is considered in Sections 2-6, which focus on issues of investment and saving, growth, risk sharing, information provision and corporate governance, respectively. Section 7 consider s the influence of law and politics on the financial system while Section 8 looks at the role financial crises have had in shaping the financial system. Section 9 contains concludingremarks.2 Investment and SavingOne of the primary purposes of the financial system is to allow savings to be invested in firms. In a series of important papers, Mayer (1988, 1990) documents how firms obtained funds and financed investment in a number of different countries. Table 2 shows the results from the most recent set of studies, based on data from 1970-1989, using Mayer’s methodology. The figures use data obtained from sources-and-uses-of-funds statements. For France, the data are from Bertero (1994), while for the US, UK, Japan and Germany they are from Corbett and Jenkinson (1996). It can be seen that internal finance is by far the most important source of funds in all countries.Bank finance is moderately important in most countries and particularly important in Japan and France. Bond finance is only important in the US and equity finance is either unimportant or negative (i.e., shares are being repurchased in aggregate) in all countries. Mayer’s studies and those using his methodology have had an important impact because they have raised the question of how important financial marke ts are in terms of providing funds for investment. It seems that, at least in the aggregate, equity markets are unimportant while bond markets are important only in the US. These findings contrast strongly with theemphasis on equity and bond markets in the traditional finance literature. Bank finance is important in all countries,but not as important as internal finance.Another perspective on how the financial system operates is obtained by looking at savings and the holding of financial assets. Table 3 shows t he relative importance of banks and markets in the US, UK, Japan, France and Germany. It can be seen that the US is at one extreme and Germany at the other. In the US, banks are relatively unimportant: the ratio of assets to GDP is only 53%, about a third the German ratio of 152%. On the other hand, the US ratio of equity market capitalization to GDP is 82%, three times the German ratio of 24%. Japan and the UK are interesting intermediate cases where banks and markets are both important. In France, banks are important and markets less so. The US and UK are often referred to as market-based systems while Germany, Japan and France are often referred to as bank-based systems. Table 4 shows the total portfolio allocation of assets ultimately owned by the household sector. In the US and UK, equity is a much more important component of household assets than in Japan,Germany and France. For cash and cash equivalents (which includes bank accounts), the reverse is true. Tables 3 and 4 provide an interesting contrast to Table 2. One would expect that, in the long run, household portfolios would reflect the financing patterns of firms. Since internal finance accrues to equity holders, one might expect that equity would be much more important in Japan, France and Germany. There are, of course, differences in the data sets underlying the different tables. For example, household portfolios consist of financial assets and exclude privately held firms, whereas the sources-and-uses-of-funds data include all firms. Nevertheless, it seem s unlikely that these differences could cause such huge discrepancies. It is puzzling that these different ways of viewing the financial system produce such radically different results.Another puzzle concerning internal versus external finance is the difference between the developed world and emerging countries. Although it is true for the US, UK, Japan, France, Germany and for most other developed countries that internal finance dominates external finance, this is not the case for emerging countries. Singh and Hamid (1992) and Singh (1995) show that, for a range of emerging economies, external finance is more important than internal finance. Moreover, equity is the most important financing instrument and dominates debt. This difference between the industrialized nations and the emerging countries has so far received little attention. There is a large theoretical literature on the operation of and rationale for internal capital markets. Internal capital markets differ from external capital markets because of asymmetric information, investment incentives, asset specificity, control rights, transaction costs or incomplete markets There has also been considerable debate on the relationship between liquidity and investment (see, for example, Fazzari, Hubbard and Petersen(1988), Hoshi, Kashyap and Scharfstein (1991))that the lender will not carry out the threat in practice, the incentive effect disappears. Although the lender’s behavior is now ex post optimal, both parties may be worse off ex ante.The time inconsistency of commitments that are optimal ex ante and suboptimal ex post is typical in contracting problems. The contract commits one to certain courses of action in order to influence the behavior of the other party. Then once that party’s behavior has been determined, the benefit of the commitment disappears and there is now an incentive to depart from it.Whatever agreements have been entered into are subject to revision because both parties can typically be made better offby “renegotiating” the original agreement. The possibility of renegotiation puts additional restrictions on the kind of contract or agreement that is feasible (we are referring here to the contract or agreement as executed, ratherthan the contract as originally written or conceived) and, to that extent, tends to reduce the welfare of both parties ex ante. Anything that gives the parties a greater power to commit themselves to the terms of the contract will, conversely, be welfare-enhancing.Dewatripont and Maskin (1995) (included as a chapter in this section) have suggested that financial markets have an advantage over financial intermediaries in maintaining commitments to refuse further funding. If the firm obtains its funding from the bond market, th en, in the event that it needs additional investment, it will have to go back to the bond market. Because the bonds are widely held, however, the firm will find it difficult to renegotiate with the bond holders. Apart from the transaction costs involved in negotiating with a large number of bond holders, there is a free-rider problem. Each bond holder would like to maintain his original claim over the returns to the project, while allowing the others to renegotiate their claims in order to finance the additional investment. The free-rider problem, which is often thought of as the curse of cooperative enterprises, turns out to be a virtue in disguise when it comes to maintaining commitments.From a theoretical point of view, there are many ways of maintaining a commitment. Financial institutions may develop a valuable reputation for maintaining commitments. In any one case, it is worth incurring the small cost of a sub-optimal action in order to maintain the value of the reputation. Incomplete information about the borrower’s type may lead to a similar outcome. If default causes the institution to change its beliefs about the defaulter’s type, then it may be optimal to refuse to deal with a firm after it has defaulted. Institutional strategies such as delegating decisions to agents who are given no discretion to renegotiate may also be an effective commitment device.Several authors have argued that, under certain circumstances, renegotiation is welfare-improving. In that case, the Dewatripont-Maskin argument is turned on its head. Intermediaries that establish long-term relationships with clients may have an advantage over financial markets precisely because it is easier for them to renegotiate contracts.The crucial assumption is that contracts are incomplete. Because of the high transaction costs of writing complete contracts, some potentially Pareto-improving contingencies are left out of contracts and securities. This incompleteness of contracts may make renegotiation desirable. The missing contingencies can be replaced by contract adjustments that are negotiated by the parties ex post, after they observe the realization of variables on which the contingencies would have been based. The incomplete contract determines the status quo for the ex post bargaining game (i.e., renegotiation)that determines the final outcome.An import ant question in this whole area is “How important are these relationships empirically?” Here there does not seem to be a lot of evidence.As far as the importance of renegotiation in the sense of Dewatripont and Maskin (1995), the work of Asquith, Gertner and Scharfstein (1994) suggests that little renegotiation occurs in the case of financially distressed firms.Conventional wisdom holds that banks are so well secured that they can and do “pull the plug” as soon as a borrower becomes distressed, leaving theunsecured creditors and other claimants holding the bag.Petersen and Rajan (1994) suggest that firms that have a longer relationship with a bank do have greater access to credit, controlling for a number of features of the borrowers’ history. It is not clea r from their work exactly what lies behind the value of the relationship. For example, the increased access to credit could be an incentive device or it could be the result ofgreater information or the relationship itself could make the borrower more credit worthy. Berger and Udell (1992) find that banks smooth loan rates in response to interest rate shocks. Petersen and Rajan (1995) and Berlin and Mester (1997) find that smoothing occurs as a firm’s credit risk changes.Berlin and Mester (1998) find that loan rate smoothing is associated with lower bank profits. They argue that this suggests the smoothing does not arise as part of an optimal relationship.This section has pointed to a number of issues for future research.• What is the relationship between th e sources of funds for investment,as revealed by Mayer (1988, 1990), and the portfolio choices of investorsand institutions? The answer to this question may shed some light onthe relative importance of external and internal finance.• Why are financing patterns so different in developing and developedeconomies?• What is the empirical importance of long-term relationships? Is renegotiationimportant is it a good thing or a bad thing?• Do long-term relationships constitute an important advantage of bankbasedsystems over market-based systems?金融体系的比较1、什么是金融体系?一个金融系统的目的(作用)是将资金从盈余者(机构)向短缺者(机构)转移(输送)。
金融风险管理外文翻译文献
金融风险管理外文翻译文献(文档含英文原文和中文翻译)原文:Enterprise Risk Management in InsuranceEnterprise Risk Management (hereinafter referred as “ERM”) interests a wide range of professions (e.g., actuaries, corporate financial managers, underwriters, accountants,and internal auditors), however, current ERM solutions often do not cover all risks because they are motivated by the core professional ethics and principles of these professions who design and administer them. In a typical insurance company all such professions work as a group to achieve the overriding corporate objectives.Risk can be defined as factors which prevent an organization in achieving its objectives and risks affect organizations holistically. The management of risk in isolation often misses its big picture. It is argued here that a holistic management of risk is logical and is the ultimate destination of all general management activities.Moreover, risk management should not be a separate function of the business process;rather, managing downside risk and taking the opportunities from upside risk should be thekey management goals. Consequently, ERM is believed as an approach to risk management, which provides a common understanding across the multidisciplinary groups of people of the organization. ERM should be proactive and its focus should be on the organizations future. Organizations often struggle to see and understand the full risk spectrum to which they are exposed and as a result they may fail to identify the most vulnerable areas of the business. The effective management of risk is truly an interdisciplinary exercise grounded on a holistic framework.Whatever name this new type of risk management is given (the literature refers to it by diverse names, such as Enterprise Risk Management, Strategic Risk Management, and Holistic Risk Management) the ultimate focus is management of all significant risks faced by the organization. Risk is an integral part of each and every action of the organization in the sense that an organization is a basket of contracts associated with risk (in terms of losses and opportunities). The idea of ERM is simple and logical, but implementation is difficult. This is because its involvement with a wide stakeholder community, which in turn involves groups from different disciplines with different beliefs and understandings. Indeed, ERM needs theories (which are the interest of academics) but a grand theory of ERM (which invariably involves an interdisciplinary concept) is far from having been achieved.Consequently, for practical proposes, what is needed is the development of a framework(a set of competent theories) and one of the key challenges of this thesis is to establish the key features of such a framework to promote the practice of ERM. Multidisciplinary Views of RiskThe objective of the research is to study the ERM of insurance companies. In line with this it is designed to investigate what is happening practically in the insurance industry at the current time in the name of ERM. The intention is to minimize the gap between the two communities (i.e., academics and practitioners) in order to contribute to the literature of risk management.In recent years ERM has emerged as a topic for discussion in the financial community,in particular, the banks and insurance sectors. Professional organizations have published research reports on ERM. Consulting firms conducted extensive studies and surveys on the topic to support their clients. Rating agencies included theERM concept in their rating criteria. Regulators focused more on the risk management capability of the financial organizations. Academics are slowly responding on the management of risk in a holistic framework following the initiatives of practitioners.The central idea is to bring the organization close to the market economy. Nevertheless,everybody is pushing ERM within the scope of their core professional understanding.The focus of ERM is to manage all risks in a holistic framework whatever the source and nature. There remains a strong ground of knowledge in managing risk on an isolated basis in several academic disciplines (e.g., economics, finance, psychology,sociology, etc.). But little has been done to take a holistic approach of risk beyond disciplinary silos. Moreover, the theoretical understanding of the holistic (i.e., multidisciplinary)properties of risk is still unknown. Consequently, there remains a lack of understanding in terms of a common and interdisciplinary language for ERM.Risk in FinanceIn finance, risky options involve monetary outcomes with explicit probabilities and they are evaluated in terms of their expected value and their riskiness. The traditional approach to risk in finance literature is based on a mean-variance framework of portfolio theory, i.e., selection and diversification. The idea of risk in finance is understood within the scope of systematic (non-diversifiable) risk and unsystematic (diversifiable)risk. It is recognized in finance that systematic risk is positively correlated with the rate of return. In addition, systematic risk is a non-increasing function of a firm’s growth in terms of earnings. Another established concern in finance is default risk and it is argued that the performance of the firm is linked to the firm’s default risk. A large part of finance literature deals with severa l techniques of measuring risks of firms’ investment portfolios (e.g., standard deviation, beta, VaR, etc.). In addition to the portfolio theory, Capital Asset Pricing Model (CAPM) was discovered in finance to price risky assets on the perfect capital markets. Finally, derivative markets grew tremendously with the recognition of option pricing theory.Risk in EconomicsRisk in economics is understood within two separate (independent) categories,i.e.,endogenous (controllable) risk and background (uncontrollable) risk. It is recognized that economic decisions are made under uncertainty in the presence of multiple risks.Expected Utility Theory argues that peoples’ risk attitude on the size of risk (small,medium, large) is derived from the utility-of-wealth function, where the utilities of outcomes are weighted by their probabilities. Economists argue that people are risk averse (neutral) when the size of the risks is large (small).Prospect theory provides a descriptive analysis of choice under risk. In economics, the concept of risk-bearing preferences of agents for independent risks was described under the notion of “ standard risk aversion.” Most of the economic research on risk is originated on the study of decision making behavior on lotteries and other gambles. Risk in PsychologyWhile economics assumes an individual’s risk preference is a function of probabilistic beliefs, psychology explores how human judgment and behavior systematically forms such beliefs. Psychology talks about the risk taking behavior (risk preferences).It looks for the patterns of human reactions to the context, reference point,mental categories and associations that influence how people make decisions.The psychological approach to risk draws upon the notion of loss aversion that manife sts itself in the related notion of “regret.” According to Willett; “risk affects economic activity through the psychological influence of uncertainty.” Managers’ attitude of risk taking is often described from the psychological point of view in terms of feelings.Psychologists argue that risk, as a multidisciplinary concept, can not be reduced meaningfully by a single quantitative treatment. Consequently, managers tend to utilize an array of risk measurers to assist them in the decision making process under uncertainty. Risk perception plays a central role in the psychological research on risk, where the key concern is how people perceive risk and how it differs to the actual outcome. Nevertheless, the psychological research on risk provides fundamental knowledge of how emotions are linked to decision making.Risk in SociologyIn sociology risk is a socially constructed phenomenon (i.e., a social problem) and defined as a strategy referring to instrumental rationality. The sociologicalliterature on risk was originated from anthropology and psychology is dominated by two central concepts. First, risk and culture and second, risk society. The negative consequences of unwanted events (i.e., natural/chemical disasters, food safety) are the key focus of sociological researches on risk. From a sociological perspective entrepreneurs remain liable for the risk of the society and responsible to share it in proportion to their respective contributions. Practically, the responsibilities are imposed and actions are monitored by state regulators and supervisors.Nevertheless, identification of a socially acceptable threshold of risk is a key challenge of many sociological researches on risk.Convergence of Multidisciplinary Views of RiskDifferent disciplinary views of risk are obvious. Whereas, economics and finance study risk by examining the distribution of corporate returns, psychology and sociology interpret risk in terms of its behavioral components. Moreover, economists focus on the economic (i.e., commercial) value of investments in a risky situation.In contrast, sociologists argue on the moral value (i.e., sacrifice) on the risk related activities of the firm. In addition, sociologists’ criticism of economists’concern of risk is that although they rely on risk, time, and preferences while describing the issues related to risk taking, they often miss out their interrelationships(i.e., narrow perspective). Interestingly, there appears some convergence of economics and psychology in the literature of economic psychology. The intention is to include the traditional economic model of individuals’ formal rational action in the understanding of the way they actually think and behave (i.e., irrationality).In addition, behavioral finance is seen as a growing discipline with the origin of economics and psychology. In contrast to efficient market hypothesis behaviour finance provides descriptive models in making judgment under uncertainty.The origin of this convergence was due to the discovery of the prospect theory in the fulfillment of the shortcomings of von Neumann-Morgenstern’s utility theory for providing reasons of human (irrational) behavior under uncertainty (e.g., arbitrage).Although, the overriding enquiry of disciplines is the estimation of risk, they comparing and reducing into a common metric of many types of risks are there ultimate difficulty. The key conclusion of the above analysis suggests that there existoverlaps on the disciplinary views of risk and their interrelations are emerging with the progress of risk research. In particular, the central idea of ERM is to obscure the hidden dependencies of risk beyond disciplinary silos.Insurance Industry PracticeThe practice of ERM in the insurance industry has been drawn from the author’s PhD research completed in 2006. The initiatives of four major global European insurers(hereinafter referred as “CASES”) were studied for this purpose. Out of these four insurers one is a reinsurer and the remaining three are primary insurers. They were at various stages of designing and implementing ERM. A total of fifty-one face-to-face and telephone interviews were conducted with key personnel of the CASES in between the end of 2004 and the beginning of 2006. The comparative analysis (compare-and-contrast) technique was used to analyze the data and they were discussed with several industry and academic experts for the purpose of validation. Thereafter,a conceptual model of ERM was developed from the findings of the data.Findings based on the data are arranged under five dimensions. They are understanding;evaluation; structure; challenges, and performance of ERM. Understanding of ERMIt was found that the key distinction in various perceptions of ERM remains between risk measurement and risk management. Interestingly, tools and processes are found complimentary. In essence, meaning that a tool can not run without a process and vice versa. It is found that the people who work with numbers (e.g.,actuaries, finance people, etc.) are involved in the risk modeling and management(mostly concerned with the financial and core insurance risks) and tend to believe ERM is a tool. On the other hand internal auditors, company secretaries, and operational managers; whose job is related to the human, system and compliance related issues of risk are more likely to see ERM as a process.ERM: A ProcessWithin the understanding of ERM as a process, four key concepts were found. They are harmonization, standardization, integration and centralization. In fact, they are linked to the concept of top-down and bottom-up approaches of ERM.The analysis found four key concepts of ERM. They are harmonization,standardization,integration and centralization (in decreasing order of importance). It was also found that a unique understanding of ERM does not exist within the CASES, rather ERM is seen as a combination of the four concepts and they often overlap. It is revealed that an understanding of these four concepts including their linkages is essential for designing an optimal ERM system.Linkages Amongst the Four ConceptsAlthough harmonization and standardization are seen apparently similar respondents view them differently. Whereas, harmonization allows choices between alternatives,standardization provides no flexibility. Effectively, harmonization offers a range of identical alternatives, out of which one or more can be adopted depending on the given circumstances. Although standardization does not offer such flexibility,it was found as an essential technique of ERM. Whilst harmonization accepts existing divergence to bring a state of comparability, standardization does not necessarily consider existing conventions and definitions. It focuses on a common standard, (a “top-down” approach). Indeed, integration of competent policies and processes,models, and data (either for management use, compliance and reporting) are not possible for global insurers without harmonizing and standardizing them. Hence, the research establishes that a sequence (i.e., harmonization, standardization, integration,and then centralization) is to be maintained when ERM is being developed in practice (from an operational perspective). Above all, the process is found important to achieve a diversified risk culture across the organization to allocate risk management responsibilities to risk owners and risk takers.ERM: A ToolViewed as a tool, ERM encompasses procedures and techniques to model and measure the portfolio of (quantifiable) enterprise risk from insurers’ core disciplinary perspective. The objective is to measure a level of (risk adjusted) capital(i.e., economic capital) and thereafter allocation of capital. In this perspective ERM is thought as a sophisticated version of insurers’ asset-liability management.Most often, extreme and emerging risks, which may bring the organization down,are taken into consideration. Ideally, the procedure of calculating economic capital is closely linked to the market volatility. Moreover, the objective is clear, i.e., meetingthe expectation of shareholders. Consequently, there remains less scope to capture the subjectivity associated with enterprise risks.ERM: An ApproachIn contrast to process and tool, ERM is also found as an approach of managing the entire business from a strategic point of view. Since, risk is so deeply rooted in the insurance business, it is difficult to separate risk from the functions of insurance companies. It is argued that a properly designed ERM infrastructure should align risk to achieve strategic goals. Alternatively, application of an ERM approach of managing business is found central to the value creation of insurance companies.In the study, ERM is believed as an approach of changing the culture of the organization in both marketing and strategic management issues in terms of innovating and pricing products, selecting profitable markets, distributing products, targeting customers and ratings, and thus formulating appropriate corporate strategies. In this holistic approach various strategic, financial and operational concerns are seen integrated to consider all risks across the organization.It is seen that as a process, ERM takes an inductive approach to explore the pitfalls (challenges) of achieving corporate objectives for broader audience (i.e.,stakeholders) emphasizing more on moral and ethical issues. In contrast, as a tool,it takes a deductive approach to meet specific corporate objectives for selected audience(i.e., shareholders) by concentrating more on monitory (financial) outcomes.Clearly, the approaches are complimentary and have overlapping elements. 作者:M Acharyya译文:保险业对企业风险管理的实证研究企业风险管理涉及各种行业(如保险精算师、公司财政经理、保险商、会计和内部审计员),当前企业风险管理解决方案往往不能涵盖所有的风险,因为这些方案取决于决策者和执行则的专业道德和原则。
互联网金融安全中英文对照外文翻译文献
互联网金融安全中英文对照外文翻译文献中英文对照外文翻译文献(文档含英文原文和中文翻译)Database Security in a Web Environment IntroductionDatabases have been common in government departments and commercial enterprises for many years. Today, databases in any organization are increasingly opened up to a multiplicity of suppliers, customers, partners and employees - an idea that would have been unheard of a few years ago. Numerous applications and their associated data are now accessed by a variety of users requiring different levels of access via manifold devices and channels – often simultaneously. For example:• Online banks allow customers to perform a variety of banking operations - via the Internet and over the telephone – whilst maintaining the privacy of account data.• E-Commerce merchants and their Service Providers must store customer, order and payment data on their merchant server - and keep it secure.• HR departments allow employees to update their personal information –whilst protecting certain management information from unauthorized access.• The medical profession must protect the confidentiality of patient data –whilst allowing essential access for treatment.• Online brokerages need to be able to provide large numbers of simultaneous users with up-to-date and accurate financial information.This complex landscape leads to many new demands upon system security. The global growth of complex web-based infrastructures is driving a need for security solutions that provide mechanisms to segregate environments; perform integrity checking and maintenance; enable strong authentication andnon-repudiation; and provide for confidentiality. In turn, this necessitates comprehensive business and technical risk assessment to identify the threats,vulnerabilities and impacts, and from this define a security policy. This leads to security definitions throughout the infrastructure - operating system, database management system, middleware and network.Financial, personal and medical information systems and some areas of government have strict requirements for security and privacy. Inappropriate disclosure of sensitive information to the wrong parties can have severe social, legal and regulatory consequences. Failure to address the basics can result in substantial direct and consequential financial losses - witness the fraud losses through the compromise of several million credit card numbers in merchants’ databases [Occf], plus associated damage to brand-image and loss of consumer confidence.This article discusses some of the main issues in database and web server security, and also considers important architecture and design issues.A Simple ModelAt the simplest level, a web server system consists of front-end software and back-end databases with interface software linking the two. Normally, the front-end software will consist of server software and the network server operating system, and the back-end database will be a relational orobject-oriented database fulfilling a variety of functions, including recording transactions, maintaining accounts and inventory. The interface software typically consists of Common Gateway Interface (CGI) scripts used to receive information from forms on web sites to perform online searches and to update the database.Depending on the infrastructure, middleware may be present; in addition, security management subsystems (with session and user databases) that address the web server’s and related applications’ requirements for authentication, accesscontrol and authorization may be present. Communications between this subsystem and either the web server, middleware or database are via application program interfaces (APIs)..This simple model is depicted in Figure 1.Security can be provided by the following components:• Web server.• Middleware.• Operating system.. Figure 1: A Simple Model.• Database and Database Management System.• Security management subsystem.The security of such a system addressesAspects of authenticity, integrity and confidentiality and is dependent on the security of the individual components and their interactions. Some of the most common vulnerabilities arise from poor configuration, inadequate change control procedures and poor administration. However, even if these areas are properlyaddressed, vulnerabilities still arise. The appropriate combination of people, technology and processes holds the key to providing the required physical and logical security. Attention should additionally be paid to the security aspects of planning, architecture, design and implementation.In the following sections, we consider some of the main security issues associated with databases, database management systems, operating systems and web servers, as well as important architecture and design issues. Our treatment seeks only to outline the main issues and the interested reader should refer to the references for a more detailed description.Database SecurityDatabase management systems normally run on top of an operating system and provide the security associated with a database. Typical operating system security features include memory and file protection, resource access control and user authentication. Memory protection prevents the memory of one program interfering with that of another and limits access and use of the objects employing techniques such as memory segmentation. The operating system also protects access to other objects (such as instructions, input and output devices, files and passwords) by checking access with reference to access control lists. Security mechanisms in common operating systems vary tremendously and, for those that are lacking, there exists special-purpose security software that can be integrated with the existing environment. However, this can be an expensive, time-consuming task and integration difficulties may also adversely impact application behaviors.Most database management systems consist of a number of modules - including database querying and database and file management - along with authorization, concurrent access and database description tables. Thesemanagement systems also use a variety of languages: a data definition language supports the logical definition of the database; developers use a data manipulation language; and a query language is used by non-specialist end-users.Database management systems have many of the same security requirements as operating systems, but there are significant differences since the former are particularly susceptible to the threat of improper disclosure, modification of information and also denial of service. Some of the most important security requirements for database management systems are: • Multi-Level Access Control.• Confidentiality.• Reliability.• Integrity.• Recovery.These requirements, along with security models, are considered in the following sections.Multi-Level Access ControlIn a multi-application and multi-user environment, administrators, auditors, developers, managers and users – collectively called subjects - need access to database objects, such as tables, fields or records. Access control restricts the operations available to a subject with respect to particular objects and is enforced by the database management system. Mandatory access controls require that each controlled object in the database must be labeled with a security level, whereas discretionary access controls may be applied at the choice of a subject.Access control in database management systems is more complicated than in operating systems since, in the latter, all objects are unrelated whereas in a database the converse is true. Databases are also required to make accessdecisions based on a finer degree of subject and object granularity. In multi-level systems, access control can be enforced by the use of views - filtered subsets of the database - containing the precise information that a subject is authorized to see.A general principle of access control is that a subject with high level security should not be able to write to a lower level object, and this poses a problem for database management systems that must read all database objects and write new objects. One solution to this problem is to use a trusted database management system.ConfidentialitySome databases will inevitably contain what is considered confidential data. For example, it could be inherently sensitive or its source may be sensitive, or it may belong to a sensitive table, thus making it difficult to determine what is actually confidential. Disclosure is also difficult to define, as it can be direct, indirect, involve the disclosure of bounds or even mere existence.An inference problem exists in database management systems whereby users can infer sensitive information from relatively insensitive queries. A trivial example is a request for information about the average salary of an employee and the number of employees turns out to be just one, thus revealing the employee’s salary. However, much more sophisticated statistical inference attacks can also be mounted. This highlights the fact that, although the data itself may be properly controlled, confidential information may still leak out.Controls can take several forms: not divulging sensitive information to unauthorized parties (which depends on the respective subject and object security levels), logging what each user knows or masking response data. The first control can be implemented fairly easily, the second quickly becomesunmanageable for a large number of users and the third leads to imprecise responses, and also exemplifies the trade-off between precision and security. Polyinstantiation refers to multiple instances of a data object existing in the database and it can provide a partial solution to the inference problem whereby different data values are supplied, depending on the security level, in response to the same query. However, this makes consistency management more difficult.Another issue that arises is when the security level of an aggregate amount is different to that of its elements (a problem commonly referred to as aggregation). This can be addressed by defining appropriate access control using views.Reliability, Integrity and RecoveryArguably, the most important requirements for databases are to ensure that the database presents consistent information to queries and can recover from any failures. An important aspect of consistency is that transactions execute atomically; that is, they either execute completely or not at all.Concurrency control addresses the problem of allowing simultaneous programs access to a shared database, while avoiding incorrect behavior or interference. It is normally addressed by a scheduler that uses locking techniques to ensure that the transactions are serial sable and independent. A common technique used in commercial products is two-phase locking (or variations thereof) in which the database management system controls when transactions obtain and release their locks according to whether or not transaction processing has been completed. In a first phase, the database management system collects the necessary data for the update: in a second phase, it updates the database. This means that the database can recover from incomplete transactions by repeatingeither of the appropriate phases. This technique can also be used in a distributed database system using a distributed scheduler arrangement.System failures can arise from the operating system and may result in corrupted storage. The main copy of the database is used for recovery from failures and communicates with a cached version that is used as the working version. In association with the logs, this allows the database to recover to a very specific point in the event of a system failure, either by removing the effects of incomplete transactions or applying the effects of completed transactions. Instead of having to recover the entire database after a failure, recovery can be made more efficient by the use of check pointing. It is used during normal operations to write additional updated information - such as logs, before-images of incomplete transactions, after-images of completed transactions - to the main database which reduces the amount of work needed for recovery. Recovery from failures in distributed systems is more complicated, since a single logical action is executed at different physical sites and the prospect of partial failure arises.Logical integrity, at field level and for the entire database, is addressed by the use of monitors to check important items such as input ranges, states and transitions. Error-correcting and error-detecting codes are also used.Security ModelsVarious security models exist that address different aspects of security in operating systems and database management systems. For example, theBell-LaPadula model defines security in terms of mandatory access control and addresses confidentiality only. The Bell LaPadula models, and other models including the Biba model for integrity, are described more fully in [Cast95] and [Pfle89]. These models are implementation-independent and provide a powerfulinsight into the properties of secure systems, lead to design policies and principles, and some form the basis for security evaluation criteria.Web Server SecurityWeb servers are now one of the most common interfaces between users and back-end databases, and as such, their security becomes increasingly important. Exploitation of vulnerabilities in the web server can lead to unforeseen attacks on middleware and backend databases, bypassing any controls that may be in place. In this section, we focus on common web server vulnerabilities and how the authentication requirements of web servers and databases are met.In general, a web server platform should not be shared with other applications and should be the only machine allowed to access the database. Using a firewall can provide additional security - either between the web server and users or between the web server and back-end database - and often the web server is placed on a de-militarized zone (DMZ) of a firewall. While firewalls can be used to block certain incoming connections, they must allow HTTP (and HTTPS) connections through to the web server, and so attacks can still be launched via the ports associated with these connections.VulnerabilitiesVulnerabilities appear on a weekly basis and, here, we prefer to focus on some general issues rather than specific attacks. Common web server vulnerabilities include:• No policy exists.• The default configuration is on.• Reusable passwords appear in clear.• Unnecessary ports available for network services are not disabled.• New security holes are not tracked. Even if they are, well-known vulnerabilities are not always fixed as the source code patches are not applied by system administrator and old programs are not re-compiled or removed.• Security tools are not used to scan the network for weaknesses and changes or to detect intrusions.• Faulty and buggy software - for example, buffer overflow and stack smashingAttacks• Automatic directory listings - this is of particular concern for the interface software directories.• Server root files are generally visible or accessible.• Lack of logs and bac kups.• File access is often not explicitly configured by the system administrator according to the security policy. This applies to configuration, client, administration and log files, administration programs, and CGI program sources and executables. CGI scripts allow dynamic web pages and make program development (in, for example, Perl) easy and rapid. However, their successful exploitation may allow execution of malicious programs, launching ofdenial-of-service attacks and, ultimately, privilege escalation on a server.Web Server and Database AuthenticationWhile user, browser and web server authentication are relatively well understood [Garf97], [Ghos98] and [Tree98], the introduction of additional components, such as databases and middleware, raise a number of authentication issues. There are a variety of options for authentication in a simple model (Figure 1). Firstly, both the web server and database management system can individually authenticate a user. This option requires the user to authenticatetwice which may be unacceptable in certain applications, although a singlesign-on device (which aims to manage authentication in a user-transparent way) may help. Secondly, a common approach is for the database to automatically grant user access based on web server authentication. However, this option should only be used for accessing publicly available information. Finally, the database may grant user access employing the web server authentication credentials as a basis for its own user authentication, using security management subsystems (Figure 1). We consider this last option in more detail.Web-based communications use the stateless HTTP protocol with the implication that state, and hence authentication, is not preserved when browsing successive web pages. Cookies, or files placed on user’s machine by a web server, were developed as a means of addressing this issue and are often used to provide authentication. However, after initial authentication, there is typically no re authentication per page in the same realm, only the use of unencrypted cookies (sometimes in association with IP addresses). This approach provides limited security as both cookies and IP addresses can be tampered with or spoofed.A stronger authentication method, commonly used by commercial implementations, uses digitally signed cookies. This allows additional systems, such as databases, to use digitally signed cookie data, including a session ID, as a basis for authentication. When a user has been authenticated by a web server (using a password, for example), a session ID is assigned and is stored in a security management subsystem database. When a user subsequently requests information from a database, the database receives a copy of the session ID, the security management subsystem checks this session ID against its local copy and, if authentication is successful, user access is granted to the database.The session ID is typically transmitted in the clear between the web server and database, but may be protected by SSL or even by physical security measures. The communications between the browser and web servers, and the web servers and security management subsystem (and its databases), are normally protected by SSL and use a web server security API that is used to digitally sign and verify browser cookies. The communications between the back-end databases and security management subsystem (and its databases) are also normally protected by SSL and use a database security API that verifies session Ids originating from the database and provides additional user authorization credentials. The web server security API is generally proprietary while, for the database security API, many vendors have adopted standards such as the Generic Security Services API (GSS-API) or CORBA [RFC2078] and [Corba].Architecture and DesignSecurity requirements for designing, building and implementing databases are important so that the systems, as part of the overall infrastructure, meet their requirements in actual operation. The various security models provide an important insight into the design requirements for databases and their management systems.Secure Database Management System ArchitecturesIn multi-level database management systems, a variety of architectures are possible: trusted subject, integrity locked, kernels and replicated. Trusted subject is used by most of the leading database management system vendors and can be integrated in existing products. Basically, the trusted subject architecture allows users to access a database via an un trusted front-end, a trusted database management system and trusted operating system. The operating systemprovides physical access to the database and the database management system provides multilevel object protection.The other architectures - integrity locked, kernels and replicated - all vary in detail, but they use a trusted front-end and an un trusted database management system. For details of these architectures and research prototypes, the reader is referred to [Cast95]. Different architectures are suited to different environments: for example, the trusted subject architecture is less integrated with the underlying operating system and is best suited when a trusted path can be assured between applications and the database management system.Secure Database Management System DesignAs discussed above, there are several fundamental differences between operating system and database management system design, including object granularity, multiple data types, data correlations and multi-level transactions. Other differences include the fact that database management systems include both physical and logical objects and that the database lifecycle is normally longer.These differences must be reflected in the design requirements which include:• Access, flow and infer ence controls.• Access granularity and modes.• Dynamic authorization.• Multi-level protection.• Polyinstantiation.• Auditing.• Performance.These requirements should be considered alongside basic information integrity principles, such as:• Well-formed transactions - to ensure that transactions are correct and consistent.• Continuity of operation - to ensure that data can be properly recovered, depending on the extent of a disaster.• Authorization and role management – to ensure that distinct roles are defined and users are authorized.• Authenticated users - to ensure that users are authenticated.• Least privilege - to ensure that users have the minimal privilege necessary to perform their tasks.• Separation of duties - to ensure that no single individual has access to critical data.• Delegation of authority - to ensure that the database management system policies are flexible enough to meet the organization’s requirements.Of course, some of these requirements and principles are not met by the database management system, but by the operating system and also by organizational and procedural measures.Database Design MethodologyVarious approaches to design exist, but most contain the same main stages. The principle aim of a design methodology is to provide a robust, verifiable design process and also to separate policies from how policies are actually implemented. An important requirement during any design process is that different design aspects can be merged and this equally applies to security.A preliminary analysis should be conducted that addresses the system risks, environment, existing products and performance. Requirements should then beanalyzed with respect to the results of a risk assessment. Security policies should be developed that include specification of granularity, privileges and authority.These policies and requirements form the input to the conceptual design that concentrates on subjects, objects and access modes without considering implementation details. Its purpose is to express information and process flows in a complete and consistent way.The logical design takes into account the operating system and database management system that will be used and which of the security requirements can be provided by which mechanisms. The physical design considers the actual physical realization of the logical design and, indeed, may result in a revision of the conceptual and logical phases due to physical constraints.Security AssuranceOnce a product has been developed, its security assurance can be assessed by a number of methods including formal verification, validation, penetration testing and certification. For example, if a database is to be certified as TCSEC Class B1, then it must implement the Bell-LaPadula mandatory access control model in which each controlled object in the database must be labeled with a security level.Most of these methods can be costly and lengthy to perform and are typically specific to particular hardware and software configurations. However, the international Common Criteria certification scheme provides the added benefit of a mutual recognition arrangement, thus avoiding the prospect of multiple certifications in different countries.ConclusionThis article has considered some of the security principles that are associated with databases and how these apply in a web based environment. Ithas also focused on important architecture and design principles. These principles have focused mainly on the prevention, assurance and recovery aspects, but other aspects, such as detection, are equally important in formulating a total information protection strategy. For example, host-based intrusion detection systems as well as a robust and tested set of business recovery procedures should be considered.Any fit-for-purpose, secure e-business infrastructure should address all the above aspects: prevention, assurance, detection and recovery. Certain industries are now starting to specify their own set of global, secure e-business requirements. International card payment associations have recently started to require minimum information security standards from electronic commerce merchants handling credit card data, to help manage fraud losses and associated impacts such as brand-image damage and loss of consumer confidence.网络环境下的数据库安全简介数据库在政府部门和商业机构得到普遍应用已经很多年了。
P2P金融模式互联网金融外文文献翻译最新译文
文献出处:Aronson J. The research of P2P model of financial [J] Value Creation in E-Business Management, 2016,12(5):85-95.原文The research of P2P model of financialAronson JAbstractThe development of the Internet financial, constantly create new financial model, P2P is one of the new financial model, the development of rapid direct threat to the commercial Banks in the financial world's dominance. In P2P explosive savage growth process, however, there are regulatory or incomplete system, risk control measures is not mature, P2P financial platform collapse would happen often, this leads to the development of P2P is in trouble Based on this, this paper introduces the P2P concepts and the reasons on the basis of the financial model, analyzes the difficulties faced by the current P2P financial model, and accordingly put forward the development of P2P financial model.Keywords: P2P financial mode; The theoretical analysis; Measures1 IntroductionThe wide application of Internet technology, when science and technology combined with financial, gives rise to some emerging Internet model, P2P has greatly reduced the transaction cost, satisfy the customer demand for financial, especially the working class and the small and medium-sized enterprise loan demand. But so far, due to the lack of innovation mode of financial supervision, to information asymmetry, imperfect credit system construction, and low security of adverse effect caused by funds, hindered the healthy and orderly development of P2P.For Internet financial can inject vigor, continuing for the financial sector to the real economy better service, we must strengthen the industry regulation, establish effective credit evaluation system and P2P platform to establish effective risk control system.So-called peer-to-peer (P2P), is the abbreviation of English Peer to Peer, meaning "person-to-person", refers to the directly by third-party Internet platform of money lending financing behavior, is a kind of direct financing behavior of individualto individual. It originated in Britain, and later to the United States, Germany and other countries, China introduced in 2007.In our country, its typical model is: the network credit companies provide a platform, by borrowing free bids, brokered transactions. Money lenders to obtain interest income with the risk; Money borrowed people due to repay the principal, the network credit charge intermediary company.Peer-to-peer (P2P) the causes of financial mode mainly lies in the fact that Internet technology rapidly Exhibition. With the development of Internet, the scope of its popularization in our country is more and more widely, new technology and new business forms appear constantly, and gradually extended to the financial sector, the financial and the Internet fusion degree in the process of deepening, the financial industry got the booming development, at the same time, also produced a P2P financial mode; Fill the shortcoming in traditional financial business function in our country at present. Let those be bank financial products and loan threshold shut out of the working class and the small and medium-sized enterprises can also have the opportunity to enjoy the financial services. Working class a large body of demand for money have great demand; Other small and medium-sized enterprises (SEM) in many places the arrested development, mainly due to small and medium-sized enterprises (smes) in bank loans difficult, loans due to the high cost. In order to promote the development of their own, small and medium-sized enterprises to seek other financing mode, which promote the generation of the P2P financial model.2 The status quo of P2P financial model2.1 P2P financial models lack of effective supervisionRelative to the early start of online banking, online securities and so on in the form of financial regulatory policy relatively incomplete, relatively mature management framework. But P2P financial mode in 2012 entered the blowout outbreak period. But the Internet financial regulatory agencies and related regulatory policy did not keep up with the pace of its rapid development, for the development of P2P is also hinder the role. Should be further follow relevant regulations to meet the constantly enrich and expand the urgent needs of the emerging financial forms. The lack of regulation for a long time, has been out of the grey zone and regulatory gap,there are low barriers to entry, lending money monitoring vacancy, credit evaluation system is not sound, and many other problems.The industry has been in a savage growth state, run, capital chain rupture and collapse phenomenon appeared frequently. ack of legal norms, unclear regulatory policy, business operation is not standard to causes such as the chaos of industry management.2.2 Domestic credit system construction is not perfectThe Internet in the financial, financial credit system is the basis of the healthy and standardizing development of the financial industry, the Internet. But the current construction of credit system is not perfect, personal credit record includes only with bank lending behavior and maintain within the Banks, other financial institutions can't call society.P2P network platform loan borrowers can only through an indirect way to verify information and the judgment through the subjective experience of auditors. Abroad in the implementation of a P2P financial model, the comparison of perfect personal credit system construction, when making loans, personal credit can achieve effective query, which leads the P2P financial mode constantly development and improvement. Internet financial enterprise credit reporting database is not perfect in our country, is not included in the central bank credit reporting system, for both the management difficulty is big, no effective mechanism and discipline and punishment.2.3 Information asymmetry cause malicious default riskOf the Internet financial transactions, payments and services are completed on the Internet, virtualization of trading, trading process is not transparent and so on have made the financial risk more diversified and uncontrolled. Of new trading patterns of this for the disclosure of the information has the certain difficulty, in P2P financial mode, due to information asymmetry, P2P platform there may be a risk, the truth of the borrower to provide information due to the master of P2P platform borrowing history data is limited, its credit rating system is also unable to grasp the situation of the borrowers, the condition of the fake information or the borrower. Once appear, default or delay balance, due to recover the cost is higher, lenders are hard to take back the principal and interest of the person failed to perform its obligations due to lending and lead to potential financial damage is one of the reasons that hinder thedevelopment of P2P.3 The implement measures3.1 Encourage innovation to strengthen the basis of industry regulationDue to P2P long-term financial platform is in a state of lack of regulation, resulting in a variety of financial risk problems occur unceasingly, serious impact on the development of P2P financial, based on this, as soon as possible, perfect the construction of Internet financial regulation legal system in our country, should provide a clear and transparent legal environment, including the market access supervision, operation supervision and exit regulatory measures to standardize the development of the P2P network platform. But don't like management of traditional financial institutions, so as not to stifle financial innovation. Perfect financial market system, pratt &whitney financial development, encourage financial innovation, rich level financial markets and products. Regulators want reasonable grasp the boundaries of innovation and strength, not to hinder the sustainable development of financial innovation, whether it be a financial product innovation, and financial service innovation. To strengthen management and ensure that financial security is very necessary, cut can not manage, weaken the vitality of financial innovation.3.2 promoting the construction of credit evaluation systemA severe credit system can restrain people daily financial activity. Therefore, in a constantly enrich financial transaction way to meet the demand of investment and financing of all social strata at the same time, the credit system construction also needs to be perfect and connectivity. At present, the central bank has started the construction of personal credit system, however, the central bank alone is not enough to build personal credit system, and will result in incomplete information system, therefore, in the process of building the personal credit system in the future, should attract more participants, to establish the perfect credit system, make scientific evaluation to the borrower's credit rating, for P2P platform provides necessary judgment. In addition, P2P financial platform should also set up its own credit system, establish a customer database, regular update of customer information in a database, at the same time, guarantee the comprehensiveness and accuracy of the new customerinformation, and effective to evaluate the customer's credit.3.3 P2P platform to strengthen risk control abilityP2P business at the core of the pricing power is in the team's own risk, the risk management ability is the core of the P2P company competitiveness. establish a risk control function is clear, for policy making, the characteristics of customer data mining, overdue customers, study and so on carries on the effective management, to standardize the front-end marketing, China audit, background collection each work orderly. At the same time, digital risk control model is established and the score card system is the effective measure to standardize P2P scientific management, with a complete set of scientific management methods, to cure it to risk control examination and approval decision engines and business process, to guide the business for examination and approval of risk control. Second, compared with the traditional financial institutions such as Banks, Internet financial firms can take advantage of big data analytics, cloud computing technology to manage customer credit evaluation and customer information, above is actually a credit evaluation system and risk control measures of innovation. Third, should attach importance to small and scattered plays important role in reducing risk, network platform, in the face of the large capital demand loan can be systemic forced to spread risk, is more than a sum of money into different sum, scattered the people who need loans to lend, risk can be effectively diluted. Fourth, guarantee qualification can be introduced with a third party professional guarantee companies provide guarantee, in case of bad debts by guarantee company compensation, in order to ensure safe operation, to ensure the safety of information and capital of investors. by using the combined risk of internal and external control means, in view of information asymmetry and capital safety is low in the strong guarantee.Era development is irreversible, the subversion and innovation of the Internet continues, because the P2P financial pattern in the global new things, the speed of development and the construction of the corresponding system is not perfect, resulting in the development of P2P financial face a lot of trouble. despite the difficulties, the game between the various arms intensified, but it's true that the development of P2Pinjected new vitality into the financial sector, in order to promote the healthy and orderly development of P2P, needs to explore the path to promote the development of P2P financial, P2P platform in the process of operation gradually improve risk control ability, ensure the safety of the funds. These efforts will make P2P financial mode gradually towards standardization and legalization, make it effectively fill the shortcoming in traditional financial business function at present, the future will be better able to make the financial service for the real economy, support the national strategic transformation of the economic structure.译文P2P金融模式研究Aronson J摘要互联网金融的发展,不断地创新出新型的金融模式,P2P就是其中一种新型金融模式,其发展的迅速直接威胁到商业银行在金融界的主导地位。
电子银行风险管理互联网金融外文文献翻译2013年3000多字
电子银行风险管理互联网金融外文文献翻译2013年3000多字E-banking has brought about a new set of risks for financial XXX risks include fraud。
processing errors。
system ns。
and other unforeseen events that can result in the XXX products or services。
It is XXX of the n to the customer and the n。
and to XXX.2.Risk management in e-bankingEffective risk management in e-XXX and analyzing potential risks。
XXX risks。
XXX.3.Security measures in e-bankingns should XXX controls。
n。
firewalls。
XXX systems。
and regular security testing and assessments.4.XXXXXX measures。
XXX passwords。
avoiding phishing scams。
XXX.5.nOverall。
effective risk management is essential for financial XXX。
ns XXX.XXX access accounts。
conduct ns。
and obtain n on financial products and services via public or private orks。
including the。
and mobile phones。
Customers can use us electronic devices。
互联网金融P2P网络借贷外文翻译文献
文献信息:文献标题:Evaluating credit risk and loan performance in online Peer-to-Peer (P2P) lending(点对点(P2P)网络借贷的信用风险与贷款绩效评估)国外作者:Riza Emekter, Yanbin Tu, Benjamas Jirasakuldech, Min Lu 文献出处:《Applied Economics》, 2015, 47(1):54-70字数统计:英文3063单词,15818字符;中文5110汉字外文文献:Evaluating credit risk and loan performance in onlinePeer-to-Peer (P2P) lendingAbstract Online Peer-to-Peer (P2P) lending has emerged recently. This micro loan market could offer certain benefits to both borrowers and lenders. Using data from the Lending Club, which is one of the popular online P2P lending houses, this article explores the P2P loan characteristics, evaluates their credit risk and measures loan performances. We find that credit grade, debt-to-income ratio, FICO score and revolving line utilization play an important role in loan defaults. Loans with lower credit grade and longer duration are associated with high mortality rate. The result is consistent with the Cox Proportional Hazard test which suggests that the hazard rate or the likelihood of the loan default increases with the credit risk of the borrowers. Finally, we find that higher interest rates charged on the highrisk borrowers are not enough to compensate for higher probability of the loan default. The Lending Club must find ways to attract high FICO score and high-income borrowers in order to sustain their businesses.Key words: Peer-to-Peer lending; credit grade; FICO score; default riskI.IntroductionWith the advent of Web 2.0, it has become easy to create online markets and virtual communities with convenient accessibility and strong collaboration.One of the emerging Web 2.0 applications is the online Peer-to-Peer (P2P) lending marketplaces, where both lenders and borrowers can virtually meet for loan transactions. Such marketplaces provide a platform service of introducing borrowers to lenders, which can offer some advantages for both borrowers and lenders. Borrowers can get micro loans directly from lenders, and might pay lower rates than commercial credit alternatives. On the other hand, lenders can earn higher rates of return compared to any other type of lending such as corporate bonds, bank deposits or certificate of deposits. One of the problems in online P2P lending is information asymmetry between the borrower and the lender. That is, the lender does not know the borrower's credibility as well as the borrower does. Such information asymmetry might result in adverse selection (Akerlof, 1970) and moral hazard (Stiglitz and Weiss, 1981). Theoretically, some of these problems can be alleviated by regular monitoring, but this approach poses a challenge in the online environment because the borrowers and the buyers do not physically meet. Fostering and enhancing the lender's trust in the borrower can also be implemented to mitigate adverse selection and moral hazard problems. In the traditional bank-lending markets, banks can use collateral, certified accounts, regular reporting, and even presence of the board of directors to enhance the trust in the borrower. However, such mechanisms are difficult to implement in the online environment which will incur a significant transaction cost.To reduce lending risks associated with information asymmetry, current online P2P lending has the following arrangements. First, the Lending Club screens out any potential high-risk borrowers based on the FICO score. The minimum FICO score to be able to participate is 640. Second, the typical size of the loans produced in this market is small, which is under $35 000 at the Lending Club. Therefore, these loans are essentially microloans which pose a relatively small loss in case of default. Third, the market maker offers matchmaking systems which can be used to generate portfolio recommendations and minimize lending risks. Fourth, if a borrower fails to pay, the market maker will report the case to a credit agency and hire a collectionagency to collect the funds on behalf of the lender. Although there are certain structures imposed in the online P2P that help to minimize the risk, this form of lending is inherently associated with greater amount of risk compared to the traditional lending.The purpose of this article is to evaluate the credit risk of borrowers from one of the largest P2P platforms in the United States provided by the Lending Club, which help lenders to make more informed decisions about the risk and return efficiency of loans based on the borrowers' grade. There are two related research questions this article will address: (1) What are some of the borrowers' characteristics that help determine the default risk? and (2) Is the higher return generated from the riskier borrower large enough to compensate for the incremental risk? Lenders can allocate their investments more efficiently if they know what characteristics of the borrower affect the default risk. Each borrower is classified by credit grade with corresponding borrowing rate assigned by the Lending Club. To make an efficient allocation, a lender should know whether the higher interest rates set for high-risk borrowers are sufficient to compensate the lenders for the higher probabilities of a potential loss.Our findings suggest that borrowers with high FICO score, high credit grade, low revolving line utilization and low debt-to-income ratio are associated with low default risk. This finding is consistent with the studies by Duarte et al. (2012) who report that borrowers with a trustworthy characteristic will have better credit scores but low probability of default. This result also suggests that besides the loan applicants' social ties and friendship as reported by Freedman and Jin (2014) and Lin et al. (2013), the four factors discussed above are also important in explaining the default risk. When comparing with US national borrowers, the results show that the Lending Club should continue to screen out the borrowers with lower FICO score and attract the highest FICO score borrowers in order to significantly reduce the default risk. In relating the risk to the return, it shows that higher interest rate charged for the riskier borrower is not significant enough to justify the higher default probability. Our finding here is consistent with the study by Berkovich (2011) who reports that high quality loans offer excess return.II.Literature ReviewThree main streams of research have emerged in response to the growing popularity of P2P lending. The first stream of research examines the reasons for the emergence of online P2P lending. The second stream of research focuses on determining the factors that explain the funding success and default risk. The last stream of research investigates the performance of online P2P loan for a given level of the risk.Peer group lending has been emerging in local communities and has attracted the research in this area. Conlin (1999) develops a model to explain the existence of peer group micro-lending programmes in the United States and Canada. He finds that peer groups enable fixed costs to be imposed on the entrepreneurs while minimizing the programme's overhead costs. Ashta and Assadi (2008) investigate whether Web 2.0 techniques are integrated to support the advanced social interactions and associations with lower costs for P2P lending. Hulme and Wright (2006) study a case of online P2P lending house, Zopa, in the United Kingdom. They suggest that the emergence of online P2P lending is a direct response to social trends and a demand for new forms of relationship in financial sector under the new information age.There is extant literature that identifies the factors determining the funding success and default risk. Using the Canadian micro-credit data, Gomez and Santor (2003) find that group lending offers lower default rates than conventional individual lending does. Study by Iyer et al. (2009) shows that lenders can evaluate one third of credit risk using both hard and soft data about the borrower. Lin et al. (2013) analyse the role of social connections in evaluating credit risk and discover that strong social networking relationship is an important factor that determines the borrowing success and lower default risk. Lin et al. (2013) further report that applicants' friendship could increase the probability of successful funding, lower interest rates on funded loans, and these borrowers are associated with lower ex post default rates at Prosper. The importance of social ties in determining loans funded is also examined by Freedman and Jin (2014). The result shows that borrowers with social ties are more likely tohave their loans funded and receive lower interest rates. However, they also find evidence of risks to lenders regarding borrower participation in social networks.Several other studies examine whether certain borrowers' characteristics and personal information determine the success of loan funding and default risk. Herzenstein et al. (2008) show that borrowers' financial strength, their listing and publicizing efforts, and demographic attributes affect likelihood of funding success. Study by Duarte et al. (2012) further argues that borrowers who appear more trustworthy have better credit score with higher probabilities of having their loans funded and default less often. Larrimore et al. (2011) demonstrate that borrowers who use extended narratives, concrete descriptions and quantitative words have positive impact on funding success. However, humanizing personal details or loan justifi cations have negative influences on funding success. Qiu et al. (2012) further reveal that in addition to personal information and social capital, other variables, including loan amount, acceptable maximum interest rate and loan period set by borrowers, significantly influence the funding success or failure.Galak et al. (2011) further show that lenders tend to favour individual over group borrowers and borrowers who are socially proximate to themselves. They also find that lenders prefer the borrowers who are more like themselves in terms of gender, occupation and first name initial. More interestingly, Gonzalez and Loureiro (2014) have similar findings: (1) when perceived age represents competence, attractiveness has no effect on loan success; (2) when lenders and borrowers are of the same gender, attractiveness might lead to a loan failure (i.e., the ‘beauty is beastly' effect) and (3) loan success is sensitive to the relative age and attractiveness of lenders and borrowers. Herzenstein et al. (2011) find that herding in the loan auction is positively related to its subsequent performance, that is whether borrowers pay the money back on time.III.DataIn this section, the loan applicants' data is first described, followed by loan distribution based on loan purposes, credit grade and loan status and it ends with thedetailed descriptive statistics of the loan applicants. This study uses 61 451 loan applications in the Lending Club from May 2007 to June 2012 obtained from . Over the study period, the Lending Club lent about $713 million to borrowers. To address the borrowers' behaviour in online P2P lending, we first examine the main reasons for borrowing money from others. Table 1 lists the borrowers' self-claimed reasons summarized in the Lending Club. Almost 70% of loan requested are related to debt consolidation or credit card debts with a total loan amount requested of approximately $387 million and $108 million, respectively. The number of loan applications for education, renewable energy and vacation contribute less than 1% of total loans with the total loan requested ranging from 1 to 3 million. The borrowers state that their preferences to borrow from the Lending Club are lower borrowing rate and inability to borrow enough money from credit cards. The second purpose for borrowing is to pay home mortgage or to re-model home.Table 1. Loan distributions by loan purpose (May 2007–June 2012)Notes: The data is obtained from 61 451 loan applicants in the Lending Club, , from May 2007 to June 2012.The loan-seeking persons are asked to provide the reasons for requesting loans.The Lending Club uses the borrower's FICO credit scores along with other information to assign a loan credit grade ranging from A1 to G5 in descending credit ranks to each loan. The detailed procedure is as follows: after assigning a base score based on FICO ratings, the Lending Club makes some adjustments depending on requested loan amount, number of recent credit inquiries, credit history length, total open credit account, currently open credit accounts and revolving line utilization todetermine the final grade, which in turn determines the interest rate on the loan.Table 2 reports the loan distribution by credit grade. The majority of borrowing requests have grades between A1 and E5. The Highest loan amounts requested are from borrowers with ‘B' credit grade, which contribute 29.56% of total amount of loans requested. The total number of applicants for this ‘B' credit grade group is 18 707, which represents total loans of approximately $210 million. The lowest loan amounts requested are from borrowers with the lowest ‘G' credit grade which accounts for 1.53% of total loans. There are only 608 loan applicants for this lowest credit rating ‘G' group and it represents approximately $11 million in total loan value. According to the Lending Club's policy, a loan credit grade is used to determine the interest rate and the maximum amount of money that a borrower can request. The higher the loan grade, the lower the interest rate. A borrowing request with a low grade renders a higher interest rate as a compensation for a high risk held by lenders. Table 2. Loans distribution by credit grades (May 2007–June 2012)Notes: The Lending Club uses the borrowers’ FICO credit scores along with other information to classify a loan from Grade A1 to G5 in descending credit risk. Therefore, A1 credit grade represents the highest credit quality/low-risk borrowers, whereas G5 credit grade represents the lowest credit quality/ high-risk borrowers. Total amount of loans requested as a percentage of total loan is 19.35% for credit grade group ‘A’, 29.56% for ‘B’, 19.94% for ‘C’, 14.84% for ‘D’, 10.15% for ‘E’, 4.59% for ‘F’ and 1.53% for ‘G’.Finally, Panel A of Table 3 shows the loan status for all the loan requests on 20 July 2012. Overall, the default rate is 4.60% with total losses of approximately $29 million. Another 2.45% of total loan requests which constitute $18.6 million could be potentially lost because the borrowers are late in making payment within 30 days or 120 days and not paying the normal instalments. 17.98% of the loans are fully paid with an approximate value of $108 million. The $557 million loans are in current status account for 74.91% of total loans. Naturally, loans with a lower grade demonstrate a higher default rate. Therefore, study on risk management on P2P lending is relevant for the lenders to optimize their investment portfolios. Panel B of Table 3 reports the loan status for the matured loans. The overall loss rate is much higher for matured loans. Among 4904 matured loans, 914 loans are charged-off, which represent 18.6%. The total loss is $5.5 million which represents 13% of all matured loans amount. Less than 1% of the matured loans are late in terms of making payment with the unpaid balance of approximately $27 000. 80.77% or $33 million of matured loans are fully paid.Table 3. Loan distribution by the loan status (May 2007–June 2012)Table 4 reports the general characteristics and credit history of the online P2P loan applicants from the Lending Club. Based on our sample of 61 451 loanapplicants, the average monthly interest charged on a loan is 12.34%. On average, 471 days passed from the issue date of the loan. The average credit grade of a borrower is 25, which corresponds to credit category between B and C. The average size of a typical loan is $11 604 and the average monthly payment is $351. The borrower in general pays back $4384 a month and has $7873 left to be paid. The average ratio of the remaining balance to total loans is 63%.Examining the borrowers' characteristics, it shows that the mean income of a borrower from the Lending Club is $5796 with the debts to income ratio of 0.1381. On average, a borrower has 9.56 open credit lines and 22 total credit lines, carries $14 315 average revolving credit balance and almost half (51.6%) of his or her credit limit. In the last six months, there is 1 credit inquiry requested by an average borrower. Average FICO score category of a typical borrower is 3.48, which corresponds to a FICO score between 680 and 750.Table 4. Descriptive statistics (May 2007–June 2012)Notes: Credit Grade is the grade assigned by the Lending Club based on the FICOrano credit rating information along with other information. Credit Grade ‘1’ is the loan category of ‘G’ which is the riskiest class of loans. Credit Grade ‘7’ is the loan category of ‘A’ which is the lowest risk borrowers. FICOrano is the credit rating of the borrowers rated by credit card companies. FICO 6 corresponds to borrowers with the FICO score above 780, FICO 5 corresponds to FICO score between 750–779, FICO 4 = 714–749, FICO 3 = 679–713, FICO 2 = 660–678 and FICO 1 = 640–659, respectively.IV.ConclusionsCredit risk is an important concern for the P2P loans. This study employs the data from the Lending Club to evaluate the credit risk of the P2P online loans. We findthat credit score, debt-to-income ratio, FICO score and revolving line utilization play an important role in determining loan default. The credit categorization used by the Lending Club successfully predicts the default probability with one exception of next lowest credit grade ‘F'. In general, higher credit grade loan is associated with lower default risk.The mortality risk also increases with the maturity of the loans. Loans with lower credit grade and longer duration are associated with high mortality rate. The Cox Proportional Hazard Test results show that as the credit risk of the borrowers increases, so does the likelihood of loan being default. However, the higher interest rate currently charged for the riskier borrower is not significant enough to justify the higher default probability. This suggests that the lenders would be better off to lend only to the safest borrowers in the highest grade category of 7 or Grade A. Increasing spreads on riskier borrower may lead to a more severe adverse selection resulting in higher default risk.The Lending Club lenders should either extend credits only to the highest grade borrower or try to find more creative ways to lower the default rate among current borrowers. When comparing with the US national consumers, borrowers with relatively higher income and potentially higher FICO scores do not participate in the P2P market. Creating incentives to attract these types of borrowers would have a significant potential to decrease the default risk in this market.中文译文:点对点(P2P)网络借贷的信用风险与贷款绩效评估摘要近年来点对点(P2P)网络借贷开始兴起。
P2P网络借贷外文文献翻译最新
外文文献翻译原文及译文文献出处:Jensen Fabian. The research of P2P online lending [J] Business Research, 2017, 9(3):31-41.原文The research of P2P network LendingJensen FabianAbstractMicro, small and medium enterprises is facing with financing difficulties,rural poor areas also lack of financial services,which has always been plagued policy makers of the two factors, also seriously restricted the economic development and hinder the two factors in the construction of a fair society. After the positive study of the relevant departments and academia,finally figured out "small loan company" this kind of small financial institutions,in order to the transfusion organization become the rural development and small and medium-sized enterprises (SME).Practice has proved that this kind of form does have some effect on the solution of the problem, but microfinance companies ’丨not deposit-taking’’policy, and become a big obstacle to influence its development. This makes the tighter credit environment,capital requirements of small and medium-sized enterprises and the vulnerable groups are far from satisfied. At the same time, the abnormal social folk capital abundant, high inflation,the stock market is tanking, strictlycontrol the real estate market economy, these funds need find investment breakthrough,and so a new kind of folk lending model,P2P network borrowing appeared.Keywords: P2P lending, Microfinance, Private lending1 IntroductionP2P lending (Peer - to - Peer lending) is an emerging in recent years the personal of personal credit model lending companies through the online platform set both a deaL Commitment to funding "connect”form of folk lending is emerging and increasingly prosperous. Is funding needs, while there is a desire to invest, such companies have to do is by their structures, network platform for the idle private capital looking for matches. And such companies provide essentially is a P2P (Peer to Peer or Person to Person, (individual financial information services for individuals) it is actually a kind of new flow of private capital. Platform itself the role of information intermediary,information disclosure, credit rating,fund settlement, overdue collection services, platform profit mainly comes from the customer to pay fees. In 2005, ZOPA,in London, the first microfinance website to personal online,pulled open the prelude of the P2P lending. After ten years of operation, a total of 750 million pounds of matching network. The platform Prosper2014 years accumulative total turnover of about $2.5 billion.P2Pnetwork, in countries such as Britain and the United States has been aloan in addition to the traditional savings and investment channels of the alternative (Slavin,2007).The success of the European and American practice for P2P network gradually towards the world.P2P lending in this form is in recent years the development of the abnormal rapidly, mainly because the form meets demand from both sides of the capital supply and demand of current economic situation. On the one hand, for money supply,in the face of high inflation and low bank deposits, bank deposit income is very small. At the same time, the stock market in the past two years is bad,real estate and gold investment door abuse is too high, and the current situation of risk is not small. In the face of all these various traditional investment present situation of the market situation is not optimistic, a large number of civilian capital urgently needs to find new breakthrough.P2P lending this form seems to be in order to meet the urgent demand, because this kind of investment model is unfolding the following several aspects: the advantages of high returns, basic around 20% annual return. Door, and the low just registered in relevant websites can become money lenders. High transparency, money lenders can according to the web site provides information about capital demanders object,to choose our willing to lend the money to lend,borrowers will provide regular use of funds, guarantee for capital lendersunderstand the usage and safety.2The origin of the P2P lending and the statusDue to the development of the P2P lending is less than 10 years, so the early literature focuses on introducing the origin and development of the network lending. Ferichs and Schumann (2008) mentioned that in 2005 the first lending site zopa,founded in the UK. Borrowing from a wide variety of network platforms appear in succession.Agarwal and Hauswald (2008) points out that facing the risk of moral hazard and adverse selection under asymmetric information, based on assumptions, such as disposable abandonment and anonymous trading orthodox financial institutions will be in accordance with the new market basic principles to be followed in the classical theory to its lending of small and medium-sized enterprises and farmers to provide collateral or guarantee. So those are unable to provide collateral poor farmers and small and medium-sized enterprises will be excluded from the formal financial institutions, in the end they will have to enter the network to meet the demand of their own money lending market. Slavin (2007) pointed out: the P2P loans in the United States and Britain has developed into a kind of savings and investment alternatives. Berger and Gleisner (2009) referred to in the United States first lending site prosper,com was established in 2006 in February,Germany’s first lending site was established in February 2007, at present, due to the legal system is different in different countries, almost all of the network platform lending operations are limited in the range of their own country. Ashta and Assadi (2009) research has shown that the type of online peer-to-peer lending platform and operation mode has its own features,in general they can be divided into two categories - for-profit and nonprofit platform, platform of for-profit business generally confined to the domestic, and non-profit platform to do business on a global scale. Both lenders is the biggest difference between the original and different requirements for earnings. For-profit platform lenders will risk requires a reasonable return for oneself, and non-profit lenders on the platform of general income does not make the request,they just want to ’’d o n a t e”part of his property,in order to help the poor people of the world.3The model of P2P network lendingPlatform is divided into two categories: basic for-profit and the for-profit (Ashta & Assadi,2009).Here the ’’p r o f i t”refers to the investment platform for investors- Investors profit type platform, hope by lending money to get match the economic benefits of risk. Non-profit platform of investors, the investment behavior is to help others, does not pay attention to taking economic returns. Nowadays the most profit type platforms are within the scope of its business,subject to regulatoryrequirements of the host countries (Berger, 2009)-Non-profit type platform is generally not subject to regional restriction, can operate on a global scale. The typical platform subdivided into three categories: public welfare,pure intermediary type and compound type mediation, after two classes are for-profit platform. The practice platform for the main service object as low-income people is in less developed areas. Simple mediation type platform only play the role of information intermediary, not to interfere in the user transaction. Compound intermediary platform to provide information service but also act as supervisors, joint chasing people, such as rate-setters role.3.1Public welfareKiva,founded in 2005, is an organization in Europe and the wealthy investors offering loans to small businesses in developing countries not for-profit P2P network platform. Basic obtained by raising its operating funds for small borrowers to provide low-interest loans and intermediary service free of charge. Because of the different national legal policy,Kiva f s business need to cooperate with local microfinance institutions (MFI),through its as a middleman to supervise and repay the loan (Ashta & Assadi,2009).3.2Simple mediation typeProsper in lending transactions only simple information intermediaryrole,through information disclosure and credit ratings provide the basis for both freedom of choice,Prosper after the deal itself is no longer involved in lending transactions. The entire Prosper platform has social security number, personal id number, bank accounts and personal credit scoring more than 520 American citizens can ’’l o a n s.First i t’s borrowing set similar EBay M double blind auction model This approach based on borrowing the preference,and strives to achieve the borrower loan conditions and investors' investment speed the acceptance and balance each other,by dynamic game to get the best interest rates (Chen et al”2014).3.3Composite mediation typeZOPA, as the ancestor of P2P network credit platform, has always been considered one of the most successful P2P network model, most scholars attribute the success to perfect risk control system. First,ZOPA .among cooperation with credit rating Company,it is according to its credit rating to determine the borrower's credit rating, and arrange it into the corresponding segment of the market, for investors to choose from. Second, ZOPA, almost all engage in transactions and related affairs. In addition to providing information to act as watchdogs,check the legality of the borrower loan procedures,completeness,supervise the borrower repayment on time,etc. ZOPA, provides a more real andtransparent financial services,at the same time,effective risk control measures can make the risk lower than traditional financial institutions.4The influence factors of P2P lendingNetwork, as it were, to borrow a thing has attracted the attention of many scholars since its birth, Klafft (2008) study that due to network lending type is a new thing, the lender lack the experience of the anonymous Internet loans, this will increase the risk of lending to network. Rothschild believes in a just grew up in the imperfect market, the researchers only indirectly through study the behavior of the borrower characteristics to obtain information about the development of the network of borrowing. But according to the behavior characteristics of the borrower and the study of the relationship lending to network events are not unified conclusion at present, such as those for borrowers loan application in the attached photos of research conclusions and even on the contrary,some research results such as Andrews (2008),it is concluded that the race, gender, personal characteristics such as little impact on the success rate of borrowing.Everett (2008) studies have found that if the loan borrowers in the group have acquaintances or merely know, makes the default rate be significantly decreased. Although Davis (2001) points out that the loan team a lack of clear ownership, while no significant characteristics andunified management decision-making mechanism, these decide whether people will join loan group is a random act. But as long as the team was able to set up loan,it can play the role of will be very important. D a t t a’s (2008) is one of the study found that the loan group leader role according to the relevant information to the t e a m’s members within the group of borrowers,and they do so power or is selfless attitude or is in order to get the corresponding reward. From this level, the loan group leaders mainly depends on the action of collecting and processing information to provide Suggestions for group members, through these behaviors, they in fact take on the role of the monitoring process of loan repayment, and in this way it indirectly promote the circulation of money lending website. According to e x p e r t’s research,in addition to loan group have a way to have obvious effect on reducing loan default rates that is to the network of group lending. This approach originated in the social network theory.5ConclusionsAfter the development history of P2P loans, theoretical basis and the development of P2P enterprise situation analysis of the P2P lending, we can find it is a full of potential and worth to continue to develop and put into lending to emerging patterns, especially considering it in solving the small micro enterprise financing difficulties and poor areas have played a huge role,need the government to make active efforts more,measures assoon as possible, in the right support and guide the development of this model.P2P网络借贷研宄Jensen Fabian摘要中小微企业融资难,贫闲地区农村缺乏金融服务,这一直是网扰政策制定者的两个因素,也是严重制约了经济发展、阻碍公平社会建设的两个因素。
互联网金融发展文献综述及外文文献资料P2P金融
本份文档包含:关于该选题的外文文献、文献综述一、外文文献标题: Online brokers lead the way for French internet finance作者: Caffard, Christophe期刊名称: International Financial Law Review卷: 20;期: 3;页: 20-24Online brokers lead the way for French internet finance1 Regulated brokersRegulated brokers are legal entities which have an investment services licence and are subject to the prudential regulations of the Comite de Reglementation Bancaire et Financiere (CRBF) and the Conseil des Marches Financiers (CMF).* Choice of legal form: regulated brokers are not required to be incorporated in a specific legal form; however, under article 13 of the MAF Law, the CECEI checks whether the legal form of the brokerage company is appropriate for providing investment services. In practice, any type of commercial company is admitted: societes de capitaux (limited companies) or societes de personnes (partnerships). The formalities of share transfer, tax and the scope of liability of a company's management will be relevant factors to the choice of legal form.* Application for an investment services licence from the CECEI: the most important part of the application is the description of the investment services, and a business plan including prospective financial statements for the following three years. The CMF will check whether the business plan is consistent with the investment services licence requested by the broker. The CECEI will ensure that the applicant's own initial funds are consistent with the business plan.The scope of the investment services licence is variable and covers one or more ofthe following investment services:Reception and transmission of orders to another investment services provider on behalf of investors, for execution. This is the core investment service provided by thebrokerage companies and, as such, a licence to provide this service is the minimum required for a brokerage company. Brokerage companies may request an investment services licence limited to the reception and transmission of orders. In this case, there will need to be a tripartite agreement between the investor, the broker and an investment services provider authorized to execute the orders of the investor. These single-- licensed brokerage companies are mere intermediaries remunerated by a commission paid by the investors. They are not entitled to benefit from the European passport under the ISD.Execution of such order other than for own account. This is defined as the execution of orders on behalf of a customer under the provision of an agency or a brokerage agreement. The brokerage company authorized to execute orders received from the investors offers a larger range of services with more potential. The broker with an investment services licence covering the execution of orders will be in charge of executing the final orders on the regulated markets, provided it is has been authorized as a market member. Unauthorized brokerage companies transmit the orders they have received to authorized market members. Authorized brokerage companies may offer investors a quasi-immediate execution of orders on the markets.Placing. This is the search for subscribers or purchasers on behalf of the issuer or seller of financial instruments. According to the CMF, in the case of a public offer of listed financial instruments placed by a market firm (for example on the Paris Stock Exchange or Nouveau March&), an online broker, which sells financial instruments online, is deemed to be providing his client with a reception-transmission of orders service and not a placing service. A placing service requires the broker to comply with capital adequacy ratios whenever it is associated with an underwriting commitment.Account-keeping, custody and clearing. These are not considered to be investment services, but assimilated services restricted to credit institutions or investment firms, and are subject to the CMF's General Regulations.CRBF regulators. CBF regulations subject brokerage companies to the following requirements: the minimum issued and paid-up share capital depends on the nature and number of investment services carried out; brokerage companies who offeraccount-keeping, custody and reception, transmission and execution of orders must have a minimum paid-up share capital of Ffrl million (about $160,000). This is reduced to Ffr350,000 when the brokerage company is not involved in account-keeping or custody services;* the minimum shareholder funds must be equal to the higher of- 25% of the overheads of the previous year, or overheads forecast in the business plan; and- the aggregate client positions divided by 150;* internal compliance procedures must be established; and* the brokerage company must comply with certain ratios relating to solvency and large exposure.Regulated brokers are also subject to the CMF's rules on the appointment of a compliance officer, information and advice for clients, mandatory clauses to be inserted in clients' agreements, professional cards required from certain employees and reporting requirements to the CMF.2 Non-regulated brokersNon-regulated brokers are sole agents appointed by an investment firm authorized by the CECEI, or an appropriate authority of an EU member state. Sole agents are nonregulated entities and are neither subject to the minimum capital and shareholder funds requirements nor to the CMF/CRBF regulations.Sole agents enter into investment services agreements with clients on behalf and in the name of their principal, who must be a regulated investment services provider. These agreements are binding on who is, as a general rule, solely liable visa-vis clients and the supervisory authorities (the CMF and/or the Bank of France). In this respect, the incorporation and activities of a sole agent brokerage is simpler, safer and cheaper than for regulated brokers. However, sole agents are fully dependent on the principal since they are not authorized to be appointed by more than one investment firm and if, for any reason, the mandate is cancelled or terminated, sole agents must stop any brokerage activity, unless they get a new mandate or are granted an investment service licence by the CECEI. Sole agents do not benefit from theEuropean passport under the ISD, as they are not considered to be investment firms. It is important to note that the sole agent does not own the brokerage business, since clients simply have a contractual relationship. This is why sole agent status is generally more suitable when the principal and agent are companies within the same group or with long-term common interests.French branches of EU investment service providersThe licence for an EU investment service provider allows it to set up branches in France, subject to authorization from the authorities of its home state.This procedure is much simpler and quicker than an application for an investment services licence with the CECEI. The other advantages of operating in France in this way are that a branch is not required to show an endowment capital in France, and that prudential ratios of the home state apply to the French branch.As a general rule under the ISD, the home state authorities retain jurisdiction over the branch in the home state, with the exception of the public policy rules, which will apply to the branches. In France, the regulation referred to below is considered to be a public policy rule with which French branches operating online brokerage services in France must comply.Regulations applicable to brokerage servicesThe offer of brokerage services and the provision of brokerage services are regulated by reference to the nature of the financial instruments offered online.The offer of brokerage servicesAdvertising / marketingThe advertising of financial instruments is heavily regulated when advertisements are included in a public offering process. In this case the advertisement is in the form of a prospectus, which must comply with COB regulations, which provide detailed requirements regarding the form and content of the prospectus. As a general rule, any other form of advertising in a public offering process must refer to the prospectus approved by the COB.* The marketing in France of financial instruments listed on a foreign market must comply with COB regulation no. 99-04. This provides that, before anytransaction, the broker must send his clients an information memorandum presenting the foreign market and the financial instruments dealt on that market. This may be sent to clients via the internet.Any advertising of operations on the foreign market must include certain mandatory information, including the identification of the legal entity which is soliciting French clients.As a general rule, the advertising of collective investment schemes is subject to regulation by the COB, which ensures that any advertisement is consistent with the notice d'information and with regulations applicable to collective investment schemes generally. SICA Vs and FCPs subject to COB regulation no. 89-02 may not be marketed until the management company has been notified of the COB's approval.However, any direct or indirect solicitation to invest in collective investment schemes subject to the simplified COB approval procedure (less formal because the scheme only targets professional investors), must contain a disclaimer informing investors that any subscription or transfer of shares or units, is restricted to qualified investors or investors whose initial investment is at least euro500,000 ($457,000) or (depending on the scheme) euro,30,000. The disclaimer must also mention that these collective investment schemes are not approved by the COB and adhere to specific investment rules.* The COB has issued guidelines no. 99-02 relating to the marketing and sale via the internet of i) collective investment scheme units or shares; and ii) discretionary mandates. These guidelines are not binding. Its purpose is to clarify certain aspects of the COB regulations which apply to collective investment schemes (management company and depositary) and to any information on financial instruments disclosed during a public offering. The COB is preparing new guidelines relating to financial advice and information disseminated via the internet.* COB regulations and recommendations are applicable to online brokers whenever financial instruments (listed or otherwise) are offered to the public.* Under the CMF's regulations, regulated brokers are bound to inform and advise their clients after having assessed their financial knowledge.* In any event, there is a prohibition on advertising units of investment funds which invest in futures markets (Article 23 of the law of 23/12/1988), or to market non-OECD financial instruments in France without the prior consent of the French Ministry of Economy.3 Canvassing lawUnder the law of 1972 relating to financial canvassing, canvassing consists of contacting potential clients by way of visits, letters, circulars and telephone calls to: i) induce them to subscribe, purchase, exchange or sell securities or participate in such operations; and ii) offer services and advice on a regular basis.The law of 1972 is not adapted to the internet and legislative reform in this field is awaited. The CMF, the COB and the CECEI consider that offers to provide e-banking and e-brokerage services would be treated in the same manner as offers of services or advice by way of letters, circulars or telephone calls.It is difficult to determine which information systems or practices will qualify as financial canvassing (and therefore regulated) or merely as financial advertising (and therefore permitted); the CECEI and the COB have not yet given any clear guidance on this question.According to a discussion and research paper on internet risk released by the Commission Bancaire (the supervisory arm of the Bank of France) in July 2000, advertising messages, including a link to the seller's site (in the case of banks) displayed on general purpose websites, or posting information, advice or offers on sites or news groups in the client's country, would be viewed as financial advertising and would not constitute financial canvassing.The Bank of France takes the view that in these examples there is no active solicitation of clients since they access the financial advertisements deliberately and of their own accord, as if visiting the premises of a bank.In contrast with these passive marketing techniques, sending messages to email addresses would be equated with sending letters and as such would qualify as canvassing, according to the Bank of France.In any case, before soliciting French customers, the brokerage company mustnotify the Bank of France (CECEI) of its intention to solicit such customers; and employees of the brokerage company must be granted a specific solicitation card by the French authorities. Any breach of this rule would constitute a criminal offence.4 Public offering regulationsPublic offering regulations are applicable whenever financial instruments are issued or transferred to the public in France, using advertising, canvassing, credit institutions or investment service providers. Public offerings are heavily regulated and are subject to a number of requirements, including prior approval by COB of a prospectus, filing with the Commercial Registry of the French translation of the issuer's constitutional documents, publication of a legal notice in the BALO and continuing information obligations.The public offering regulations apply to offers of both listed and unlisted financial instruments. In this respect, online brokers offering listed shares to the public are subject to public offering regulations and in particular COB Regulation no. 99-08, under which the online broker must comply with the following disclosure and advertising rules:* the preparation of a simplified prospectus which must be approved by the COB and made freely available to the public; and * any advertisement must refer to the simplified prospectus and specify how to obtain a copy.A private placement (as opposed to a public offering) is defined as the issue or transfer of financial instruments to qualified investors or to a restricted circle of investors.In order to ensure a private placement via the internet, it is necessary to restrict electronic access to the broker's website by passwords granted solely to qualified investors. It is also mandatory under COB Regulation No. 99-09 that a private placement disclaimer be displayed on the webpages of the broker's website. The disclaimer must mention that:* offering materials (advertisements, information memoranda, etc) have not been submitted to the COB for its approval;* qualified investors must participate in the private placement for their ownaccount;* any offer to the public of the financial instruments subscribed or purchased by the qualified investors in the private placement would be subject to public offering regulations; and* if the investors are members of a restricted circle of more than 100, they must certify that they are associated with the management of the issuer on a professional or a personal basis. The provision of online brokerage servicesRules of conduct applicable to online brokers Regulated brokers and principals of non-regulated brokers are investment service providers and are subject to the rules of conduct set out in its General Regulation. The CMF has issued General Decision no. 99-07 providing regulations and guidelines. It implements the CMF rules of conduct.As a general rule, the message must clearly identify the issuer of a message offering the service of reception or transmission of orders. In particular, the website must display the legal status of the broker and the investment service it is authorized to provide. Regulated brokers and non-regulated brokers must be clearly distinguished, and the latter must disclose the identity of their investment service provider whom they are asking as agent.If the online broker is not in charge of account-keeping and custody services, whoever is must be clearly identified. Before entering into a contract with any new client, theonline broker must verify the client's identity and domicile by requesting the following documents:a photocopy of a valid official identity document (passport, identity card, driving licence);* bank details; and* written evidence of address.The broker must send confirmation that he has received these documents and, in doing so, check the client's address. These formalities and verifications may not be carried out via the internet.Once the identity and domicile ofthe new client have been checked, the onlinebroker can provide investment services to his client where:* the client has signed an agreement relating to the evidential rules and procedures applicable to the reception of orders via the internet;* the funds or financial instruments have been credited to the client's account. This does not apply to the broker if it is not the account keeper or the custodian;* the broker has checked that its client may receive the information on the relevant financial instruments and risks via the internet; and* the broker must ensure that the client receives in advance more detailed information regarding operations involving financial instruments which do not correspond to the client's regular dealings.In cases where the broker is responsible for account-- keeping, it should operate an automated system monitoring the accounts of the client and freezing any order in the event of insufficient provision or margin cover.The CMF also recommends that this automated system should freeze any order sent by the client which does not comply with market regulations.Compliance with these rules of conduct raises problems when the broker's website is outsourced to a third party, which happens frequently. The authorities are concerned that brokers may lose control over the operation of their websites and would be unable to take any operational responsibility, while remaining liable. This is why the Commission Bancaire is considering imposing an obligation on investment firms and credit institutions providing online financial services, to monitor their outside internet service providers and/or software companies.5 Regulation of contracts entered Into by online brokersContracts with clients These are subject to the CMF regulations, and in particular to CMF General Decision no. 98-28 relating to the mandatory clauses which must be included in agreements entered into with clients. It came into force in June 2000 and any existing contract is required to be duly amended.The agreements must contain a clause setting out the identity of the client and its legal capacity. In particular, qualified investors must be identified among other legal entities as well as the investment services provided. The categories of financialinstruments and financial services must also be stated in the agreement. This is important since it is taken into account when determining whether the broker has properly assessed the skills of his client. In this respect, it is recommended that high-risk speculative and/or complex operations, such as operations on futures markets, be restricted to informed clients or to qualified investors.In practice, the online broker asks new clients to answer a questionnaire which acts as proof that the broker has fulfilled its obligations to assess the skills ofits client.The agreement must contain a confidentiality clause which is binding. In this respect, it is useful for the online broker to provide exceptions to this obligation so that information on clients can be centralized within a member ofthe same group of companies, or accessed by an outside software company.Contracts with other investment services providersThe number of contracts entered into by brokers with other investment service providers depends on the scope of its licence. Non-regulated brokers must enter into an exclusive mandate with a licensed investment service provider.Regulated brokers which are not market members or not licensed for the execution of orders must conclude a transmission of orders agreement with market members or other investment service providers.These contracts are not subject to the CMF General Decision no. 98-28 or to other specific regulations, with the exception of.* clearing agreements;* when a client gives a broker with whom he has an account an order for transmission to another non-resident institution with comparable status, the broker is forbidden from being remunerated in the form of hard commission (a commission rebate) by the institution to which the order has been transmitted; and* a non account-keeping broker receiving orders from a client for transmission to another institution may be remunerated in the form of a hard commission, provided that the broker informs the client when entering into contractual relations (and thereafter annually) of the terms and conditions and amount of the hard commission.Contracts entered into with software companiesThese contracts might at first appear to have regulatory implications. However, recent financial regulations applicable to e-- brokerage now have a direct bearing on implications for IT agreements.In practice, brokers must ensure that the operation of the website and the reception and transmission of software orders complies with the CMF General Decision and any other applicable regulations applicable. The upgrade clause of the IT agreement entered into with the software company should address the question of the software being upgraded in the event of changes to applicable regulations.It is also recommended that any outsourcing agreement contains a clause which sets out how the online broker monitors the operation of the outsourced website.二、文献综述互联网金融发展文献综述摘要互联网金融的快速发展成为近年来中国经济金融领域备受瞩目的重要现象,国内学术界讨论互联网金融的文献数量也急速膨胀,但目前尚缺少对与互联网金融相关的各类文献进行全面梳理的综述类论文。
网络金融风险防范外文翻译文献
网络金融风险防范外文翻译文献(文档含英文原文和中文翻译)原文:How to guard against financial risks networkFirst, the definition of network financeNetwork Finance is a computer network for the technical support of the financial activities and related activities in general, is a network of information technology and product of the combination of modern finance, but it is not a simple combination of the two, but a financial industry and even all industries An operating mechanism, is the future of enterprise system development. Narrowly understood, refers to the financial network of financial service providers based on the host to the Internet or communications network for the media, through the financial data and business processes embedded software platform, user interface terminal mode of operation of the new financial ; from a broad understanding of the concept of network finance their mode of operation also includes matching network of financial institutions, networks and related financial markets, regulatory and other external environment. Including: e-money, online banking, online payment, network security and network insurance.Second, the network of financial riskNetwork mainly engaged in the financial settlement of electronic money and electronic virtual financial services, in addition to traditional financial activities which exist in the process of credit risk, liquidity risk, interest raterisk, currency risk and market risk, from a technical, business and legal perspective, There are the following specific risks:1. Technology risk(1) hacker attacks. The operation of the network must rely on financial transactions, computer and Internet, all transactions are stored in the computer, the transmission of online information is easy to become a large network of "hacker" attack. In addition, Web access is a form of Internet service, is also a network of financial institutions trading and services platform, but it depends on TCP / IP protocol, there are many security vulnerabilities. This gives hackers broke into financial institutions through the network to create the conditions for the system. Hackers only need to use loopholes in the system itself, "only need to modify a few settings " you can allow financial institutions to a standstill.(2) technology selection risk. To carry out financial business networks, they must choose a proven technology solutions to support. Once there is choice, there will be a result of selection for the same mistakes which led to the risk. One possibility is to choose the technology system and client terminal software compatibility due to poor speed of information transmission interruption or reduction, another risk is that of technical alternatives have been eliminated, resulting in relatively backward technology, the network out of date, leading to enormous technical and Lossof business opportunities. Financial terms of the network, technology choice may lose all of the market failure, or even lose the basis for survival.2. Business risks.(1) operational risk. Operational risk from the system reliability, stability and security caused major defects in the possibility of potential loss may come from the negligence of online financial customers, may also come from the financial security system network and its products, design flaws and operational errors . Operational risk relates primarily to authorize the use of online financial accounts, the network of financial risk management systems, networks, financial institutions and the exchange of information among customers, true and false recognition of electronic money.(2) the risk of market signals. Market risk is due to signal asymmetric information network of financial institutions led to the face of adverse selection and moral hazard arising from business risks. Such as Internet banking customers can not identify the risk level of the Internet at a disadvantage, online customers may use their hidden information and action to make the network to their advantage at the expense of the interests of the decision-making banks and leaving because of adverse public comment on Internet Banking Risk of losing customers and sources of funding risks.(3) credit risk. Reputation risk is the network of financial institutions can not create good customer relations, can not establish their own good reputation, and thus can not engage in financial business. Once the virtualnetwork of financial institutions to provide financial services can not achieve the expected level of the public, or adverse reactions in the community, or network security system of financial institutions have been destroyed to forma network of financial credit risk.3. Legal risks. The legal risks of financial networks, mainly from two aspects: First, violation of relevant laws, regulations and system requirements, and online transactions failed to comply with the provisions of the relevant rights and obligations. These laws and regulations, including consumer protection laws, financial disclosure system, privacy protection, intellectual property protection law and currency system. Second, the lack of network financial law. China Internet Finance still in its infancy, is still quite a lack of appropriate laws and regulations. Therefore, using the Internet to provide or receive financial services, signed an economic contract rights and obligations in the face considerable legal risk, vulnerable to undue disputes, not only increase the cost of online financial transactions, and even affect the Development of the financial health of the network.Third, improve the network to prevent and control financial risks Point of the network of financial risks, involving a wide range of interests, it is necessary to perfect legal environment, strengthening access management, a sound regulatory system, adjust the regulatory strategy and other aspects, a multi-pronged, comprehensive treatment.1. Improve the legal system.(1) legislative efforts to increase the network of financial, clear the network of financial rights and obligations of relevant subjects.(2) to develop rules of fair trade network. In the identification and validation of digital signatures, transactions preservation of evidence, the transaction and both parties share responsibility for the protection of personal information of consumers to make detailed provisions to ensure transaction security, digital evidence when disputes arise and transactions in a real and effective personal Privacy.2. Enhanced market access management.(1) The status of the technology infrastructure as one of the conditions of market access. Financial services applications for operating the network of financial institutions not only a considerable scale of network equipment, but also need to have confirmed the legality of trading partners, to prevent tampering with trading information and prevent information leakage and other aspects of key technologies.(2) to develop rigorous internal control system. Publicity for the network of financial services, information disclosure, and system design have institutional arrangements, the establishment of a network of financial institutions or a new business, the must have sound risk identification, identification, management, risk cover and disposal programs.(3) to develop and improve the types of transactions operating procedures. Applications to open accounts for customers, customerauthorization statement, the general development of trading procedures, rules to prevent illegal trading and online financial transaction system against criminal activities.(4) the implementation of the network type of financial business management. Development of classification standards, banking and financial services capabilities and the ability to credit rating, thus a variety of services on the network to carry out the financial restrictions and permits.3. Improve the regulatory system.(1) improve the network of financial risk monitoring systems. The establishment of "national (network) Financial Risk Management Committee."(2) to strengthen collaborative supervision. "Committee" of the member units and other relevant regulatory authorities to share information resources among each other and opening up their own information database, and regularly informed of their supervision, promote joint supervision, supervision of financial risks to improve network accuracy and timeliness.(3) to strengthen international cooperation in financial supervision network. Meanwhile, the network with international cooperation in financial supervision to strengthen the network of bank borrowing way illegal tax evasion, money laundering and other acts, the way the use of Internet banking transnational smuggling, illegal arms trafficking activities such as arms and drug trafficking, illegal attack on the use of Internet banking othersites internet bank hackers, and other international criminal activities a full range of monitoring, the formation of the network can effectively protect the financial health of the global network operations and is responsible for the supervision of the financial system.4. Adjust the control strategy.(1) and improve the modernization level of financial supervision network. In the practice, we should have complete control of the network of financial institutions to improve the business operation of the network capacity and the forecast level of financial risk, and enhance macro-control of the systematic and forward-looking, but also to strengthen financial supervision and standardization of network construction, improve the network of financial supervision modern and scientific level.(2) improve the network of financial and non-site inspection of the site content system. On-site inspection should focus on the technical elements to be checked.(3) the establishment of mandatory information disclosure system. Follow the "open, fair and just" principle, development of financial services than the traditional more stringent information disclosure rules, norms, disclosure of the content, format, frequency and responsibilities and so on, through the financial statements, disclosure of the online publicity and other means of financial networks business information.(4) Innovative forms of regulation. Take full advantage of informationsuperiority, the establishment of real-time tracking and monitoring systems, strengthen monitoring, while also taking on the network "rules, patrol checks," the way the operational status of the network and whether the financial "irregularities" carry out spot checks found that, in a timely manner to correct or take punitive measures.5. Building security system.(1) accelerate research and development with China's own intellectual property rights of advanced information technology. Including computer equipment, communications equipment, system software, encryption algorithms, from the protection of national financial security and national economic security perspective to improve network security.(2) improving the network operating environment. Computer networks and centers to strengthen the management of the engine room, increase physical security measures for computer input, and enhance computer systems of key technologies and key equipment against attacks, anti-virus capabilities, maintenance of computer hardware security, ensure network banks rely on network hardware The normal operation of the environment safe.(3) secure access. On the one hand through the network of physical and logical isolation means isolation, and physical resources to unauthorized users isolated from each other, on the other hand through the application ofthe authentication and grading systems such as login authorization to restrict access to unauthorized users.译文:如何防范网络金融风险一、网络金融的定义网络金融是对以电脑网络为技术支撑的金融活动和相关活动的总称,是网络信息技术与现代金融相结合的产物,但它并不是二者的简单结合,而是一种金融业乃至所有行业的一种运行机制,是未来企业机制发展的方向。
P2P网络借贷金融文献综述及外文文献资料
本份文档包含:关于该选题的外文文献、文献综述一、外文文献文献信息标题: Emergence of Financial Intermediaries in Electronic Markets: The Case of Online P2P Lending作者: Berger, Sven C; Gleisner, Fabian期刊名称: Business Research;第2卷;第1期;页码:39-65年份: 2015.Emergence of Financial Intermediaries in Electronic Markets: The Case of Online P2PLendingAbstractWe analyze the role of intermediaries in electronic markets using detailed data of more than 14,000 originated loans on an electronic P2P (peer-to-peer) lending platform. In such an electronic credit market, lenders bid to supply a private loan. Screening of potential borrowers and the monitoring of loan repayment can be delegated to designated group leaders. We find that these market participants act as financial intermediaries and significantly improve borrowers' credit conditions by reducing information asymmetries, predominantly for borrowers with less attractive risk characteristics. Our findings may be surprising given the replacement of a bank by an electronic marketplace.Keywords: Asymmetric information, intermediation, social lending, electronic marketsManuscript received July 7, 2008, accepted by Christian Schlag (Finance) March 5, 2009.1 IntroductionThe evolution of information technology in recent years has led to the development of electronic marketplaces where traditional intermediaries may be less important or even redundant for the economic interaction of market participants (Benjamin andWigand 1995, Evans and Wurster 1997, Malone, Yates, and Benjamin 1987). Within the financial services industry, the debate about disintermediation and the future relevance of financial intermediaries (Allen and Santomero 2001, Nellis, McCaffery, and Hutchinson 2000, Schmidt, Hackethal, and Tyrell 1999) is fueled by the increasing role of electronic lending markets (P2P Lending or Social Lending) where an electronic marketplace replaces a bank as the traditional intermediary and enables the brokerage of consumer loans directly between borrowers and lenders (Hulme and Wright 2006, Meyer 2007). A recent study predicts that within the next few years such social banking platforms may have a market share of ten percent of the worldwide market for retail lending and financial planning (Gartner Inc. 2008). For the US, the P2P lending market is estimated to grow to a volume of up to ten billion USD within the next 10 years (Bruene 2007). We examine more than 14,000 credit transactions on the American electronic P2P lending platform , covering all transactions that took place in the market between 2005-11 and 2007-09. Our analysis of the P2P credit market starts with the observation that, despite the direct mediation of loans in the marketplace, new types of intermediaries emerge as market participants provide paid intermediary services. In the paper we then focus on the following questions: (1) From a theoretical point of view, how can these intermediaries create value in the interaction between borrowers and lenders? (2) Should all borrowers make use of an intermediary, and can it make sense to pay for intermediary services? (3) From the borrowers' perspective, what is the economic impact of intermediation in the electronic lending marketplace? Our empirical analysis is confirmatory in nature. It is based on the literature on financial intermediation (e. g., Diamond 1984, Leland and Pyle 1976) from which we derive hypotheses on the role of intermediaries in electronic marketplaces.The electronic lending platform Prosper provides an excellent laboratory for studying intermediaries in electronic marketplaces. Prosper is the largest provider with nearly 90 million USD in loans originated in the examination period from 2005-11 to 2007-09, as market participants were permitted to act as paid intermediaries in this period. As of 2008-09-30, Prosper dominated the US market for P2P lending with atotal of 176 million USD in issued loans, followed by its competitor Lending Club with 19 million USD.1 At that time, the market share of P2P consumer loans represented a fraction of the around 490 billion USD of non-revolving consumer credit outstanding at commercial banks (Federal Reserve 2008). All loans on Prosper have an identical maturity of 36 months. Our data sample includes detailed information on 14,321 financial transactions as well as the market participants that chose to participate in the market and covers transactions with and without the use of an intermediary. This allows us to test for aspects of the financial transaction and individual factors that might influence the usage of intermediary services. In line with traditional intermediation theory, we find that financial intermediaries on electronic P2P lending platforms have significant impact on borrowers' credit conditions, suggesting that intermediation helps to reduce the prevalent information asymmetries. The intermediary primarily contributes by screening potential borrowers. A mandatory screening process by means of the intermediary's commitment to screen every borrower within the group significantly improves borrowers' access to credit. Following diligent screening, the intermediary's recommendation of a borrower signals better information about creditworthiness and thus leads to better credit conditions. Moreover, bidding on the screened borrower's credit listing has an even stronger impact on the resulting interest rate.Our results indicate that borrowers should consider the reputation of an intermediary as it serves as a good proxy for the future diligent assessment of borrowers. Intermediation costs can be compensated by lower interest margins for borrowers. These results are robust to self-selection regarding the choice of an intermediary and characteristics of the financial transaction. All in all, our results suggest that financial intermediaries in electronic credit marketplaces may create substantial value for borrowers. Our findings are consistent with a stream of literature suggesting that electronic markets create business opportunities for new intermediaries (Chircu and Kauffman 2000, Methlie and Pedersen 2002, Bakos 1991, Bakos 1998, Sen and King 2003). Despite the electronic credit marketplace enables the direct mediation of loans, new financial intermediaries emerge between borrowers and lenders. There areseveral reasons why our results are of particular interest also for banks and other financial service providers that face the strategic decision of an active involvement in electronic lending markets. One option could be to participate in these marketplaces and offer financial advisory. Another interesting possibility could be to enter the P2P lending market and to establish a new marketplace to support the existing retail operations and enable cross-selling. Eventually, lending marketplaces are potential customers for banks' transaction services.Our approach to examining the role of financial intermediaries on electronic lending platforms makes three important contributions to the literature: First, this is one of the first studies analyzing an electronic lending marketplace, and the first study to empirically examine intermediation on an electronic P2P lending platform. We explain how electronic credit markets work, and provide insights into the role of intermediaries in the marketplace. Second, we test theoretical predictions from the literature on financial intermediation with new data. Our sample of more than 14,000 transactions on a P2P lending marketplace includes detailed information on the involved market participants and the loan characteristics. The dataset covers the complete transaction history of the credit marketplace for a time period of almost two years. Third, we quantify the economic impact of intermediation and other transaction characteristics on borrowers' loan spread and show that the usage of financial intermediaries which are neither professional nor institutional but members of the network may significantly improve the terms of trade for the borrowers.The remainder of the paper is organized as follows: the next section gives an overview of electronic P2P lending platforms and explains the functioning of these marketplaces. Section 3 summarizes the relevant previous literature on financial intermediation and derives hypotheses about the role of intermediaries on electronic lending platforms. Section 4 overviews the methodology employed, describes the data, and presents the empirical results of our analyses as well as robustness tests. In section 5 we conclude with a summary and the limitations of our study.2 Intermediaries in electronic credit marketplaces2.1 Electronic marketplaces and disintermediationMarkets are essential for economic activity in mediating the demand for and supply of goods and services. Intermediaries help to facilitate transactions between buyers and sellers by (1) providing transaction processing capabilities, (2) bringing enhanced levels of knowledge and expertise, and (3) adding to the transactability of a given good or service (Chircu and Kauffman 2000).The internet has made e-commerce possible where electronic markets are becoming more important in coordinating supply and demand (Grieger 2003, Segev, Gebauer, and Farber 1999). Electronic markets can facilitate economic activity even under complex and insecure conditions (Cordella 2006), significantly reduce information and transaction costs, and may in this way displace traditional intermediaries (Malone, Yates, and Benjamin 1987). Many authors argue that once electronic markets emerge, traditional intermediaries may be threatened by an electronic brokerage effect also called disintermediation (for a literature overview see Chircu and Kauffman 2000). In sharp contrast to that, the theoretical contributions on electronic markets and disintermediation have not yet been supported by convincing empirical evidence (Chircu and Kauffman 2000, Sen and King 2003). Moreover, the displacement of traditional intermediaries may never occur. Authors like Sarkar, Butler, and Steinfield (1998) or Hagel and Singer (1999) argue that electronic markets may lead to new forms of intermediation.2.2 Electronic lending platformsElectronic lending platforms are electronic markets that mediate between borrowers and lenders of loans.Wefocus here on consumer loans between individual borrowers and lenders and exclude platforms for bonds or syndicated loans (Steelmann 2006). The electronic credit marketplace as a website in the World Wide Web constitutes the general conditions for peer-to-peer lending and provides the administration of current loans. Electronic lending platforms differ in the way loans are originated: Some providers mediate between borrowers and lenders themselves, whereas other providers match borrowers' credit listings and lenders' bids with an auction mechanism (Meyer 2007).The lion share of participants in the marketplace are private individuals, althoughthere are institutional lenders investing in some, too. There are numerous providers that operate nationally due to differing regulatory frameworks. Table 1 provides an overview of the three major Anglo-American and German providers and their business models. A recent development of the business model of P2P lending marketplaces is that lenders may trade loans prior to maturity, increasing the liquidity of P2P loans. As of February 2009, Prosper is still in the process, whereas Lending Club has already successfully registered with the SEC to create a secondary loan market. Despite differing business models, there is one distinctive feature that these marketplaces have in common: Transactions in electronic credit marketplaces occur anonymously between fictitious "screen names". Therefore, information is asymmetrically distributed between borrowers and lenders. Loans are not collateralized and lenders face the inherent risk of default (Steelmann 2006). Despite anonymous interactions, loan listings contain additional information on potential borrowers. Lenders can evaluate individual creditworthiness through quantitative as well as qualitative figures. , America's largest peer-topeer lending marketplace, provides an individual rating and an indicator of indebtedness in cooperation with the credit reporting agency Experian as the two main quantitative figures. The informational value of these figures should be considered high, although the degree to which consumer credit reports are accurate, complete or consistent is in dispute (Avery, Calem, Canner, and Bostic 2003). Most platforms give market participants the opportunity to provide additional personal information about their background, their financial standing and the purpose of the loan. This qualitative, "soft" information is mandatory and its validity is a priori not controlled. Borrowers thereby might have an incentive to overemphasize their "quality" (the present value of the prospective projects, their financial standing or payment behavior) in their personal descriptions (moral hazard).Among the emerging literature on electronic lending marketplaces, a number of working papers examine the role of borrowers' "soft" information that is conveyed in personal pictures and descriptions. A study by Herzenstein, Andrews, Dholakia, and Lyandres (2008) analyzes around 5,000 loan listings on during June 2006and finds that demographic attributes such as race and gender have only a small effect on the likelihood of the auction's funding success when compared to the impact of borrowers' financial strength and effort when listing and publicizing the auction.In contrast to that, Ravina (2008) shows that borrowers' characteristics such as beauty and race significantly affect loan fundability and loan pricing. Incorporating nearly 12,000 loan requests from 2007-03-12 and 2007-04-16 she finds that borrowers perceived as beautiful are more likely to get a loan and pay significantly lower credit spreads. Moreover, Ravina finds that black borrowers pay significantly higher spreads even though they are not more likely to default.A study by Pope and Sydnor (2008) analyzes around 110,000 loan listings on in a one-year period from 2006-06 until 2007-05. There results indicate significant racial disparities on the credit market: Loan listings of black borrowers are less likely to be funded and the spreads paid by blacks are higher than those by comparable whites. In contrast to Ravina (2008), they find that blacks have a higher relative default rate than white borrowers. Of course, it is impossible to evaluate whether P2P lending offers more or less equal access to credit compared to traditional consumer lending: Inherent in an analysis on P2P lending based on transaction data is a potential sample selection bias. Lenders using the online platform might represent those with a high probability of default or lenders whose credit applications have been rejected at traditional banks. For example, Agarwal and Hauswald (2008) find that small business lenders strategically self-select into electronic (transactional) lending with respect to the publicly available information on their creditworthiness. It follows that from observed transactions in a P2P marketplace a comparison to loan availability and loan pricing at traditional banking institutions is not possible.However, none of this is the aim of this paper: We focus on the role of intermediaries that emerge in the interaction between borrowers and lenders in the electronic P2P lending market. Central to our analyses are social networks on the Prosper marketplace called groups.2.3 Groups on In addition to personal profiles, borrowers and lenders can form groups. These smallercommunities within the marketplace review and assess the creditworthiness of individual members. Groups are potentially beneficial for market participants by providing and verifying information or obtaining additional information about borrowers that is not publicly available. Groups lack distinct ownership and governance features as they typically exist in credit cooperatives (Davis 2001, Taylor 1971). There is no ownership of the groups, and there is no collective decision mechanism on accepting group members or granting loans. Furthermore, groups do not exclusively deal with their members. At any time, lenders from outside the group may invest in a group member's loan listing. This implies that there is no rotation of money within the group, and no specific allocation process. There are two papers that specifically examine the role of groups on the P2P lending website : Freedman and Jin (2008) use transaction data from 200601-06 until 2008-07-31 covering around 290,000 loan listings and 25,000 funded loans. They find evidence for the idea that the monitoring within social networks provides a stronger incentive to pay off loans ex-post: Loans with friend endorsements and friend bids have fewer missed payments and yield significantly higher rates of return than other loans. Everett (2008) looks at the influence of group membership on loan default within 13,486 Prosper loans. The dataset covers funded loans from 2006-05-31 until 2007-11-06 and incorporates ex post loan performance information until 2008-05-07. He finds that membership in a group significantly decreases loan default risk if the group enforces real-life personal connections like, e.g., employees of the same company or alumni of a certain university. Both studies presented above look at social networks in the credit market but do not specifically take the group leader into account. It is, however, not the group as an institution per se, but the group leader who decides about membership and plays a substantial role in the lending process.2.4 Group leaders as financial intermediariesIn order to reduce information asymmetries, lenders must screen potential borrowers. Given the large number of available credit listings, it can be costly or impossible to process the information available about potential borrowers. Therefore, intermediaries emerge in the electronic marketplace offering intermediary services in order to assessand limit credit risk. Every participant in the online lending platform can found a group and become a group leader. Group leaders set membership criteria and administer the group. Groups are smaller communities within the marketplace where group members may share a bond based on employment, geography, education, common leisure activities, or other factors. The principle that people from close communities act more responsibly towards each other aims to lower the risk of defaults and therefore enables lending at better rates. Among the most important tasks of the group leader is the screening of borrowers within the group (a voluntary due diligence known as "vetting"). Within groups, it is common that borrowers send personal documents regarding their identity, income, and other pertinent information to the group leader. The group leader may also establish personal contact with the borrowers' employer to verify the personal income in order to recommend a borrower's credit listing.The assignment as a group leader may be timeconsuming, since a detailed "due diligence" of a potential borrower can take several hours. There are many individual motives for forming a group and becoming a group leader. Intrinsic motivation may result from altruism or related social returns from leading a group. As extrinsic motivation and as a more tangible example, the owner of an Apple computer store may run a group on Prosper to promote sales by providing an alternative form of consumer finance. Leading a group can also be even more directly monetarily motivated: Group leaders were permitted to receive remuneration ("fees") for their effort, acting as paid intermediaries. Group leaders collect a fee in the form of additional interest for providing intermediation services until 2007-09-12, when Prosper modified the fee concept (Prosper Marketplace Inc. 2007b). The incentive for borrowers to disclose information to the group leader is to attract more bids on their credit listing for the purpose of better interest rates. Group leaders also supervise the repayment of loans within their group. In the case of default, Prosper informs the group leader who can encourage loan repayment and may arrange limited repayments (called "community payments") on behalf of a member who is not able to do so. Group leaders thus serve as a financial intermediary by acting as middlemen betweenlenders and borrowers. Even though the electronic lending marketplace displaces the traditional depository institution as a financial intermediary (Datta and Chatterjee 2008), group leaders emerge as new intermediaries. The group leader facilitates the movement of capital from surplus units in the marketplace to deficit units by producing information, providing advice, and monitoring loan repayment. Where intermediary services were concerned, borrowers faced the choice between "free" or "paid" intermediaries. It is a priori not clear if intermediation created value for the electronic marketplace and, in particular, for the borrowers.Wefocus here on the value of intermediation for borrowers.3 Development of hypothesesThere is extensive research on financial intermediation. In this section we review the relevant intermediation literature in order to derive hypotheses about the role of intermediaries in electronic credit marketplaces. Traditionally, transaction costs and information problems have provided the foundation for understanding intermediaries (Allen and Santomero 1998, Bhattacharya and Thakor 1993, Dewatripont and Tirole 1994, Santomero 1984). Due to asymmetric information between borrowers and lenders, financial markets can perform poorly or even fail when borrowers know their characteristics (the present value of the prospective projects), but lenders cannot distinguish between them. Market value then reflects average project quality (Akerlof 1970, Leland and Pyle 1976). As a result, "good risks" are driven out of the market and average project quality decreases (adverse selection). This can be the case if borrowers cannot be expected to be entirely straightforward about their characteristics since there may be a substantial reward for exaggerating positive qualities (moral hazard). In his seminal article, Diamond (1984) argues that intermediaries can help to overcome problems of asymmetric information by acting as "delegated monitors". When several lenders in a loan syndicate want to monitor a borrower and monitoring is costly, there will either be inefficiently high monitoring expenditure or a free-riding problem, where no lender has an incentive to monitor. In this case, a financial intermediary as a delegated monitor minimizes the costs of monitoring. In Diamond (1984) the intermediary holds deposits and writes loan contracts to borrowers, whichis not the case with the group leader in the electronic lending platform. Nevertheless, the argumentation is applicable to the lending platform Prosper for two reasons. Firstly, the capital of several lenders is syndicated into one loan. Secondly, lenders face a large number of potential borrowers in the marketplace. Lenders benefit from additional private information about borrowers in order to better assess credit risk and the appropriate borrowing rate required. Acquiring private information about credit listings implies a time-consuming (repeated) interaction with the borrower which is costly. Therefore, there are group leaders who act as intermediaries in producing additional private information about borrowers within groups. The intermediary realizes significant economies of scale by producing information for the marketplace. Intermediaries can solve another information problem prevalent in electronic marketplaces. Borrowers might not be willing to disclose proprietary information to a large number of lenders in a public financial market. Following Bhattacharya and Chiesa (1995), an intermediary acts as the facilitator of knowledge sharing, whereby proprietary information is only disclosed vis-à-vis the intermediary.In the marketplace, participants can voluntarily disclose additional private information regarding their credit listing. Within groups, borrowers may disclose proprietary information regarding their financial standing solely to the group leader. As group members, borrowers can thus avoid disclosing private information to the marketplace. Group leaders assess and recommend a borrower's credit quality based on additional private information, and at the same time preserve the privacy of proprietary information. Groups enable a better assessment of the borrowers' credit quality, resulting in potentially lower rates for borrowers.Finally, group leaders not only screen potential borrowers, but also monitor ongoing loan repayment in place of the potentially large number of lenders. In cases of loan default, Prosper informs the group leader who may encourage loan repayment and even arrange limited repayments by the group. If a borrower's loan is more than one month late, lenders can make what is called a "community payment" on behalf of a borrower who is temporarily not able to do so. These payments can be compared to a mutual insurance mechanism.All in all, the intermediary reduces uncertainty for lenders, which should be reflected in lower required risk premiums. The arguments provided above lead us to the first fundamental hypothesis:Hypothesis H1: Borrowers within groups are able to borrow at lower credit spreads. Next, we formulate three hypotheses that enable us to decompose the role of the group leader in the lending marketplace. With imperfect information about borrowers' credit quality, lenders can use publicly observable signals to assess credit risk (Riley 1975, Rothschild and Stiglitz 1976, Spence 1973). Observable characteristics or actions can serve as signals. On the electronic lending platform Prosper, the recommendation of a credit listing by a group leader is a strong observable signal of credit quality. Borrowers can voluntarily provide additional private information regarding their financial standing to their group leader. Group leaders can then recommend credit listings within their groups. This observable recommendation serves as a signal of good credit quality for the marketplace.This leads to:Hypothesis H2: The recommendation of a credit listing by the group leader leads to lower credit spreads.The reliability of information produced by an intermediary is a prevalent problem in the intermediation literature. Group leaders might recommend credit listings within their group without prior diligent screening. It may be difficult or impossible for potential lenders to distinguish good information from bad. Group leaders can signal credibility of a recommendation by bidding on the recommended credit listing. The potential investment of the group leader is an observable signal for information quality (Leland and Pyle 1976). We derive:Hypothesis H3a: A group leader's bidding serves as a credible signal for the quality of the credit listing and results in lower credit spreads.Hypothesis H3b: A group leader's bidding on a credit listing signals information quality and has a stronger impact on credit spreads than a recommendation by the group leader.We derive two additional hypotheses about the reputation and the size of groups. Past activities within a group, especially regarding the diligent assessment of individualborrowers by the group leader, are only imperfectly observable. In contrast, the reputation of a group in the electronic marketplace is observable from its group rating. The group rating is a measurement of a group's performance in paying back its loans in comparison with expected (historical) default rates. A defaulted loan worsens a group's rating and therefore its reputation. Tirole (1996) shows analytically how a group's good reputation positively influences individual behavior. The group rating reflects a group's ability to assess borrowers' credit quality, and serves as a proxy for the group leader's behavior in the future.In addition to a group leader's general ability, we argue that group reputation serves as an effective mechanism to prevent collusion between the group leader and a borrower within the group. The phenomenon of collusion (see, e.g., Tirole 1991) could be a major concern for participants in the electronic lending marketplace. This would be the case if a potential borrower could "bribe" the group leader in order to receive a recommendation and a bid. With an increasing probability for such collusive behavior, the credibility of the observable actions of the intermediary would be significantly reduced. This would be reflected in a decreasing group rating due to higher than expected defaults within the group. We deduce:Hypothesis H4: A higher group rating leads to lower credit spreads.When deciding to join a group, market participants face the choice of group size. At first sight, a smaller group seems to offer a potentially closeknit community in the marketplace that facilitates the interaction and closer collaboration of group members with the group leader. This is fairly comparable to the stream of literature on relationship lending that emphasizes the exchange and evaluation of "soft information" within small banks (Petersen and Rajan 1994, Elyasiani and Goldberg 2004, Berger, Miller, Petersen, Rajan, and Stein 2005). On closer examination, and presumably more important, borrowers and lenders might prefer larger groups because they generate more opportunities for exchange, collectively provide more funds for loans, and, thus, offer easier access to credit. From an investor's perspective, in addition to a larger network, bigger groups are attractive because they may enable effective "peer-monitoring" which lowers credit risk. The concept of peermonitoring,。
金融风险管理外文翻译文献
文献信息:文献标题:MANAGING FINANCIAL RISK BY USING DERIVATIVES:A Study of United Arab Emirate Listed Companies(利用金融衍生工具管理金融风险:阿拉伯联合酋长国上市公司研究)国外作者:Ali Said文献出处:《Economics and Finance Review》, 2017, 5(03):5–13字数统计:英文2093单词,11611字符;中文3580汉字外文文献:MANAGING FINANCIAL RISK BY USING DERIV ATIVES:A Study of United Arab Emirate Listed CompaniesAbstract The present paper attempts to identify the ways that the United Arab Emirate listed companies manage their financial risk with the use of derivatives. By examining the companies’ annual reports and financial reviews for the year 2015. The studied revealed that low use of the financial derivatives within Investment and the real estate industries. The use of the derivatives was only 25% while is consider to be below due to the high risk associated with the industry. The risk management tools available for hedging real-estate risk within the United Arab Emirate financial market are very much in their infancy and have problems ranging from illiquidity of trading to lack of theoretical development regarding modeling.Keywords: Financial risk, derivatives, interest rate risk, foreign exchange risk, United Arab Emirate ListedCompanies.1.INTRODUCTIONMany of the companies work on reducing risk associated with a business such as interest rates, currency-exchange rates, commodity prices and equity markets. Therefore, many companies are relying heavily on the use of the finance derivatives.The financial derivatives play an important role to support companies to manage and reduce risk by shelter these firms from the volatility of the financial market.Many of the academies and practitioners have expressed concerns over the use of derivatives. Some of the academic studies, such as Faulkender (2005) and Vickery (2008), show that companies frequently utilize interest rate risk derivatives to time the market. Another study such by Brown, Crabb, and Haushalter (2002) discovered that the use of corporate risk management instrument in the gold mining industry is often affected by attempts to time market prices.While other studies by Nance, Smith, and Smithson (1993), Mian (1996), and Hentschel and Kothari (2001) demonstrate that the employ of derivatives does not produce meaningful differences in firms' risk.This paper is organized as follows. Section 2 review the relevant literature, followed by section 3 that states out the research questions. Section 4 explains the methodology of the present study. Section 5 results, and the last section contains the conclusion.2.LITERATURE REVIEWThe volatility, the constant changes in the business arena, and deal with the changes in interest rates and exchange rate movements make a company exposed to losses. During 2008, the financial markets expose to the loss which affected enterprises and the overall economy. Therefore, many companies started to explore and implement risk management within the enterprise. Risk management is a practice that identifies possible risks in advance and examines these events and takes the necessary actions to reduce or eliminate these risks.Financial derivatives considered to be one of the essential tools that can be used to reduce and cost risk. In the 2002 Berkshire Hathaway, annual report, Warren Buffet advised against the utilizing of derivatives, and consider them to be the financial weapons of mass destruction bringing dangers that are potential can lethal for the business and economy. However, Buffet's view on derivatives faces resistance from the standard academics that derivatives are used to reduce risk (Smith and Stulz(1985))Bartram et.al. (2011) examined the use of financial derivatives to reduce both total risk and systematic risk. While Nguyen and Faff (2010) showed that regardless of the public distress about utilization and implementing financial derivatives would increase firm risk, the evidence demonstrations that in most cases, financial derivatives are used for hedging intentions.As discussed by Clark and Judge (2008), hedging tools are contingent on the type of exposure and risk. For example, Short-term instruments such as foreign currency forwards and options are used to hedge short-term exposure against of generated from export actions, while foreign currency debt and foreign currency swaps into foreign currency (but not into domestic currency) are employed to hedge long-term exposure result from assets located in foreign positions.Papaioannou (2006) showed that the larger companies are, the more likely to utilize financial derivative to try to hedge against the risk associated with the exchange rate. The primary goal of using the derivatives instruments to reduce the losses due to the volatility and instability of the market, for example, foreign exchange derivatives have given companies the stability in the cash flow and earning to give due to the reducing the risk associated with exchange rates.The companies’choice of foreign exchange derivatives tools is focused on OTC currency forwards (over 50% of all foreign exchange derivatives used), OTC currency options (around 20%), and OTC currency swaps (around 10%). El-Masry (2006) emphasized that the objective of the use of derivative for hedging intentions is controlling the unpredictability and instability in cash flows, and the second reason was the market value of the firm.Another study by Stulz (2005), reported that 28 percent of firms employ derivatives instruments to reduce earnings volatility. While Adedeji and Baker (2002) stated that the purpose of using interest rate derivatives to hedge against the risk that associated with financial troubles and economies of scale. Yu et.al. (2001) stated that many of the Hong Kong firms had used derivatives instruments for risk management purpose to manage the associated with foreign exchange and interest rate derivatives.There is various kind of instruments in the derivative markets. Below we describe the major types that are widely used in the market:(1)Forward contracts: represent agreements for postponed delivery of financial tools or commodities in which the buyer decides to purchase, and the seller decides to provide, at a specified future date, a specified instrument or commodity at an indicated price or yield. Forward contracts are not traded on organized exchanges, and their contractual terms are not standardized. The reporting exercise also includes deals where only the difference between the contracted forward outright rate and the prevailing spot rate is settled at maturity, such as non-deliverable forwards (i.e., forwards which do not require physical delivery of a non-convertible currency) and other contracts for difference (Michael, 2012).(2)Swaps are contracts in which two participants agree to trade payment streams established on a specified notional amount for a period. Forward exchange swap agreements are reported as swaps (Michael, 2012).(3)Options: Option contracts grant either the right or the responsibility, depending upon whether the reporting organization is the buyer or the writer, respectively, to buy or sell a financial instrument or commodity at an agreed price up to a required future date (Michael, 2012).(4)Forward rate agreement is a forward contract in which the two participants agree to establish interest payments to each other at futures dates. One party makes a payment at a rate decided to in advance. The other party makes a disbursement at a rate to be determined later (Michael, 2012).3.RESEARCH QUESTIONManaging risk by implementing financial derivatives can be controversial topic due to the events that were associated with last financial crisis. Also, the financial derivatives topic considers being relative new particularly in the Middle East. More theoretical and empirical studies are needed particularly countries generate significant of their income through oil production. In this paper, we are trying to fill this research gap. To assess and explain how publicly traded companies in United Arab Emiratemanage their financial risk through the use of the financial derivatives. The following questions are to be addressed in the present study.(1)Do the United Arab Emirate listed companies use derivatives to hedge the risks?(2)What are the risks that the derivatives are hedging?(3)What are the types of derivative instruments that the companies are using?(4)What are the objectives of using such kinds of derivatives?4.DEFINITION OF V ARIABLES AND DATAThe past of 20 years, the financial derivatives have shown growth in the engineering and the use. The increase in the growth of these instruments. Along with this growth, the regulation and disclosure of the utilization of the derivatives have been developed too.Therefore, companies in different countries are required to report the information about their use of the derivatives in their annual reports. In this study, we gathered and examined company-level data. The data come from United Arab Emirate Financial Market. The first step is collecting the annual reports and financial reviews. The second phase identified whether the companies employed derivatives to hedge their financial risks. The third phase would be determining the types of derivatives these companies utilized against types of risks.5.RESULTSOf all the 70 companies in the United Arab Emirate Financial stock market, 37 of them (or 82.9%) reported that they used at least one derivative to manage the risk of the company’s operation. It was interesting that the study has revealed that companies within the Hospitality, Telecommunication, and Pharmaceutical at 100% the companies reported that they used derivatives.Also, the study showed the companies within the banking and financial services industry only 71% revealed used financial sector. Furthermore, the study revealed that Insurance, Real Estate, Construction, Industrial, and energy industries were 47.1%,25%, 60%, 50%, and 50% respectively. It is interesting to note that 47.9% of the companies did not use any derivatives. The tourism, telecommunication, and pharmaceutical sectors, the percentage is the highest (100%). Here are some examples.Gulf Pharmaceutical Co. and Gulf Medical Projects within the pharmaceutical sector has used the financial derivatives as investment tools to support the company’s operation costs. Nance, Smith, and Smithson (1993),Geczy, Minton, and Schrand (1995), and Dolde (1995) find that firms with high levels of research and development (R&D) expenses are more likely to use some form of derivatives instrument as an investment tool.Another example, Abu Dhabi National Hotels and National Corp For Tourism and Hotels sector were using the interest rate swaps hedging. According to Amirik Singh and Arun Upneja (2008) the lodging firms predominantly use interest rate swaps and options to manage interest rate risk due to underinvestment costs, financial distress costs, managerial risk aversion, information asymmetry, cash-flow volatility, proportion of floating-rate debt, foreign sales ratio, and firm size are significant determinants of the decision to hedge.In the telecommunication sectors, Sudan Telecommunication Co. Ltd, Ooredoo, and Emirates Telecommunication Group Company have used financial derivatives to hedge against foreign currency and interest rate risk. The result consistent with the findings of, Grant and Marshall (1997), Bodnar et al. (1999), Mallin et al. (2001) indicate that in hedging contractual obligations, forwards is the most popular derivative instrument used to hedge currency risk, and swaps the most popular derivative instrument to hedge interest rate risks within the telecommunication sector.The studied revealed that low use of the financial derivatives within Investment and the real estate industries. The use of the derivatives was only 25% while is consider to be below due to the high risk associated with the sector which agreed with the finding of the study of Fabozzi, et al. (2009) real estate markets represent a very large proportion of the total wealth in developed countries. The risk management tools available for hedging real-estate risk are very much in their infancy and haveproblems ranging from illiquidity of trading to lack of theoretical development regarding modeling.The study has also revealed that only 50% of the companies within the United Arab Emirate financial market has been using the interest rates financial derivatives to reduce the cost of borrowing. Furthermore, these companies have used futures and options to hedged against the liabilities and assets 29% and 30% respectively. The other interesting finding that some of the companies started to use Islamic financial derivatives however the rate is still low only 11% of the companies within the United Arab Emirate financial market reported using these tools.6.CONCLUSIONSOur study has provided some preliminary information about the determinations and the use of financial derivatives among the companies in United Arab Emirate financial market. Our research has revealed some interesting patterns that can influence the company financial stability through risk management. In the future, more research should be carried to assess the trend by using different statistics models such as time-series data or propensity score-matching methods.Also, the comparison can be made between Dubai financial market to other Middle Eastern financial markets and such as Kuwaiti and Saudi Arabi. As well, study the companies that use Islamic financial tools compare to traditional financial derivatives as a tool to manage risks associated with the enterprise’s operation. If firm-level data are available, it is desirable to research the financial decisions concerning the use of derivatives and the outcomes of these decisions. As well compare the use the financial derivatives result to other companies that use Islamic financial instruments.中文译文:利用金融衍生工具管理金融风险:阿拉伯联合酋长国上市公司研究摘要通过对2015年公司的年度报告和财务报告进行审查,本文试图确定阿拉伯联合酋长国上市公司利用衍生工具来管理其金融风险的方式。
金融市场的风险管理(英文版)
金融市场的风险管理(英文版)Risk Management in Financial MarketsIntroductionRisk management is a crucial aspect of the financial markets. It involves the identification, assessment, and mitigation of potential risks that may impact an organization's financial well-being. The dynamic nature of financial markets makes effective risk management imperative to ensure stability and sustainability. This article aims to explore the various aspects of risk management in financial markets.Types of RisksFinancial markets face various types of risks, each with its unique characteristics. The most common types of risks in financial markets include credit risk, market risk, liquidity risk, operational risk, and systemic risk.Credit risk refers to the potential loss arising from a borrower's inability to repay a loan or meet its contractual obligations. Financial institutions employ credit risk management techniques, such as credit scoring models and credit derivatives, to assess and mitigate this risk.Market risk encompasses the potential loss due to fluctuating market prices of financial instruments. It includes risks associated with interest rates, currencies, equities, commodities, and derivatives. Market risk management involves using techniques like portfolio diversification, hedging, and stress testing to mitigate potential losses.Liquidity risk arises when an institution is unable to fulfill its financial obligations due to an insufficient availability of liquid assets. Effective liquidity risk management involves maintaining adequate liquidity buffers, developing contingency funding plans, and regularly monitoring and stress testing liquidity positions.Operational risk involves the risk of financial loss due to inadequate or failed internal processes, systems, or human error. It includes risks associated with technology failures, fraud, legal and regulatory compliance, and vendor management. Operational risk management involves implementing robust internal controls, conducting regular audits, and training staff on risk awareness.Systemic risk refers to the risk of widespread disruptions or failures in the financial system that could have a significant impact on the overall economy. It can arise from interconnectedness and interdependencies among financial institutions, such as in the case of a financial crisis. Systemic risk management involves regulatory oversight, stress testing, and contingency planning at both the institutional and systemic levels.Risk Assessment and MitigationEffective risk management starts with a thorough and comprehensive risk assessment. This involves identifying and analyzing risks, including their potential impacts and likelihoods of occurrence. Risk assessment enables organizations to prioritize risks and allocate resources accordingly.Once risks are identified, appropriate risk mitigation strategies canbe implemented. These strategies may include risk avoidance, risk reduction, risk transfer, or risk acceptance. Risk avoidance involves refraining from activities that pose significant risks. Risk reduction involves implementing measures to minimize the likelihood or impact of risks. Risk transfer involves transferring risks to another party, such as through insurance or hedging. Risk acceptance involves acknowledging and accepting certain risks if their potential impact is deemed acceptable.Risk management frameworks and tools can also assist in the overall risk management process. These frameworks provide a structured approach to managing risks and can help organizations establish appropriate risk management policies, procedures, and controls. Examples of risk management tools include risk registers, risk appetite statements, risk and control self-assessment, and key risk indicators.Continual Monitoring and ReviewRisk management is an ongoing process that requires continuous monitoring and review. Financial institutions need to establish effective risk monitoring systems to detect and assess emerging risks promptly. Regular risk reporting and analysis help organizations stay informed about their risk profiles and take necessary actions.Risk management frameworks should also be periodically reviewed and updated to ensure their effectiveness in addressing evolving risks. As technology advances and market conditions change, risk management practices need to keep pace to effectively manage emerging risks.ConclusionRisk management is a critical component of the financial markets. The proper identification, assessment, and mitigation of risks are essential for maintaining stability and sustainability. By implementing robust risk management practices, financial institutions can navigate the challenges and uncertainties of financial markets effectively. Continued commitment to risk management ensures the soundness and integrity of the overall financial system.Sure, here's some additional content on the topic:Risk measurement and monitoring are key aspects of risk management in financial markets. Organizations use various metrics and tools to quantify and monitor risks. These include value-at-risk (VaR), stress testing, scenario analysis, and sensitivity analysis. VaR measures the potential loss in a portfolio or position under normal market conditions, with a specified confidence level. Stress testing, on the other hand, involves assessing the impact of extreme and hypothetical market scenarios on a portfolio's value. Scenario analysis involves analyzing the potential outcomes of specific events or market conditions. Sensitivity analysis assesses how changes in underlying factors, such as interest rates or exchange rates, affect the value of a portfolio.Risk management practices also extend to regulatory compliance. Financial institutions need to comply with various regulations and guidelines set by regulatory authorities. These regulations aim to safeguard the stability and integrity of the financial system and protect consumers. Risk management frameworks helporganizations ensure compliance by providing guidelines on risk assessment, reporting, and governance. Regulatory frameworks, such as Basel III, require banks to maintain adequate capital buffers to absorb potential losses and to have robust risk management systems in place.Technology plays a significant role in modern risk management. Advanced analytics tools and algorithms enable organizations to better analyze and understand risks. Artificial intelligence and machine learning can identify patterns and detect anomalies that may indicate potential risks. Risk management systems can also be automated to facilitate real-time monitoring and reporting. Technology-driven risk management helps organizations to improve risk assessment accuracy, increase efficiency, and enable faster decision-making.In addition to external risks, organizations also need to consider internal risks. Internal risks can arise from poor governance, inadequate internal controls, or unethical behaviors. Risk management frameworks often include internal control systems to ensure the effective mitigation of internal risks. These systems involve procedures and policies that promote transparency, accountability, and ethical behavior within the organization. Regular internal audits help assess the effectiveness of internal controls and identify areas for improvement.Risk management is a collective effort that involves all stakeholders in the financial markets. Regulators, financial institutions, investors, and market participants all play a role in identifying, assessing, and mitigating risks. Effective riskmanagement requires collaboration and information sharing among these stakeholders. Regulatory authorities set standards and guidelines, financial institutions implement risk management practices, investors conduct due diligence, and market participants adhere to market rules and regulations.In conclusion, risk management in financial markets is vital to ensure stability, sustainability, and trust in the financial system. It involves identifying, assessing, and mitigating various types of risks, including credit risk, market risk, liquidity risk, operational risk, and systemic risk. Risk assessment and mitigation strategies are informed by robust risk management frameworks and tools. Continual monitoring and review of risks help organizations stay informed and responsive to emerging risks. Technology and regulatory compliance also play significant roles in effective risk management. By prioritizing risk management, financial institutions can safeguard their financial well-being and contribute to the overall stability of the financial system.。
互联网金融P2P网络借贷外文翻译文献
文献信息:文献标题:Evaluating credit risk and loan performance in online Peer-to-Peer (P2P) lending(点对点(P2P)网络借贷的信用风险与贷款绩效评估)国外作者:Riza Emekter, Yanbin Tu, Benjamas Jirasakuldech, Min Lu 文献出处:《Applied Economics》, 2015, 47(1):54-70字数统计:英文3063单词,15818字符;中文5110汉字外文文献:Evaluating credit risk and loan performance in onlinePeer-to-Peer (P2P) lendingAbstract Online Peer-to-Peer (P2P) lending has emerged recently. This micro loan market could offer certain benefits to both borrowers and lenders. Using data from the Lending Club, which is one of the popular online P2P lending houses, this article explores the P2P loan characteristics, evaluates their credit risk and measures loan performances. We find that credit grade, debt-to-income ratio, FICO score and revolving line utilization play an important role in loan defaults. Loans with lower credit grade and longer duration are associated with high mortality rate. The result is consistent with the Cox Proportional Hazard test which suggests that the hazard rate or the likelihood of the loan default increases with the credit risk of the borrowers. Finally, we find that higher interest rates charged on the highrisk borrowers are not enough to compensate for higher probability of the loan default. The Lending Club must find ways to attract high FICO score and high-income borrowers in order to sustain their businesses.Key words: Peer-to-Peer lending; credit grade; FICO score; default riskI.IntroductionWith the advent of Web 2.0, it has become easy to create online markets and virtual communities with convenient accessibility and strong collaboration.One of the emerging Web 2.0 applications is the online Peer-to-Peer (P2P) lending marketplaces, where both lenders and borrowers can virtually meet for loan transactions. Such marketplaces provide a platform service of introducing borrowers to lenders, which can offer some advantages for both borrowers and lenders. Borrowers can get micro loans directly from lenders, and might pay lower rates than commercial credit alternatives. On the other hand, lenders can earn higher rates of return compared to any other type of lending such as corporate bonds, bank deposits or certificate of deposits. One of the problems in online P2P lending is information asymmetry between the borrower and the lender. That is, the lender does not know the borrower's credibility as well as the borrower does. Such information asymmetry might result in adverse selection (Akerlof, 1970) and moral hazard (Stiglitz and Weiss, 1981). Theoretically, some of these problems can be alleviated by regular monitoring, but this approach poses a challenge in the online environment because the borrowers and the buyers do not physically meet. Fostering and enhancing the lender's trust in the borrower can also be implemented to mitigate adverse selection and moral hazard problems. In the traditional bank-lending markets, banks can use collateral, certified accounts, regular reporting, and even presence of the board of directors to enhance the trust in the borrower. However, such mechanisms are difficult to implement in the online environment which will incur a significant transaction cost.To reduce lending risks associated with information asymmetry, current online P2P lending has the following arrangements. First, the Lending Club screens out any potential high-risk borrowers based on the FICO score. The minimum FICO score to be able to participate is 640. Second, the typical size of the loans produced in this market is small, which is under $35 000 at the Lending Club. Therefore, these loans are essentially microloans which pose a relatively small loss in case of default. Third, the market maker offers matchmaking systems which can be used to generate portfolio recommendations and minimize lending risks. Fourth, if a borrower fails to pay, the market maker will report the case to a credit agency and hire a collectionagency to collect the funds on behalf of the lender. Although there are certain structures imposed in the online P2P that help to minimize the risk, this form of lending is inherently associated with greater amount of risk compared to the traditional lending.The purpose of this article is to evaluate the credit risk of borrowers from one of the largest P2P platforms in the United States provided by the Lending Club, which help lenders to make more informed decisions about the risk and return efficiency of loans based on the borrowers' grade. There are two related research questions this article will address: (1) What are some of the borrowers' characteristics that help determine the default risk? and (2) Is the higher return generated from the riskier borrower large enough to compensate for the incremental risk? Lenders can allocate their investments more efficiently if they know what characteristics of the borrower affect the default risk. Each borrower is classified by credit grade with corresponding borrowing rate assigned by the Lending Club. To make an efficient allocation, a lender should know whether the higher interest rates set for high-risk borrowers are sufficient to compensate the lenders for the higher probabilities of a potential loss.Our findings suggest that borrowers with high FICO score, high credit grade, low revolving line utilization and low debt-to-income ratio are associated with low default risk. This finding is consistent with the studies by Duarte et al. (2012) who report that borrowers with a trustworthy characteristic will have better credit scores but low probability of default. This result also suggests that besides the loan applicants' social ties and friendship as reported by Freedman and Jin (2014) and Lin et al. (2013), the four factors discussed above are also important in explaining the default risk. When comparing with US national borrowers, the results show that the Lending Club should continue to screen out the borrowers with lower FICO score and attract the highest FICO score borrowers in order to significantly reduce the default risk. In relating the risk to the return, it shows that higher interest rate charged for the riskier borrower is not significant enough to justify the higher default probability. Our finding here is consistent with the study by Berkovich (2011) who reports that high quality loans offer excess return.II.Literature ReviewThree main streams of research have emerged in response to the growing popularity of P2P lending. The first stream of research examines the reasons for the emergence of online P2P lending. The second stream of research focuses on determining the factors that explain the funding success and default risk. The last stream of research investigates the performance of online P2P loan for a given level of the risk.Peer group lending has been emerging in local communities and has attracted the research in this area. Conlin (1999) develops a model to explain the existence of peer group micro-lending programmes in the United States and Canada. He finds that peer groups enable fixed costs to be imposed on the entrepreneurs while minimizing the programme's overhead costs. Ashta and Assadi (2008) investigate whether Web 2.0 techniques are integrated to support the advanced social interactions and associations with lower costs for P2P lending. Hulme and Wright (2006) study a case of online P2P lending house, Zopa, in the United Kingdom. They suggest that the emergence of online P2P lending is a direct response to social trends and a demand for new forms of relationship in financial sector under the new information age.There is extant literature that identifies the factors determining the funding success and default risk. Using the Canadian micro-credit data, Gomez and Santor (2003) find that group lending offers lower default rates than conventional individual lending does. Study by Iyer et al. (2009) shows that lenders can evaluate one third of credit risk using both hard and soft data about the borrower. Lin et al. (2013) analyse the role of social connections in evaluating credit risk and discover that strong social networking relationship is an important factor that determines the borrowing success and lower default risk. Lin et al. (2013) further report that applicants' friendship could increase the probability of successful funding, lower interest rates on funded loans, and these borrowers are associated with lower ex post default rates at Prosper. The importance of social ties in determining loans funded is also examined by Freedman and Jin (2014). The result shows that borrowers with social ties are more likely tohave their loans funded and receive lower interest rates. However, they also find evidence of risks to lenders regarding borrower participation in social networks.Several other studies examine whether certain borrowers' characteristics and personal information determine the success of loan funding and default risk. Herzenstein et al. (2008) show that borrowers' financial strength, their listing and publicizing efforts, and demographic attributes affect likelihood of funding success. Study by Duarte et al. (2012) further argues that borrowers who appear more trustworthy have better credit score with higher probabilities of having their loans funded and default less often. Larrimore et al. (2011) demonstrate that borrowers who use extended narratives, concrete descriptions and quantitative words have positive impact on funding success. However, humanizing personal details or loan justifi cations have negative influences on funding success. Qiu et al. (2012) further reveal that in addition to personal information and social capital, other variables, including loan amount, acceptable maximum interest rate and loan period set by borrowers, significantly influence the funding success or failure.Galak et al. (2011) further show that lenders tend to favour individual over group borrowers and borrowers who are socially proximate to themselves. They also find that lenders prefer the borrowers who are more like themselves in terms of gender, occupation and first name initial. More interestingly, Gonzalez and Loureiro (2014) have similar findings: (1) when perceived age represents competence, attractiveness has no effect on loan success; (2) when lenders and borrowers are of the same gender, attractiveness might lead to a loan failure (i.e., the ‘beauty is beastly' effect) and (3) loan success is sensitive to the relative age and attractiveness of lenders and borrowers. Herzenstein et al. (2011) find that herding in the loan auction is positively related to its subsequent performance, that is whether borrowers pay the money back on time.III.DataIn this section, the loan applicants' data is first described, followed by loan distribution based on loan purposes, credit grade and loan status and it ends with thedetailed descriptive statistics of the loan applicants. This study uses 61 451 loan applications in the Lending Club from May 2007 to June 2012 obtained from . Over the study period, the Lending Club lent about $713 million to borrowers. To address the borrowers' behaviour in online P2P lending, we first examine the main reasons for borrowing money from others. Table 1 lists the borrowers' self-claimed reasons summarized in the Lending Club. Almost 70% of loan requested are related to debt consolidation or credit card debts with a total loan amount requested of approximately $387 million and $108 million, respectively. The number of loan applications for education, renewable energy and vacation contribute less than 1% of total loans with the total loan requested ranging from 1 to 3 million. The borrowers state that their preferences to borrow from the Lending Club are lower borrowing rate and inability to borrow enough money from credit cards. The second purpose for borrowing is to pay home mortgage or to re-model home.Table 1. Loan distributions by loan purpose (May 2007–June 2012)Notes: The data is obtained from 61 451 loan applicants in the Lending Club, , from May 2007 to June 2012.The loan-seeking persons are asked to provide the reasons for requesting loans.The Lending Club uses the borrower's FICO credit scores along with other information to assign a loan credit grade ranging from A1 to G5 in descending credit ranks to each loan. The detailed procedure is as follows: after assigning a base score based on FICO ratings, the Lending Club makes some adjustments depending on requested loan amount, number of recent credit inquiries, credit history length, total open credit account, currently open credit accounts and revolving line utilization todetermine the final grade, which in turn determines the interest rate on the loan.Table 2 reports the loan distribution by credit grade. The majority of borrowing requests have grades between A1 and E5. The Highest loan amounts requested are from borrowers with ‘B' credit grade, which contribute 29.56% of total amount of loans requested. The total number of applicants for this ‘B' credit grade group is 18 707, which represents total loans of approximately $210 million. The lowest loan amounts requested are from borrowers with the lowest ‘G' credit grade which accounts for 1.53% of total loans. There are only 608 loan applicants for this lowest credit rating ‘G' group and it represents approximately $11 million in total loan value. According to the Lending Club's policy, a loan credit grade is used to determine the interest rate and the maximum amount of money that a borrower can request. The higher the loan grade, the lower the interest rate. A borrowing request with a low grade renders a higher interest rate as a compensation for a high risk held by lenders. Table 2. Loans distribution by credit grades (May 2007–June 2012)Notes: The Lending Club uses the borrowers’ FICO credit scores along with other information to classify a loan from Grade A1 to G5 in descending credit risk. Therefore, A1 credit grade represents the highest credit quality/low-risk borrowers, whereas G5 credit grade represents the lowest credit quality/ high-risk borrowers. Total amount of loans requested as a percentage of total loan is 19.35% for credit grade group ‘A’, 29.56% for ‘B’, 19.94% for ‘C’, 14.84% for ‘D’, 10.15% for ‘E’, 4.59% for ‘F’ and 1.53% for ‘G’.Finally, Panel A of Table 3 shows the loan status for all the loan requests on 20 July 2012. Overall, the default rate is 4.60% with total losses of approximately $29 million. Another 2.45% of total loan requests which constitute $18.6 million could be potentially lost because the borrowers are late in making payment within 30 days or 120 days and not paying the normal instalments. 17.98% of the loans are fully paid with an approximate value of $108 million. The $557 million loans are in current status account for 74.91% of total loans. Naturally, loans with a lower grade demonstrate a higher default rate. Therefore, study on risk management on P2P lending is relevant for the lenders to optimize their investment portfolios. Panel B of Table 3 reports the loan status for the matured loans. The overall loss rate is much higher for matured loans. Among 4904 matured loans, 914 loans are charged-off, which represent 18.6%. The total loss is $5.5 million which represents 13% of all matured loans amount. Less than 1% of the matured loans are late in terms of making payment with the unpaid balance of approximately $27 000. 80.77% or $33 million of matured loans are fully paid.Table 3. Loan distribution by the loan status (May 2007–June 2012)Table 4 reports the general characteristics and credit history of the online P2P loan applicants from the Lending Club. Based on our sample of 61 451 loanapplicants, the average monthly interest charged on a loan is 12.34%. On average, 471 days passed from the issue date of the loan. The average credit grade of a borrower is 25, which corresponds to credit category between B and C. The average size of a typical loan is $11 604 and the average monthly payment is $351. The borrower in general pays back $4384 a month and has $7873 left to be paid. The average ratio of the remaining balance to total loans is 63%.Examining the borrowers' characteristics, it shows that the mean income of a borrower from the Lending Club is $5796 with the debts to income ratio of 0.1381. On average, a borrower has 9.56 open credit lines and 22 total credit lines, carries $14 315 average revolving credit balance and almost half (51.6%) of his or her credit limit. In the last six months, there is 1 credit inquiry requested by an average borrower. Average FICO score category of a typical borrower is 3.48, which corresponds to a FICO score between 680 and 750.Table 4. Descriptive statistics (May 2007–June 2012)Notes: Credit Grade is the grade assigned by the Lending Club based on the FICOrano credit rating information along with other information. Credit Grade ‘1’ is the loan category of ‘G’ which is the riskiest class of loans. Credit Grade ‘7’ is the loan category of ‘A’ which is the lowest risk borrowers. FICOrano is the credit rating of the borrowers rated by credit card companies. FICO 6 corresponds to borrowers with the FICO score above 780, FICO 5 corresponds to FICO score between 750–779, FICO 4 = 714–749, FICO 3 = 679–713, FICO 2 = 660–678 and FICO 1 = 640–659, respectively.IV.ConclusionsCredit risk is an important concern for the P2P loans. This study employs the data from the Lending Club to evaluate the credit risk of the P2P online loans. We findthat credit score, debt-to-income ratio, FICO score and revolving line utilization play an important role in determining loan default. The credit categorization used by the Lending Club successfully predicts the default probability with one exception of next lowest credit grade ‘F'. In general, higher credit grade loan is associated with lower default risk.The mortality risk also increases with the maturity of the loans. Loans with lower credit grade and longer duration are associated with high mortality rate. The Cox Proportional Hazard Test results show that as the credit risk of the borrowers increases, so does the likelihood of loan being default. However, the higher interest rate currently charged for the riskier borrower is not significant enough to justify the higher default probability. This suggests that the lenders would be better off to lend only to the safest borrowers in the highest grade category of 7 or Grade A. Increasing spreads on riskier borrower may lead to a more severe adverse selection resulting in higher default risk.The Lending Club lenders should either extend credits only to the highest grade borrower or try to find more creative ways to lower the default rate among current borrowers. When comparing with the US national consumers, borrowers with relatively higher income and potentially higher FICO scores do not participate in the P2P market. Creating incentives to attract these types of borrowers would have a significant potential to decrease the default risk in this market.中文译文:点对点(P2P)网络借贷的信用风险与贷款绩效评估摘要近年来点对点(P2P)网络借贷开始兴起。
网络金融风险防范外文翻译文献
网络金融风险防范外文文献翻译(含:英文原文及中文译文)英文原文How to guard against financial risks network ProfessorKristian BehrensFirst, the definition of network finance Network Finance is a computer network for the technical support of the financial activities and related activities in general, is a network of information technology and product of the combination of modern finance, but it is not a simple combination of the two, but a financial industry and even all industries An operating mechanism, is the future of enterprise system development. Narrowly understood, refers to the financial network of financial service providers based on the host to the Internet or communications network for the media, through the financial data and business processes embedded software platform, user interface terminal mode of operation of the new financial ; from a broad understanding of the concept of network finance their mode of operation also includes matching network of financial institutions, networks and related financial markets, regulatory and other external environment. Including: e-money, online banking, online payment, network security and network insurance. Second, the network of financial riskNetwork mainly engaged in the financial settlement of electronicmoney and electronic virtual financial services, in addition to traditional financial activities which exist in the process of credit risk, liquidity risk, interest rate risk, currency risk and market risk, from a technical, business and legal perspective, There are the following specific risks:1. Technology risk(1) hacker attacks. The operation of the network must rely on financial transactions, computer and Internet, all transactions are stored in the computer, the transmission of online information is easy to become a large network of "hacker" attack. In addition, Web access is a form of Internet service, is also a network of financial institutions trading and services platform, but it depends on TCP / IP protocol, there are many security vulnerabilities. This gives hackers broke into financial institutions through the network to create the conditions for the system. Hackers only need to use loopholes in the system itself, "only need to modify a few settings " you can allow financial institutions to a standstill.(2) technology selection risk. To carry out financial business networks, they must choose a proven technology solutions to support. Once there is choice, there will be a result of selection for the same mistakes which led to the risk. One possibility is to choose the technology system and client terminal software compatibility due to poor speed of information transmission interruption or reduction, another risk is that of technical alternatives have been eliminated, resulting in relativelybackward technology, the network out of date, leading to enormous technical and Loss of business opportunities. Financial terms of the network, technology choice may lose all of the market failure, or even lose the basis for survival.2. Business risks.(1) operational risk. Operational risk from the system reliability, stability and security caused major defects in the possibility of potential loss may come from the negligence of online financial customers, may also come from the financial security system network and its products, design flaws and operational errors . Operational risk relates primarily to authorize the use of online financial accounts, the network of financial risk management systems, networks, financial institutions and the exchange of information among customers, true and false recognition of electronic money. (2) the risk of market signals. Market risk is due to signal asymmetric information network of financial institutions led to the face of adverse selection and moral hazard arising from business risks. Such as Internet banking customers can not identify the risk level of the Internet at a disadvantage, online customers may use their hidden information and action to make the network to their advantage at the expense of the interests of the decision-making banks and leaving because of adverse public comment on Internet Banking Risk of losing customers and sources of funding risks. (3) credit risk. Reputation risk isthe network of financial institutions can not create good customer relations, can not establish their own good reputation, and thus can not engage in financial business. Once the virtual network of financial institutions to provide financial services can not achieve the expected level of the public, or adverse reactions in the community, or network security system of financial institutions have been destroyed to form a network of financial credit risk.3. Legal risks. The legal risks of financial networks, mainly from two aspects: First, violation of relevant laws, regulations and system requirements, and online transactions failed to comply with the provisions of the relevant rights and obligations. These laws and regulations, including consumer protection laws, financial disclosure system, privacy protection, intellectual property protection law and currency system. Second, the lack of network financial law. China Internet Finance still in its infancy, is still quite a lack of appropriate laws and regulations. Therefore, using the Internet to provide or receive financial services, signed an economic contract rights and obligations in the face considerable legal risk, vulnerable to undue disputes, not only increase the cost of online financial transactions, and even affect the Development of the financial health of the network.Third, improve the network to prevent and control financial risksPoint of the network of financial risks, involving a wide range ofinterests, it is necessary to perfect legal environment, strengthening access management, a sound regulatory system, adjust the regulatory strategy and other aspects, a multi-pronged, comprehensive treatment.1. Improve the legal system.(1) legislative efforts to increase the network of financial, clear the network of financial rights and obligations of relevant subjects.(2) to develop rules of fair trade network. In the identification and validation of digital signatures, transactions preservation of evidence, the transaction and both parties share responsibility for the protection of personal information of consumers to make detailed provisions to ensure transaction security, digital evidence when disputes arise and transactions in a real and effective personal Privacy.2. Enhanced market access management.(1) The status of the technology infrastructure as one of the conditions of market access. Financial services applications for operating the network of financial institutions not only a considerable scale of network equipment, but also need to have confirmed the legality of trading partners, to prevent tampering with trading information and prevent information leakage and other aspects of key technologies. (2) to develop rigorous internal control system. Publicity for the network of financial services, information disclosure, and system design have institutional arrangements, the establishment of a network of financialinstitutions or a new business, the must have sound risk identification, identification, management, risk cover and disposal programs.(3) to develop and improve the types of transactions operating procedures. Applications to open accounts for customers, customer authorization statement, the general development of trading procedures, rules to prevent illegal trading and online financial transaction system against criminal activities.(4) the implementation of the network type of financial business management. Development of classification standards, banking and financial services capabilities and the ability to credit rating, thus a variety of services on the network to carry out the financial restrictions and permits.3. Improve the regulatory system.(1) improve the network of financial risk monitoring systems. The establishment of "national (network) Financial Risk Management Committee."(2) to strengthen collaborative supervision. "Committee" of the member units and other relevant regulatory authorities to share information resources among each other and opening up their own information database, and regularly informed of their supervision, promote joint supervision, supervision of financial risks to improve network accuracy and timeliness.(3) to strengthen international cooperation in financial supervision network. Meanwhile, the network with international cooperation in financial supervision to strengthen the network of bank borrowing way illegal tax evasion, money laundering and other acts, the way the use of Internet banking transnational smuggling, illegal arms trafficking activities such as arms and drug trafficking, illegal attack on the use of Internet banking other sites internet bank hackers, and other international criminal activities a full range of monitoring, the formation of the network can effectively protect the financial health of the global network operations and is responsible for the supervision of the financial system.4. Adjust the control strategy.(1) and improve the modernization level of financial supervision network. In the practice, we should have complete control of the network of financial institutions to improve the business operation of the network capacity and the forecast level of financial risk, and enhance macro-control of the systematic and forward-looking, but also to strengthen financial supervision and standardization of network construction, improve the network of financial supervision modern and scientific level.(2) improve the network of financial and non-site inspection of the site content system. On-site inspection should focus on the technical elements to be checked. (3) the establishment of mandatory informationdisclosure system. Follow the "open, fair and just" principle, development of financial services than the traditional more stringent information disclosure rules, norms, disclosure of the content, format, frequency and responsibilities and so on, through the financial statements, disclosure of the online publicity and other means of financial networks business information. (4) Innovative forms of regulation. Take full advantage of information superiority, the establishment of real-time tracking and monitoring systems, strengthen monitoring, while also taking on the network "rules, patrol checks," the way the operational status of the network and whether the financial "irregularities" carry out spot checks found that, in a timely manner to correct or take punitive measures.5. Building security system.(1) accelerate research and development with China's own intellectual property rights of advanced information technology. Including computer equipment, communications equipment, system software, encryption algorithms, from the protection of national financial security and national economic security perspective to improve network security.(2) improving the network operating environment. Computer networks and centers to strengthen the management of the engine room, increase physical security measures for computer input, and enhance computer systems of key technologies and key equipment against attacks, anti-virus capabilities, maintenance of computer hardware security,ensure network banks rely on network hardware The normal operation of the environment safe.(3) secure access. On the one hand through the network of physical and logical isolation means isolation, and physical resources to unauthorized users isolated from each other, on the other hand through the application of the authentication and grading systems such as login authorization to restrict access to unauthorized users.中文译文网络金融风险防范克里斯蒂安·贝伦斯网络金融的定义网络金融是计算机网络对于金融活动和相关活动的技术支持一般,是信息技术与现代金融相结合的产物,但它不是简单的组合这两个,但一个金融业乃至所有行业的一个运营机制,是企业系统发展的未来。
金融风险管理外文翻译文献
金融风险管理外文翻译文献(文档含英文原文和中文翻译)原文:Enterprise Risk Management in InsuranceEnterprise Risk Management (hereinafter referred as “ERM”) interests a wide range of professions (e.g., actuaries, corporate financial managers, underwriters, accountants,and internal auditors), however, current ERM solutions often do not cover all risks because they are motivated by the core professional ethics and principles of these professions who design and administer them. In a typical insurance company all such professions work as a group to achieve the overriding corporate objectives.Risk can be defined as factors which prevent an organization in achieving its objectives and risks affect organizations holistically. The management of risk in isolation often misses its big picture. It is argued here that a holistic management of risk is logical and is the ultimate destination of all general management activities.Moreover, risk management should not be a separate function of the business process;rather, managing downside risk and taking the opportunities from upside risk should be thekey management goals. Consequently, ERM is believed as an approach to risk management, which provides a common understanding across the multidisciplinary groups of people of the organization. ERM should be proactive and its focus should be on the organizations future. Organizations often struggle to see and understand the full risk spectrum to which they are exposed and as a result they may fail to identify the most vulnerable areas of the business. The effective management of risk is truly an interdisciplinary exercise grounded on a holistic framework.Whatever name this new type of risk management is given (the literature refers to it by diverse names, such as Enterprise Risk Management, Strategic Risk Management, and Holistic Risk Management) the ultimate focus is management of all significant risks faced by the organization. Risk is an integral part of each and every action of the organization in the sense that an organization is a basket of contracts associated with risk (in terms of losses and opportunities). The idea of ERM is simple and logical, but implementation is difficult. This is because its involvement with a wide stakeholder community, which in turn involves groups from different disciplines with different beliefs and understandings. Indeed, ERM needs theories (which are the interest of academics) but a grand theory of ERM (which invariably involves an interdisciplinary concept) is far from having been achieved.Consequently, for practical proposes, what is needed is the development of a framework(a set of competent theories) and one of the key challenges of this thesis is to establish the key features of such a framework to promote the practice of ERM. Multidisciplinary Views of RiskThe objective of the research is to study the ERM of insurance companies. In line with this it is designed to investigate what is happening practically in the insurance industry at the current time in the name of ERM. The intention is to minimize the gap between the two communities (i.e., academics and practitioners) in order to contribute to the literature of risk management.In recent years ERM has emerged as a topic for discussion in the financial community,in particular, the banks and insurance sectors. Professional organizations have published research reports on ERM. Consulting firms conducted extensive studies and surveys on the topic to support their clients. Rating agencies included theERM concept in their rating criteria. Regulators focused more on the risk management capability of the financial organizations. Academics are slowly responding on the management of risk in a holistic framework following the initiatives of practitioners.The central idea is to bring the organization close to the market economy. Nevertheless,everybody is pushing ERM within the scope of their core professional understanding.The focus of ERM is to manage all risks in a holistic framework whatever the source and nature. There remains a strong ground of knowledge in managing risk on an isolated basis in several academic disciplines (e.g., economics, finance, psychology,sociology, etc.). But little has been done to take a holistic approach of risk beyond disciplinary silos. Moreover, the theoretical understanding of the holistic (i.e., multidisciplinary)properties of risk is still unknown. Consequently, there remains a lack of understanding in terms of a common and interdisciplinary language for ERM.Risk in FinanceIn finance, risky options involve monetary outcomes with explicit probabilities and they are evaluated in terms of their expected value and their riskiness. The traditional approach to risk in finance literature is based on a mean-variance framework of portfolio theory, i.e., selection and diversification. The idea of risk in finance is understood within the scope of systematic (non-diversifiable) risk and unsystematic (diversifiable)risk. It is recognized in finance that systematic risk is positively correlated with the rate of return. In addition, systematic risk is a non-increasing function of a firm’s growth in terms of earnings. Another established concern in finance is default risk and it is argued that the performance of the firm is linked to the firm’s default risk. A large part of finance literature deals with severa l techniques of measuring risks of firms’ investment portfolios (e.g., standard deviation, beta, VaR, etc.). In addition to the portfolio theory, Capital Asset Pricing Model (CAPM) was discovered in finance to price risky assets on the perfect capital markets. Finally, derivative markets grew tremendously with the recognition of option pricing theory.Risk in EconomicsRisk in economics is understood within two separate (independent) categories,i.e.,endogenous (controllable) risk and background (uncontrollable) risk. It is recognized that economic decisions are made under uncertainty in the presence of multiple risks.Expected Utility Theory argues that peoples’ risk attitude on the size of risk (small,medium, large) is derived from the utility-of-wealth function, where the utilities of outcomes are weighted by their probabilities. Economists argue that people are risk averse (neutral) when the size of the risks is large (small).Prospect theory provides a descriptive analysis of choice under risk. In economics, the concept of risk-bearing preferences of agents for independent risks was described under the notion of “ standard risk aversion.” Most of the economic research on risk is originated on the study of decision making behavior on lotteries and other gambles. Risk in PsychologyWhile economics assumes an individual’s risk preference is a function of probabilistic beliefs, psychology explores how human judgment and behavior systematically forms such beliefs. Psychology talks about the risk taking behavior (risk preferences).It looks for the patterns of human reactions to the context, reference point,mental categories and associations that influence how people make decisions.The psychological approach to risk draws upon the notion of loss aversion that manife sts itself in the related notion of “regret.” According to Willett; “risk affects economic activity through the psychological influence of uncertainty.” Managers’ attitude of risk taking is often described from the psychological point of view in terms of feelings.Psychologists argue that risk, as a multidisciplinary concept, can not be reduced meaningfully by a single quantitative treatment. Consequently, managers tend to utilize an array of risk measurers to assist them in the decision making process under uncertainty. Risk perception plays a central role in the psychological research on risk, where the key concern is how people perceive risk and how it differs to the actual outcome. Nevertheless, the psychological research on risk provides fundamental knowledge of how emotions are linked to decision making.Risk in SociologyIn sociology risk is a socially constructed phenomenon (i.e., a social problem) and defined as a strategy referring to instrumental rationality. The sociologicalliterature on risk was originated from anthropology and psychology is dominated by two central concepts. First, risk and culture and second, risk society. The negative consequences of unwanted events (i.e., natural/chemical disasters, food safety) are the key focus of sociological researches on risk. From a sociological perspective entrepreneurs remain liable for the risk of the society and responsible to share it in proportion to their respective contributions. Practically, the responsibilities are imposed and actions are monitored by state regulators and supervisors.Nevertheless, identification of a socially acceptable threshold of risk is a key challenge of many sociological researches on risk.Convergence of Multidisciplinary Views of RiskDifferent disciplinary views of risk are obvious. Whereas, economics and finance study risk by examining the distribution of corporate returns, psychology and sociology interpret risk in terms of its behavioral components. Moreover, economists focus on the economic (i.e., commercial) value of investments in a risky situation.In contrast, sociologists argue on the moral value (i.e., sacrifice) on the risk related activities of the firm. In addition, sociologists’ criticism of economists’concern of risk is that although they rely on risk, time, and preferences while describing the issues related to risk taking, they often miss out their interrelationships(i.e., narrow perspective). Interestingly, there appears some convergence of economics and psychology in the literature of economic psychology. The intention is to include the traditional economic model of individuals’ formal rational action in the understanding of the way they actually think and behave (i.e., irrationality).In addition, behavioral finance is seen as a growing discipline with the origin of economics and psychology. In contrast to efficient market hypothesis behaviour finance provides descriptive models in making judgment under uncertainty.The origin of this convergence was due to the discovery of the prospect theory in the fulfillment of the shortcomings of von Neumann-Morgenstern’s utility theory for providing reasons of human (irrational) behavior under uncertainty (e.g., arbitrage).Although, the overriding enquiry of disciplines is the estimation of risk, they comparing and reducing into a common metric of many types of risks are there ultimate difficulty. The key conclusion of the above analysis suggests that there existoverlaps on the disciplinary views of risk and their interrelations are emerging with the progress of risk research. In particular, the central idea of ERM is to obscure the hidden dependencies of risk beyond disciplinary silos.Insurance Industry PracticeThe practice of ERM in the insurance industry has been drawn from the author’s PhD research completed in 2006. The initiatives of four major global European insurers(hereinafter referred as “CASES”) were studied for this purpose. Out of these four insurers one is a reinsurer and the remaining three are primary insurers. They were at various stages of designing and implementing ERM. A total of fifty-one face-to-face and telephone interviews were conducted with key personnel of the CASES in between the end of 2004 and the beginning of 2006. The comparative analysis (compare-and-contrast) technique was used to analyze the data and they were discussed with several industry and academic experts for the purpose of validation. Thereafter,a conceptual model of ERM was developed from the findings of the data.Findings based on the data are arranged under five dimensions. They are understanding;evaluation; structure; challenges, and performance of ERM. Understanding of ERMIt was found that the key distinction in various perceptions of ERM remains between risk measurement and risk management. Interestingly, tools and processes are found complimentary. In essence, meaning that a tool can not run without a process and vice versa. It is found that the people who work with numbers (e.g.,actuaries, finance people, etc.) are involved in the risk modeling and management(mostly concerned with the financial and core insurance risks) and tend to believe ERM is a tool. On the other hand internal auditors, company secretaries, and operational managers; whose job is related to the human, system and compliance related issues of risk are more likely to see ERM as a process.ERM: A ProcessWithin the understanding of ERM as a process, four key concepts were found. They are harmonization, standardization, integration and centralization. In fact, they are linked to the concept of top-down and bottom-up approaches of ERM.The analysis found four key concepts of ERM. They are harmonization,standardization,integration and centralization (in decreasing order of importance). It was also found that a unique understanding of ERM does not exist within the CASES, rather ERM is seen as a combination of the four concepts and they often overlap. It is revealed that an understanding of these four concepts including their linkages is essential for designing an optimal ERM system.Linkages Amongst the Four ConceptsAlthough harmonization and standardization are seen apparently similar respondents view them differently. Whereas, harmonization allows choices between alternatives,standardization provides no flexibility. Effectively, harmonization offers a range of identical alternatives, out of which one or more can be adopted depending on the given circumstances. Although standardization does not offer such flexibility,it was found as an essential technique of ERM. Whilst harmonization accepts existing divergence to bring a state of comparability, standardization does not necessarily consider existing conventions and definitions. It focuses on a common standard, (a “top-down” approach). Indeed, integration of competent policies and processes,models, and data (either for management use, compliance and reporting) are not possible for global insurers without harmonizing and standardizing them. Hence, the research establishes that a sequence (i.e., harmonization, standardization, integration,and then centralization) is to be maintained when ERM is being developed in practice (from an operational perspective). Above all, the process is found important to achieve a diversified risk culture across the organization to allocate risk management responsibilities to risk owners and risk takers.ERM: A ToolViewed as a tool, ERM encompasses procedures and techniques to model and measure the portfolio of (quantifiable) enterprise risk from insurers’ core disciplinary perspective. The objective is to measure a level of (risk adjusted) capital(i.e., economic capital) and thereafter allocation of capital. In this perspective ERM is thought as a sophisticated version of insurers’ asset-liability management.Most often, extreme and emerging risks, which may bring the organization down,are taken into consideration. Ideally, the procedure of calculating economic capital is closely linked to the market volatility. Moreover, the objective is clear, i.e., meetingthe expectation of shareholders. Consequently, there remains less scope to capture the subjectivity associated with enterprise risks.ERM: An ApproachIn contrast to process and tool, ERM is also found as an approach of managing the entire business from a strategic point of view. Since, risk is so deeply rooted in the insurance business, it is difficult to separate risk from the functions of insurance companies. It is argued that a properly designed ERM infrastructure should align risk to achieve strategic goals. Alternatively, application of an ERM approach of managing business is found central to the value creation of insurance companies.In the study, ERM is believed as an approach of changing the culture of the organization in both marketing and strategic management issues in terms of innovating and pricing products, selecting profitable markets, distributing products, targeting customers and ratings, and thus formulating appropriate corporate strategies. In this holistic approach various strategic, financial and operational concerns are seen integrated to consider all risks across the organization.It is seen that as a process, ERM takes an inductive approach to explore the pitfalls (challenges) of achieving corporate objectives for broader audience (i.e.,stakeholders) emphasizing more on moral and ethical issues. In contrast, as a tool,it takes a deductive approach to meet specific corporate objectives for selected audience(i.e., shareholders) by concentrating more on monitory (financial) outcomes.Clearly, the approaches are complimentary and have overlapping elements. 作者:M Acharyya译文:保险业对企业风险管理的实证研究企业风险管理涉及各种行业(如保险精算师、公司财政经理、保险商、会计和内部审计员),当前企业风险管理解决方案往往不能涵盖所有的风险,因为这些方案取决于决策者和执行则的专业道德和原则。
互联网大数据金融中英文对照外文翻译文献
互联网大数据金融中英文对照外文翻译文献互联网大数据金融中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:Internet Finance's Impact on Traditional FinanceAbstractAs the advances in modern information and Internet technology, especially the develop of cloud computing, big data, mobile Internet, search engines and social networks, profoundly change, even subvert many traditional industries, and the financial industry is no exception. In recent years, financial industry has become the most far-reaching area influenced by Internet, after commercial distribution and the media. Many Internet-based financial service models have emerged, and have had a profound and huge impact on traditional financial industries. "Internet-Finance" has win the focus of public attention.Internet-Finance is low cost, high efficiency, and pays more attention to the user experience, and these features enable it to fully meet the special needs of traditional "long tail financial market", to flexibly provide more convenient and efficient financial services and diversified financial products, to greatly expand the scope anddepth of financial services, to shorten the distance between people space and time, and to establish a new financial environment, which effectively integrate and take use of fragmented time, information, capital and other scattered resources, then add up to form a scale, and grow a new profit point for various financial institutions. Moreover, with thecontinuous penetration and integration in traditional financial field, Internet-Finance will bring new challenges, but also opportunities to the traditional. It contribute to the transformation of the traditional commercial banks, compensate for the lack of efficiency in funding process and information integration, and provide new distribution channels for securities, insurance, funds and other financial products. For many SMEs, Internet-Finance extend their financing channels, reduce their financing threshold, and improve their efficiency in using funds. However, the cross-industry nature of the Internet Finance determines its risk factors are more complex, sensitive and varied, and therefore we must properly handle the relationship between innovative development and market regulation, industry self-regulation.Key Words:Internet Finance; Commercial Banks; Effects; Regulatory1 IntroductionThe continuous development of Internet technology, cloud computing, big data, a growing number of Internet applications such as social networks for the business development of traditional industry provides a strong support, the level of penetration of the Internet on the traditional industry. The end of the 20th century, Microsoft chairman Bill Gates, who declared, "the traditional commercial bank will become the new century dinosaur". Nowadays, with the development of the Internet electronic information technology, we really felt this trend, mobile payment, electronic bank already occupies the important position in our daily life.Due to the concept of the Internet financial almost entirely from the business practices, therefore the present study focusedon the discussion. Internet financial specific mode, and the influence of traditional financial industry analysis and counter measures are lack of systemic research. Internet has always been a key battleground in risk investment, and financial industry is the thinking mode of innovative experimental various business models emerge in endlessly, so it is difficult to use afixed set of thinking to classification and definition. The mutual penetration and integration of Internet and financial, is a reflection of technical development and market rules requirements, is an irreversible trend. The Internet bring traditional financial is not only a low cost and high efficiency, more is a kind of innovative thinking mode and unremitting pursuit of the user experience. The traditional financial industry to actively respond to. Internet financial, for such a vast blue ocean enough to change the world, it is very worthy of attention to straighten out its development, from the existing business model to its development prospects."Internet financial" belongs to the latest formats form, discusses the Internet financial research of literature, but the lack of systemic and more practical. So this article according to the characteristics of the Internet industry practical stronger, the several business models on the market for summary analysis, and the traditional financial industry how to actively respond to the Internet wave of financial analysis and Suggestions are given, with strong practical significance.2 Internet financial backgroundInternet financial platform based on Internet resources, on the basis of the big data and cloud computing new financial model. Internet finance with the help of the Internet technology, mobile communication technology to realize financing, paymentand information intermediary business, is a traditional industry and modern information technology represented by the Internet, mobile payment, cloud computing, data mining, search engines and social networks, etc.) Produced by the combination of emerging field. Whether financial or the Internet, the Internet is just the difference on the strategic, there is no strict definition of distinction. As the financial and the mutual penetration and integration of the Internet, the Internet financial can refer all through the Internet technology to realize the financing behavior. Internet financial is the Internet and the traditional financial product of mutual infiltration and fusion, the new financial model has a profound background. The emergence of the Internet financial is a craving for cost reduction is the result of the financial subject, is also inseparable from the rapid development of modern information technology to provide technical support.2.1 Demands factorsTraditional financial markets there are serious information asymmetry, greatly improve the transaction risk. Exhibition gradually changed people's spending habits, more and more high to the requirement of service efficiency and experience; In addition, rising operating costs, to stimulate the financial main body's thirst for financial innovation and reform; This pulled by demand factors, become the Internet financial produce powerful inner driving force.2.2 Supply driving factorData mining, cloud computing and Internet search engines, such as the development of technology, financial and institutional technology platform. Innovation, enterprise profit-driven mixed management, etc., for the transformation of traditional industry and Internet companies offered financialsector penetration may, for the birth and development of the Internet financial external technical support, become a kind of externalization of constitution. In the Internet "openness, equality, cooperation, share" platform, third-party financing and payment, online investment finance, credit evaluation model, not only makes the traditional pattern of financial markets will be great changes have taken place, and modern information technology is more easily to serve various financial entities. For the traditional financial institutions, especially in the banking, securities and insurance institutions, more opportunities than the crisis, development is better than a challenge.3 Internet financial constitute the main body3.1 Capital providersBetween Internet financial comprehensive, its capital providers include not only the traditional financial institutions, including penetrating into the Internet. In terms of the current market structure, the traditional financial sector mainly include commercial Banks, securities, insurance, fund and small loan companies, mainly includes the part of the Internet companies and emerging subject, such as the amazon, and some channels on Internet for the company. These companies is not only the providers of capital market, but also too many traditional so-called "low net worth clients" suppliers of funds into the market. In operation form, the former mainlythrough the Internet, to the traditional business externalization, the latter mainly through Internet channels to penetrate business, both externalization and penetration, both through the Internet channel to achieve the financial business innovation and reform.3.2 Capital demandersInternet financial mode of capital demanders although there is no breakthrough in the traditional government, enterprise and individual, but on the benefit has greatly changed. In the rise and development of the Internet financial, especially Internet companies to enter the threshold of made in the traditional financial institutions, relatively weak groups and individual demanders, have a more convenient and efficient access to capital. As a result, the Internet brought about by the universality and inclusive financial better than the previous traditional financial pattern.3.3 IntermediariesInternet financial rely on efficient and convenient information technology, greatly reduces the financial markets is the wrong information. Docking directly through Internet, according to both parties, transaction cost is greatly reduced, so the Internet finance main body for the dependence of the intermediary institutions decreased significantly, but does not mean that the Internet financial markets, there is no intermediary institutions. In terms of the development of the Internet financial situation at present stage, the third-party payment platform plays an intermediary role in this field, not only ACTS as a financial settlement platform, but also to the capital supply and demand of the integration of upstream and downstream link multi-faceted, in meet the funds to pay at the same time, have the effect of capital allocation. Especially in the field of electronic commerce, this function is more obvious.3.4 Large financial dataBig financial data collection refers to the vast amounts of unstructured data, through the study of the depth of its mining and real-time analysis, grasp the customer's trading information,consumption habits and consumption information, and predict customer behavior and make the relevant financial institutions in the product design, precise marketing and greatly improve the efficiency of risk management, etc.Financial services platform based on the large data mainly refers to with vast trading data of the electronic commerce enterprise's financial services. The key to the big data from a large number of chaotic ability to rapidly gaining valuable information in the data, or from big data assets liquidation ability quickly. Big data information processing, therefore, often together with cloud computing.4 Global economic issuesFOR much of the past year the fast-growing economies of the emerging world watched the Western financial hurricane from afar. Their own banks held few of the mortgage-based assets that undi d the rich world’s financial firms. Commodity exporters were thriving, thanks to high prices fo r raw materials. China’s economic juggernaut powered on. And, from Budapest to Brasília, an abundance of credit fuelled domestic demand. Even as talk mounted of the rich world suffering its worst financial collapse since the Depression, emerging economies seemed a long way from the centre of the storm.No longer. As foreign capital has fled and confidence evaporated, the emerging world’s stockmarkets have plunged (in some cases losing half their value) and currencies tumbled. The seizure in the credit market caused havoc, as foreign banks abruptly stopped lending and stepped back from even the most basic banking services, including trade credits.Like their rich-world counterparts, governments are battling to limit the damage (see article). That is easiest for those withlarge foreign-exchange reserves. Russia is spending $220 billion to shore up its financial services industry. South Korea has guaranteed $100 bill ion of its banks’ debt. Less well-endowed countries are asking for help.Hungary has secured a EURO5 billion ($6.6 billion) lifeline from the European Central Bank and is negotiating a loan from the IMF, as is Ukraine. Close to a dozen countries are talking to the fund about financial help.Those with long-standing problems are being driven to desperatemeasures. Argentina is nationalising its private pension funds, seemingly to stave off default (see article). But even stalwarts are looking weaker. Figures released this week showed that China’s growth slowed to 9% in the year to the third quarter-still a rapid pace but a lot slower than the double-digit rates of recent years.The various emerging economies are in different states of readiness, but the cumulative impact of all this will be enormous. Most obviously, how these countries fare will determine whether the world economy faces a mild recession or something nastier. Emerging economies accounted for around three-quarters of global growth over the past 18 months. But their economic fate will also have political consequences.In many places-eastern Europe is one example (see article)-financial turmoil is hitting weak governments. But even strong regimes could suffer. Some experts think that China needs growth of 7% a year to contain social unrest. More generally, the coming strife will shape the debate about the integration of the world economy. Unlike many previous emerging-market crises, today’s mess spread from the rich world, largely thanks to increasingly integrated capital markets. If emerging economiescollapse-either into a currency crisis or a sharp recession-there will be yet more questioning of the wisdom of globalised finance.Fortunately, the picture is not universally dire. All emerging economies will slow. Some will surely face deep recessions. But many are facing the present danger in stronger shape than ever before, armed with large reserves, flexible currencies and strong budgets. Good policy-both at home and in the rich world-can yet avoid a catastrophe.One reason for hope is that the direct economic fallout from the rich world’s d isaster is manageable. Falling demand in America and Europe hurts exports, particularly in Asia and Mexico. Commodity prices have fallen: oil is down nearly 60% from its peak and many crops and metalshave done worse. That has a mixed effect. Although it hurts commodity-exporters from Russia to South America, it helps commodity importers in Asia and reduces inflation fears everywhere. Countries like Venezuela that have been run badly are vulnerable (see article), but given the scale of the past boom, the commodity bust so far seems unlikely to cause widespread crises.The more dangerous shock is financial. Wealth is being squeezed as asset prices decline. China’s house prices, for instance, have started falling (see article). This will dampen domestic confidence, even though consumers are much less indebted than they are in the rich world. Elsewhere, the sudden dearth of foreign-bank lending and the flight of hedge funds and other investors from bond markets has slammed the brakes on credit growth. And just as booming credit once underpinned strong domestic spending, so tighter credit will mean slower growth.Again, the impact will differ by country. Thanks to huge current-account surpluses in China and the oil-exporters in the Gulf, emerging economies as a group still send capital to the rich world. But over 80 have deficits of more than 5% of GDP. Most of these are poor countries that live off foreign aid; but some larger ones rely on private capital. For the likes of Turkey and South Africa a sudden slowing in foreign financing would force a dramatic adjustment. A particular worry is eastern Europe, where many countries have double-digit deficits. In addition, even some countries with surpluses, such as Russia, have banks that have grown accustomed to easy foreign lending because of the integration of global finance. The rich world’s bank bail-outs may limit the squeeze, but the flow of capital to the emerging world will slow. The Institute of International Finance, a bankers’ group, expects a 30% decline in net flows of private capital from last year.This credit crunch will be grim, but most emerging markets can avoidcatastrophe. The biggest ones are in relatively good shape. The more vulnerable ones can (and should) be helped.Among the giants, China is in a league of its own, with a $2 trillion arsenal of reserves, a current-account surplus, little connection to foreign banks and a budget surplus that offers lots of room to boost spending. Since the country’s leaders have made clear that they will do whatev er it takes to cushion growth, China’s economy is likely to slow-perhaps to 8%-but not collapse. Although that is not enough to save the world economy, such growth in China would put a floor under commodity prices and help other countries in the emerging world.The other large economies will be harder hit, but should beable to weather the storm. India has a big budget deficit and many Brazilian firms have a large foreign-currency exposure. But Brazil’s economy is diversified and both countries have plenty of reserves to smooth the shift to slower growth. With $550 billion of reserves, Russia ought to be able to stop a run on the rouble. In the short-term at least, the most vulnerable countries are all smaller ones.There will be pain as tighter credit forces adjustments. But sensible, speedy international assistance would make a big difference. Several emerging countries have asked America’s Federal Reserve for liquidity support; some hope that China will bail them out. A better route is surely the IMF, which has huge expertise and some $250 billion to lend. Sadly, borrowing from the fund carries a stigma. That needs to change. The IMF should develop quicker, more flexible financial instruments and minimise the conditions it attaches to loans. Over the past month deft policymaking saw off calamity in the rich world. Now it is time for something similar in the emerging world.5 ConclusionsInternet financial model can produce not only huge social benefit, lowertransaction costs, provide higher than the existing direct and indirect financing efficiency of the allocation of resources, to provide power for economic development, will also be able to use the Internet and its related software technology played down the traditional finance specialized division of labor, makes the financial participants more mass popularization, risk pricing term matching complex transactions, tend to be simple. Because of the Internet financial involved in the field are mainly concentrated in the field of traditional financial institutions to the currentdevelopment is not thorough, namely traditional financial "long tail" market, can complement with the original traditional financial business situation, so in the short term the Internet finance from the Angle of the size of the market will not make a big impact to the traditional financial institutions, but the Internet financial business model, innovative ideas, and its apparent high efficiency for the traditional financial institutions brought greater impact on the concept, also led to the traditional financial institutions to further accelerate the mutual penetration and integration with the Internet.译文:互联网金融对传统金融的影响作者:罗萨米;拉夫雷特摘要网络的发展,深刻地改变甚至颠覆了许多传统行业,金融业也不例外。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
P2P金融风险管控中英文对照外文翻译文献P2P金融风险管控中英文对照外文翻译文献(文档含英文原文和中文翻译)译文:P2P 金融下的中小企业融资摘要中小企业融资难是世界性难题。
文章介绍了互联网金融的概念,重点概括了 P2P 金融在科技和金融创新融合方面的发展,综合了现在学术界对 P2P 金融研究的五大方向方面的各种观点和见解。
指出了当前 P2P 金融发展的突出问题风险控制,并对互联网金融的大趋势进行了分析。
关键词: P2P金融; 金融创新; 风险管控1引言从企业发展的历史看,大型企业都来源于中小企业。
中小企业是国民经济中最具活力的部分,往往走在技术发展的最前端,在高科技产业、清洁能源、绿色经济等方面都有很好的业绩,在经济转型中发挥着巨大作用。
中小企业融资难是世界性难题。
这些中小企业融资环境和渠道狭窄,有 60% 以上无法获得银行贷款。
目前,科技型企业又有轻资产的特点,融资困境,成为困扰可持续发展的巨大瓶颈。
2 互联网金融的概念近两年来,互联网金融呈现井喷式发展, 2014 年以来,互联网金融板块表现强势。
当前经济领域存在两个特别矛盾的现象,一是中小企业在企业总数中占比很大,但普遍存在融资难的问题; 二是民间闲散资金多,但除了股市和房市,往别的领域投资很难。
而以互联网、大数据、云计算为基础和高度契合市场引领的互联网金融的发展,对于解决这两个难题,更好地为实体经济,尤其是中小企业发展创造良好的金融环境,也为中国在国际竞争当中实现弯道超车起到重要作用。
互联网金融除了掌握客户端外,还便于做好上游资本供给方、下游资本使用方点与点的整合,结合互联网的其中特质( P2P) 及金融的本质( 资本) 。
依托互联网金融的发展,金融供给能力得以提高,包容性得以增强,可以动员更多的金融资源,覆盖面更广,覆盖度更多,满足更分散、更多元化的需求。
互联网金融最狭隘的概念就是 P2P( Peer-to-Peer Lend-ing) 金融平台,P2P 模式的核心是: 在这个具有资质的网站平台上,借款人发出借贷信息,并提供借贷项目的具体情况、借款人的相关诚信及经济实力等有关信息; 投资人根据平台上提供的信息,进行决策,最后做出向借款人发放贷款的决定。
P2P 金融是一种新的金融模式,通过互联网和大数据,使借贷双方信息不对称降到最低,这种新的融资渠道,为个人和企业提供了很大的便利,是现有银行体系的有益补充。
P2P 对我国金融业务影响很大。
传统银行的商业模式,主要是存贷业务,P2P 全新的商业模式,解构了传统银行的商业模式,打破了国有银行垄断的局面,在一定程度上以碎片化的方式补充了市场的缺憾。
P2P 金融实现了科技和金融的创新融合发展,释放了科技机制改革和金融改革的双重红利,有利于推出更多的金融产品来服务科技创新,支持科技型企业的发展,解决素来轻资产的科技型中小企业多面的融资难; 也有利于金融业创新,寻找新的投资方向,以获得较高的投资回报。
2005 年,全球第一家 P2P 金融公司 Zopa( Zone of Possi-ble Agreement) 成立于伦敦。
2006 年,美国第一家 P2P 金融公司 Prosper 成立于加州。
2007 年,我国第一家 P2P 金融公司拍拍贷成立,目前我国 P2P 金融公司超过 300 多家,交易额高达 200 多亿元。
金融是一个风险高度放大的行业,P2P 金融具有互联网天然的便捷属性,但相对传统金融机构而言,互联网的开放性也决定了 P2P 金融在网站平台、信息安全等方面可能会受到极大的挑战,风控压力会更大。
通过对 P2P 金融进行规范,可以引导民间资本更好地促进实体经济的发展。
3 目前 P2P 金融研究的五大方向3.1是什么: 是颠覆者还是补充者有观点认为: P2P 金融是传统金融与互联网创新的融合,现阶段还处于融合的阶段,存在很多问题,出现问题并不可怕,问题也可以看做是一个矛盾,解决问题的过程,正是推动一个新生事物向前发展的过程,这是 P2P 金融成长的必经阶段。
要正确对待现阶段 P2P 金融存在的问题和不完善的地方: 一要引导; 二要规避风险。
只有这样,才会引导金融和互联网产生更多的创新,走向理性的繁荣。
3 .2 干什么: 服务草根还是服务高端综合这一方向的研究成果,主要有以下几种观点和见解。
有观点认为: 资本市场是多层次的,P2P 金融是其中的一个组成部分,与传统金融企业相比,应该走差异化的发展路子,主要为融资难的中小微企业服务。
有观点认为: P2P 金融如果服务的对象,大多数是低风险客户,那么就会出现一个问题,必须做够一定的规模,才能有比较好的经济回报,而要做够一定的规模,必须投入一定的人力成本、时间成本和资金成本,这对同样小规模的 P2P金融企业而言,会形成不小的压力,为此,(完整译文请到百度文库)一些 P2P 金融企业就逐渐搞起了“资金池”,将资金贷给大的客户,如果大的客户经营出现问题,就容易使 P2P 金融出现风险,甚至导致P2P 金融企业主“跑路”。
所以 P2P 金融企业,应该多做小额贷款,不要轻易涉猎大的客户,大的客户风险太大,不是P2P 金融企业所能承担的。
而多做小额贷款,成本也比银行低,有竞争优势。
3.3 怎么干: 模式创新下的风险防范综合这一方向的研究成果,主要有以下几种观点和见解。
有观点认为: 互联网技术和金融的融合还没有达到非常合理、科学的地步,P2P 金融还会出现许多新问题。
而当P2P 金融达到一定规模后,风险管控将会成为 P2P 金融健康发展的关键。
如果对 P2P 金融进行监管,也将成为对 P2P监管者智慧的重要考验。
有观点认为: 要对 P2P 金融进行风险管控,应该从对客户的征信做起,征信系统完善后,再对接借贷款双方,这样做虽然很辛苦,但可以规避许多风险,保障 P2P 金融行业的健康发展。
同时,要明确行业监管的主体,为方便管理,应该进行属地管理。
3.4 谁来干: 金融领域干还是非金融领域干综合这一方向的研究成果,主要有以下几种观点和见解。
有观点认为: P2P 金融由有金融背景的团队来做更好;由于 P2P 金融是基于互联网的,有互联网基因,所以团队中应该有具有互联网知识和技能的专门性人才参加。
有观点认为: P2P 金融既可以由传统金融转型发展而来,也可以由互联网公司创新而来,最后形成的团队,必须既有金融和投资知识、又有互联网知识。
其中具有金融和投资方面知识的人员,要按照金融行业的规矩管控风险; 具有互联网方面知识的人员,要按照网络行业的规矩进行大数据分析,选定客户进行销售、客户维护,同时做好网络安全。
有观点认为: P2P 金融代表了未来金融发展的方向,现在一些商业银行也大力发展 P2P 金融,但同时要防范风险向银行系统的转移,加大对 P2P 网络借贷平台的监管。
3.5 如何管: 跨界发展与分业监管有观点认为: P2P 金融,从本质上讲,仍然是金融,与传统金融业相比,只不过是金融模式的变化,所以必须监管。
如果不加强监管,就会出现跑路等问题,既对行业健康发展不利,又容易带来严重的社会问题,影响社会稳定。
有观点认为: 在研究监管时,应该有国家投资基金,扶持这个领域中的顶层技术创新。
P2P 金融作为一个新的金融业态,要对顶层提前进行研发,防止出现银行系统类似现在的问题。
有观点认为: 欧洲、美国基于大数据的对个人的征信系统较为发达,可以有效防止欺诈行为。
一是要尽快建立个人信用体系。
二是要尽快建立 P2P 网络借贷的相关法律法规。
三是要加强 P2P 网络借贷的行业自律。
四是准入资格要非常清楚,实行备案注册制。
原文:The small and medium-sized enterprise financing under P2P financeWaitz MAbstractSmall and medium-sized enterprise financing difficult is worldwide difficult problem. Article introduces the concept of the Internet financial, mainly summarized the P2P financial in the development of financial innovation and integration of science and technology, a combination of academic research on P2P financial now of the five directions of various views and opinions. Points out the current P2P financial problems in the development of risk control, and analyses the trend of the Internet financial.Keywords: P2P financial; Financial innovation; Risk control1 IntroductionLook from the history of enterprise development, a large enterprise originate from small and medium-sized enterprises. Small and medium-sized enterprises (smes) is the most dynamic part of the national economy, often walk in the forefront of technology development, in the high-tech industry, clean energy, green economy, etc, have good performance, play an important role in the economic transformation. Small and medium-sized enterprise financing difficult is worldwide difficult problem. These small and medium-sized enterprise financing environment and narrow channels, more than 60% are unable to get a bank loan. At present, science and technology enterprises and the characteristics of light assets, financing difficulties, become a huge bottleneck of sustainable development.2 The concept of the Internet financialIn the past two years, the Internet financial show explosive growth,since 2014, the Internet financial sector performance strength. Current economic field exists the phenomenon of two special contradiction, one is the small and medium-sized enterprises in the total number of enterprises accounted for a large, but the universal problems of financing difficulties; Second, folk idle capital, but in addition to the stock market and housing market, it is difficult to invest in other areas. And on the basis of the Internet, cloud computing, big data and highly fit market leads the development of the Internet financial, to solve these two problems, better serve the real economy, especially small and medium-sized enterprise development to create a good financial environment, but also for China's overtaking play an important role in the implementation of international competition corners.Internet financial besides master client, also facilitate completes the upstream suppliers, downstream capital use party, the integration of point and point, combining with the characteristics of the Internet (P2P) and the nature of financial (capital).Based on the development of the Internet financial, financial supply ability is improved, inclusive to strengthen, can mobilize more financial resources, broader, more coverage, more decentralized, more diversified needs.The Internet the most narrow financial concept is P2P (Peer - to - Peer Lend - ing) financial platform, the core of the P2P model is: on the web site has a qualification platform, the borrower credit information, and provide the loan project specific situation, the borrower's integrity and economic strength and other related information; Investors according to the platform to provide information, make decisions, and finally made a decision of to make loans to borrowers.P2P finance is a new kind of financial model, through the Internet and large data, make to minimize the asymmetric information, this new financing channels, for individuals and businesses to provide great convenience, is a beneficial supplement of the existing banking system. Peer-to-peer (P2P) had a great influence on financial business in China. Traditional banking business model, mainly is the savings and loan business, P2P entirely new business models, deconstructs the traditional banking business model, breaking the monopoly of state-owned Banks, to a certain extent, in the form of fragmentation added to the drawback of the market.P2P financial innovation of science and technology and financial integration development, the release of the science and technology system reform and the double dividend of financial reform, to introduce more financial products to serve the scientific and technological innovation, support the development of science and technology enterprises, solve to create light assets of small and mid-sized enterprise multidimensional financing difficulties; Also is helpful for financial innovation, find new investment direction, in order to obtain a higher return on investment.In 2005, the world's first P2P Zopa, a financial company (Zone of Possi - ble Agreement) was founded in London. In 2006, the United States, the first a P2P financial company Prosper founded in California. In 2007, our country the first P2P finance company established on credit, at present, the P2P financial firms more than more than 300, traded as high as more than 200 one hundred million. Financial risk is a highly amplified industry, P2P financial with convenient Internet natural attributes, but relative to the traditional financial institutions, financial in the Internet's openness also determines the P2P web site platform, information security, etc, could be affected by a great deal of challenges, risk control will be more pressure.3 The five direction of current P2P financial3.1 What is: it is subversive or supplementaryHas view: P2P financial is the innovation of the Internet with the traditional financial integration, at present is still in the stage of integration, there are a lot of problems, problems are not terrible, problems can also be seen as a contradiction, the process to solve the problem, is to promote the process of developing a new thing, this is the necessary stage P2P financial growth. To correctly treat the present P2P financial problems and drawbacks: a guide; Second, we must avoid risk. Only in this way, will lead to financial and the Internet have more innovation, to the prosperity of the rational.3.2 What: high-end service grassroots or serviceComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. Has view: is a multi-level capital market, the P2P finance is one of the components, compared withtraditional financial companies, should follow the development way of differentiation and mainly for the financing difficulties of small and medium-sized enterprise service. View: P2P financial if the service object, mostly low risk customers, then there will be a problem, must do a certain size, can have a better economic returns, and to do a certain size, must put the human cost, time cost and the cost of capital, the same small P2P financial companies, will form a lot of pressure, therefore, some P2P financial enterprises gradually became the "pool", big customers, lending if big client management problems, is easy to appear P2P financial risk, and even lead to P2P financial business owners "run". So P2P financial enterprises, should do more small loans, don't dabble in big customers, big customer risk is too big, not P2P financial companies can undertake. And do more small loans, the cost is lower than the bank, have a competitive advantage.3.3 How to do: innovation mode of risk preventionComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. The argument goes, the Internet technology and the integration of financial haven't reached a very reasonable, scientific, P2P financial there will be many new problems. And when the P2P financial after reaching a certain size, risk control will be the key to the healthy development of the P2P financial. If the P2P financial regulation, also will become a important test of P2P regulators wisdom. Have a view is: to the P2P financial risk control, should start from to the customer credit, credit reporting system perfect, to both sides of the docking loans, although to do so is very hard, but can avoid many risks, guarantee the healthy development of the financial industry, the P2P.At the same time, to clear the main body of industry regulations, for the convenience of management, appendage management should be implemented.3.4 Who is going to do: working in the financial sector or non-financial areasComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. The argument goes, P2P financial done by a team with a finance background is better; Due to the P2P finance is based on the Internet, with Internet gene, so the teamshould have the knowledge and skills of specialized personnel to participate in the Internet. View: P2P financial can be developed from the traditional financial transformation, also can by Internet companies innovation, finally formation of the team, must have both the financial and investment knowledge, and the Internet. Knowledge of finance and investment aspects of the personnel, in accordance with the rules of the financial industry control risk; The persons with Internet knowledge, according to the rules of the network industry big data analysis, selected customers for sales, customer maintenance, at the same time do a good job in network security. View: P2P financial represents the future direction of financial development, some commercial Banks now also vigorously develop P2P financial, but at the same time to prevent the transfer of risk to the banking system, increased regulation of lending to P2P network platform.3.5 How to pipe: cross-border development and supervised respectivelyHas view: P2P financial, in essence, is still a financial, compared with the traditional industry, is only the change of the financial model, so must be regulated. If not strengthen supervision, can appear the problem such as run, adverse to the healthy development of the industry, and easy to bring serious social problems, affect social stability. View: in research regulation, there should be a state investment fund, to support the top in the field of technology innovation.P2P financial as a new financial form, to the top ahead of research and development, to prevent the banking system similar to the problem now. The argument goes: Europe, the United States based on large data of individual credit reporting system is relatively developed, can effectively prevent fraud. One is to establish individual credit system as soon as possible. The second is to establish P2P lending related laws and regulations as soon as possible. Three is to strengthen self-discipline of the P2P lending industry. Four is entry qualifications have to be very clear, the implementation system of archival filing registration.资料来源:The small and medium-sized enterprise financing under P2Pfinance [J]. Journal of Business Research, 2016, 8(6): 81-91.作者:Waitz M.11。