This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical...This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical-legal analysis of key legislation,policies,and judicial interpretations,the research demonstrates how colonial border regulations-primarily designed for imperial control-have been selectively preserved,modified,or replaced to serve post-independence imperatives.Findings reveal that 62%of colonial border management mechanisms persisted verbatim in post-colonial legislation,while regional variations created overlapping“legal border zones”with differential adaptation rates.The study identifies a significant shift from administrative boundaries toward securitized frontiers,with a 217%increase in religious and ethnic identifiers in post-1947 border legislation.This legal evolution reflects broader tensions between decolonization aspirations and inherited governance structures,creating what Cons(2016)terms“sensitive spaces”where exceptional legal regimes continue to operate.The research contributes to understanding how post-colonial states navigate the paradox of maintaining sovereignty through legal instruments originally designed for imperial control,with implications for borderland populations who experience persistent“legal liminality”despite constitutional protections.展开更多
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s...Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.展开更多
Since the end of World War II,European migration narratives have undergone multiple turns.The shift toward securitization began around the 1980s and 1990s,aggravated by the rise of the extreme right,the disintegration...Since the end of World War II,European migration narratives have undergone multiple turns.The shift toward securitization began around the 1980s and 1990s,aggravated by the rise of the extreme right,the disintegration of the bipolar world,the acceleration of globalization,the global war on terror,and the 2015 European refugee crisis.Although,given the current context of globalization and anti-terrorism efforts,the same phenomenon can be seen in many countries worldwide,the securitization of migration in Europe has distinct"European characteristics":(i)the debate has been particularly intense and controversial;(i)the actors involved are complex and diverse;and(ii)the issue of immigrants is closely related with the European Union's peripheral governance.Admittedly,securitizing migration has enabled Europe to adopt more assertive policies on the issue.This,however,cannot fully address its challenges.An effective response requires finding a middle way between different(or even opposing)political positions,relocating immigrants within Europe geographically,developing psychosocial mechanisms to reduce the risk of terrorist attacks,and implementing a multilateral approach to migration governance.展开更多
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti...This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.展开更多
In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which can...In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility.展开更多
Against the background that the central government is strengthening macro control and tightening credit scale of real estate businesses, financing capacity becomes the determinant for a real estate enterprise's devel...Against the background that the central government is strengthening macro control and tightening credit scale of real estate businesses, financing capacity becomes the determinant for a real estate enterprise's development. Domestic enterprises have many ways of financing, and this paper describes ten common models, simply analyses the advantages and disadvantages of each model, while explains and recommends three financing models with practical examples: individual entrusted loan, trust financing and assets securitization.展开更多
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog...A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data.展开更多
On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factor...On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factors with the aid of Logistic model and Multinomial Logit model.The study indicates that factors influencing willingness of rural land circulation and securitization mainly include land contract method,land circulation information and approaches,rights and interests of farmers infringed or not,policies of benefiting farmers,and non-agricultural skills. Finally,it came up with following pertinent policy recommendations:( 1) reforming and improving land contract methods;( 2)strengthening disclosure of land circulation information;( 3) reforming and improving land circulation approaches;( 4) strengthening protection of farmers' rights and interests in the process of land circulation;( 5) reinforcing and implementing policies benefiting farmers;( 6) cultivating and developing farmers' non-agricultural skills.展开更多
New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and ...New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and transmissibility of nontraditional security threats are unprecedented.The emergence and even perpetuation of the above-mentioned new features are both attributed to objective factors,such as social development,ideological shifts,and scientific and technological advancement,and are closely related to the moves of certain major countries to instigate the so-called remarkable power competition recklessly and boost geopolitical contest.The rapid resurgence of securitization in global politics is hidden behind the rise of nontraditional security threats.Nontraditional security issues have generally entered a dynamic phase,which exerts an impact on the international security environment and the global landscape.A growing number of countries have emphasized on the realistic and urgent threat of nontraditional security challenges to their national security.These countries have tended to achieve traditional security goals via nontraditional means and tackle nontraditional security challenges with traditional mindsets.Thus,the boundary between traditional and nontraditional security issues is increasingly blurred.The methodology that dichotomizes traditional and nontraditional security issues may no longer be useful during assessments of major threats confronting national security.The connotations of peace and war have significantly changed in the new era.Distinguishing"hot"security issues from"cold"ones or traditional security issues from nontraditional ones is difficult.Such distinction requires consideration of all security issues when recognizing and addressing national security challenges.Thus,these increasingly complex security issues must be analyzed within a wide context of the oncein-a-century changes occurring worldwide and China should pursue a holistic approach to national security as a fundamental principle in response to various threats.展开更多
Financial reform has been a core dimension of the initial global policy response to the financial turmoil of 2007-08. At the first G-20 summit of heads of state and government in November
Italian military real-estate is highly varied as regards its location, intended uses, its typological, stylistic, and constructive features and its state of conservation. What historical and documental value can we at...Italian military real-estate is highly varied as regards its location, intended uses, its typological, stylistic, and constructive features and its state of conservation. What historical and documental value can we attribute to the typological and technical aspects of military buildings? What problems and strategies have to be studied before such buildings can be repurposed for inclusion into a circuit of social and civil uses? Some attempts were made to answer these questions by analysing the military real estate of Palmanova, the fortress city founded by the Serenissima Republic of Venice in 1593, a city designed by engineers, military analysts, and expert military architects all answerable to the Fortifications Office of Venice. There are a number of barracks situated inside the city's fortified walls, within a somewhat confined area: Montezemolo, Isonzo, Ederle, Filzi, Montesanto and others in outlying villages. Barracks built in different periods (some during the Renaissance, others in the eighteenth century and some even after the Second World War) have been gradually phased out of service. Their restoration and functional leverage, in the early years of this century, were discussed in terms of an economic and cultural strategy that would not upset the city. New regeneration strategies are called for if these abandoned military structures are not to undergo further deterioration. These strategies should be based upon a knowledge of these structures' features--their layout, architecture, technologies--and should also embrace local policies, but first and foremost they require real, contextualized and economically sustainable projects.展开更多
The democratization process in the Middle East and North Africa (MENA), better known as the Arab Spring, led to increased instability in the region. The civil war in Syria coupled with the attacks by the Islamic Sta...The democratization process in the Middle East and North Africa (MENA), better known as the Arab Spring, led to increased instability in the region. The civil war in Syria coupled with the attacks by the Islamic State of Iraq and Syria (ISIS) or later known as the Islamic State (IS) has resulted in one of the largest humanitarian crises since World War II. This security threat has spread to other regions, including Southeast Asia. Indonesia, with the biggest Moslems population in Southeast Asia, has been affected most significantly in comparison to other ASEAN member countries. ISIS has acknowledged its terrorist actions which involved suicide bomb attacks, and also claimed membership all over the archipelago. The continuing violence and resulting threats or feeling of insecurity negatively affect the lives, freedom, dignity, and development oft^e people. Not only related to political and military, the threat also affected human security, including economic, environmental, social, and other forms of harm done by the overall livelihood and wellbeing of individuals. Other threats related to the recruitment process of new ISIS member made use of conventional and social media. This arcticle aims to answer the question: "How has ISIS threatened human security in Indonesia?" Another question is: How has the Indonesian government reacted to securitize the above issues? It concluded that the government has not comprehensively solved the issues to reduce human security threats in Indonesia展开更多
The growth in shadow banking system over the past few years is acknowledged as the key risk to Malaysia's financial stability. This is because that it is associated with growth in the household debts extended by the ...The growth in shadow banking system over the past few years is acknowledged as the key risk to Malaysia's financial stability. This is because that it is associated with growth in the household debts extended by the shadow banks. In line with initiatives by the Bank Negara Malaysia (the Central Bank of Malaysia) to enhance surveillance on the activities of the shadow banks in Malaysia, this study attempts to examine the determinants of default risks of shadow banks restricting to focus on their two main activities: securitization and collateralization. The results provide empirical evidence that future methodology to examine the systemic risks in the shadow banking system may need to account for additional explanatory variables that measure collateralized assets that are being intermediated.展开更多
Recently, global financial crisis or meltdown rocked the international financial market. This havoc was the result of the reckless use of financial derivatives that received spontaneous patronization from the financia...Recently, global financial crisis or meltdown rocked the international financial market. This havoc was the result of the reckless use of financial derivatives that received spontaneous patronization from the financial whiz, but it is strange to discover that those proponents of market economy embarked on policy that was purely Keynesian in principle. The episode started in August 2007 with the collapse of subprime mortgage market and reached its climax during August 2008. Central banks in many countries of the western world intervened in the market to pump additional fund to give buoyancy in the credit market. The crisis encapsulated with the queer idea of financial instruments and multiple origins related to subprime mortgage left its trail in both developed and developing countries. Thus, an elaborate analysis of the causal link among various innovative instruments highlighting a mismatch between academic doctrine and real-life perspective and the inadequacy of the institutional arrangements supposed to tame the volatility of the market may be a useful guide to financial analysts and policy planners. The purpose of this paper is to highlight systemic gaps in the meltdown and redefine the contour of macroeconomics most appropriate to weather such catastrophe in the future.展开更多
Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely relate...Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely related to national security, and become the core resource arena that countries along the river basin compete for. This study argues that under the combined effect of the natural factors of water shortage, the geographical factors of uneven distribution of rivers across boundaries, and the subjective factors of water politics (the unfair setting of rules for water allocation), water disputes in the Middle East have become obstacles to regional peace, and the serious uneven distribution of water is the root cause of regional water disputes. Neither the historical water conflicts nor the existing water cooperation framework has solved the problem of balanced water distribution, which makes the people in basin countries directly face the crisis of survival rights and national security, and lays the fuse for the outbreak of regional water disputes and even future water wars. This study proposes the concept and analytical framework of “water securitization” based on securitization theory, and applies it to the Jordan River Basin, to analyze the reasons for the uneven distribution of water resources in the Middle East. The power-dominant state with asymmetric power in the river basin obtains the status of water hegemony by securitizing water, realizing the self-interested distribution of water resources, whichleads to the uneven distribution of water resources, and ultimately leads to the outbreak of conflicts and disputes. Specifically, it mainly adopts three mechanisms of discursive securitization, operational securitization, and institutional securitization. Looking to the future, it is difficult to successfully resolve water disputes in the Middle East in the short term, and a “de-securitization” approach is particularly important in resolving water disputes and easing regional security tension. Only by adopting a multi-field joint strategy can it provide the possibility to effectively resolve water disputes in the Jordan River Basin.展开更多
Along with the advancement of urbanization, the traffic infrastructure construction of urban rail expanding constantly, meet the demand of city travel. However in the construction of urban rail transit, the constructi...Along with the advancement of urbanization, the traffic infrastructure construction of urban rail expanding constantly, meet the demand of city travel. However in the construction of urban rail transit, the construction fund demand is large, expected return and long construction period, makes its financing difficult. This paper analyze the predictable and stable cash income of rail transit construction, introducing the financing way of asset securitization, and attracting private investment and institutions. Discussing the urban rail transit in China which using the feasibility of asset securitization, providing financing channels to urban rail transit.展开更多
文摘This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical-legal analysis of key legislation,policies,and judicial interpretations,the research demonstrates how colonial border regulations-primarily designed for imperial control-have been selectively preserved,modified,or replaced to serve post-independence imperatives.Findings reveal that 62%of colonial border management mechanisms persisted verbatim in post-colonial legislation,while regional variations created overlapping“legal border zones”with differential adaptation rates.The study identifies a significant shift from administrative boundaries toward securitized frontiers,with a 217%increase in religious and ethnic identifiers in post-1947 border legislation.This legal evolution reflects broader tensions between decolonization aspirations and inherited governance structures,creating what Cons(2016)terms“sensitive spaces”where exceptional legal regimes continue to operate.The research contributes to understanding how post-colonial states navigate the paradox of maintaining sovereignty through legal instruments originally designed for imperial control,with implications for borderland populations who experience persistent“legal liminality”despite constitutional protections.
文摘Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.
文摘Since the end of World War II,European migration narratives have undergone multiple turns.The shift toward securitization began around the 1980s and 1990s,aggravated by the rise of the extreme right,the disintegration of the bipolar world,the acceleration of globalization,the global war on terror,and the 2015 European refugee crisis.Although,given the current context of globalization and anti-terrorism efforts,the same phenomenon can be seen in many countries worldwide,the securitization of migration in Europe has distinct"European characteristics":(i)the debate has been particularly intense and controversial;(i)the actors involved are complex and diverse;and(ii)the issue of immigrants is closely related with the European Union's peripheral governance.Admittedly,securitizing migration has enabled Europe to adopt more assertive policies on the issue.This,however,cannot fully address its challenges.An effective response requires finding a middle way between different(or even opposing)political positions,relocating immigrants within Europe geographically,developing psychosocial mechanisms to reduce the risk of terrorist attacks,and implementing a multilateral approach to migration governance.
基金Supported by the National Basic Research Program of China (973 Program) (2007CB311201)the National High-Technology Research and Development Program of China (863 Program) (2006AA01Z427)the National Natural Science Foundation of China (60673073)
文摘This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.
文摘In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility.
文摘Against the background that the central government is strengthening macro control and tightening credit scale of real estate businesses, financing capacity becomes the determinant for a real estate enterprise's development. Domestic enterprises have many ways of financing, and this paper describes ten common models, simply analyses the advantages and disadvantages of each model, while explains and recommends three financing models with practical examples: individual entrusted loan, trust financing and assets securitization.
基金We received funding solely from our institution to perform this research.
文摘A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data.
基金Supported by Development Report Project for Philosophy and Social Science of the Ministry of Education(11JBG006)Project of National Social Science Foundation(11CJY034)+1 种基金Project of Hubei Financial Research Center of Key Research Base of Humanities and Social Science of Colleges and Universities of Hubei Province(2011B003)Fundamental Research Funds for the Central Universities in 2013(20132013)
文摘On the basis of questionnaire survey in 54 natural villages of 22 cities( counties) in 6 central region provinces,this paper analyzed the willingness of rural land circulation and securitization and influencing factors with the aid of Logistic model and Multinomial Logit model.The study indicates that factors influencing willingness of rural land circulation and securitization mainly include land contract method,land circulation information and approaches,rights and interests of farmers infringed or not,policies of benefiting farmers,and non-agricultural skills. Finally,it came up with following pertinent policy recommendations:( 1) reforming and improving land contract methods;( 2)strengthening disclosure of land circulation information;( 3) reforming and improving land circulation approaches;( 4) strengthening protection of farmers' rights and interests in the process of land circulation;( 5) reinforcing and implementing policies benefiting farmers;( 6) cultivating and developing farmers' non-agricultural skills.
文摘New changes are taking place in nontraditional security fields,characterized by the increase in confrontation and conflict,the intensification of threats,and diversification.The interconnectivity,unpredictability,and transmissibility of nontraditional security threats are unprecedented.The emergence and even perpetuation of the above-mentioned new features are both attributed to objective factors,such as social development,ideological shifts,and scientific and technological advancement,and are closely related to the moves of certain major countries to instigate the so-called remarkable power competition recklessly and boost geopolitical contest.The rapid resurgence of securitization in global politics is hidden behind the rise of nontraditional security threats.Nontraditional security issues have generally entered a dynamic phase,which exerts an impact on the international security environment and the global landscape.A growing number of countries have emphasized on the realistic and urgent threat of nontraditional security challenges to their national security.These countries have tended to achieve traditional security goals via nontraditional means and tackle nontraditional security challenges with traditional mindsets.Thus,the boundary between traditional and nontraditional security issues is increasingly blurred.The methodology that dichotomizes traditional and nontraditional security issues may no longer be useful during assessments of major threats confronting national security.The connotations of peace and war have significantly changed in the new era.Distinguishing"hot"security issues from"cold"ones or traditional security issues from nontraditional ones is difficult.Such distinction requires consideration of all security issues when recognizing and addressing national security challenges.Thus,these increasingly complex security issues must be analyzed within a wide context of the oncein-a-century changes occurring worldwide and China should pursue a holistic approach to national security as a fundamental principle in response to various threats.
文摘Financial reform has been a core dimension of the initial global policy response to the financial turmoil of 2007-08. At the first G-20 summit of heads of state and government in November
文摘Italian military real-estate is highly varied as regards its location, intended uses, its typological, stylistic, and constructive features and its state of conservation. What historical and documental value can we attribute to the typological and technical aspects of military buildings? What problems and strategies have to be studied before such buildings can be repurposed for inclusion into a circuit of social and civil uses? Some attempts were made to answer these questions by analysing the military real estate of Palmanova, the fortress city founded by the Serenissima Republic of Venice in 1593, a city designed by engineers, military analysts, and expert military architects all answerable to the Fortifications Office of Venice. There are a number of barracks situated inside the city's fortified walls, within a somewhat confined area: Montezemolo, Isonzo, Ederle, Filzi, Montesanto and others in outlying villages. Barracks built in different periods (some during the Renaissance, others in the eighteenth century and some even after the Second World War) have been gradually phased out of service. Their restoration and functional leverage, in the early years of this century, were discussed in terms of an economic and cultural strategy that would not upset the city. New regeneration strategies are called for if these abandoned military structures are not to undergo further deterioration. These strategies should be based upon a knowledge of these structures' features--their layout, architecture, technologies--and should also embrace local policies, but first and foremost they require real, contextualized and economically sustainable projects.
文摘The democratization process in the Middle East and North Africa (MENA), better known as the Arab Spring, led to increased instability in the region. The civil war in Syria coupled with the attacks by the Islamic State of Iraq and Syria (ISIS) or later known as the Islamic State (IS) has resulted in one of the largest humanitarian crises since World War II. This security threat has spread to other regions, including Southeast Asia. Indonesia, with the biggest Moslems population in Southeast Asia, has been affected most significantly in comparison to other ASEAN member countries. ISIS has acknowledged its terrorist actions which involved suicide bomb attacks, and also claimed membership all over the archipelago. The continuing violence and resulting threats or feeling of insecurity negatively affect the lives, freedom, dignity, and development oft^e people. Not only related to political and military, the threat also affected human security, including economic, environmental, social, and other forms of harm done by the overall livelihood and wellbeing of individuals. Other threats related to the recruitment process of new ISIS member made use of conventional and social media. This arcticle aims to answer the question: "How has ISIS threatened human security in Indonesia?" Another question is: How has the Indonesian government reacted to securitize the above issues? It concluded that the government has not comprehensively solved the issues to reduce human security threats in Indonesia
文摘The growth in shadow banking system over the past few years is acknowledged as the key risk to Malaysia's financial stability. This is because that it is associated with growth in the household debts extended by the shadow banks. In line with initiatives by the Bank Negara Malaysia (the Central Bank of Malaysia) to enhance surveillance on the activities of the shadow banks in Malaysia, this study attempts to examine the determinants of default risks of shadow banks restricting to focus on their two main activities: securitization and collateralization. The results provide empirical evidence that future methodology to examine the systemic risks in the shadow banking system may need to account for additional explanatory variables that measure collateralized assets that are being intermediated.
文摘Recently, global financial crisis or meltdown rocked the international financial market. This havoc was the result of the reckless use of financial derivatives that received spontaneous patronization from the financial whiz, but it is strange to discover that those proponents of market economy embarked on policy that was purely Keynesian in principle. The episode started in August 2007 with the collapse of subprime mortgage market and reached its climax during August 2008. Central banks in many countries of the western world intervened in the market to pump additional fund to give buoyancy in the credit market. The crisis encapsulated with the queer idea of financial instruments and multiple origins related to subprime mortgage left its trail in both developed and developing countries. Thus, an elaborate analysis of the causal link among various innovative instruments highlighting a mismatch between academic doctrine and real-life perspective and the inadequacy of the institutional arrangements supposed to tame the volatility of the market may be a useful guide to financial analysts and policy planners. The purpose of this paper is to highlight systemic gaps in the meltdown and redefine the contour of macroeconomics most appropriate to weather such catastrophe in the future.
文摘Severe water shortage and uneven water distribution plague countries in the Middle East, especially the Jordan River Basin. As a strategic resource with competitive political nature, water resources are closely related to national security, and become the core resource arena that countries along the river basin compete for. This study argues that under the combined effect of the natural factors of water shortage, the geographical factors of uneven distribution of rivers across boundaries, and the subjective factors of water politics (the unfair setting of rules for water allocation), water disputes in the Middle East have become obstacles to regional peace, and the serious uneven distribution of water is the root cause of regional water disputes. Neither the historical water conflicts nor the existing water cooperation framework has solved the problem of balanced water distribution, which makes the people in basin countries directly face the crisis of survival rights and national security, and lays the fuse for the outbreak of regional water disputes and even future water wars. This study proposes the concept and analytical framework of “water securitization” based on securitization theory, and applies it to the Jordan River Basin, to analyze the reasons for the uneven distribution of water resources in the Middle East. The power-dominant state with asymmetric power in the river basin obtains the status of water hegemony by securitizing water, realizing the self-interested distribution of water resources, whichleads to the uneven distribution of water resources, and ultimately leads to the outbreak of conflicts and disputes. Specifically, it mainly adopts three mechanisms of discursive securitization, operational securitization, and institutional securitization. Looking to the future, it is difficult to successfully resolve water disputes in the Middle East in the short term, and a “de-securitization” approach is particularly important in resolving water disputes and easing regional security tension. Only by adopting a multi-field joint strategy can it provide the possibility to effectively resolve water disputes in the Jordan River Basin.
文摘Along with the advancement of urbanization, the traffic infrastructure construction of urban rail expanding constantly, meet the demand of city travel. However in the construction of urban rail transit, the construction fund demand is large, expected return and long construction period, makes its financing difficult. This paper analyze the predictable and stable cash income of rail transit construction, introducing the financing way of asset securitization, and attracting private investment and institutions. Discussing the urban rail transit in China which using the feasibility of asset securitization, providing financing channels to urban rail transit.