scholarly journals An Analysis of the Current State of the Consumer Credit Reporting System in China

2020 ◽  
Vol 2020 (4) ◽  
pp. 89-110
Author(s):  
Mo Chen ◽  
Jens Grossklags

AbstractThe Chinese Social Credit System (SCS), known as the first national digitally-implemented credit rating system, consists of two parallel arms: a government-run and a commercial one. The government-run arm of the SCS, especially efforts to blacklist and redlist individuals and organizations, has attracted significant attention worldwide. In contrast, the commercial part has been less often in the public spotlight except for discussions about Zhima Credit.The commercial arm of the SCS, also referred to as the Consumer Credit Reporting System (CCRS), has been under development for about two decades and took a major step forward in 2015 when 8 companies were granted permission to implement pilot consumer credit reporting programs. This development fundamentally increased the reach and impact of the SCS due to these companies’ sizable customer base and access to vast troves of consumer-related information.In this paper, we first map the Chinese CCRS to understand the actors in the credit reporting ecosystem. Then, we study 13 consumer credit reporting companies to examine how they collect and use personal information. Based on the findings, we discuss the relationship between the CCRS and the SCS including the changes in the power relationships between the government, consumer credit reporting companies and Chinese citizens.

2021 ◽  
pp. 56-76
Author(s):  
Roman Z. Rouvinsky ◽  
Ekaterina Rouvinskaya ◽  
Tatiana Komarova

This comparative research is dedicated to the attitude of the residents of PRC and Russia towards the practices of digital profiling and social score (ranking / grading) that are currently being implemented worldwide. Analysis is conducted on the results of interviewing the Chinese citizens, as well as sociological survey carried out among the Russian residents. The interviewing of the Chinese citizens was conducted in two stages: September 2020 via questionnaire in a written form; and March 2021, through the web platform CrowdSignal. The survey of the Russian residents was carried out from September 8, 2021 to October 26, 2021 in the form of filling out a printed questionnaire, as well as through the web platform. The conducted interviews demonstrate a high level of confidence of Chinese youth in the practices of collecting and processing personal information that were adopted in China, as well as the government initiatives on implementation of the score mechanisms in public administration. Unlike the Chinese citizens, the Russian residents including youth, to a considerable extent are inclined towards distrust in the government and namely private commercial companies with regards to their method of collecting and use personal information. A significant part of the Russian residents have not yet made up their mind on digital profiling and social credit system, or are cautious of such innovations.


Author(s):  
Ariane Ollier-Malaterre

This study attempts to delineate $2 when they use social media, shop online, and make electronic payments using WeChat Pay and Alipay. It is part of a book I am writing on perceptions of privacy and surveillance in China and is grounded in an inductive content analysis of 58 semi-structured in-depth interviews I conducted late 2019 in Beijing, Shanghai, and Chengdu. Privacy is written with two different words in Mandarin: $2 (a personal thing you do not wish to disclose in public akin to Western definitions) and $2 (hiding a shameful secret). Most of my interviewees used the latter meaning: $2 . Privacy, thus, was $2 , understood as $2 (moral face - e.g., purchases of personal medicine, underwear and sex-related products, or weapons) and $2 (social face - eg., financial information). Moreover, they perceived the need to hide shameful information $2 : parents and supervisors, or hackers who would disclose personal information, but less so an abstract entity such as the government. For instance, several interviewees felt they could “hide on Weibo” using a pseudonym, despite the real-name registration policy. These findings on privacy may shed slight on how Chinese citizens view the digitalization of surveillance through facial recognition monitoring and the building of the social credit system, and contribute to culture-sensitive surveillance research.


2018 ◽  
Vol 36 (1) ◽  
pp. 93-107 ◽  
Author(s):  
Zahy Ramadan

Purpose China is establishing a social credit rating system with the aim to score the trust level of citizens. The scores will be based on an integrated database that includes a vast range of information sources, rating aspects like professional conduct, corruption, type of products bought, peers’ own scores and tax evasion. While this form of gamification is expected to have dire consequences on brands and consumers alike, the literature in that particular area of interest remains non-existent. The paper aims to discuss these issues. Design/methodology/approach A conceptual framework is suggested that highlights early on the risks and implications on brands and companies operating in that particular upcoming landscape. Findings The gamification of trust that the social credit system focuses on presents potential risks on brand and consumer relationships. This in turn will affect brand sustainability vis-à-vis the expected drastic changes in the Chinese business landscape. This study suggests the strategies to follow which will be of high interest to companies, consumers, as well as to the Chinese authorities during and after implementation stage. Originality/value This paper is amongst the first to discuss the potential effects of the Chinese social credit rating system on brands. The conceptual framework fills a sizeable gap in the literature and pioneers the discussion on potential dilemmas brands will be faced with within this new business landscape.


2004 ◽  
Vol 19 (2) ◽  
pp. 130-139 ◽  
Author(s):  
Alan Thorogood ◽  
Philip Yetton ◽  
Anthony Vlasic ◽  
Joan Spiller

The South Australian Water case study illustrates the management challenges in aligning Information Technology with business objectives in a publicly owned corporation. To achieve the alignment, the new CIO begins by refreshing the IT infrastructure to support the required business applications. When the Government establishes ‘Improved water quality’ as a major corporate goal, the CIO seeks to add value to the business by developing a quality reporting system that leverages the existing technology. At the same time, he demonstrates to the corporation the IT function's capability to deliver business value through the management of multiple outsourcing vendors.


2018 ◽  
Vol 2 (2) ◽  
pp. 211-219
Author(s):  
Wenni Syafitri ◽  
Muhamad Sadar ◽  
Eddisyah Putra Pane

SMP IT Madani as one of the schools that apply the concept of islamic in its education practice. SMPIT Madani is a school formed by amil zakat self-supporting institution ummah Riau by using theconcept of free school. SMP IT stands in 2011 with a total of 20 students. Over time, the currentnumber of junior Madani IT students amounted to 75 students. The average students who attendjunior high school IT is the students who come from poor families.SMP IT Madani has received School Operational Assistance (BOS) a few years back. The BOSprogram uses a different approach than Special Assistance for Students (BKM) ie BOS funds are notgiven to poor students but are provided to schools and managed by schools. The mechanism forcalculating BOS funds is based on the number of students in each school. So the goal of this BOScan be achieved is to free the cost of education for poor students or not able and can alleviate forother students so they can get 9 years basic education services.The obligations of schools receiving BOS programs should report the realization of the use of theprogram to the government. Currently schools are having difficulties to make reporting realizationof BOS program to government and foundation. Differences in reporting formats to foundations andgovernments make the school experience serious problems. If it does not sync between reportingbetween the government and the foundation will cause many other questions and problems. Wheninterviewed, the school is very eager for this matter to be resolved immediately.Based on the problems of the partners, it can be concluded the solution of the problem is a reportinginformation system synchronized to the government and the foundation. So that SMP IT Madani nolonger experience obstacles to the reporting of BOS program activities. As a result the name ofUnilak increasingly fragrant in the eyes of society, especially SMP IT Madani.Method of implementation of activities used is direct observation to the location of partners toperform the first phase, this stage includes data collection and data processing. When this stage takesplace, we will get an overview of the Information Technology environment, and the partner's needfor the BOS program reporting mechanism. After the first phase is done, it will be held the secondphase of socialization, this stage to do the sosiasisasi about the benefits of synchronizing BOSreporting to the government and the foundation. Then in the third stage, the authors do the designand implementation of BOS reporting system based on information obtained from the foundation.Finally, the training phase: Each partner school sends its representative two people, to attend trainingon the use of reporting system that can synchronize BOS and foundation reporting.


MaRBLe ◽  
2019 ◽  
Vol 2 ◽  
Author(s):  
Nadja Aldendorff

In 2014, the State Council of the People’s Republic of China released a document that called for the construction of a nationwide Social Credit System (SCS) with the goal to encourage sincerity and punish insincerity. The system uses blacklists that citizens land on for various cases of misbehavior, ranging from failing to pay a fine to being caught Jaywalking. This research explains the design process behind the SCS and in particular why many Chinese citizens are embracing this form of surveillance. It focuses on three topics to answer this question: the historical roots underlying the system, the perceived lack of trust in Chinese society and the comparison with concepts from surveillance theories developed in the West. From the analysis, following conclusions could be drawn: Historically, the state has often acted as a promoter and enforcer of moral virtue. The SCS fits perfectly into this tradition. The most prominent reason for the positive Chinese reaction is the lack of institutions in China that promote trust between citizens and businesses. There is a severe trust deficit which the government had to find a solution for. Regarding surveillance theory, Foucault’s concept of ‘panopticism’ shows similarities with the SCS and underlines its effectiveness in changing and steering people’s behavior while Lyon’s notion of ‘social sorting’ is used to demonstrate the potential dangers of the Chinese system.


2021 ◽  
Vol 5 (3) ◽  
pp. 361
Author(s):  
Mertyani Sari Dewi ◽  
Komang Trisna Sari Dewi ◽  
Made Dwi Ferayani

The government must pay attention to the ability of its employees because it has accountability that can develop a sound and well-established reporting system. The government must pay attention to the ability of its employees because it has accountability that can develop a sound and well-established reporting system. The purpose of this study was to examine the sensitivity and ethics to the behavior of accounting actors and to examine the philosophy of Tri Kaya Parisudha, which is one of the local variables of the Balinese Hindu genus which can strengthen the effect of sensitivity and sensitivity on ethical behavior. The method used in this research is the Component-based SEM, Partial Least Square (PLS) analysis method. A questionnaire technique was used as a data collection tool to obtain data. Questionnaires will be distributed to 25 OPD Bangli Regency. The test results show empirical evidence that equity sensitivity has a significant positive effect on the behavior of accounting actors. Second, ethical sensitivity has a significant positive effect on the ethical behavior of accounting actors. Third, the philosophy of Tri Kaya Parisudha strengthens the influence of ethical sensitivity on the behavior of ethical accounting actors. Fourth, Tri Kaya Parisudha's philosophy strengthens the influence of ethical sensitivity on the behavior of ethical accounting actors. 


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2015 ◽  
pp. 1098-1122
Author(s):  
Linda Pardy ◽  
David Thomson ◽  
Samantha Pattridge

In Canada, the use of Social Networking Sites (SNS) for instructional purposes at post-secondary institutions is constrained by students' legislated rights to privacy. Some universities have explored ways to obtain the advantages of cloud computing while still meeting mandated obligations to protect student privacy. The government of British Columbia maintains the strictest standards in Canada regarding access to and storage of personal information, hampering instructional use of SNS. The University of the Fraser Valley (UFV) decided to work within this legislation and challenge faculty to modify their classroom practice. At UFV the most significant SNS-related teachable moments come from education towards informed consent to public sharing of information through SNS. While our ability to teach students how to use SNS resources is restricted, working within the legislation encourages educators to evaluate their central purpose for using SNS. Students acquire digital skills through various forms of informal learning; therefore, the formal instructional setting becomes an opportunity to foster development of digital citizens.


Sign in / Sign up

Export Citation Format

Share Document