期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
The Legal Framework of Borders: A Critical Analysis of the Continuity and Change in Border Laws From the Colonial to the Post-Colonial Era in India
1
作者 Shailen Verma 《International Relations and Diplomacy》 2025年第3期134-141,共8页
This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical... This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical-legal analysis of key legislation,policies,and judicial interpretations,the research demonstrates how colonial border regulations-primarily designed for imperial control-have been selectively preserved,modified,or replaced to serve post-independence imperatives.Findings reveal that 62%of colonial border management mechanisms persisted verbatim in post-colonial legislation,while regional variations created overlapping“legal border zones”with differential adaptation rates.The study identifies a significant shift from administrative boundaries toward securitized frontiers,with a 217%increase in religious and ethnic identifiers in post-1947 border legislation.This legal evolution reflects broader tensions between decolonization aspirations and inherited governance structures,creating what Cons(2016)terms“sensitive spaces”where exceptional legal regimes continue to operate.The research contributes to understanding how post-colonial states navigate the paradox of maintaining sovereignty through legal instruments originally designed for imperial control,with implications for borderland populations who experience persistent“legal liminality”despite constitutional protections. 展开更多
关键词 border laws post-colonial legal theory INDIA partition SECURITIZATION legal transplantation citizenship critical border studies historical institutionalism SOVEREIGNTY
在线阅读 下载PDF
Reflections and Improvements on China’s Asset-Backed Securities Information Disclosure System
2
作者 Zhao Mingxin 《Contemporary Social Sciences》 2024年第1期122-136,共15页
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s... Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures. 展开更多
关键词 asset-backed securities asset securitization information disclosure
在线阅读 下载PDF
The Securitization of Migration in Europe
3
作者 Feng Yiran Huang Jing 《Contemporary International Relations》 2024年第6期90-109,共20页
Since the end of World War II,European migration narratives have undergone multiple turns.The shift toward securitization began around the 1980s and 1990s,aggravated by the rise of the extreme right,the disintegration... Since the end of World War II,European migration narratives have undergone multiple turns.The shift toward securitization began around the 1980s and 1990s,aggravated by the rise of the extreme right,the disintegration of the bipolar world,the acceleration of globalization,the global war on terror,and the 2015 European refugee crisis.Although,given the current context of globalization and anti-terrorism efforts,the same phenomenon can be seen in many countries worldwide,the securitization of migration in Europe has distinct"European characteristics":(i)the debate has been particularly intense and controversial;(i)the actors involved are complex and diverse;and(ii)the issue of immigrants is closely related with the European Union's peripheral governance.Admittedly,securitizing migration has enabled Europe to adopt more assertive policies on the issue.This,however,cannot fully address its challenges.An effective response requires finding a middle way between different(or even opposing)political positions,relocating immigrants within Europe geographically,developing psychosocial mechanisms to reduce the risk of terrorist attacks,and implementing a multilateral approach to migration governance. 展开更多
关键词 international migration refugee crisis SECURITIZATION
在线阅读 下载PDF
Instantiate Random Oracles in OAEP with Pseudorandom Functions
4
作者 JIA Xiaoying LI Hongda LI Bao 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期651-656,共6页
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti... This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes. 展开更多
关键词 random oracle(RO) model INSTANTIATION optimal asymmetric encryption padding(OAEP) indistinguishable securitity against adaptive chosen ciphertext attack (IND-CCA2)
原文传递
Path of the Information Asymmetry of Asset Backed Securitization—Information Game Analysis of Embedded Block Chain Technology 被引量:2
5
作者 Xiaoxiao Zhang Wen Shi 《International Journal of Communications, Network and System Sciences》 2018年第6期133-146,共14页
In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which can... In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility. 展开更多
关键词 BLOCK CHAIN INFORMATION Asymmetry INFORMATION Game ASSET Backed SECURITIZATION
暂未订购
On Financing Models of Real Estate Enterprise 被引量:2
6
作者 Su Keqiang 《China's Foreign Trade》 2011年第6期56-58,共3页
Against the background that the central government is strengthening macro control and tightening credit scale of real estate businesses, financing capacity becomes the determinant for a real estate enterprise's devel... Against the background that the central government is strengthening macro control and tightening credit scale of real estate businesses, financing capacity becomes the determinant for a real estate enterprise's development. Domestic enterprises have many ways of financing, and this paper describes ten common models, simply analyses the advantages and disadvantages of each model, while explains and recommends three financing models with practical examples: individual entrusted loan, trust financing and assets securitization. 展开更多
关键词 real estate enterprise enterprise financing individual entrusted loan trustfinancing assets securitization equity financing
在线阅读 下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
7
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain Zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
在线阅读 下载PDF
On Willingness of Rural Land Circulation and Securitization in Central Regions of China 被引量:1
8
作者 Jianxin LU Yuwei SU 《Asian Agricultural Research》 2014年第3期36-41,共6页
On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factor... On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factors with the aid of Logistic model and Multinomial Logit model.The study indicates that factors influencing willingness of rural land circulation and securitization mainly include land contract method,land circulation information and approaches,rights and interests of farmers infringed or not,policies of benefiting farmers,and non-agricultural skills. Finally,it came up with following pertinent policy recommendations:( 1) reforming and improving land contract methods;( 2)strengthening disclosure of land circulation information;( 3) reforming and improving land circulation approaches;( 4) strengthening protection of farmers' rights and interests in the process of land circulation;( 5) reinforcing and implementing policies benefiting farmers;( 6) cultivating and developing farmers' non-agricultural skills. 展开更多
关键词 RURAL LAND CIRCULATION LAND SECURITIZATION Logisti
在线阅读 下载PDF
Impacts of Nontraditional Security Issues on National Security 被引量:1
9
作者 Fu Xiaoqiang Han Liqun 《Contemporary International Relations》 2022年第4期48-64,共17页
New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and ... New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and transmissibility of nontraditional security threats are unprecedented.The emergence and even perpetuation of the above-mentioned new features are both attributed to objective factors,such as social development,ideological shifts,and scientific and technological advancement,and are closely related to the moves of certain major countries to instigate the so-called remarkable power competition recklessly and boost geopolitical contest.The rapid resurgence of securitization in global politics is hidden behind the rise of nontraditional security threats.Nontraditional security issues have generally entered a dynamic phase,which exerts an impact on the international security environment and the global landscape.A growing number of countries have emphasized on the realistic and urgent threat of nontraditional security challenges to their national security.These countries have tended to achieve traditional security goals via nontraditional means and tackle nontraditional security challenges with traditional mindsets.Thus,the boundary between traditional and nontraditional security issues is increasingly blurred.The methodology that dichotomizes traditional and nontraditional security issues may no longer be useful during assessments of major threats confronting national security.The connotations of peace and war have significantly changed in the new era.Distinguishing"hot"security issues from"cold"ones or traditional security issues from nontraditional ones is difficult.Such distinction requires consideration of all security issues when recognizing and addressing national security challenges.Thus,these increasingly complex security issues must be analyzed within a wide context of the oncein-a-century changes occurring worldwide and China should pursue a holistic approach to national security as a fundamental principle in response to various threats. 展开更多
关键词 nontraditional security issues national security SECURITIZATION
在线阅读 下载PDF
中国房地产投资信托的发展与未来展望
10
作者 林淑娟 《中国外资》 2009年第10期9-10,12,共3页
继美国、日本、韩国、澳大利亚、新加坡及香港先后推出房地产信托基金上市后,中国2008年年底《国九条》中批准此类作为创新融资方式,其中越秀、北辰等大型房地产公司均表示将以房地产信托基金形式上市。本文拟以中国现行的不动产证蒡... 继美国、日本、韩国、澳大利亚、新加坡及香港先后推出房地产信托基金上市后,中国2008年年底《国九条》中批准此类作为创新融资方式,其中越秀、北辰等大型房地产公司均表示将以房地产信托基金形式上市。本文拟以中国现行的不动产证蒡化制度作为研究对象,配合不动产证券化现况的介绍与探讨,提升对中国不动产证券化的认知度.同时也将探讨中国不动产证券化在金融体系中对民间与政府的影响情形,讨论中国发展不动产证券化的必要性及可行性,将金融市场与金融机构的问题引入,以一个全球化的观点来探讨不动产证券化对于投资、长期经济成长的影响。 展开更多
关键词 不动产证券化(Real ESTATE Securitization)房地产投资信托基金(Real ESTATE Investment Trusts REITs)
在线阅读 下载PDF
Financial Reform after the Crisis:An Early Assessment
11
作者 Nicolas Véron 《China's Foreign Trade》 2012年第6期20-22,共3页
Financial reform has been a core dimension of the initial global policy response to the financial turmoil of 2007-08. At the first G-20 summit of heads of state and government in November
关键词 TURMOIL BANKING BASEL sector SUMMIT CREDIT Securit
在线阅读 下载PDF
The Palmanova Cantonments: Conservation, Value-Enhancement and Transformation for an Integrated and Overall Regeneration
12
作者 Maria Paola Gatti Giovanni Russo Luca Zecchin 《Journal of Civil Engineering and Architecture》 2017年第6期559-570,共12页
Italian military real-estate is highly varied as regards its location, intended uses, its typological, stylistic, and constructive features and its state of conservation. What historical and documental value can we at... Italian military real-estate is highly varied as regards its location, intended uses, its typological, stylistic, and constructive features and its state of conservation. What historical and documental value can we attribute to the typological and technical aspects of military buildings? What problems and strategies have to be studied before such buildings can be repurposed for inclusion into a circuit of social and civil uses? Some attempts were made to answer these questions by analysing the military real estate of Palmanova, the fortress city founded by the Serenissima Republic of Venice in 1593, a city designed by engineers, military analysts, and expert military architects all answerable to the Fortifications Office of Venice. There are a number of barracks situated inside the city's fortified walls, within a somewhat confined area: Montezemolo, Isonzo, Ederle, Filzi, Montesanto and others in outlying villages. Barracks built in different periods (some during the Renaissance, others in the eighteenth century and some even after the Second World War) have been gradually phased out of service. Their restoration and functional leverage, in the early years of this century, were discussed in terms of an economic and cultural strategy that would not upset the city. New regeneration strategies are called for if these abandoned military structures are not to undergo further deterioration. These strategies should be based upon a knowledge of these structures' features--their layout, architecture, technologies--and should also embrace local policies, but first and foremost they require real, contextualized and economically sustainable projects. 展开更多
关键词 FORTRESS decommissioning SECURITIZATION value-enhancement CONSERVATION regeneration.
在线阅读 下载PDF
The Threat to Indonesia From the Islamic State of Iraq and Syria (IS/ISIS): A Human Security Perspective
13
作者 Sukawarsini Djelantik 《International Relations and Diplomacy》 2018年第5期269-278,共10页
The democratization process in the Middle East and North Africa (MENA), better known as the Arab Spring, led to increased instability in the region. The civil war in Syria coupled with the attacks by the Islamic Sta... The democratization process in the Middle East and North Africa (MENA), better known as the Arab Spring, led to increased instability in the region. The civil war in Syria coupled with the attacks by the Islamic State of Iraq and Syria (ISIS) or later known as the Islamic State (IS) has resulted in one of the largest humanitarian crises since World War II. This security threat has spread to other regions, including Southeast Asia. Indonesia, with the biggest Moslems population in Southeast Asia, has been affected most significantly in comparison to other ASEAN member countries. ISIS has acknowledged its terrorist actions which involved suicide bomb attacks, and also claimed membership all over the archipelago. The continuing violence and resulting threats or feeling of insecurity negatively affect the lives, freedom, dignity, and development oft^e people. Not only related to political and military, the threat also affected human security, including economic, environmental, social, and other forms of harm done by the overall livelihood and wellbeing of individuals. Other threats related to the recruitment process of new ISIS member made use of conventional and social media. This arcticle aims to answer the question: "How has ISIS threatened human security in Indonesia?" Another question is: How has the Indonesian government reacted to securitize the above issues? It concluded that the government has not comprehensively solved the issues to reduce human security threats in Indonesia 展开更多
关键词 cooperation REGIONALISM SECURITIZATION SOUTHEAST-ASIA TERRORISM
在线阅读 下载PDF
Shadow Banking Credit Intermediation: Determinants of Default Risks in Securitization and Collateralization
14
作者 Mohd Yaziz Mohd Isa Md. Zabid Haji Abdul Rashid 《Journal of Modern Accounting and Auditing》 2014年第11期1119-1129,共11页
The growth in shadow banking system over the past few years is acknowledged as the key risk to Malaysia's financial stability. This is because that it is associated with growth in the household debts extended by the ... The growth in shadow banking system over the past few years is acknowledged as the key risk to Malaysia's financial stability. This is because that it is associated with growth in the household debts extended by the shadow banks. In line with initiatives by the Bank Negara Malaysia (the Central Bank of Malaysia) to enhance surveillance on the activities of the shadow banks in Malaysia, this study attempts to examine the determinants of default risks of shadow banks restricting to focus on their two main activities: securitization and collateralization. The results provide empirical evidence that future methodology to examine the systemic risks in the shadow banking system may need to account for additional explanatory variables that measure collateralized assets that are being intermediated. 展开更多
关键词 household debts shadow banks SECURITIZATION collateralization
在线阅读 下载PDF
Global Financial Crisis: Systemic Failure and the Underlying Knowledge Gap
15
作者 Mir Obaidur Rahman 《Journal of Modern Accounting and Auditing》 2014年第9期950-958,共9页
Recently, global financial crisis or meltdown rocked the international financial market. This havoc was the result of the reckless use of financial derivatives that received spontaneous patronization from the financia... Recently, global financial crisis or meltdown rocked the international financial market. This havoc was the result of the reckless use of financial derivatives that received spontaneous patronization from the financial whiz, but it is strange to discover that those proponents of market economy embarked on policy that was purely Keynesian in principle. The episode started in August 2007 with the collapse of subprime mortgage market and reached its climax during August 2008. Central banks in many countries of the western world intervened in the market to pump additional fund to give buoyancy in the credit market. The crisis encapsulated with the queer idea of financial instruments and multiple origins related to subprime mortgage left its trail in both developed and developing countries. Thus, an elaborate analysis of the causal link among various innovative instruments highlighting a mismatch between academic doctrine and real-life perspective and the inadequacy of the institutional arrangements supposed to tame the volatility of the market may be a useful guide to financial analysts and policy planners. The purpose of this paper is to highlight systemic gaps in the meltdown and redefine the contour of macroeconomics most appropriate to weather such catastrophe in the future. 展开更多
关键词 subprime mortgage SECURITIZATION origin to distribution model network theory
在线阅读 下载PDF
A Securitization-Perspective Analysis of Water Disputes in the Jordan River Basin
16
作者 ZHANG Jieying 《International Relations and Diplomacy》 2022年第5期229-238,共10页
Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely relate... Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely related to national security, and become the core resource arena that countries along the river basin compete for. This study argues that under the combined effect of the natural factors of water shortage, the geographical factors of uneven distribution of rivers across boundaries, and the subjective factors of water politics (the unfair setting of rules for water allocation), water disputes in the Middle East have become obstacles to regional peace, and the serious uneven distribution of water is the root cause of regional water disputes. Neither the historical water conflicts nor the existing water cooperation framework has solved the problem of balanced water distribution, which makes the people in basin countries directly face the crisis of survival rights and national security, and lays the fuse for the outbreak of regional water disputes and even future water wars. This study proposes the concept and analytical framework of “water securitization” based on securitization theory, and applies it to the Jordan River Basin, to analyze the reasons for the uneven distribution of water resources in the Middle East. The power-dominant state with asymmetric power in the river basin obtains the status of water hegemony by securitizing water, realizing the self-interested distribution of water resources, whichleads to the uneven distribution of water resources, and ultimately leads to the outbreak of conflicts and disputes. Specifically, it mainly adopts three mechanisms of discursive securitization, operational securitization, and institutional securitization. Looking to the future, it is difficult to successfully resolve water disputes in the Middle East in the short term, and a “de-securitization” approach is particularly important in resolving water disputes and easing regional security tension. Only by adopting a multi-field joint strategy can it provide the possibility to effectively resolve water disputes in the Jordan River Basin. 展开更多
关键词 the Middle East Region the Jordan River Basin water disputes SECURITIZATION water securitization
在线阅读 下载PDF
Application of Asset Securitization in Urban Rail Transit Financing
17
作者 Shoufang Wang 《International English Education Research》 2015年第7期37-39,共3页
Along with the advancement of urbanization, the traffic infrastructure construction of urban rail expanding constantly, meet the demand of city travel. However in the construction of urban rail transit, the constructi... Along with the advancement of urbanization, the traffic infrastructure construction of urban rail expanding constantly, meet the demand of city travel. However in the construction of urban rail transit, the construction fund demand is large, expected return and long construction period, makes its financing difficult. This paper analyze the predictable and stable cash income of rail transit construction, introducing the financing way of asset securitization, and attracting private investment and institutions. Discussing the urban rail transit in China which using the feasibility of asset securitization, providing financing channels to urban rail transit. 展开更多
关键词 ASSET SECURITIZATION RAIL TRANSIT FINANCING APPLICATION
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部