The Rise and Development of Non-traditional Banking Business in China

Author(s):  
Zhixian Qu
2017 ◽  
pp. 123-141 ◽  
Author(s):  
S. Ageeva ◽  
A. Mishura

We examine the spatial distribution of banks in Russian regions to identify the factors that affect changing territorial architecture of the banking system. The object of the study is dynamics of the number of commercial banks and their branches in 1991-2016. Besides the well-known tendency of concentration of the banking business in Moscow and reducing the number of banks in other regions we analyzed situation in the federal districts taking as an example the Siberian Federal District. This approach allowed us to formulate hypotheses about the causes of differences in the availability of banking institutions in Russian regions.


Significance Follow-on action from Washington and responses from foreign actors will shape the US government’s adversarial policy towards China in semiconductors and other strategic technologies. Impacts The Biden administration will likely conclude that broad-based diversion of the semiconductor supply chain away from China is not feasible. The United States will rely on export controls and political pressure to prevent diffusion to China of cutting-edge chip technologies. The United States will focus on persuading foreign semiconductor leaders to help develop US capabilities, thereby staying ahead of China. Washington will focus on less direct approaches to strategic technology competition with China, notably technical standards-setting. Industry leaders in the semiconductor supply chain worldwide will continue expanding business in China in less politically sensitive areas.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lester Ross ◽  
Kenneth Zhou

Purpose To describe and analyze the implications of the new Measures (the “Measures”) for Cybersecurity Review jointly promulgated on April 27, 2020 by twelve Chinese government departments led by the Cyberspace Administration of China (CAC). Design/methodology/approach Defines the scope of the Measures, explains the functions and obligations of critical information infrastructure operators (each, a CIIO), outlines the self-assessment and cybersecurity review process and discusses the implications of the Measures for foreign companies doing business in China. Findings The Measures impose an obligation on CII operators to apply for a cybersecurity review when they intend to procure network products and services that present or may present a national security concern. Such review will focus not only on national security and data leakage concerns, but also on supply-chain security concerns. The cybersecurity review will likely further the decoupling between China and the US. Practical implications While the Measures are not formally intended to discriminate against foreign products and services, the promulgation of the Measures will have a significant impact on foreign companies that supply network products or services to CII operators in China. Originality/value Practical guidance from lawyers with extensive experience in advising Chinese, US, European and other companies on laws and regulations related to competition, cross-border investments, joint ventures, strategic alliances and international trade matters.


2017 ◽  
Vol 24 (1) ◽  
pp. 83-102 ◽  
Author(s):  
Håkan Lindgren

This study demonstrates the existence of a private, informal and lively credit market in rural Sweden during the 1840s, a period that predates the development of a modern banking system. The market, mainly based on private promissory notes, was concentrated in the hands of a limited number of wealthy farmers who specialized in lending, They facilitated access to credit to well-off farmers, regardless of whether they owned their farms or leased taxed land. By using information from probate inventories, the article analyses the wealth portfolio and characteristics of the lending business of the largest creditors (‘parish bankers’) in a judicial district of southern Sweden in 1841–5. The heart and soul of their business was an intimate knowledge of borrowers’ creditworthiness and mutual trust, as typical of local credit networks. The article also explores the existence of an intergenerational transmission of parish banking business – a dimension of private lending that opens an original path of research on local credit markets in early modern Europe.


Author(s):  
Arbana Sahiti ◽  
Arben Sahiti ◽  
Muhamet Aliu

Abstract Today risk management plays a vital role in business. Each firm, whether big or small, makes an effort to manage risk more effectively. Risk management is very important in the financial system, especially in banks. Billions of Euros are spent each year on the financial reporting of banks. Banks should implement effective solutions in risk management to mitigate their risks. Great financial debate that originated in the 1990s is reportedly linked to errors that occurred in the banking sector due to poor risk management. It should be noted that today technology plays a key role in risk management and it has already had a positive effect on the financial industry. Analysis of risk and its management has become significant in the Kosovo economy since the post-war period. The nature of the banking business is threatened by risks because more financial products are becoming complicated. The main role of banks is intermediation between those who have resources and those seeking them. Banks face various risks at the corporate level, such as operational, liquidity, legal, credit, and market risks; thus, these risks should be converted into a composite measure. This research aims to determine practices and effects of risk management in the banking sector. Relevant data were collected from banks through questionnaires and telephone interviews; analysis has been conducted using statistical tools. This study will engage both the quantitative and qualitative methods of data analysis. Dependent variables will be separated from independent variables, and regression analysis will be used to analyse the quantitative data.


2011 ◽  
Vol 25 (2) ◽  
pp. 173-195 ◽  
Author(s):  
Carsten Horn ◽  
Markus Rudolf

Sign in / Sign up

Export Citation Format

Share Document