互联网金融人才结构研究外文文献翻译

合集下载

P2P 金融下的中小企业融资互联网金融外文文献翻译最新译文

P2P 金融下的中小企业融资互联网金融外文文献翻译最新译文

文献出处: Waitz M. The small and medium-sized enterprise financing under P2P finance [J]. Journal of Business Research, 2016, 8(6): 81-91.原文The small and medium-sized enterprise financing under P2P financeWaitz MAbstractSmall and medium-sized enterprise financing difficult is worldwide difficult problem. Article introduces the concept of the Internet financial, mainly summarized the P2P financial in the development of financial innovation and integration of science and technology, a combination of academic research on P2P financial now of the five directions of various views and opinions. Points out the current P2P financial problems in the development of risk control, and analyses the trend of the Internet financial.Keywords: P2P financial; Financial innovation; Risk control1 IntroductionLook from the history of enterprise development, a large enterprise originate from small and medium-sized enterprises. Small and medium-sized enterprises (smes) is the most dynamic part of the national economy, often walk in the forefront of technology development, in the high-tech industry, clean energy, green economy, etc, have good performance, play an important role in the economic transformation. Small and medium-sized enterprise financing difficult is worldwide difficult problem. These small and medium-sized enterprise financing environment and narrow channels, more than 60% are unable to get a bank loan. At present, science and technology enterprises and the characteristics of light assets, financing difficulties, become a huge bottleneck of sustainable development.2 The concept of the Internet financialIn the past two years, the Internet financial show explosive growth, since 2014, the Internet financial sector performance strength. Current economic field exists the phenomenon of two special contradiction, one is the small and medium-sizedenterprises in the total number of enterprises accounted for a large, but the universal problems of financing difficulties; Second, folk idle capital, but in addition to the stock market and housing market, it is difficult to invest in other areas. And on the basis of the Internet, cloud computing, big data and highly fit market leads the development of the Internet financial, to solve these two problems, better serve the real economy, especially small and medium-sized enterprise development to create a good financial environment, but also for China's overtaking play an important role in the implementation of international competition corners.Internet financial besides master client, also facilitate completes the upstream suppliers, downstream capital use party, the integration of point and point, combining with the characteristics of the Internet (P2P) and the nature of financial (capital).Based on the development of the Internet financial, financial supply ability is improved, inclusive to strengthen, can mobilize more financial resources, broader, more coverage, more decentralized, more diversified needs.The Internet the most narrow financial concept is P2P (Peer - to - Peer Lend - ing) financial platform, the core of the P2P model is: on the web site has a qualification platform, the borrower credit information, and provide the loan project specific situation, the borrower's integrity and economic strength and other related information; Investors according to the platform to provide information, make decisions, and finally made a decision of to make loans to borrowers.P2P finance is a new kind of financial model, through the Internet and large data, make to minimize the asymmetric information, this new financing channels, for individuals and businesses to provide great convenience, is a beneficial supplement of the existing banking system. Peer-to-peer (P2P) had a great influence on financial business in China. Traditional banking business model, mainly is the savings and loan business, P2P entirely new business models, deconstructs the traditional banking business model, breaking the monopoly of state-owned Banks, to a certain extent, in the form of fragmentation added to the drawback of the market.P2P financial innovation of science and technology and financial integration development, the release of the science and technology system reform and the doubledividend of financial reform, to introduce more financial products to serve the scientific and technological innovation, support the development of science and technology enterprises, solve to create light assets of small and mid-sized enterprise multidimensional financing difficulties; Also is helpful for financial innovation, find new investment direction, in order to obtain a higher return on investment.In 2005, the world's first P2P Zopa, a financial company (Zone of Possi - ble Agreement) was founded in London. In 2006, the United States, the first a P2P financial company Prosper founded in California. In 2007, our country the first P2P finance company established on credit, at present, the P2P financial firms more than more than 300, traded as high as more than 200 one hundred million. Financial risk is a highly amplified industry, P2P financial with convenient Internet natural attributes, but relative to the traditional financial institutions, financial in the Internet's openness also determines the P2P web site platform, information security, etc, could be affected by a great deal of challenges, risk control will be more pressure.3 The five direction of current P2P financial3.1 What is: it is subversive or supplementaryHas view: P2P financial is the innovation of the Internet with the traditional financial integration, at present is still in the stage of integration, there are a lot of problems, problems are not terrible, problems can also be seen as a contradiction, the process to solve the problem, is to promote the process of developing a new thing, this is the necessary stage P2P financial growth. To correctly treat the present P2P financial problems and drawbacks: a guide; Second, we must avoid risk. Only in this way, will lead to financial and the Internet have more innovation, to the prosperity of the rational.3.2 What: high-end service grassroots or serviceComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. Has view: is a multi-level capital market, the P2P finance is one of the components, compared with traditional financial companies, should follow the development way of differentiation and mainly for the financing difficulties of small and medium-sized enterprise service. View: P2P financial if theservice object, mostly low risk customers, then there will be a problem, must do a certain size, can have a better economic returns, and to do a certain size, must put the human cost, time cost and the cost of capital, the same small P2P financial companies, will form a lot of pressure, therefore, some P2P financial enterprises gradually became the "pool", big customers, lending if big client management problems, is easy to appear P2P financial risk, and even lead to P2P financial business owners "run". So P2P financial enterprises, should do more small loans, don't dabble in big customers, big customer risk is too big, not P2P financial companies can undertake. And do more small loans, the cost is lower than the bank, have a competitive advantage.3.3 How to do: innovation mode of risk preventionComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. The argument goes, the Internet technology and the integration of financial haven't reached a very reasonable, scientific, P2P financial there will be many new problems. And when the P2P financial after reaching a certain size, risk control will be the key to the healthy development of the P2P financial. If the P2P financial regulation, also will become a important test of P2P regulators wisdom. Have a view is: to the P2P financial risk control, should start from to the customer credit, credit reporting system perfect, to both sides of the docking loans, although to do so is very hard, but can avoid many risks, guarantee the healthy development of the financial industry, the P2P.At the same time, to clear the main body of industry regulations, for the convenience of management, appendage management should be implemented.3.4 Who is going to do: working in the financial sector or non-financial areasComprehensive research achievements of this direction, mainly has the following kinds of views and opinions. The argument goes, P2P financial done by a team with a finance background is better; Due to the P2P finance is based on the Internet, with Internet gene, so the team should have the knowledge and skills of specialized personnel to participate in the Internet. View: P2P financial can be developed from the traditional financial transformation, also can by Internet companies innovation, finally formation of the team, must have both the financial and investment knowledge, andthe Internet. Knowledge of finance and investment aspects of the personnel, in accordance with the rules of the financial industry control risk; The persons with Internet knowledge, according to the rules of the network industry big data analysis, selected customers for sales, customer maintenance, at the same time do a good job in network security. View: P2P financial represents the future direction of financial development, some commercial Banks now also vigorously develop P2P financial, but at the same time to prevent the transfer of risk to the banking system, increased regulation of lending to P2P network platform.3.5 How to pipe: cross-border development and supervised respectivelyHas view: P2P financial, in essence, is still a financial, compared with the traditional industry, is only the change of the financial model, so must be regulated. If not strengthen supervision, can appear the problem such as run, adverse to the healthy development of the industry, and easy to bring serious social problems, affect social stability. View: in research regulation, there should be a state investment fund, to support the top in the field of technology innovation.P2P financial as a new financial form, to the top ahead of research and development, to prevent the banking system similar to the problem now. The argument goes: Europe, the United States based on large data of individual credit reporting system is relatively developed, can effectively prevent fraud. One is to establish individual credit system as soon as possible. The second is to establish P2P lending related laws and regulations as soon as possible. Three is to strengthen self-discipline of the P2P lending industry. Four is entry qualifications have to be very clear, the implementation system of archival filing registration.译文P2P 金融下的中小企业融资Waitz M摘要中小企业融资难是世界性难题。

互联网金融发展文献综述及外文文献资料P2P金融

互联网金融发展文献综述及外文文献资料P2P金融

本份文档包含:关于该选题的外文文献、文献综述一、外文文献标题: Online brokers lead the way for French internet finance作者: Caffard, Christophe期刊名称: International Financial Law Review卷: 20;期: 3;页: 20-24Online brokers lead the way for French internet finance1 Regulated brokersRegulated brokers are legal entities which have an investment services licence and are subject to the prudential regulations of the Comite de Reglementation Bancaire et Financiere (CRBF) and the Conseil des Marches Financiers (CMF).* Choice of legal form: regulated brokers are not required to be incorporated in a specific legal form; however, under article 13 of the MAF Law, the CECEI checks whether the legal form of the brokerage company is appropriate for providing investment services. In practice, any type of commercial company is admitted: societes de capitaux (limited companies) or societes de personnes (partnerships). The formalities of share transfer, tax and the scope of liability of a company's management will be relevant factors to the choice of legal form.* Application for an investment services licence from the CECEI: the most important part of the application is the description of the investment services, and a business plan including prospective financial statements for the following three years. The CMF will check whether the business plan is consistent with the investment services licence requested by the broker. The CECEI will ensure that the applicant's own initial funds are consistent with the business plan.The scope of the investment services licence is variable and covers one or more ofthe following investment services:Reception and transmission of orders to another investment services provider on behalf of investors, for execution. This is the core investment service provided by thebrokerage companies and, as such, a licence to provide this service is the minimum required for a brokerage company. Brokerage companies may request an investment services licence limited to the reception and transmission of orders. In this case, there will need to be a tripartite agreement between the investor, the broker and an investment services provider authorized to execute the orders of the investor. These single-- licensed brokerage companies are mere intermediaries remunerated by a commission paid by the investors. They are not entitled to benefit from the European passport under the ISD.Execution of such order other than for own account. This is defined as the execution of orders on behalf of a customer under the provision of an agency or a brokerage agreement. The brokerage company authorized to execute orders received from the investors offers a larger range of services with more potential. The broker with an investment services licence covering the execution of orders will be in charge of executing the final orders on the regulated markets, provided it is has been authorized as a market member. Unauthorized brokerage companies transmit the orders they have received to authorized market members. Authorized brokerage companies may offer investors a quasi-immediate execution of orders on the markets.Placing. This is the search for subscribers or purchasers on behalf of the issuer or seller of financial instruments. According to the CMF, in the case of a public offer of listed financial instruments placed by a market firm (for example on the Paris Stock Exchange or Nouveau March&), an online broker, which sells financial instruments online, is deemed to be providing his client with a reception-transmission of orders service and not a placing service. A placing service requires the broker to comply with capital adequacy ratios whenever it is associated with an underwriting commitment.Account-keeping, custody and clearing. These are not considered to be investment services, but assimilated services restricted to credit institutions or investment firms, and are subject to the CMF's General Regulations.CRBF regulators. CBF regulations subject brokerage companies to the following requirements: the minimum issued and paid-up share capital depends on the nature and number of investment services carried out; brokerage companies who offeraccount-keeping, custody and reception, transmission and execution of orders must have a minimum paid-up share capital of Ffrl million (about $160,000). This is reduced to Ffr350,000 when the brokerage company is not involved in account-keeping or custody services;* the minimum shareholder funds must be equal to the higher of- 25% of the overheads of the previous year, or overheads forecast in the business plan; and- the aggregate client positions divided by 150;* internal compliance procedures must be established; and* the brokerage company must comply with certain ratios relating to solvency and large exposure.Regulated brokers are also subject to the CMF's rules on the appointment of a compliance officer, information and advice for clients, mandatory clauses to be inserted in clients' agreements, professional cards required from certain employees and reporting requirements to the CMF.2 Non-regulated brokersNon-regulated brokers are sole agents appointed by an investment firm authorized by the CECEI, or an appropriate authority of an EU member state. Sole agents are nonregulated entities and are neither subject to the minimum capital and shareholder funds requirements nor to the CMF/CRBF regulations.Sole agents enter into investment services agreements with clients on behalf and in the name of their principal, who must be a regulated investment services provider. These agreements are binding on who is, as a general rule, solely liable visa-vis clients and the supervisory authorities (the CMF and/or the Bank of France). In this respect, the incorporation and activities of a sole agent brokerage is simpler, safer and cheaper than for regulated brokers. However, sole agents are fully dependent on the principal since they are not authorized to be appointed by more than one investment firm and if, for any reason, the mandate is cancelled or terminated, sole agents must stop any brokerage activity, unless they get a new mandate or are granted an investment service licence by the CECEI. Sole agents do not benefit from theEuropean passport under the ISD, as they are not considered to be investment firms. It is important to note that the sole agent does not own the brokerage business, since clients simply have a contractual relationship. This is why sole agent status is generally more suitable when the principal and agent are companies within the same group or with long-term common interests.French branches of EU investment service providersThe licence for an EU investment service provider allows it to set up branches in France, subject to authorization from the authorities of its home state.This procedure is much simpler and quicker than an application for an investment services licence with the CECEI. The other advantages of operating in France in this way are that a branch is not required to show an endowment capital in France, and that prudential ratios of the home state apply to the French branch.As a general rule under the ISD, the home state authorities retain jurisdiction over the branch in the home state, with the exception of the public policy rules, which will apply to the branches. In France, the regulation referred to below is considered to be a public policy rule with which French branches operating online brokerage services in France must comply.Regulations applicable to brokerage servicesThe offer of brokerage services and the provision of brokerage services are regulated by reference to the nature of the financial instruments offered online.The offer of brokerage servicesAdvertising / marketingThe advertising of financial instruments is heavily regulated when advertisements are included in a public offering process. In this case the advertisement is in the form of a prospectus, which must comply with COB regulations, which provide detailed requirements regarding the form and content of the prospectus. As a general rule, any other form of advertising in a public offering process must refer to the prospectus approved by the COB.* The marketing in France of financial instruments listed on a foreign market must comply with COB regulation no. 99-04. This provides that, before anytransaction, the broker must send his clients an information memorandum presenting the foreign market and the financial instruments dealt on that market. This may be sent to clients via the internet.Any advertising of operations on the foreign market must include certain mandatory information, including the identification of the legal entity which is soliciting French clients.As a general rule, the advertising of collective investment schemes is subject to regulation by the COB, which ensures that any advertisement is consistent with the notice d'information and with regulations applicable to collective investment schemes generally. SICA Vs and FCPs subject to COB regulation no. 89-02 may not be marketed until the management company has been notified of the COB's approval.However, any direct or indirect solicitation to invest in collective investment schemes subject to the simplified COB approval procedure (less formal because the scheme only targets professional investors), must contain a disclaimer informing investors that any subscription or transfer of shares or units, is restricted to qualified investors or investors whose initial investment is at least euro500,000 ($457,000) or (depending on the scheme) euro,30,000. The disclaimer must also mention that these collective investment schemes are not approved by the COB and adhere to specific investment rules.* The COB has issued guidelines no. 99-02 relating to the marketing and sale via the internet of i) collective investment scheme units or shares; and ii) discretionary mandates. These guidelines are not binding. Its purpose is to clarify certain aspects of the COB regulations which apply to collective investment schemes (management company and depositary) and to any information on financial instruments disclosed during a public offering. The COB is preparing new guidelines relating to financial advice and information disseminated via the internet.* COB regulations and recommendations are applicable to online brokers whenever financial instruments (listed or otherwise) are offered to the public.* Under the CMF's regulations, regulated brokers are bound to inform and advise their clients after having assessed their financial knowledge.* In any event, there is a prohibition on advertising units of investment funds which invest in futures markets (Article 23 of the law of 23/12/1988), or to market non-OECD financial instruments in France without the prior consent of the French Ministry of Economy.3 Canvassing lawUnder the law of 1972 relating to financial canvassing, canvassing consists of contacting potential clients by way of visits, letters, circulars and telephone calls to: i) induce them to subscribe, purchase, exchange or sell securities or participate in such operations; and ii) offer services and advice on a regular basis.The law of 1972 is not adapted to the internet and legislative reform in this field is awaited. The CMF, the COB and the CECEI consider that offers to provide e-banking and e-brokerage services would be treated in the same manner as offers of services or advice by way of letters, circulars or telephone calls.It is difficult to determine which information systems or practices will qualify as financial canvassing (and therefore regulated) or merely as financial advertising (and therefore permitted); the CECEI and the COB have not yet given any clear guidance on this question.According to a discussion and research paper on internet risk released by the Commission Bancaire (the supervisory arm of the Bank of France) in July 2000, advertising messages, including a link to the seller's site (in the case of banks) displayed on general purpose websites, or posting information, advice or offers on sites or news groups in the client's country, would be viewed as financial advertising and would not constitute financial canvassing.The Bank of France takes the view that in these examples there is no active solicitation of clients since they access the financial advertisements deliberately and of their own accord, as if visiting the premises of a bank.In contrast with these passive marketing techniques, sending messages to email addresses would be equated with sending letters and as such would qualify as canvassing, according to the Bank of France.In any case, before soliciting French customers, the brokerage company mustnotify the Bank of France (CECEI) of its intention to solicit such customers; and employees of the brokerage company must be granted a specific solicitation card by the French authorities. Any breach of this rule would constitute a criminal offence.4 Public offering regulationsPublic offering regulations are applicable whenever financial instruments are issued or transferred to the public in France, using advertising, canvassing, credit institutions or investment service providers. Public offerings are heavily regulated and are subject to a number of requirements, including prior approval by COB of a prospectus, filing with the Commercial Registry of the French translation of the issuer's constitutional documents, publication of a legal notice in the BALO and continuing information obligations.The public offering regulations apply to offers of both listed and unlisted financial instruments. In this respect, online brokers offering listed shares to the public are subject to public offering regulations and in particular COB Regulation no. 99-08, under which the online broker must comply with the following disclosure and advertising rules:* the preparation of a simplified prospectus which must be approved by the COB and made freely available to the public; and * any advertisement must refer to the simplified prospectus and specify how to obtain a copy.A private placement (as opposed to a public offering) is defined as the issue or transfer of financial instruments to qualified investors or to a restricted circle of investors.In order to ensure a private placement via the internet, it is necessary to restrict electronic access to the broker's website by passwords granted solely to qualified investors. It is also mandatory under COB Regulation No. 99-09 that a private placement disclaimer be displayed on the webpages of the broker's website. The disclaimer must mention that:* offering materials (advertisements, information memoranda, etc) have not been submitted to the COB for its approval;* qualified investors must participate in the private placement for their ownaccount;* any offer to the public of the financial instruments subscribed or purchased by the qualified investors in the private placement would be subject to public offering regulations; and* if the investors are members of a restricted circle of more than 100, they must certify that they are associated with the management of the issuer on a professional or a personal basis. The provision of online brokerage servicesRules of conduct applicable to online brokers Regulated brokers and principals of non-regulated brokers are investment service providers and are subject to the rules of conduct set out in its General Regulation. The CMF has issued General Decision no. 99-07 providing regulations and guidelines. It implements the CMF rules of conduct.As a general rule, the message must clearly identify the issuer of a message offering the service of reception or transmission of orders. In particular, the website must display the legal status of the broker and the investment service it is authorized to provide. Regulated brokers and non-regulated brokers must be clearly distinguished, and the latter must disclose the identity of their investment service provider whom they are asking as agent.If the online broker is not in charge of account-keeping and custody services, whoever is must be clearly identified. Before entering into a contract with any new client, theonline broker must verify the client's identity and domicile by requesting the following documents:a photocopy of a valid official identity document (passport, identity card, driving licence);* bank details; and* written evidence of address.The broker must send confirmation that he has received these documents and, in doing so, check the client's address. These formalities and verifications may not be carried out via the internet.Once the identity and domicile ofthe new client have been checked, the onlinebroker can provide investment services to his client where:* the client has signed an agreement relating to the evidential rules and procedures applicable to the reception of orders via the internet;* the funds or financial instruments have been credited to the client's account. This does not apply to the broker if it is not the account keeper or the custodian;* the broker has checked that its client may receive the information on the relevant financial instruments and risks via the internet; and* the broker must ensure that the client receives in advance more detailed information regarding operations involving financial instruments which do not correspond to the client's regular dealings.In cases where the broker is responsible for account-- keeping, it should operate an automated system monitoring the accounts of the client and freezing any order in the event of insufficient provision or margin cover.The CMF also recommends that this automated system should freeze any order sent by the client which does not comply with market regulations.Compliance with these rules of conduct raises problems when the broker's website is outsourced to a third party, which happens frequently. The authorities are concerned that brokers may lose control over the operation of their websites and would be unable to take any operational responsibility, while remaining liable. This is why the Commission Bancaire is considering imposing an obligation on investment firms and credit institutions providing online financial services, to monitor their outside internet service providers and/or software companies.5 Regulation of contracts entered Into by online brokersContracts with clients These are subject to the CMF regulations, and in particular to CMF General Decision no. 98-28 relating to the mandatory clauses which must be included in agreements entered into with clients. It came into force in June 2000 and any existing contract is required to be duly amended.The agreements must contain a clause setting out the identity of the client and its legal capacity. In particular, qualified investors must be identified among other legal entities as well as the investment services provided. The categories of financialinstruments and financial services must also be stated in the agreement. This is important since it is taken into account when determining whether the broker has properly assessed the skills of his client. In this respect, it is recommended that high-risk speculative and/or complex operations, such as operations on futures markets, be restricted to informed clients or to qualified investors.In practice, the online broker asks new clients to answer a questionnaire which acts as proof that the broker has fulfilled its obligations to assess the skills ofits client.The agreement must contain a confidentiality clause which is binding. In this respect, it is useful for the online broker to provide exceptions to this obligation so that information on clients can be centralized within a member ofthe same group of companies, or accessed by an outside software company.Contracts with other investment services providersThe number of contracts entered into by brokers with other investment service providers depends on the scope of its licence. Non-regulated brokers must enter into an exclusive mandate with a licensed investment service provider.Regulated brokers which are not market members or not licensed for the execution of orders must conclude a transmission of orders agreement with market members or other investment service providers.These contracts are not subject to the CMF General Decision no. 98-28 or to other specific regulations, with the exception of.* clearing agreements;* when a client gives a broker with whom he has an account an order for transmission to another non-resident institution with comparable status, the broker is forbidden from being remunerated in the form of hard commission (a commission rebate) by the institution to which the order has been transmitted; and* a non account-keeping broker receiving orders from a client for transmission to another institution may be remunerated in the form of a hard commission, provided that the broker informs the client when entering into contractual relations (and thereafter annually) of the terms and conditions and amount of the hard commission.Contracts entered into with software companiesThese contracts might at first appear to have regulatory implications. However, recent financial regulations applicable to e-- brokerage now have a direct bearing on implications for IT agreements.In practice, brokers must ensure that the operation of the website and the reception and transmission of software orders complies with the CMF General Decision and any other applicable regulations applicable. The upgrade clause of the IT agreement entered into with the software company should address the question of the software being upgraded in the event of changes to applicable regulations.It is also recommended that any outsourcing agreement contains a clause which sets out how the online broker monitors the operation of the outsourced website.二、文献综述互联网金融发展文献综述摘要互联网金融的快速发展成为近年来中国经济金融领域备受瞩目的重要现象,国内学术界讨论互联网金融的文献数量也急速膨胀,但目前尚缺少对与互联网金融相关的各类文献进行全面梳理的综述类论文。

互联网金融安全中英文对照外文翻译文献

互联网金融安全中英文对照外文翻译文献

互联网金融安全中英文对照外文翻译文献中英文对照外文翻译文献(文档含英文原文和中文翻译)Database Security in a Web Environment IntroductionDatabases have been common in government departments and commercial enterprises for many years. Today, databases in any organization are increasingly opened up to a multiplicity of suppliers, customers, partners and employees - an idea that would have been unheard of a few years ago. Numerous applications and their associated data are now accessed by a variety of users requiring different levels of access via manifold devices and channels – often simultaneously. For example:• Online banks allow customers to perform a variety of banking operations - via the Internet and over the telephone – whilst maintaining the privacy of account data.• E-Commerce merchants and their Service Providers must store customer, order and payment data on their merchant server - and keep it secure.• HR departments allow employees to update their personal information –whilst protecting certain management information from unauthorized access.• The medical profession must protect the confidentiality of patient data –whilst allowing essential access for treatment.• Online brokerages need to be able to provide large numbers of simultaneous users with up-to-date and accurate financial information.This complex landscape leads to many new demands upon system security. The global growth of complex web-based infrastructures is driving a need for security solutions that provide mechanisms to segregate environments; perform integrity checking and maintenance; enable strong authentication andnon-repudiation; and provide for confidentiality. In turn, this necessitates comprehensive business and technical risk assessment to identify the threats,vulnerabilities and impacts, and from this define a security policy. This leads to security definitions throughout the infrastructure - operating system, database management system, middleware and network.Financial, personal and medical information systems and some areas of government have strict requirements for security and privacy. Inappropriate disclosure of sensitive information to the wrong parties can have severe social, legal and regulatory consequences. Failure to address the basics can result in substantial direct and consequential financial losses - witness the fraud losses through the compromise of several million credit card numbers in merchants’ databases [Occf], plus associated damage to brand-image and loss of consumer confidence.This article discusses some of the main issues in database and web server security, and also considers important architecture and design issues.A Simple ModelAt the simplest level, a web server system consists of front-end software and back-end databases with interface software linking the two. Normally, the front-end software will consist of server software and the network server operating system, and the back-end database will be a relational orobject-oriented database fulfilling a variety of functions, including recording transactions, maintaining accounts and inventory. The interface software typically consists of Common Gateway Interface (CGI) scripts used to receive information from forms on web sites to perform online searches and to update the database.Depending on the infrastructure, middleware may be present; in addition, security management subsystems (with session and user databases) that address the web server’s and related applications’ requirements for authentication, accesscontrol and authorization may be present. Communications between this subsystem and either the web server, middleware or database are via application program interfaces (APIs)..This simple model is depicted in Figure 1.Security can be provided by the following components:• Web server.• Middleware.• Operating system.. Figure 1: A Simple Model.• Database and Database Management System.• Security management subsystem.The security of such a system addressesAspects of authenticity, integrity and confidentiality and is dependent on the security of the individual components and their interactions. Some of the most common vulnerabilities arise from poor configuration, inadequate change control procedures and poor administration. However, even if these areas are properlyaddressed, vulnerabilities still arise. The appropriate combination of people, technology and processes holds the key to providing the required physical and logical security. Attention should additionally be paid to the security aspects of planning, architecture, design and implementation.In the following sections, we consider some of the main security issues associated with databases, database management systems, operating systems and web servers, as well as important architecture and design issues. Our treatment seeks only to outline the main issues and the interested reader should refer to the references for a more detailed description.Database SecurityDatabase management systems normally run on top of an operating system and provide the security associated with a database. Typical operating system security features include memory and file protection, resource access control and user authentication. Memory protection prevents the memory of one program interfering with that of another and limits access and use of the objects employing techniques such as memory segmentation. The operating system also protects access to other objects (such as instructions, input and output devices, files and passwords) by checking access with reference to access control lists. Security mechanisms in common operating systems vary tremendously and, for those that are lacking, there exists special-purpose security software that can be integrated with the existing environment. However, this can be an expensive, time-consuming task and integration difficulties may also adversely impact application behaviors.Most database management systems consist of a number of modules - including database querying and database and file management - along with authorization, concurrent access and database description tables. Thesemanagement systems also use a variety of languages: a data definition language supports the logical definition of the database; developers use a data manipulation language; and a query language is used by non-specialist end-users.Database management systems have many of the same security requirements as operating systems, but there are significant differences since the former are particularly susceptible to the threat of improper disclosure, modification of information and also denial of service. Some of the most important security requirements for database management systems are: • Multi-Level Access Control.• Confidentiality.• Reliability.• Integrity.• Recovery.These requirements, along with security models, are considered in the following sections.Multi-Level Access ControlIn a multi-application and multi-user environment, administrators, auditors, developers, managers and users – collectively called subjects - need access to database objects, such as tables, fields or records. Access control restricts the operations available to a subject with respect to particular objects and is enforced by the database management system. Mandatory access controls require that each controlled object in the database must be labeled with a security level, whereas discretionary access controls may be applied at the choice of a subject.Access control in database management systems is more complicated than in operating systems since, in the latter, all objects are unrelated whereas in a database the converse is true. Databases are also required to make accessdecisions based on a finer degree of subject and object granularity. In multi-level systems, access control can be enforced by the use of views - filtered subsets of the database - containing the precise information that a subject is authorized to see.A general principle of access control is that a subject with high level security should not be able to write to a lower level object, and this poses a problem for database management systems that must read all database objects and write new objects. One solution to this problem is to use a trusted database management system.ConfidentialitySome databases will inevitably contain what is considered confidential data. For example, it could be inherently sensitive or its source may be sensitive, or it may belong to a sensitive table, thus making it difficult to determine what is actually confidential. Disclosure is also difficult to define, as it can be direct, indirect, involve the disclosure of bounds or even mere existence.An inference problem exists in database management systems whereby users can infer sensitive information from relatively insensitive queries. A trivial example is a request for information about the average salary of an employee and the number of employees turns out to be just one, thus revealing the employee’s salary. However, much more sophisticated statistical inference attacks can also be mounted. This highlights the fact that, although the data itself may be properly controlled, confidential information may still leak out.Controls can take several forms: not divulging sensitive information to unauthorized parties (which depends on the respective subject and object security levels), logging what each user knows or masking response data. The first control can be implemented fairly easily, the second quickly becomesunmanageable for a large number of users and the third leads to imprecise responses, and also exemplifies the trade-off between precision and security. Polyinstantiation refers to multiple instances of a data object existing in the database and it can provide a partial solution to the inference problem whereby different data values are supplied, depending on the security level, in response to the same query. However, this makes consistency management more difficult.Another issue that arises is when the security level of an aggregate amount is different to that of its elements (a problem commonly referred to as aggregation). This can be addressed by defining appropriate access control using views.Reliability, Integrity and RecoveryArguably, the most important requirements for databases are to ensure that the database presents consistent information to queries and can recover from any failures. An important aspect of consistency is that transactions execute atomically; that is, they either execute completely or not at all.Concurrency control addresses the problem of allowing simultaneous programs access to a shared database, while avoiding incorrect behavior or interference. It is normally addressed by a scheduler that uses locking techniques to ensure that the transactions are serial sable and independent. A common technique used in commercial products is two-phase locking (or variations thereof) in which the database management system controls when transactions obtain and release their locks according to whether or not transaction processing has been completed. In a first phase, the database management system collects the necessary data for the update: in a second phase, it updates the database. This means that the database can recover from incomplete transactions by repeatingeither of the appropriate phases. This technique can also be used in a distributed database system using a distributed scheduler arrangement.System failures can arise from the operating system and may result in corrupted storage. The main copy of the database is used for recovery from failures and communicates with a cached version that is used as the working version. In association with the logs, this allows the database to recover to a very specific point in the event of a system failure, either by removing the effects of incomplete transactions or applying the effects of completed transactions. Instead of having to recover the entire database after a failure, recovery can be made more efficient by the use of check pointing. It is used during normal operations to write additional updated information - such as logs, before-images of incomplete transactions, after-images of completed transactions - to the main database which reduces the amount of work needed for recovery. Recovery from failures in distributed systems is more complicated, since a single logical action is executed at different physical sites and the prospect of partial failure arises.Logical integrity, at field level and for the entire database, is addressed by the use of monitors to check important items such as input ranges, states and transitions. Error-correcting and error-detecting codes are also used.Security ModelsVarious security models exist that address different aspects of security in operating systems and database management systems. For example, theBell-LaPadula model defines security in terms of mandatory access control and addresses confidentiality only. The Bell LaPadula models, and other models including the Biba model for integrity, are described more fully in [Cast95] and [Pfle89]. These models are implementation-independent and provide a powerfulinsight into the properties of secure systems, lead to design policies and principles, and some form the basis for security evaluation criteria.Web Server SecurityWeb servers are now one of the most common interfaces between users and back-end databases, and as such, their security becomes increasingly important. Exploitation of vulnerabilities in the web server can lead to unforeseen attacks on middleware and backend databases, bypassing any controls that may be in place. In this section, we focus on common web server vulnerabilities and how the authentication requirements of web servers and databases are met.In general, a web server platform should not be shared with other applications and should be the only machine allowed to access the database. Using a firewall can provide additional security - either between the web server and users or between the web server and back-end database - and often the web server is placed on a de-militarized zone (DMZ) of a firewall. While firewalls can be used to block certain incoming connections, they must allow HTTP (and HTTPS) connections through to the web server, and so attacks can still be launched via the ports associated with these connections.VulnerabilitiesVulnerabilities appear on a weekly basis and, here, we prefer to focus on some general issues rather than specific attacks. Common web server vulnerabilities include:• No policy exists.• The default configuration is on.• Reusable passwords appear in clear.• Unnecessary ports available for network services are not disabled.• New security holes are not tracked. Even if they are, well-known vulnerabilities are not always fixed as the source code patches are not applied by system administrator and old programs are not re-compiled or removed.• Security tools are not used to scan the network for weaknesses and changes or to detect intrusions.• Faulty and buggy software - for example, buffer overflow and stack smashingAttacks• Automatic directory listings - this is of particular concern for the interface software directories.• Server root files are generally visible or accessible.• Lack of logs and bac kups.• File access is often not explicitly configured by the system administrator according to the security policy. This applies to configuration, client, administration and log files, administration programs, and CGI program sources and executables. CGI scripts allow dynamic web pages and make program development (in, for example, Perl) easy and rapid. However, their successful exploitation may allow execution of malicious programs, launching ofdenial-of-service attacks and, ultimately, privilege escalation on a server.Web Server and Database AuthenticationWhile user, browser and web server authentication are relatively well understood [Garf97], [Ghos98] and [Tree98], the introduction of additional components, such as databases and middleware, raise a number of authentication issues. There are a variety of options for authentication in a simple model (Figure 1). Firstly, both the web server and database management system can individually authenticate a user. This option requires the user to authenticatetwice which may be unacceptable in certain applications, although a singlesign-on device (which aims to manage authentication in a user-transparent way) may help. Secondly, a common approach is for the database to automatically grant user access based on web server authentication. However, this option should only be used for accessing publicly available information. Finally, the database may grant user access employing the web server authentication credentials as a basis for its own user authentication, using security management subsystems (Figure 1). We consider this last option in more detail.Web-based communications use the stateless HTTP protocol with the implication that state, and hence authentication, is not preserved when browsing successive web pages. Cookies, or files placed on user’s machine by a web server, were developed as a means of addressing this issue and are often used to provide authentication. However, after initial authentication, there is typically no re authentication per page in the same realm, only the use of unencrypted cookies (sometimes in association with IP addresses). This approach provides limited security as both cookies and IP addresses can be tampered with or spoofed.A stronger authentication method, commonly used by commercial implementations, uses digitally signed cookies. This allows additional systems, such as databases, to use digitally signed cookie data, including a session ID, as a basis for authentication. When a user has been authenticated by a web server (using a password, for example), a session ID is assigned and is stored in a security management subsystem database. When a user subsequently requests information from a database, the database receives a copy of the session ID, the security management subsystem checks this session ID against its local copy and, if authentication is successful, user access is granted to the database.The session ID is typically transmitted in the clear between the web server and database, but may be protected by SSL or even by physical security measures. The communications between the browser and web servers, and the web servers and security management subsystem (and its databases), are normally protected by SSL and use a web server security API that is used to digitally sign and verify browser cookies. The communications between the back-end databases and security management subsystem (and its databases) are also normally protected by SSL and use a database security API that verifies session Ids originating from the database and provides additional user authorization credentials. The web server security API is generally proprietary while, for the database security API, many vendors have adopted standards such as the Generic Security Services API (GSS-API) or CORBA [RFC2078] and [Corba].Architecture and DesignSecurity requirements for designing, building and implementing databases are important so that the systems, as part of the overall infrastructure, meet their requirements in actual operation. The various security models provide an important insight into the design requirements for databases and their management systems.Secure Database Management System ArchitecturesIn multi-level database management systems, a variety of architectures are possible: trusted subject, integrity locked, kernels and replicated. Trusted subject is used by most of the leading database management system vendors and can be integrated in existing products. Basically, the trusted subject architecture allows users to access a database via an un trusted front-end, a trusted database management system and trusted operating system. The operating systemprovides physical access to the database and the database management system provides multilevel object protection.The other architectures - integrity locked, kernels and replicated - all vary in detail, but they use a trusted front-end and an un trusted database management system. For details of these architectures and research prototypes, the reader is referred to [Cast95]. Different architectures are suited to different environments: for example, the trusted subject architecture is less integrated with the underlying operating system and is best suited when a trusted path can be assured between applications and the database management system.Secure Database Management System DesignAs discussed above, there are several fundamental differences between operating system and database management system design, including object granularity, multiple data types, data correlations and multi-level transactions. Other differences include the fact that database management systems include both physical and logical objects and that the database lifecycle is normally longer.These differences must be reflected in the design requirements which include:• Access, flow and infer ence controls.• Access granularity and modes.• Dynamic authorization.• Multi-level protection.• Polyinstantiation.• Auditing.• Performance.These requirements should be considered alongside basic information integrity principles, such as:• Well-formed transactions - to ensure that transactions are correct and consistent.• Continuity of operation - to ensure that data can be properly recovered, depending on the extent of a disaster.• Authorization and role management – to ensure that distinct roles are defined and users are authorized.• Authenticated users - to ensure that users are authenticated.• Least privilege - to ensure that users have the minimal privilege necessary to perform their tasks.• Separation of duties - to ensure that no single individual has access to critical data.• Delegation of authority - to ensure that the database management system policies are flexible enough to meet the organization’s requirements.Of course, some of these requirements and principles are not met by the database management system, but by the operating system and also by organizational and procedural measures.Database Design MethodologyVarious approaches to design exist, but most contain the same main stages. The principle aim of a design methodology is to provide a robust, verifiable design process and also to separate policies from how policies are actually implemented. An important requirement during any design process is that different design aspects can be merged and this equally applies to security.A preliminary analysis should be conducted that addresses the system risks, environment, existing products and performance. Requirements should then beanalyzed with respect to the results of a risk assessment. Security policies should be developed that include specification of granularity, privileges and authority.These policies and requirements form the input to the conceptual design that concentrates on subjects, objects and access modes without considering implementation details. Its purpose is to express information and process flows in a complete and consistent way.The logical design takes into account the operating system and database management system that will be used and which of the security requirements can be provided by which mechanisms. The physical design considers the actual physical realization of the logical design and, indeed, may result in a revision of the conceptual and logical phases due to physical constraints.Security AssuranceOnce a product has been developed, its security assurance can be assessed by a number of methods including formal verification, validation, penetration testing and certification. For example, if a database is to be certified as TCSEC Class B1, then it must implement the Bell-LaPadula mandatory access control model in which each controlled object in the database must be labeled with a security level.Most of these methods can be costly and lengthy to perform and are typically specific to particular hardware and software configurations. However, the international Common Criteria certification scheme provides the added benefit of a mutual recognition arrangement, thus avoiding the prospect of multiple certifications in different countries.ConclusionThis article has considered some of the security principles that are associated with databases and how these apply in a web based environment. Ithas also focused on important architecture and design principles. These principles have focused mainly on the prevention, assurance and recovery aspects, but other aspects, such as detection, are equally important in formulating a total information protection strategy. For example, host-based intrusion detection systems as well as a robust and tested set of business recovery procedures should be considered.Any fit-for-purpose, secure e-business infrastructure should address all the above aspects: prevention, assurance, detection and recovery. Certain industries are now starting to specify their own set of global, secure e-business requirements. International card payment associations have recently started to require minimum information security standards from electronic commerce merchants handling credit card data, to help manage fraud losses and associated impacts such as brand-image damage and loss of consumer confidence.网络环境下的数据库安全简介数据库在政府部门和商业机构得到普遍应用已经很多年了。

互联网金融电子银行外文文献翻译2014年译文3050字大数据

互联网金融电子银行外文文献翻译2014年译文3050字大数据

文献出处:RICHARD C. Internet Finance's Impact on Traditional Finance [J]. The Journal of International Finance, 2014, 6(12): 13-29.(本译文归百度文库所有,完整译文请到百度文库)原文Internet Finance's Impact on Traditional FinanceRICHARD CAbstractWith the advent of the era of web2.0, Banks have full access to the Internet age, the large data of the Internet is profoundly affects the future of the Banks, represented by the Banks of financial enterprises and represented by electric business enterprise Internet companies, is a financial of the Internet and the Internet financialization swing. The large data of the Internet is profoundly affecting the bank's future development direction, it also marks a new era of financial, the rapid development of Internet financial, also brought unprecedented challenges to electronic banking, regardless of technical strength, talent resources level, or the problem such as system innovation are all faced with great challenge and opportunity.Key words: Internet financial; Electronic banking; Third-party payment; big data1 The concepts of Internet financialInternet finance is the product of the combination of both financial and Internet, is to use the Internet technology and mobile communication technology to realize capital flow and information transfer mode of new financial, Internet financial is different from traditional finance: financial business adopted by the media, financial participants direct contact through the Internet, make the transparency of financial business, higher intermediate cheaper, more convenient way.The current Internet financial landscape, is made up of traditional financial institutions and non-financial institutions. Traditional financial institutions are mainly the Internet innovation of traditional financial business and electricity, such as innovation, non-financial institutions mainly refers to the use of Internet technologiesto finance the operation of the electric business enterprise lending to network platform, the raise pattern of network investment platform, dig choir class mobile banking APP, and third party payment platform, etc.2 Status quo of Internet financial developmentSince the birth of the Internet technology, Internet financial development and there are two paths: one is the financialization of Internet enterprise development, namely the Internet into financial, a financial enterprise development of the Internet, that Banks and other financial institutions use the Internet technology and the Internet channel to realize the existing business, Internet finance is in the Internet under the new formats, financial institutions through in-depth change to provide is suitable for the characteristics of the Internet financial services to the customers, namely financial the Internet and the Internet are related to the financial industry. But from the point of the current situation, the Internet enterprise financialization of development are clearly in the offensive, Internet companies continuously introduce new products and new business model, constantly eating away at the traditional banking business. Internet financial and banking camp slightly passive, for sudden Internet enterprise competition, struggling to keep up, change the traditional bank Internet more stop electronic banking, electronic banking for Banks is just a kind of more channels. Third-party payment rapid development with the rapid development of the Internet trading platform, as the credit intermediary third-party payment application and the emergence of a third party payment, both buyers and sellers of mutual distrust embarrassing questions, and play a huge role in promoting the development of electronic commerce. Internet users around the world use third-party payment complete online payment, direct payment after the bank on the net; Third-party Internet payment after net silver, become the second largest Internet users electronic payment.Mobile payment business remain high growth, with the mature development of mobile technology, in recent years, with mobile phone "tablets such as the widely application of the intelligent terminal, apple, android and other mobile Internet payment to booming spring rate, and begun to take shape. In addition, the rapiddevelopment of network finance network finance is the investor (or family) analysis of merchants to provide financial product information via the Internet, according to the change of external conditions for the existence of its remaining assets form to adjust, to maximize personal or family property yields a series of activities. In the rapidly changing financial market" s financial information explosion, the network financial investors especially personal financial investors provide great convenience.3 The electronic banking development under the Internet financial3.1 Attach importance to the user experience, improve service qualityThe biggest challenge for traditional Banks, and lies in the change of thinking mode. Internet financial irreversible situation will bring the bank internal technology, talent, and a variety of mechanisms policy adjustments. For electronic banking this team is the most favorable to build customer experience department. Because electronic banking sector is one of the most customer groups. Since the establishment of electronic banking operations, and directly serving the customer, and not like a traditional bank, through the counter "lobby manager to provide service! If improper process experience design in the background, will have service personnel to assist the follow up, but the mobile banking and Internet banking in the financial service of Internet, almost no bank staff to help, the user experience can complete data, including customers in the use of time, the function of be fond of and so on. The electronic bank grasp the first-hand information of the user experience, through the analysis of data, timely adjustments, maximize meet customer demand, therefore, only attach importance to the customer experience, seeing it as a lifeline of the development of the electronic banking can promote the rapid development of electronic banking, promote financial Internet.3.2 Scale operationThe Internet represents advanced productive forces has three meanings: the first layer is external ability, such as the Internet product design platform performance; the second is the customer of the Internet enterprise operation ability; Open the third layer is the "share and innovation spirit. The combination of financial and Internet also need to be reflected in the three levels at the same time. The nature of the Internet financialstrategy is a kind of platform, the platform strategy, refers to connect two (or more) specific group, providing them with interactive mechanism, to meet the needs of all groups, and ingeniously profit business model. At present, for Banks, have set up the network platform and through its complete financial business, but the Internet is just a way for it. Besides, set up the Internet financial physical platform is the first step, only into the platform through the platform operation to attract a large number of customers, you can't really play the value of the platform, if there is no customer security, and banking has discouraged Internet financial! And attract customers into the platform, through the platform to retain customers, financial focused on using Internet platform to attract customers" operating customers, finally, the transaction demand for customers to bank trading system to complete implementation. In short, the bank will convert the Angle of view, changing ideas, empathy, and reflect the value of customers, do the platform scale is large, and the bank can get their own value.3.3 Speed up new Internet technology and the integration of new business development banAt present, a lot of financial business needs to be done through the online operation, especially the bank on the net "third-party payment" mobile payment business, developing very rapidly. But the financial sector of the Internet, make a lot of supporting measures cannot follow up in time, there are a lot of potential safety hazard, especially on the application of safety technology, lack of necessary guidance standards. Platform development and utilization of the banking system and the lack of necessary and sufficient time for testing, will also leave a safe hidden trouble. The Internet technology put forward higher requirements for Banks. Bank network background of the operating system, database and even a very important core system, once a problem, even very small fault, will cause serious influence to banking! For the banking system, therefore, the construction of "maintenance, and the security of bank business continuity, put forward higher request. The bank should strengthen the Internet of the new technology research and application, especially for large data mining analysis, Banks have access to the first-hand customer data convenience (bankbusiness is money, but money is the corresponding data, the bank is essentially operating data), in addition, the application of new technology research at the same time, speed up new technology and new business integration development bank, gather enough stamina for electronic banking development of mobile payment to integrate development. Of course, the high quality of the network financial talent is a new technology and the Internet bank a prerequisite for new business development, at the same time, the bank related personnel will need to continue to strengthen its own theoretical accomplishment and operation skills. Electronic banking is based on the Internet and application, its openness, also, some important data information has stolen using the risk of tampering, mobile payment in recent years the immense, play a strong role for the development of electronic banking, but also over a wireless network for mobile payments, so also are faced with the risk of information security. Therefore, strengthen the publicity of information security" guidance, especially to the customers in the electronic banking security guide appears especially important.4 ConclusionsIn a word, with the development of Internet financial, electronic banking begins to change ideas, innovation as the breakthrough point to user requirements and the Internet, the innovation of electronic banking service mode, fast improving electronic banking customer experience and channel integration level, through the meet the rapidly changing financial consumption demand and convenient and safe service experience demand to improve customer satisfaction, attach great importance to the safety control and risk management, carry out scientific development and sustainable development of electronic banking. Also, to actively explore new application of digital marketing. By investing in external activities, such as social media channels or web crawler technology, such as access to social relationship tree relationship with the customer behavior, flexible matching intermediary business pricing policy and marketing activities, realize effective social marketing; Customer data collected about browsing mobile phone or card number as the center, to accumulate accurate marketing resources; To strengthen and Internet companies, operators in LBS data, data such as contact, joint to carry out new marketing activities. On the whole, in theface of the rapid development of Internet financial, commercial Banks should be ready, must absorb and draw lessons from the latest industry innovation, to achieve faster and better development of electronic banking business.译文互联网金融下的电子银行发展作者:理查德·科勒摘要随着web2.0时代的到来,银行业已经全面进入互联网时代,互联网的大数据正深刻地影响着银行的未来,以银行为代表的金融企业和以电商企业为代表的互联网企业,正在掀起金融互联网化和互联网金融化的浪潮。

互联网金融外文文献翻译 2

互联网金融外文文献翻译 2

外文出处:DeBonisR, Silvestrini A. Internet finance and its influence ontraditional banking [J]. Applied FinancialEconomics, 2016,3(5):409-425.原文Internetfinanceanditsinfluenceontraditionalbanking DeBonisR, SilvestriniAA b stractsWith the rapid development of information technology, Internet financialmodel graduallyrise.ThispapersummarizestheInternetfinancialmodelonthebasisofth e concept, features and functions of Internet financial model in strategy,customer channels,financing, pricingand financial disintermediation of the impact of the tra di ti o nal c om mercial bank. T his paper a r g ue s t hat Inte rne t financ i al m ode l in the short term will not stand in the way of commercial bank's traditional business modelandprofit,butinthelongtermcommercialBanksshoulduseoftheInternetfinancial model,in order to obtain the new development. At the same time, the sustainedandhealthy development of the Internet industry to rely on Internet financialenterprises e lf-di s c i pli ne,posit i ve i nnovat i on,but a lsoattrac t m orec us t ome rs,strengt he nt h e construction ofsystemsecurity.Key words: Financial innovation; Internet financial; FinancialdisintermediationAt p r e s ent, m obi le payment, online ba nking, m obil e ba nki ng and financ i al businessinChina'sbooming financialinnovationssuchascloud,thusformedanew kind of financial model -- the Internet finance. Big data era and brand creation,spread tothedevelopmentoffinancialinstitutionsisbothachallengeandopportunity.Alo ng with the development of the Internet financial, emerging Internet traditionalfinancialcompanies and financial institutions will be a fierce competition, the future mayeven change thetraditional financial management mode and operationpattern. The Inter net financial concepts, features andfunctions Theconcept of the Inter net financial.After years of development, Internet companies stay in business does not providetechnicalsupporttofinancialinstitutionsandservicelevel,thedataaccumulated through the depth of mining information, to expand our business to thefinancial sector,buildfinancialmodelsandInternetbecometheemergingfieldofcombining inf orm a ti on technol o g ya ndca pi ta l.I nt e rne tfina n ci a lmodelisdiffer e ntfromindirectfinancing of commercial bank, it is also different from directfinancing capital market'sthirdfinancialfinancingmodel.Fromthe perspectiveofthe financingmode of Internet financial mode in essence is a kind of direct financing mode. Butcompared withthetraditionalmodeofdirectfinancing,Internetfinancingmodelhasalarge am ount ofinforma t ion,l ow e r transa c tioncost s,hig he ffic i en c y,et c.Adoptappropria t eth e Internet finance is a kind of financial model in the information age. Theauthor believesthattheInternetfinanceisbasedonmoderninformationtechnologyin financia l activities, with functions of financing, payment and transactionintermediary.Thecharacteristicsofthe Internetfinancial.Availabili t y of f i nancia l resources. Financia l exclusi on is defined as: people i nthefinancialsystemlackaconditioninwhichthe share of financial services,includingthesocialvulnerablegroupsinthelackofwaysormethodsiscloseto financialinstitutions,aswellasintheuseoffinancialproductsorfinancialservicesexist difficulties and obstacles. The current management mode,thetraditionalcom m ercia l Banks un able t o effi ci ent ly deal with small comp ani es, and part ofth eindividual customer's business requirements, lead to the financial exclusion of certaincustomers .Internet financial mode, the customer can break through the geographical restrictions, on the Internet looking for financial resources, alleviate thefinancialexclusion, enhance the level of socialwelfare.Trading the relative information. The traditional financing mode, thefinancial institutionstoobtaininvestmententerprises,especiallysmallmicroenterprise inform ation cost is higher, income and cost does not match. Internetfinancial generationanddisseminationofinformation throughsocial network, any enterpriseandindividualinformationwillcontactwithothersubjects.Bothpartiestocollect inform ation via the Internet, can be more comprehensive understanding of a businessor personal financial and credit situation, reduce the information asymmetry. Whenloandefault object, Internet financial enterprises through public default and reducing rating information, increase the cost ofdefault.The allocation of resources to mediation. The traditionalfinancing mode, the money s upplyand de m and both s i des inform a ti on often don't m a t c h.Capitaldemanders can't get the money in time to support at the same time, capitalsuppliers also can't find good investment projects. Internet financial mode, the money supply anddemandbothsidesnolongerneedtheintermediaryinstitutionssuchasBanksor exch angeset,canbedonethroughthenetworkplatformtoinformationscreening,ma t chi ng, pricing and tra di ng, di sintermediation effect isobvious.The Inter net financialfunction.The platform function Financial enterprises establish the platform ofnetwork financial via the Internet, customers can choose the suitable financial products,justmove your fingers, which can carry out payment, loan, investment, financialactivities,s uc h as convenient and quick, from running er r ands, and w a iti ng f or c us tome r.The allocation of resources(i.e.,financing) function. Internet financialisessentiallyawayofdirectfinancing.Internetfinancialmode,wecaneasilycheck counter party transaction records; To find the right risk management tools andriskdiversification; In-depth analysis the data by information technology,comprehensiveand i n-depth master competitors in form atio n, improve the effi c iency ofr e s o urce allocation.Asthe Internetfinancialmodel,the conceptof"sincethe financial"arisesatthehistoricmoment.3,paymentfunction.Internetfinancial mode, between merchants and customers to pay by a third party to complete, convenient,efficient,lower cost. The third party payment or will weaken the commercial bank, the statusofthe traditional payment platform. At present, the people's bank of China for about200third-party payment companies issued payment business license. In 2012, our country third party online payment market size of 3.8trillion.Information gatheringand processing.Traditional financialmode, theinformationresourcesdispersed,confuseddataisdifficult toeffectivelyhandlethe application. Internet financial mode, people use"cloudcomputing"principle,information asymmetry, thepyramid can be flattened, realize the standardizationofdata, structured, increasing the service efficiency of the data.Second, the Internet's influence on the traditional commercial bankingfinancial mode to review the financial strategy, to adapt to the challenges of the Internet fina nc ial model. The emergence of the Int e rnet f i nancial m o delfor s m al l andmedium-sized bank provides an opportunity to competewith the big Banks. If you canmakegooduseofthismodel,thepositiveinnovation,willcatchupwiththebig Banks in some emerging business, the formation of competitiveness. Traditional bankingmaybebecauseoftheInternet financialmodelchangeinthecompetitive la n dscape.SomeInternetcom pa niesha v enots a ti s fyon lydo t hird-pa rtyonl i nepayment platform, but with the advantages of data accumulation andinformation mining,directlytothesupplychain,smallmicroenterprisecreditfinancingexpansi on,the future may impact the core of the traditional banking business, rob Bankscustomerresources,alternative physical channels, overturning traditionalbankma na gement mode and profitable w ay.The development of banking customer andchannelThe customer is the basis ofcommercial Banks and other financial institutionsto the business. Internet financial model for commercial Banks to expand thecustomerbase. In 2012, the global Internet users up to 2012 people; Chinese Internet users is565 m i ll i on (2), the numbe r of onlin e s hoppi ng, 193 million (3).U nde r the modeof Internetfinancial,commercialBankscanbecombinedwithits ownstrategy,on theonehand,toattractnewcustomers;Ontheotherhand,increase customer adhesiveness, close business relationship with clients. Internet financial mode, thebank may change to traditional target audience and traditional physicalnetworkadvantages weakening, the pursuit of diversification personalized service of smalland medium-sized enterprises and individual customers more inclined to participate in a variety of financial transactions via the Internet. Commercial Banks willchange traditionalvaluecreationandrealizationway,abletoprovidefast,lowcostservicesoffin ancial institutionsto get marketfavor.Improve efficiency of resource allocation, effectively solve the smallmicroenterprise financing difficult problem.Internet financial companies with large data, cloud computing, and microlending technology. These three technologies can make a comprehensive understandingofthe Internetfinancialinstitutionsthebusinesspracticesofsmallbusinessesandindividual custom e rs and c redit ra ting, and esta bl ish a database and ne t w o rk c r edit sys t em. Inthecredit review, investors will network trading and credit history as a referenceand analysisindicators.Loanobjectsuchasadefault,financialfirmsstillcanusethe Internetnetworkplatformtocollectandpublishinformation,increasingdefaultcost,red ucetheriskofinvestors,intheserviceofsmallandmedium-sizedenterprise fina n cin g, a nd personal l oans has a unique advantage. T here f or e, t he Int e r n etfi n an c ialmodelcangobeyondthetraditionalfinancingwayofresourceallocationeffic iency,significantlyreducetransactioncosts,stronglysupportthedevelopmentofthereal economy. Thepricediscoveryfunction,andpromote themercerizationofinterest rate.Int e rne t fi nan c ial m ode l ca n obj e ctivel y r e fle c t the mar ke ts uppl y a nd d e mand bothsidespricepreferences, commercial Banks and other financial institutionsrespond to interest rate marketization.Debit offer Internet financial as a trading platform, funds, credit on the basis of the liquidity preference choice, risk factors,such as loan object, the two sides bargaining to clinch a deal, tradingmarketcom pl et e ly. W i t h m arket-ori ented inter es t r a te, financialinstituti ons ca nnotcompletelydependontheguidanceofthecentralbank'sbenchmarkrate,shouldtaketheinitiativetofindbenchmarkinterestratesinthemarket .TheInternetmode,financial institutions, financial market interest rate movements can be done viatheInternet, determine specific customer base interest rates. If can also in-depthstudyofdatamining,canevenformcompletelydeterminedbythemarket"rateindex",soas to improve the loanpricing.To speed up financial disintermediation.Traditional Banks inthe financial business,mainly ACTS as afinancialintermediaryfunction. Internet financial will acceleratefinancial disintermediation,make the funds of commercial Banks intermediary function marginalized. IntheInternet financial mode, Internet companies to provide financial search platform forcapitalsupplyanddemand,asmoneyinformationintermediaryrole.Fromthe perspectiveoffinanc ing,capitalsupplyanddemandbothsidesusingsearchplatform fortradingobject,afterthefinanci ngdealisdonebybothsides.Fromtheperspective of t h e pa y third-party payme nt pla t form, ca n provide c us t ome r s wit h paying,automatic collecting and transfer the remittance and settlement and paymentservices,with the traditional bank payment form instead.Third, the Internet financial mode development trendand strategy of commercialBanks.Overall,theInternetfinancial institutions development speed is fast,b ut the vol umeisre lat ive ly smal l,s h ort-te rm w ou ldnots ha kecomm e rcialbank's traditional business model and profit way. Sustained and healthy development ofthe financialindustry,theauthorthinksthat,theInternet,needtopayattentiontothe following four points: first, the Internet financial enterprises shouldself-discipline,business development can notdrill loophole legal and regulatory loopholes, shouldbeto support the rea l e c onomy as the start i ng point. Sec ond, the I nternet f inanci a l enterprisesshouldactivelyinnovation,andconstantlygraftfunctionof financialservicesandinformationtechnology,explorenewbusinessareas,complementarywith th e traditional financial business model. Again, the Internet financial enterprises touseits own resources,breakthe geographical boundaries,attract morecustomers,opera t in g a s "ma k ing a fool of. Fina l ly, the Inte rne t fi nan c ial enterpr i sesshould strengthentheconstructionofsystemsecurity,toensurethesafetyof capital,informationofthetrader. Fromthesocialenvironment, peopleshould give the Internet financial enterprises more open and tolerant attitude. Under the premiseofguarantee the financial stability and security, relevant departments can considertobreak through the geographical, trade restrictions, encourage financialindustry competition, safeguardsocial financial ecologicalenvironment.Traditional model of commercial Banks in the Internet age still mercialBanks'capitalstrength,cognitiveandhighcreditstanding,perfectinfrastructure,physicaloutletsarewidelydistributed, entitybank can establish the trust of the tangible. In addition to providing traditional commercial bankloanbusiness, wealth depository and provide payment and settlement business media, alsoforthesocietytoprovideliquidityinsurance,supportnormaleconomicactivity.Some financial business needs professional experience judgment, informationtechnology cannot completely replace the face the vigorous development of the Internet financial bus i ness, comme rc ia l B a nks and other financi a l i ns t i tut i ons should pa y c l osea t te nt ionto the development of the Internet financial trends, changing the conceptof development, actively adjust strategy. Commercial Banks to use the Internet financial mode, can deep integration of Internet technology and the bank's corebusiness,improve customer service quality, expand the service channels, improve the level of business, t o ada pt to the Int e rnet fina ncia l model to the impac t of t he tradi t iona l financial pattern, obtain new development. Based on comparative advantage, in support, service the real economy At the same time, create value for shareholders.译文互联网金融以及它对传统银行业的影响作者:伯尼斯;席尔瓦尼摘要随着信息技术的快速发展,互联网金融模式逐渐兴起。

互联网金融外文文献翻译

互联网金融外文文献翻译

互联网金融外文文献翻译随着信息技术的迅猛发展,互联网金融已成为当今金融领域的热门话题。

为了深入了解这一领域的国际前沿动态,对相关外文文献的翻译显得尤为重要。

互联网金融是指利用互联网技术和信息通信技术实现资金融通、支付、投资和信息中介服务的新型金融业务模式。

它打破了传统金融的时间和空间限制,极大地提高了金融服务的效率和覆盖面。

在翻译互联网金融外文文献时,首先要面对的是专业术语的翻译。

例如,“PeertoPeer Lending”通常被翻译为“P2P 借贷”,“Blockchain Technology”则是“区块链技术”,“Fintech”是“金融科技”。

准确翻译这些术语对于理解文献的核心内容至关重要。

同时,互联网金融领域的发展日新月异,新的概念和词汇不断涌现。

这就要求译者时刻关注行业动态,及时掌握最新的术语和表达方式。

比如,“Digital Currency”(数字货币)、“RoboAdvisor”(智能投顾)等都是近年来出现的新词汇。

除了术语,句子结构的处理也是翻译中的难点。

外文文献中常常会出现长难句,句子成分复杂,逻辑关系隐晦。

在翻译时,需要对句子进行仔细分析,理清其结构和逻辑关系,然后用符合中文表达习惯的方式进行翻译。

例如:“The rapid development of fintech has not only disrupted the traditional financial landscape but also created numerous opportunities for innovative financial services, which has posed both challenges and prospects for the regula tory framework” 可以翻译为:“金融科技的快速发展不仅颠覆了传统的金融格局,还为创新金融服务创造了众多机会,这给监管框架带来了挑战和前景。

互联网金融国外文献-外文文献怎么找

互联网金融国外文献-外文文献怎么找

互联网金融国外文献-外文文献怎么找互联网上查找外文文献的地方互联网上查找外文文献的地方香港科技大学图书馆Dspacehttp:///dspace包括香港科技大学的学术论文、学位论文、研究报告等内容,均可免费获取全文。

Openj-gatehttp:///提供4350种开放获取的期刊的数百万期刊全文文献。

加利福尼亚大学国际和区域数字馆藏http:///escholarship/加利福尼亚大学国际和区域数字馆藏研究项目。

EScholarshipRepository主要提供已出版的期刊论文、未出版的研究手稿、会议文献以及其他连接出版物上的文章1万多篇,均可免费阅读。

剑桥大学机构知识库http:///由Cambridge University Library和University Computing Service 维护,提供剑桥大学相关的期刊、学术论文、学位论文等电子资源。

发展中国家联合期刊库http:///非营利的电子出版物服务机构,提供来自发展中国家的开放获取的多种期刊的全文。

美国密西根大学论文库http:///美国密西根大学论文库2万多篇期刊论文、技术报告、评论等文献全文。

包含艺术学、生物学、社会科学、资源环境学等学科的相关论文,另还有博硕士论文。

标识为OPEN的可以打开全文。

jfg CERN Document Serverhttp:///主要覆盖物理学及相关学科,提供360,000多篇全文文献,包括预印文献、期刊论文、图书、图片、学位论文等等。

kl ArXivhttp:///ArXiv是属于Cornell University的非盈利教育机构,面向物理学、数学、非线性科学、计算机科学和定量生物学等学科提供16种免费电子期刊的访问。

NASA Technical Reports Serverhttp:///?method=browse主要是关于航空航天领域研究的科技报告和会议论文。

National Service Center for Environmental Publicationshttp:///ncepihom/National Service Center for Environmental Publications提供的是美国环境保护总署(EPA)出版物。

互联网金融背景下英语翻译特征及人才培养路径探析

互联网金融背景下英语翻译特征及人才培养路径探析

互联网金融背景下英语翻译特征及人才培养路径探析作者:林圆园来源:《宁波职业技术学院学报》2020年第03期摘要:随着全球化的深入发展,国与国之间的融合度和依赖度达到新的水平,尤其在互联网技术的推动下,全球一体化进程更加明显,催生一批新业态。

其中互联网金融发展最为迅速,对相关从业人员提出了新要求,在此背景下,对英语翻译人员能力要求也越来越高,需要通过拓宽互联网金融领域的知识,提高翻译专业词汇和术语水平,增强长难句翻译技巧等措施,不断提升英语翻译人才专业素养,助推互联网金融健康可持续发展。

关键词:互联网金融; 英语翻译; 人才培养; 路径中图分类号: H319 文献标志码: A 文章编号: 1671-2153(2020)03-0072-04一、互联网金融及其英语翻译的重要性互联网行业和金融领域的发展需要,尤其是金融变革的深层次需要,驱动着互联网金融的快速发展。

金融业可以拓展互联网服务功能的广度和深度,互联网也有助于金融业创新产品和服务及低成本扩张,对传统金融体系形成有益补充,满足不断增长的异质金融需求。

在全球一体化不断深入推进下,中国与其他国家之间的经濟交流越来越密切,在国际市场上发挥着重要的作用。

英语作为世界性通用语言,在金融行业发挥着媒介和桥梁的作用,通过学习提高专业英语能力,翻译国外的金融法规和政策,能够帮助了解国外经济形势,缩短不同种族及地区人们在时间和空间上的距离,有利于建立一种全新的金融生态环境,高质量的英语翻译能便捷、安全、高效、简洁的在若干维度为不同主体提供最佳服务体验,保证不同主体间的黏性,促进他们的交流互动,实现可持续发展。

近几年,互联网金融在全球范围内的发展势如破竹,通过互联网与金融的深度融合改变传统金融业务模式,互联网金融发展的去中心化特征,相对传统金融行业,平台金融初始成本更低,业务范围更广,智力支撑需求更多。

互联网金融的这些变化,对英语翻译带来了新的机遇和挑战。

在互联网金融特有背景下的新兴词汇也应运而生,如第三方支付、点对点信贷、移动支付、普惠金融、比特币和大数据等。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

文献出处:Oyelere P. The study on internet financial talent’s structure[J]. Accounting & Taxation, 2016, 2(1): 79-91.原文The study on internet financial talent’s structurePeter OyelereAbstractThe rapid development of Internet financial, Internet financial products and model innovation. Development of industry, however, cannot leave the talent support, especially the financial industry, the Internet has many industries such as the Internet, finance, media convergence characteristics, demand for talent is diversified and complex, the traditional financial talent and IT can't satisfy the Internet financial demand for talent. So you need to study summary to the existing Internet financial model, analyzes the talent structure, these talents knowledge skills. On the one hand, fill the blank of the theoretical study of the Internet financial talent; on the other hand, for education to cultivate the Internet play a guiding role of financial talent. Keywords: internet financial, personnel structure, business process1 IntroductionSince the Internet technology in the 20th century was born in the United States, with the Internet as the core of information technology into the era's most important global wave of technology, and the immeasurable speed and energy changing all walks of life, to People's Daily lives, a major impact on politics, economy, culture, promote the society into the network social form. In essence, financial itself is digital, and the Internet have the same number gene. Since the birth of the Internet technology, the Internet is closely related with the financial sector, the symbiotic development. Consistent innovation based on the Internet for the whole industry and the domestic special financial environment, the development of the Internet financial has its prime mover and broad prospects. On the one hand, the rapid development of Internet financial and good expectations, on the other hand is a lack of good and bad areintermingled and talent development in the process of enterprise.2 The ecological analysis of Internet financial2.1 The development of the Internet financialFrom a global perspective on the history of the Internet financial check, you can find the following events: the iconic 1992 E - Trade companies in the United States launched online securities trading; The United States in 1995 established the first network bank, the security first network bank (SFNB);In the late 1990 s, the mobile phone bank was born in the Czech republic; In Japan in 1999, the first complete the insurance company of business of selling insurance via the Internet;1998 pay (Paypal) as a trading company in the United States; In 2005, the world's first appeared in Britain P2P lending platform Zopa; In 2008 the first the indiegogo raise platform was established in the United States.In 2005-2012.At this stage, no longer pure Internet and finance is the combination of technology, and deep into the financial business areas: network lending began to sprout, the suggests to enter, third-party payment gradually grow. After that, the P2P lending rapid development platform. Moreover some traditional Banks, brokerages and other financial institutions also rely on the Internet, the restructuring of the business model innovation, speed up the construction of innovative online platform. The future, the Internet financial will rely on big data, cloud computing application data, and even the Internet of things to produce more likely.2.2 The definition of internet financial modelThe Internet financial as a spectrum, and according to various financial form in pay three differences, information processing, the allocation of resources will be in the field is divided into six main types: 1) the financial Internet, the Internet for financial intermediation and market instead of physical network, human services, including Internet banking, mobile banking, securities and insurance companies, network financial trading platform, online sales of financial products.2) mobile payments with the third party payment, reflect the Internet's impact on financial payment.3) the Internet currency, is the Internet's impact on monetary form.4) basedon big data inquiry and network loans, refers to using technology of data base and credit assessment and loan, greatly improve the information asymmetry.5) loans, P2P network based on Internet platform of personal debt, debt financing mode.6) the suggests, it is through the Internet equity financing model for the investment projects to raise equity capital. Starting from the demand of financial to categorize. Whether in traditional financial times or the financial times, the Internet is consistent, the basic demand for financial, investment, financing, and payment. Pay on demand, Internet financial sector has a third-party payment mode and Internet currency; In terms of investment and financing needs, by providing enterprise (regardless of the enterprise for the Internet company or financial institution or both) its own financial products to investors and financiers capital turnover and respectively: electronic banking, securities and insurance network sales, big data loans, Banks, such as the Internet insurance mode; In investment and financing channels on both sides of the third party intermediary, and produced: fund net sales and Internet brokerages, P2P loans, the raise pattern, etc. In the field of information supply produced a big data reference model. Produced in the field of payment for the mediation of the third party pay model and as a medium of payment mode of Internet currency.3 The structure process of internet financial talentTalent structure, this article from the perspective of group research state, but not from macroscopic Angle research group talent structure, but from the perspective of medium industry, enterprise, Internet finance talent group structure were studied. Besides talent structure dimension is more, we mainly focus on the knowledge skill structure this dimension.3.1 The structure of third party payment talentsThird party payment of Internet financial models need to be first to the payment system, pay sites, mobile construction, maintenance, operation, in these two show platform construction, the operational personnel demand. In the third-party payment mechanism, the platform system development team is the core enterprise personnel.3.2 Large data structure of talents for the loanBig data loan pattern, first is the development of loan products, secondly, its eachlink involve large data acquisition and analysis, on the basis of a large amount of data to establish various models such as the hydrology trading model, default risk model, the interest rate sensitivity model applied to loans, such as bulk loan so as to realize low cost, so big data talents is the core requirements. Once again, as the loan business, also in terms of customer credit as traditional loans to credit rating. Traditional financial institutions issue loans, credit audit personnel first collecting the data, information from the central bank credit reporting system, from the borrower to provide business information, financial information and the information about assets, secondly to identify borrowers data authenticity, this link time-consuming, often leads to the traditional loan process long, according to the information summary credit decision. Unlike traditional lenders is that its credit rating personnel main job is to the credit index screening, credit, risk model was constructed, the validity of the evaluation model, optimize the model, etc. According to established the credit evaluation model, the risk model, etc., can complete the related data into the credit rating, credit.3.3 The structure of P2P lending talentsP2P lending the summary of the formation of the form according to the above, the first P2P lending relying on Internet platform, platform operating experience, although not significantly affect the choice of the investors, but the platform security is investors consider important factors. Although many small-scale P2P companies choose to buy ready-made website templates, or the website development contract to a third party software developers, but cause the late operation and maintenance difficulties, links and maintenance personnel for long-term development of the P2P lending platform construction is still indispensable.In addition, looking for investors and lenders to link, link and post-loan credit audit collection, most of the P2P lending platform would inevitably involve offline activities, offline activities more fully, the higher the degree of risk control platform. On the hand, the current P2P lending also needs O2O talents.For the platform construction maintenance personnel, mainly to computer knowledge, financial knowledge, marketing knowledge; For product developmenttalents, also need a computer, finance, marketing knowledge; Talent for big data is needed for the computer knowledge, big data and business knowledge; For credit evaluation talented person need is a economic and financial knowledge, mathematics, statistics knowledge, the financial and accounting knowledge, etc. Need for O2O talent is organization, coordination and negotiation skills. For project promotion personnel, need is marketing knowledge. Intellectual skills required to comprehensive the above, the Internet financial talent structure is: the computer knowledge, financial knowledge, big data knowledge, marketing knowledge, business knowledge, organization and coordination ability.4 ConclusionsFor has entered the Internet in the field of financial enterprises, talent is the basis of its sustainable development, innovation, to make it into the field for the future of the enterprise, whether to have relevant talent is whether it can enter the factors to consider.Not only that, but for the Internet financial enterprises, can not have the talent and knowledge structure, Internet financial enterprise and the traditional financial institutions on the organizational structure and culture is also a huge difference between the two. In terms of organizational structure, the Internet post Settings of a financial enterprise, responsibility and organization structure is often based on the enterprise business model and subject to change and the adjustment of the management goal, set up its departments and positions, responsibilities, organization structure must be relatively flexible and flexible. In addition, employees often need to form into a group or team to complete each work, so as to adapt to rapidly changing job content. In terms of culture, culture of the Internet financial enterprises is a sharing, learning, and encourage innovation, to better communication barriers between across the industry convergence and fast learning new knowledge in the development of industry.译文互联网金融人才结构研究Peter Oyelere摘要互联网金融的飞速发展,互联网金融的产品与模式也不断创新。

相关文档
最新文档