My Account Log in

4 options

Handbook of blockchain, digital finance, and inclusion. Volume 2, ChinaTech, mobile security, distributed ledger, and blockchain / edited by David Lee Kuo Chuen, Robert Deng.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost Ebook Business Collection Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online
Format:
Book
Contributor:
Lee, David (David Kuo Chuen)
Deng, Robert H., editor.
Language:
English
Subjects (All):
Electronic funds transfers.
Physical Description:
1 online resource (529 pages)
Edition:
1st ed.
Place of Publication:
London, England : Academic Press, 2018.
Contents:
Front Cover
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2
Copyright
Contents
List of Contributors
Preface
Background
Purpose
Themes
Acknowledgment by David LEE Kuo Chuen
Acknowledgment by Robert Deng
1 The Game of Dian Fu: The Rise of Chinese Finance
1.1 Introduction: What Is Dianfu é è ?
1.2 Dian Fu One: Dian Fu in the Equity Market
1.2.1 Rise of China's GDP
1.2.2 Rise of China's Stock Market
1.2.3 Market Capitalization of the World's Top Stock Exchanges
1.2.4 National Equities Exchange and Quotations (NEEQ)
1.2.5 Private Equity and Venture Capital
1.2.6 Variable Interest Entity (VIE)
1.2.7 Investment Abroad
1.3 Dian Fu Two: Dian Fu in China's Peer-to-Peer Lending
1.4 Dian Fu Three: Dian Fu in Crowdfunding
1.5 Dian Fu Four: Dian Fu in the People's Currency
1.6 Dian Fu Five: Dian Fu in Banking
1.7 Conclusion
1.7.1 Financial Inclusion and Fintech
1.7.2 Expanding to the ASEAN Region
Appendix: Acquisitions of Alibaba
Acknowledgments
References
Notes
2 Balancing Innovation and Risks in Digital Financial Inclusion-Experiences of Ant Financial Services Group
2.1 Introduction
2.2 De nition
2.2.1 Digital Financial Inclusion
2.3 Experiences of Ant Financial
2.3.1 Financial Innovation at Ant Financial
2.3.2 Risk Management at Ant Financial
3 Regulating FinTech in China: From Permissive to Balanced
3.1 Introduction
3.2 The Evolution of Digital Financial Services in China
3.2.1 Evolution of Traditional DFS
3.2.2 Evolution of Non-traditional DFS
3.3 Regulation of Digital Financial Services in China
3.3.1 DFS Regulation Before 2015
3.3.2 DFS Regulation After 2015
3.4 Conclusion
4 Big Data Technology: Application and Cases
4.1 Why Big Data Technology Matters?.
4.1.1 Introduction to Big Data Technology
4.1.2 Problems and Obstacles of Traditional Financial Service
4.2 How Big Data Technology Helps Improving Credit Performance
4.2.1 Big Data Technology Empowers Digital Finance to Innovate
4.2.2 Big Data Credit Investigation
4.3 Brief Introduction of CreditEase: Better Technology, Better Finance
4.4 An Instance of Big Data Technology: CreditEase Financial Cloud
4.4.1 Ultra Large Data Scale
4.4.2 Leading Data Processing Technique
4.4.3 Advance Knowledge Map Technology
4.4.4 Expert Experience and Data Closed-Loop
4.5 Cases and Application Scenarios for CreditEase Financial Cloud
4.5.1 E-Commerce Platform Cooperation
4.5.2 ERP (Enterprise Resource Planning) Software Platform Cooperation
4.5.3 Car Rental by Credit
4.5.4 Instant Installments
5 Trust Management in Mobile Platforms
5.1 Introduction
5.2 Trust, Trust Modeling, and Trust Management
5.2.1 Perspective of Trust and Its Characteristics
5.2.1.1 Perception of Trust Concept
5.2.1.2 Factors That In uence Trust
5.2.1.3 Characteristics of Trust
5.2.2 Trust Modeling
5.2.2.1 Taxonomy of Trust Models
5.2.2.2 Trust Evaluation Technologies
5.2.3 Trust Management and Its Main Technologies
5.2.4 Trusted Computing
5.2.5 Reputation Systems
5.2.6 Hybrid Trust Management Solution
5.3 Trust Management in Mobile Platforms
5.3.1 Mobile Trusted Computing Platform
5.3.1.1 Mobile Computing Platform
5.3.1.2 Trusted Computing Platform
5.3.1.3 Mobile Trusted Computing Platform
5.3.1.4 Perspectives of MTCP
5.3.2 Trust Management on Mobile Software Components
5.3.2.1 Trust Challenges of Mobile Software Components
5.3.2.2 Existing Trust Models of Components Based Software System.
5.3.2.3 Autonomic Trust Management for a Component-Based Software System
5.3.3 Trust Evaluation on Mobile Applications
5.3.3.1 Challenges of Mobile Application Trust Management
5.3.3.2 Existing Trust Evaluation Models of Mobile Applications
5.3.3.3 A Trust-Behavior-Based Reputation System for Mobile Applications: TruBeRepec
5.3.4 Mobile Malware Detection
5.3.4.1 Evolution and Classi cation of Malware
5.3.4.2 Malware Detection and Analysis
5.4 Further Discussions
5.4.1 Open Issues and Challenges
5.4.2 Future Research Trends
5.5 Conclusions
6 Security Issues of In-Store Mobile Payment
6.1 Introduction
6.2 Background on In-Store Card Payment
6.2.1 Magnetic Stripe Payment Cards
6.2.2 EMV Payment Cards
6.3 In-Store Mobile Payment Network Models
6.3.1 Overview of In-Store Mobile Payment Services
6.3.2 Network Model of PTB Payment Services
6.3.2.1 Token Provision
6.3.2.2 Token Usage
6.3.3 Network Model of STB Payment Services
6.4 Issues Related to Token Service Provider
6.4.1 Role of Token Service Provider
6.4.2 Security Challenges
6.4.2.1 ID &amp
V Methods
6.4.2.2 Token Assurance
6.4.2.3 Domain Restriction Controls
6.4.2.4 Token Vault Secure Storage
6.5 Issues Related to Mobile Payment Service Provider / Token Requestor
6.5.1 Security Issues of Token Requestor
6.5.2 Security Issues of Mobile Payment Service Provider
6.5.2.1 Service Account Credential Security
6.5.2.2 Payment Credential Security
6.6 On-Device Level Issues
6.6.1 Payment Card Emulation
6.6.1.1 Secure Element (SE)-Enabled Card Emulation
6.6.1.2 Host Card Emulation (HCE)
6.6.1.3 Comparison Between SE and HCE
6.6.2 User Authentication
6.6.2.1 Non-biometric User Authentication
6.6.2.2 Biometric User Authentication.
6.6.2.3 Free Authentication Transaction
6.7 Conclusion
7 Blockchain - From Public to Private
7.1 Introduction
7.2 Terminology
7.3 Overview of the Bitcoin Blockchain
7.4 Characteristics of Blockchain
7.4.1 Distributed Consensus Protocols
7.4.2 Liveness and Safety
7.4.3 No Correlation Between Nodes Failures
7.4.4 Resiliency
7.4.5 Types of Fault
7.4.6 Synchrony
7.4.7 Authentication and Non-repudiation
7.4.8 Scalability and Performance
7.4.9 Turing-Complete
7.4.10 Smart Contracts
7.4.11 Smart Contract Oracle
7.5 Types of Blockchains
7.5.1 Token-Based Consensus Protocol Blockchains (With Mining)
7.5.1.1 Ethereum
7.5.1.2 Proof-of-Stake
7.5.2 Token-Based Consensus Protocol Blockchains (Without Mining)
7.5.2.1 Tendermint
7.5.2.2 Ripple Protocol Consensus Algorithm (RPCA)
7.5.3 Token-Less Blockchain Technologies
7.5.3.1 Practical Byzantine Fault Tolerance (PBFT)
7.5.3.2 Hyperledger
7.5.3.3 R3 Corda
7.6 Conclusion
7.6.1 Step 1: Decide if Blockchain is the Right Solution for the Problem
7.6.2 Step 2: Assess the Bene ts and Caveats
7.6.3 Step 3: Assess the Technical Design Considerations
7.6.4 Step 4: Assess the Functional Design Considerations
7.6.5 Step 5: Assess the Non-functional and Operational Considerations
7.6.5.1 Identity and Key Management
7.6.5.2 Privacy and Con dentiality
7.6.5.3 Existing Systems Integration and Interoperability
7.6.5.4 Regulations
7.6.5.5 Production Rollout and Testing
7.6.5.6 Operational Readiness
Appendix 1: The Six Layers of Blockchain
Appendix 2: Notable Blockchain and Distributed Ledger Technologies
8 Blockchain 101: An Introduction to the Future
8.1 Two Factors to Achieve Trust
8.2 What Problems Do Blockchains Solve?.
8.2.1 The Perfect Storm of the Permissionless Network
8.3 What Problems Do Blockchains Create?
8.4 In Conclusion: The 9 Factors of Blockchain
9 Betting Blockchain Will Change Everything - SEC and CFTC Regulation of Blockchain Technology
9.1 Introduction
9.2 The Paper Crisis and the National Market System
9.2.1 The Paperwork Crisis
9.2.2 SEC Response
9.2.3 Securities Act Amendments of 1975
9.3 Blockchain Technologies
9.3.1 What Is Blockchain Technology?
9.3.2 Blockchain and Traditional Financial Services Technology
9.3.3 Restricted and Unrestricted Blockchains
9.4 SEC Regulation of Blockchain Technology
9.4.1 What Is a Security?
9.4.2 Securities Exchanges
9.4.3 ATS
9.4.4 Broker-Dealers
9.4.4.1 Engaged in the Business
9.4.4.2 "For the Account of Others
9.4.4.3 Role of Compensation in Analysis
9.4.4.4 Effecting Transactions in Securities
9.5 BTC Trading Corp
9.5.1 Clearing Agencies
9.5.1.1 Clearing Corporations
9.5.1.2 Depositories
9.5.2 Transfer Agents
9.6 CFTC Regulation of Blockchain Technology
9.6.1 Introduction
9.6.2 Facts
9.6.3 CFTC Jurisdiction
9.6.4 The Actual Delivery Exception
9.6.5 Section 4(a) of the CEA
9.6.6 Section 4(d) of the CEA
9.6.7 Analysis
9.7 Conclusions
Note
10 Global Financial Institutions 2.0
10.1 Blockchain
10.2 Global Financial Institutions
10.3 Frameworks and Antecedents of Change
10.3.1 International Organizations: Core Components
10.3.2 Framework for Dynamic, Iterative Change of Global Financial Institutions
10.4 Blockchain and Global Financial Institutions 2.0
10.5 Needs That Change Post-Global Financial Institutions Blockchain Adoption
10.6 The Innovation Ahead
Notes.
11 Open-Source Operational Risk: Should Public Blockchains Serve as Financial Market Infrastructures?.
Notes:
Includes bibliographical references at the end of each chapters and index.
Description based on online resource; title from PDF title page (ebrary, viewed August 28, 2017).
ISBN:
9781787850248
1787850242
9780128122990
0128122994
9780128122822
012812282X

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account