Internet Finance in China
Internet Finance in China
This book is about Internet finance, a concept coined by the authors in 2012.
Internet finance deals specifically with the impacts of Internet-based technologies,
such as mobile payments, social networks, search engines, cloud computation, and
big data, on the financial sector. Major types of Internet finance include third-party
payments and mobile payments, Internet currency, P2P lending, crowdfunding, and
the use of big data in financial activities.
Internet finance is highly popular and heavily discussed in China. Chinese Premier
Li Keqiang made the healthy development of Internet finance a policy priority in 2014
state-of-union address. This book, as a detailed report on Internet finance in China,
will help readers understand the status quo and development of China’s financial
system and will serve as a guide for readers doing financial businesses in China.
Dr. Ping XIE has been executive vice president of China Investment Corporation
since 2007. He is responsible for private equity and direct investment. He is currently
the Vice Chairman of CF40 Executive Council. From 2005–2007, he served as the
President of Central Huijin Investment Corporation, which is now the domestic
arm of CIC. He played an important role in the reform of China’s big five state
owned banks. Prior to that, he worked at the People’s Bank of China for 20 years,
where he held a number of senior positions, including the Head of the Financial
Stability Department and Head of the Research Department. He has conducted
extensive research in monetary theory and policy, comparative studies of financial
systems, financial markets, rural finance, and financial regulation. He is a three-time
winner of the Sun Ye Fang Economic Prize (1995, 2000, and 2005).
Directors
TU Guangshao Executive Vice Mayor of Shanghai
WAN Jianhua Chairman of E-Capital Transfer Co., Ltd
QIAN Yingyi Director, Shanghai Finance Institute
Deputy Directors
WENG Zuliang Chief, CPC Huangpu District, Shanghai
XU Zhen Chairman, Shanghai Clearing House
Chief Editors
LI Xunlei Vice President & Chief Economist, Haitong Securities
LIAN Ping Chief Economist, Bank of Communications
LIAO Min Director, Shanghai Office, China Banking Regulatory
Commission
MIAO Jianmin President, China Life Insurance (Group) Company
WANG Qing President of Shanghai Chongyang Investment Management
Co., Ltd
ZHANG Chun Executive Dean, Shanghai Advanced Institute of Finance,
Shanghai Jiaotong University
ZHENG Yang Director, Shanghai Financial Services Office
ZHONG Wei Deputy Director, Shanghai Finance Institute
Executive Editor
WANG Haiming Executive Deputy Director, Shanghai Finance Institute
Chief Translators
Martin Chorzempa
John Lin
The “New Finance Book Series” was created by the Shanghai Finance Institute
(SFI). The book series traces developments in new finance, explores new trends,
pursues solutions to novel problems, and inspires new knowledge.
Founded on July 14, 2011, the Shanghai Finance Institute (SFI) is a leading non-
governmental, non-profit institute dedicated to professional academic financial
research. SFI is operated by the China Finance 40 Forum (CF40) and has a strategic
cooperation with the Shanghai Huangpu District government.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Ping Xie
Haier Liu
Chuanwei Zou
Introduction and Practical Approaches
Internet Finance in China
First published 2016
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Typeset in Bembo
by diacriTech, Chennai
Contents
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
List of figures xi
List of tables xiii
1 Introduction 1
Section 1: Defining Internet finance 1
1 Internet finance is a forward looking concept 1
2 The changeable and unchangeable of Internet finance 2
Section 2: The development of Internet finance 5
1 The rise of Internet finance 5
2 The scope of Internet finance 6
3 Governmental attitudes toward Internet finance 7
Section 3: Structure of this book 8
2 Mobile banks 25
Section 2: Network securities companies 32
1 Business models worldwide 32
2 Chinese models 33
Section 3: Network insurance companies 34
1 Development 34
2 Major types 35
Section 4: Network financial trading platforms 36
1 SecondMarket 36
2 SharesPost 37
Section 5: Distribution networks for financial products 38
Notes 39
5 Internet currency 56
Section 1: The concept of Internet currency 56
Section 2: The economics of Internet currency 57
1 Online communities and network economics 57
2 The new form of currency: Facilitating network payments 58
3 The risks of Internet currency 59
Section 3: Bitcoin 60
1 Working mechanism 60
2 Issuance mechanism 63
3 Bitcoin’s effect 64
4 Innovation and insufficiency 65
5 Risk and regulation 66
Notes 68
6 Big data 70
Section 1: Big data: Concepts and main types 70
1 Basic concept 70
2 Recorded data 71
3 Data based on graphs 72
4 Data in order 72
Section 2: Primary tasks for big data analysis 73
1 Classification 73
2 Regression 75
3 Association analysis 76
4 Cluster analysis 77
5 Recommender system 77
6 Anomaly detection 78
7 Link analysis 79
Section 3: Comparison of big data analysis and econometrics 81
1 Introduction to econometrics 81
2 Differences between big data analysis and econometrics 83
3 Inherent contact between big data analysis and econometrics 84
Notes 89
viii Contents
7 Big data-based credit and Internet lending 90
Section 1: Big data-based credit 90
1 Basic concepts 90
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
9 Crowdfunding 123
Section 1: About Kickstarter 123
1 The establishment of Kickstarter 123
2 The operating model of Kickstarter 123
3 The pricing structure of Kickstarter 124
4 Projects on the Kickstarter platform 124
5 Kickstarter guidelines 124
Section 2: Operational principle and development 125
1 Relation between crowdfunding and crowdsourcing 125
2 Operational principles and project classification 125
3 Development overview 128
Section 3: The economics of crowdfunding 131
1 Common characteristics 131
2 Incentives 131
3 Crowdfunding risks 133
Contents ix
4 Market design 134
5 Several open questions 136
Notes 138
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Financial
intermediaries
(such as banks)
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Depositors Borrowers
Financial
markets (such as
exchanges)
Depositors Borrowers
Internet
Figure 1.1 How to understand a state without intermediaries and markets. Arrows denote
fund flows.
Information
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
The Internet can significantly decrease transaction costs and asymmetric informa-
tion, increase efficient management and pricing of risk, and expand the boundaries
of possible transactions. It provides a platform for suppliers and demanders of capital
to transact directly, which influences financial transactions and organizational forms.
Second, we have the influence of the Internet “spirit.”The core of Internet spirit
lies in openness, sharing, decentralization, equality, freedom of choice, usefulness,
and democracy. On the other hand, traditional finance is more elitist. It stresses
professional qualifications and entry thresholds, which manifest in the fact that not
everyone can access financial services. Internet finance reflects the emergence of
the individual organization and platform model in finance. Finance will be even
more useful when financial distribution and specialization are weakened.
at least one of the characteristics in the three pillars should be classified as Internet
finance. This can be viewed as a constructive definition of Internet finance that
can cover its main types. For example, if commercial banks use big data to conduct
credit assessment and lending businesses, they are using Internet finance.
• Formal finance has not always been able to meet the financial demands of
small- and medium-sized enterprises (SMEs) and farmers, and private finance
(or informal finance) has intrinsic limitation and risks.
• Economic restructuring has created spending and credit demands beyond
those which can be met by formal finance.
6 Introduction
• Banks are hugely profitable when the interest spreads between deposits and
loans are protected, which is currently the case in China due to interest rate
controls on deposits and lending. Capital thus has a strong incentive to enter
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
In this context, Internet finance in China currently aims to meet the credit
financing needs of individuals and SMEs, the equity financing needs of some crea-
tive projects, the investing and financing needs of ordinary people, and financial
product sales through non-bank channels. It thus can also be considered inclusive
finance. Internet finance will not have as large of an impact on big enterprises or
big projects, but the share of such enterprises in the economy will decline over
time. Moreover, financial resources in China have been allocated mostly to the cen-
tral government and state-owned sectors for a long time.We predict that in the next
ten years, large amounts of financial resources will be distributed from the central
to local and state-owned to private sectors. This profound change in the distribu-
tion of financial resources will contribute to the development of Internet finance.
Finance and Rong 360 are growing parts of the Internet finance landscape in
China and elsewhere.
2 Mobile and third-party payments
Mobile and third-party payments reflect the influence that the Internet has
on the payments industry. The main players are Paypal in the USA, Alibaba,
Caifutong, and Tencent’s Wechat payment in China.
3 Internet currency
Internet currency reflects the influence that Internet has on currency. It
includes Bitcoin, Q-coin, and Amazon Coins.
4 Using big data for credit scoring and network loans
Credit bureaus are key for loan provision, so we discuss credit investiga-
tion together with network loans. ZestFinance in the USA and Kreditech
in Germany already do credit scoring based on big data, while Kabbage in
the USA and Alibaba microcredit in China give out network loans based on
big data.
5 Peer-to-Peer (P2P) network loans
P2P network loans include personal debit and credit on the Internet, which
is represented by Prosper, Lending Club, Zopa, Credit Ease, Lufax, Paipai
Lending, and P2P Lending.
6 Crowdfunding
Crowdfunding is financing over the Internet in which many investors are able
to contribute small sums for a project or company. Current crowdfunding plat-
forms include Kickstarter (which provides returns through means other than
equity) and AngelCrunch.
We must clarify that there are no clear lines between so many different forms of
Internet finance. They are all constantly changing. For example, usage-based insur-
ance came into being in the insurance industry; equity research found that Twitter
activity can predict future share prices; and the combination of big data with actu-
arial studies and portfolio investment will contribute to many new business models
(see Chapter 12). Thus, the six main types of Internet finance in this book are nei-
ther mutually exclusive nor collectively exhaustive.
This book has 12 chapters divided into four parts. Figure 1.3 shows the structure.
Chapter 1
Introduction
Chapter 11
Chapter 4 Chapter 7
Chapter 6 Chapter 8 Internet
Chapter 3 Mobile Chapter 5 Credit Chapter 9
Generally p2p exchage
Internet and Internet Investigation Crowdfunding
discuss network economy
webification third-party Currency and network financing
big data loans
payments loans
SECTION 1: INTRODUCTION
Under Internet finance, money and securities will be transferred through mobile
communication networks.
The foundation for mobile payments is the development of mobile commu-
nication technologies, especially the high penetration of smart phones and tablets.
According to Goldman Sachs, the volume of mobile payments reached US$105.9
billion in 2011 and was expected to grow at 42% annually in the coming five years
to reach US$616.9 billion by 2016. The share of mobile payments in the global
payment market was 1% in 2011 and will reach 2.2% by 2015.4
Backed by Wi-Fi and 4G technologies, Internet and mobile communication
networks are increasingly integrated, and cable telephone, radio, and TV networks
will be incorporated in the near future. Mobile payments will then be further
combined with credit cards, online banking, and e-payments to become more
available, convenient, and user-friendly. With the development of security software
such as identity authentication and digital signatures, mobile payments will be
applied not only to small sum payments in daily life, but also to large payments
between companies. It could completely replace payment instruments such as cash
and checks.
Cloud computing ensures the storage and computing capabilities necessary for
mobile payments. Despite becoming increasingly smart, mobile communication
12 The theory of Internet finance
devices cannot match personal computers in terms of storage capacity and
computing speed due to requirements for portability and size. Cloud computation
can overcome such shortcomings through a transfer of storage and computation
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
1 General views
Information about capital suppliers and, more essentially, capital demanders, is
imperative in financial activities. Mishkin points out that there are two types of
information processing under direct and indirect financing.6 The first type is the
production and sale of information by private entities. Many specialized institu-
tions produce information that can differentiate the quality of capital demanders,
such as credit rating agencies and research teams at investment banks. Commercial
banks are information producers and users at the same time, so they also belong to
this category. The second type is information disclosure required or encouraged by
governments, such as financial statements of listed companies.
Compared with commercial banks and securities markets, Internet finance will
differ most in its information processing. First, social networks will generate and
spread information, especially information without disclosure obligations. Second,
search engines will structure, sequence, and index information to alleviate the over-
load problem. Third, cloud computation will ensure rapid processing capabilities
for mass information. Thus, the overall picture is that, with the help of cloud com-
putation, information from capital suppliers and demanders will be revealed and
spread through social networks, concentrated and standardized by search engines
to produce a dynamic information sequence. With such processed information,
risk assessment of any capital demander will be carried out at a low cost. Thus
information needs in financial activities will be satisfied in a way similar to the
credit default swap (CDS) market. According to Xie and Zou, CDS creates a time
series of default probability via transaction mechanisms similar to social networks
The theory of Internet finance 13
and search engines.7 It is even more effective than credit rating agencies. The
following paragraphs discuss the roles of social networks, search engines, and cloud
computation, respectively.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
First, social networks digitize and map social relationships on the Internet and
serve as platforms to release, spread, and share information. Social networks are
based on two foundations. First, networking behaviors are intrinsic to human beings
and characterized by the attributes of exchangeability,8 consistency,9 contagious-
ness,10 and transmissibility.11 Second, the development of the Internet and other
communication technologies has reduced individuals’ costs to release information
and contact with strangers, leading to new types of collaboration such as Chinese
phenomenon of “Cyber Manhunt” and editing of Wikipedia.12 Social networks also
contain lots of relational data, that is information about contact, connection, com-
munity attachment, and gathering.13
Second, from mass information, search engines can identify contents that best
match the needs of information users. Integration between search engines and social
networks is inevitable,14 which is embodied in the development of social search.
Third, with the performance of integrated circuit (IC) approaching physical
limits, cloud computation employs a large number of PCs to share computational
tasks with great extendibility, fault tolerance and consistency of multiple backup
data, producing huge computational capabilities and storage space. Cloud com-
putation thus facilitates the processing of mass information and is instrumental
in the development of search engines.15 The financial sector, as one of the biggest
users of computation power, will also be influenced by the development of cloud
computation.
We use a simple example to demonstrate information processing under
Internet finance. Individuals (or institution) have many stakeholders, who all have
some information about their wealth, employment status, personality, and so on.
If all stakeholders’ information is released and pooled on social networks, and
inaccurate information is disputed or filtered through social networks and search
engines, we will get a reliable picture of their creditworthiness. Social networks
also enable the accumulation of “social capital” among people, with which costs
of financial activities will drop considerably and opportunistic behaviors will be
constrained.
2 Model
2.1 Assumptions
Suppose there are n persons who express their views on default probability of a per-
son or entity (“reference entity”) by trading a financial product similar to CDS.This
financial product is essentially a two-period contract with two types of participants,
sellers and buyers. For one unit of financial product, in the first period, the buyer
pays to the seller a premium of s (also the financial product’s price); in the second
period, if the reference entity defaults, the seller compensates the buyer an amount
of l. Suppose l is determined beforehand and s by market equilibrium. Our target
is to explore the information content of s.
14 The theory of Internet finance
Suppose all persons have an initial wealth in the first period, which exists in the
form of risk-free bonds with zero risk-free rate. In the first period, every person
decides whether to buy or sell the financial product and by what amount based on
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
his information, wealth and risk preference. In the second period, if the reference
entity defaults, compensation between buyers and sellers is triggered. Suppose that
the utility of all persons is a CARA function of second-period wealth with absolute
risk aversion coefficient α , that is:
u ( w ) = −α exp ( −α ⋅ w ) (2.1)
exp (Y )
P = Pr (Y + e > 0 ) = 1 − Pr ( e ≤ −Y ) = (2.2)
1 + exp (Y )
Suppose there are two types of information in Y .The first is public information,
denoted by X . The second is private information acquired by every person, with
private information of no. i person denoted by Z i . We introduce five assumptions
on information structure:
n
1 Y = X + ∑ Z , that
i =1
i is simple linear addition between public and private
information;
2 For any i, E (Z i ) = 0;
3 For any i ≠ j, E (Z j Z i ) = 0, that is private information of different persons
is uncorrelated;
4 For any i, E (Z i X ) = 0, that is public and private information is uncorrelated;
5 Assumptions I–IV are public knowledge.
s.t. w i 2 = w i 1 − θ i ⋅ s + θ i ⋅ l ⋅ 1{default}
1 ⎛ Pi ⎛ l ⎞⎞
θi = ln ⎜ − 1⎟⎠ ⎟ (2.5)
α l ⎜⎝ 1 − Pi ⎝ s ⎠
⎛l ⎞
Monotonic increasing transformation S = − ln ⎜ − 1⎟ is introduced (or equiv-
exp (S ) ⎝ s ⎠
alently s = l . Since S has the same information content as s,16 we will
1 + exp (S )
focus on S in the following analysis. Based on Equation (2.3), θi can be equivalently
expressed as:
X + Zi − S (2.6)
θi =
αl
∑θ
i =1
i =0 (2.7)
Based on Equations (2.6) and (2.7), the equilibrium price of the financial
product is:
1 n
S = X + ∑ Zi
n i =1
(2.8)
16 The theory of Internet finance
2.2.3 The information content of the equilibrium price
The equilibrium price (Equation 2.8) embodies major attributes of information
processing under Internet finance. First, private information is reflected and
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
E [Y S, X ] = Y (2.9)
dvt = λ vt (1 − vt ) dt (2.10)
v 0 exp ( λt ) (2.11)
vt =
1 − v 0 + v 0 exp ( λt )
(2.12)
n i =1
1 n
Obviously, when t → ∞, St → X + Z i + ∑ Z i. So the spread of information
n i =1
is essentially a process of private information becoming public. This demonstrates
the sharing and communication of information in social networks.
1 General views
Under Internet finance, capital supply and demand information will be released on
the Internet and smoothly matched. Capital suppliers and demanders will contact
each other directly and conduct transactions without the help of any financial
intermediary.
An example is P2P lending such as Lending Club, which provides deposit and
loan services similar to commercial banks. Lending Club is a US company founded
in 2007. For qualified loan applications, Lending Club assigns internal credit ratings.
Different ratings are associated with different loan interest rates. The lower the
rating is, the higher the loan interest rate is. Lending Club refers to each loan as
a note and publishes information of the loan and the borrower on its website
for potential investors to select. For each note, the minimum amount an investor
can buy is US$25, which is small enough to ensure risk diversification. Lending
Club provides instruments for investors to construct loan portfolios and trade loans.
Lending Club is also responsible for loan administration, such as receiving principal
and interest payments from borrowers and transferring them to investors, handling
payment delay or default, and so on.
Another example is crowdfunding such as Kickstarter, which functions similar
to securities markets. Kickstarter is a US company founded in 2009. It helps creative
projects to raise funds through an innovative online platform. Return to investors is
in the form of project products, such as music CDs and movie posters. Investors can
also recommend projects to their friends on Facebook. In April 2012, the United
States passed the Jumpstart Our Business Startups Act (JOBS Act), allowing small
companies to raise equity through crowdfunding.
To better explain resource allocation under Internet finance, we compare P2P
lending represented by Lending Club with Rotating Savings and Credit Association
(ROSCA) in the following paragraphs.
ROSCA is an informal financial organization that exists almost worldwide.
Typically, an originator invites several friends or relatives to participate and meet
every month or quarter for mutual assistance. For example, in coastal regions of
18 The theory of Internet finance
southeast China, the number of participants is usually around 30. At every meeting,
participants lend a certain amount of money to one person on a rotational basis.
According to Zhang and Zou, ROSCA can be considered as a collection of P2P
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
lending between participants who receive funds early and participants who receive
funds later.20 Although many researchers find that ROSCA plays an import role in
promoting credit availability, crashes of ROSCA do occur. Zhang and Zou point
out that ROSCA mainly relies on networks of acquaintances and has a safety fron-
tier21. Once ROCSA expands beyond the circle of friends or relatives, it becomes
very difficult to control participants’ moral hazard, usually in the form of arbitrage
among different ROSCAs. ROSCA has multiple rounds and it is almost impossible
for participants to transfer their shares to others or withdraw early. When ROSCA
encounters any problem, participants’ utility maximizing behaviors usually lead to
“fallacy of composition.”
We can arrive at two conclusions. First, essentially both P2P lending and ROSCA
are direct lending between two individuals. In fact, according to SmartMoney
Magazine,22 the founder of Prosper, the first P2P lending company, was inspired
by ROSCA. Hence, P2P lending can be considered as an integration between
Internet-based technologies and informal financial organizations.
Second, in P2P lending, an investor may extend loans as small as a few dozen
dollars to hundreds of borrowers, which would be unimaginable in ROSCA. This
is made possible by two factors. First, in P2P lending, borrowers’ credit risk is evalu-
ated by independent third parties.This greatly alleviates the information asymmetry
problem and enables transactions between strangers. Second, investment and loan
administration are carried out by modern technologies, which reduce transaction
costs substantially.
By an extension of the above logic, we believe that, driven by Internet-based
technologies such as mobile payments, social networks, search engines and cloud
computing, direct financing among people (the oldest type of financial activi-
ties in human society) will reach beyond the traditional frontier of safety and
commercial viability. With little information asymmetry and low transaction
costs, Internet finance will generate a sufficiently large “transaction possibility
set” where bilateral or multilateral transactions can be carried out simultaneously,
quickly, and efficiently. Resource allocation under Internet finance will maximize
social welfare and promote social equality. Everyone will have transparent and fair
opportunities to invest or raise money. People who have never met will become
acquaintances through Internet finance, which will facilitate their cooperation in
other activities.
A key concept here is “transaction possibility set.” Below is an explanation of this
concept and how it is influenced by information asymmetry and transaction costs.
ment opportunities. Whether a deal can be reached with a certain capital demander
depends on complex conditions, which are not covered by “transaction possibility set.”
1 + μ i + μ i / li
1 + fi ≤ (2.13).
θi
Equation (2.13) gives the highest funding cost affordable to the capital demander.
The higher expected yield is (higher μi ), the higher project risk is (lower θi ) or the
lower leverage ratio is (lower li ), the higher funding cost the capital demander can
afford.
c ij + 1 + r j
1 + fi ≥ (2.14)
(1 − λ )θ
ij i
20 The theory of Internet finance
Equation (2.14) gives the minimum investment yield required by the capital
supplier. It needs to compensate for capital cost, transaction costs, credit risk of the
capital demander and information asymmetry.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
In Equation (2.15), only c ij and λij are determined by the relationship between
the capital demander and supplier. With other parameters constant, the lower
transaction costs are, or the lower the degree of information asymmetry becomes,
Equation (2.15) is more likely to be satisfied. So the “transaction possibility set” is:
We have introduced the concept of Internet finance and discussed its payment,
information processing and resource allocation.We believe that Internet finance can
promote economic growth and generate considerable social benefits by increasing
resource allocation efficiency, reducing transaction costs, and promoting availability
of financial services.
The theory of Internet finance 21
Currently, China has made the following progresses in Internet finance. First,
the central bank (People’s Bank of China) issues third-party payment licenses to
the top three mobile operators. Second, several P2P lending companies have been
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Notes
1 Mishkin, Frederic. 1995. “The Economics of Money, Banking, and Financial Markets,”
Harper Collins College Publishers.
2 For instance, physical bookstores such as Borders have gone bankrupt under competi-
tion from electronic books and online bookstores. MP3 and music sharing websites
have reshaped the business model of music industry. Amazon and Taobao have seriously
eroded the traditional retail industry.
3 Under Internet finance, prudential regulation on financial institutions (such as commer-
cial banks, securities firms, and insurance firms) may cease to exist and is to an extent
replaced by behavioral regulation and protection of financial consumers.
4 Goldman Sachs. 2012. “Mobile Monetization: Does the Shift in Traffic Pay?”
5 Xie, Ping, and Long Yin. 2001. “The Financial Theory and the Financial Governance
Under Internet Economy.” Journal of Economic Research, no. 4.
6 Mishkin, Frederic. 1995. “The Economics of Money, Banking, and Financial Markets,”
Harper Collins College Publishers.
7 Xie, Ping, and Chuanwei Zou. 2011. “The Irreplaceable Functions of CDS.” Review of
Financial Development, no. 1.
8 Conditions for people to establish relationships and access precious resources, that is the
concepts, “courtesy demands reciprocity” and “return a favor with a favor.”
9 People have the tendency to establish communication networks with others who have
similar traits, that is “birds of a feather flock together.”
10 How ideas, information, and views are exchanged among people in a communication
network, that is “if you live with a lame person, you will learn to limp.”
11 Monge, Peter R., and Noshir S. Contractor. 2003. “Theories of Communication
Networks,” Oxford University Press, Inc. If individual A has a relationship with indi-
vidual B and individual B has a relationship with individual C, then individual A has a
relationship with individual C, that is “a friend’s friend is a friend and an enemy’s enemy
is a friend.”
12 Shirky, Clay. 2008. “Here Comes Everybody: The Power of Organizing Without
Organizations,” Penguin Press.
13 Scott, John. 2000. “Social Network Analysis: A Handbook,” Sage Publications, Inc.
14 Technically speaking, processing of relational data has always been a major component
of search engines. For instance, the “crawler” algorithm for capturing web pages and link
analysis method for web page sequencing have all employed the linkage between web
pages that belong to relational data. Recently, Facebook has launched Graph Search.
15 For instance, real-time search involves a tremendous quantity of computation. Google is
a forerunner in the development of cloud computation.
22 The theory of Internet finance
16 Strictly speaking, due to the one-to-one correspondence between S and s, σ-algebras
induced by S and s are the same.
17 Petersen, Mitchell A. 2004. “Information: Hard and Soft,”Working Paper, Kellogg School
of Management.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
18 Under current model setting, people may deduce others’ private information from
equilibrium price and adjust their estimation of default probability and trade decision,
thus affecting market equilibrium.This scenario belongs to rational expected equilibrium.
19 Huang, Chi-fu, and Robert H. Litzenberger. 1988. “Foundations for Financial
Economics,” Elsevier Science Publishing Co., Inc.
20 Zhang, Xiang, and Chuanwei Zou. 2007.“The Mechanism of Systemic Bidding ROSCA
Default.” Journal of Financial Research, no. 11.
21 Zou, Chuanwei, and Xiang Zhang. 2011. “Arbitrage and Systemic Bidding ROSCA
Default.” Journal of Financial Research, no. 9.
22 “Global Lessons for Better Savings Habits,” SmartMoney, Nov 18 2011.
23 In other words, financing takes the form of loans. However, similar logic also applies to
other forms of financing such as preferred stocks, ordinary stocks, and convertible bonds.
3 The internetization of finance
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
1 Network banks
According toYin Long,1 network banking has two meanings.The first touches upon
the meaning of the term and identifies the nature of network banking. “Network”
has a meaning beyond Local Area Networks (LAN), the Internet, and other open
electronic networks. It also includes internal bank networks, money transfer net-
works, payment and clearing networks, and even telecommunication networks. If it
serves as a carrier for financial information, products, or services, it is seen as a new
channel for the banking industry and fits under the scope of network banking. The
second meaning touches upon the identification of the network banking business
and the function of banking. Network banks are recognized as possessing an inde-
pendent website used to provide certain customer services (here network means
Internet). Network banking is not only an evolution in banks’ business model; it is
the internetization of banking itself.
The evolution of network banking has experienced three stages: business process
digitization, business management digitization, and reengineering of the bank
(see Table 3.1)
In the first stage, banks mainly use information and communication technologies
to assist and support business development, such as data storage and centralized
processing for transactions. In this stage, banks basically automated office processes,
but at that time information communication technology was not mature.The bank
information systems were dispersed and closed.
24 The internetization of finance
Table 3.1 Information technology and commercial bank innovation2
In the second stage, the rapid development of information technology and the
reduction of cost provided favorable conditions for the extensive application of
information technology networks in banks. Banks widely use networked real-time
trading, developed internal networks, and rolled out both point of sale (POS) and
ATM machines.
The third stage is marked by the birth of the first network bank, Security
First Network Bank, in October 1995. With this, a new service channel emerged.
Network banking, telephone banking, mobile banking, and television banking
helped customers get more convenient service. The innovation of this phase has
The internetization of finance 25
revolutionized the banking business system, breaking the sub-sectoral restrictions
of banking, insurance, and securities, thereby continuously integrating the financial
sector. Business development in turn increased the demand for information and
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2 Mobile banks
Mobile banking refers to the use of mobile phones, PDAs and other mobile devices
to connect customers and financial institutions. The first mobile bank was built in
the Czech Republic in the late 1990s by the Expandia Bank and mobile operator
Radiomobile. Since then mobile banking has appeared in a variety of modes and
a lot of cases. In December 2013, Zhou Xiaochuan, the governor of the PBoC
said, “We should learn from international experience through mobile banking to
provide basic financial services to rural areas, remote areas and poor areas” in an
interview with the Financial Times.
systems are underdeveloped and find it difficult to meet basic needs for financial
services, especially lacking physical outlets, which leads to a huge space for develop-
ment of these emerging mobile banking models (see Table 3.3, analysis focused on
the following cases).
meet customer demand rather than make customers adapt to providers. However,
if the provider is an absolute monopoly, there is no incentive to build and promote
the Coca-Cola model.
Most people now believe security is the main obstacle to the promotion of
mobile banking. For example, security concerns make mobile banking unpopular
in developed countries, while people in underdeveloped countries may not be
cognizant of the security problems of mobile banking. In fact, the poor are more
concerned about safety, because deposits are essential to them. In the future, the
financial model will change. There will be more branchless services and the supply
and demand sides of funds through mobile phones and other mobile terminals can
be directly matched. At that time, product pricing, risk management, and informa-
tion processing can be completed in everyone’s hand. There will be no need for
bank intermediaries. At that time, mobile banking will replace physical financial
institutions and gain popularity in both underdeveloped and developed regions.
10 49 3 N/A N/A
50 100 5 N/A 10
101 500 25 60 25
501 1, 000 30 60 25
1, 001 1, 500 30 60 25
1, 501 2, 500 30 60 25
2, 501 3, 500 30 80 45
3, 501 5, 000 30 95 60
200 2, 500 30
2, 501 5, 000 60
16 million strong low-income group in South Africa (48% of the adult population).
In addition to financial services such as transfer, payment, prepaid recharge, wage
payment, and account query by phone, Wizzit also offers a Maestro debit card.
Users can use the card for withdrawals at ATMs and deposits at bank branches.
It uses more than 2,000 WIZZ Kids8 to advertise and serve as agents (including
registration for the service) rather than placing advertising in conventional media.
Wizzit has no minimum balance requirement or fixed costs, which makes it
attractive to groups not normally covered by financial services. Its greatest advantage
is its low transaction costs, which are sustained through high volumes. Despite
being founded partially by a telecom company,Wizzit is compatible with all mobile
operators. Like similar services, it monitors user accounts and suspends transactions
that cross certain thresholds for transaction amount or total account volume.
2.5.1 Developments
Some banks in China have launched mobile banking, including big state-owned
banks such as Bank of China (BOC), Agricultural Bank of China (ABC), Industrial
and Commercial Bank of China (ICBC), Construction Bank of China (CBC), and
Bank of Communications (BCM); nationwide joint-stock banks; city commercial
banks and rural commercial banks; rural cooperative banks; new-type rural financial
institutions; and rural credit cooperatives. Mobile banking through regional banks
is basically network banking on the phone. Mobile banking is relevant to rural
finance when it includes cardless cash withdrawal, small loans to farmers, on-site
remittance, and mobile finance.
BCMs first launched mobile banking with cardless cash withdrawal, then
China Guangfa Bank (GDB), Shenzhen Development Bank (SDB) and ICBC
launched similar services. Cardholders prearrange the withdrawal on the platform
and then can withdraw funds without their card. This can protect the client from
card theft, allow emergency withdrawals, and permit others to remotely complete
the withdrawal for them (if they keep the money, this becomes a quasi-transfer).
The ATM requirement has led to this service expanding more in cities than the
countryside.
Small loans to farmers was first launched by ABC’s Guangxi and Henan branches
as pilot programs. They provide six basic functions including self-help borrowing,
self-help payment, reimbursement trial, loan contracts, information queries, and
reimbursement queries.This service is a win-win; farmers can obtain loans without
leaving home, ABC expands the rural market with lower transaction costs, and the
government promotes financial inclusion.
The internetization of finance 31
Postal Savings Bank of China (PSBC) was the first to launch site-based remit-
tance services.This service allows farmers to remit funds by delivering the notice of
withdrawal with a listed beneficiary.The farmers with no bank card in remote areas
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
securities services through AOL, and then established its own online trading site
www.etrade.com in 1996. At present, E-Trade is the world’s largest personal online
investment services site, with customers in over 100 countries. Its most salient
advantage is low transaction costs. E-Trade has strong technical capabilities and a
convenient online trading channel, all without physical locations. Thus, they are
able to offer trades with a commission average of only about US$10. The disadvan-
tage of E-trade lies in its lack of experienced investment advisers.
Charles Schwab has become one of America’s personal financial services market
leaders. In the mid-1990s, Charles Schwab made a major breakthrough when it
launched an online financial services platform. Charles Schwab offers investors a
relatively inexpensive service mainly through telephone, fax, and Internet trading.
Unlike E-trade, Schwab is not a pure Internet securities company because it has a
few physical locations for customer service. The Schwab mode has low cost, but its
research and development ability is weak.
Merrill Lynch was one of the world’s leading financial management and con-
sulting companies. Unlike Schwab, Merrill Lynch focused on high-end customers,
providing customers with face-to-face, comprehensive asset investment advisory
services. Merrill lynch had strong investment research and portfolio consulting, but
it had a limited potential customer base due to the cost of providing personalized
service. Its use of the Internet was not nearly as deep as the other two modes.
2 Chinese models
Internet securities companies in China mainly provide information and financial
services. We divide them into three forms: brokerage website mode, independent
third-party site, and brokerage and bank cooperation.
The brokerage website mode is common for the securities companies, such
as GF Securities Guotai Junan, CITIC Securities, and Haitong Securities. These
trading and service sites are part of the company’s inner service centers. Their
services are not limited to the traditional brokerage business. Customers can also
buy information products and funds on the platform. The advantage of this model
is that the securities company can directly provide traditional market services
for online clients through the website, and brokerage service advantages can be
fully displayed. The problem for small and medium-sized brokerages is that special
website construction requires significant funds.
In independent third-party site mode, the Internet services company, consulting
firm, and software system developers build websites to provide consultancy services
for customers, and brokerages are in the background providing online securities
trading services to customers. This model is an open platform. If the client needs
securities trading, he/she can just open “add broker” on the software. Flash and Great
Wisdo are some of the leaders in this area for the Chinese market. Some websites
34 The internetization of finance
only provide consulting services, such as Oriental Wealth. The advantage of this
mode is that technology and information advantages can be fully reflected. The
disadvantage is that the content of the securities service and professional level trust
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
1 Development
In the insurance industry, information and communication technology originally
was used for electronic insurance products. Marketing is also increasingly electronic.
With the development of IT, e-commerce platforms gradually developed, through
which customers can self-service, obtain quotes, and buy products.
The first insurance company to promote its insurance products entirely through
the Internet was founded in 1999 in Japan as a joint venture between AFLAC and
Japan Telecom. It focuses on customers under the age of 40. INSWEB (US) is the
world’s largest and most respected insurance e-commerce site. Forbes once called
it the best site on the Internet. The site covers insurance of just about everything,
including cars, housing, medical treatment, personal life, and pets.
China’s online insurance is still at a rudimentary stage. Most insurance companies
just set up their own web portal with little comparative information. In June 2012,
“Rest Assured Insurance” put B2B and B2C trading online. It is also a third-party
insurance sales platform. In 2013, Alibaba, China’s Ping An Insurance, and Tencent
jointly established an online property insurance company that will disrupt the exist-
ing Chinese insurance marketing model.
The internetization of finance 35
2 Major types
The online insurance businesses can provide insurance services online, use spe-
cialized companies, or collaborate together online.16 The first type operates sales
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
through the company’s website. This helps promote the company and its products
through new channels. The insurance company can then manage customer data to
provide other value-added services, such as providing free SMS and personalized
e-mail subscriptions. The disadvantage of this scheme for its consumers is a lack
of comparability. It only shows one company’s products and has high technical
requirements. The eCoverage (US) was the first company to provide customers
with service from quotation to claims service on the Internet.
Another model uses a network platform to put all related insurance company
products information online. Users search for and choose insurance products,
then are linked to a fitting insurance company. These platforms can charge com-
paratively lower commission and fees. In this mode, users can quickly find what
they need by comparing different insurance companies. Huize.com was the first
third-party insurance electronic commerce platform in China to provide product
comparisons, vertical transactions, purchases, and professional insurance consult-
ing interaction in one place. It combined with several large insurance companies
to provide real-time online insurance. INSWEB is a typical example in foreign
countries; it inked agreements with more than 50 insurance companies all over the
world and cooperates with more than 180 websites. There are three main profit
points for this platform mode. The first is the intermediary fee paid by consum-
ers, the second is a “finder’s fee” paid by the agent, and the third is advertising and
other fees.
In the Taobao network insurance mode, the insurance site does not list insur-
ance products or information. It just provides a platform for insurance suppliers and
demanders to match themselves. The core of this website is to provide help both
sides make an independent choice and provide some “soft” information for the
insurance market. Many insurance companies are now on Taobao, such as China’s
Ping An Insurance and China Life Insurance, who now do online sales of insurance,
car insurance, health insurance, and other products.
A network insurance support platform does not directly provide insurance prod-
ucts. It provides information and technical support for insurers, and is generally
founded by a non-insurance agency. These generally have a very deep industry
background with strong information superiority and social credibility. Firms such
as China Insurance Network provide theory and policy, member communication,
real-time news, data, information, training information, and information related to
insurance companies, insurance agents and brokers, and other information for insur-
ance practitioners and consumers. Network insurance technical support provides
information technology specifically for insurance companies. Typical representa-
tives such as the Yi-Bao network only provide technical guarantees and services for
insurance companies.
36 The internetization of finance
SECTION 4: NETWORK FINANCIAL TRADING PLATFORMS
1 SecondMarket
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
SecondMarket was established in 2004 to provide online trading services for prod-
ucts such as equity of non-listed companies, fixed income securities, bankruptcy
claims, warrants, and alternative assets.
1.2 Policies
1 The willingness of companies to trade their equity is a precondition for trans-
actions. Non-public companies vary widely. Some companies value the control
and operating flexibility, while others may pay more attention to liquidity and
enterprise value. Therefore, SecondMarket only provides the trading services
for non-public companies after obtaining their consent. It also allows the com-
pany to set restrictions, including trade restrictions and investor qualifications.
Some companies only allow former employees to trade, while others only
allow existing shareholders to purchase. A majority of companies are opposed
to excessively frequent trading.
2 Disclosure of certain information is required to participate in SecondMarket.
It requires non-public companies to disclose financial information to its
registered members on the online trading platform, including the audited
The internetization of finance 37
annual reports of last two years and other risk factors. SecondMarket strictly
controls the database to prevent leaks.
3 Individual investors must have net assets of more than US$1 million or
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2 SharesPost
SharesPost was founded in 2009. It focuses on the market of trading non-listed
companies’ equity. SharesPost also provides services such as financing through
private equity, index preparation, and third-party research reports.
2.1 Background
In 2009, Greg Brogger and Scott Painter founded the SharesPost website to establish
an exchange market for equity of non-listed companies. Brogger worked as a
securities lawyer after earning a JD and MBA from the University of Pennsylvania.
The other founder started his own business in 1993. In 1998, they started a company
together, zag.com, that provided an online platform for purchasing cars. It disrupted
the traditional sales model of cars and quickly swept the nation. Subsequently, they
found that private equity transactions were still realized through telephone, which
followed the traditional brokerage model pervasive in the 1930s.They believed that
its disruption would be a tremendous opportunity, so they founded SharesPost.
SharesPost has already attracted 83,000 investors. There are more than 150
stocks traded on the platform, with a total value of up to US$1 billion. The most
frequently traded stocks include hot stocks such as Facebook and Yelp. Even a single
quarter (Q4 2011) has seen a trading volume up to US$180 million in Sharespost’s
secondary market. It shows both momentum and a large potential for growth.
38 The internetization of finance
2.2 Main policies
1 Threshold for investment: Although SharesPost is an open market, in order to
conform with securities regulations, SharesPost sets the criteria for qualified
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
investors along the lines of those for private placement: individual investors
must have net assets of more than US$1 million or have annual income of
more than US$200,000. Institutional investors must possess net assets of at least
US$100 million.
2 Private equity transfer: SharesPost is similar to a BBS or forum. Buyers and
sellers on SharesPost register as members and trade equities through the web-
site platform. The two parties agree on a time to discuss the transaction, and
then process the negotiation. Finally, the deal reached between the parties is
submitted to the registered broker of SharesPost for an audit. In contrast with
SecondMarket, equity transfers do not need the approval or authorization of
the company.
3 Private placement financing: In addition to private equity transfers, SharesPost
has a private placement market. Start-ups and their agent investment banks can
post offers on SharesPost’s bulletin board.The buyers and sells can then contact
each other directly.
4 Creation of indices: SharesPost created the first private equity index in US
history—the SharesPost Index. The Index consists of thirty representative
companies traded on SharePost’s platform. It is reported in real time during
trading hours.
5 Providing third-party research reports: To find the intrinsic value of the stocks,
SharesPost offers up to 450 reports provided by nine third-party research
institutions. The reports cover many well-known venture enterprises such as
Twitter,Yelp, Facebook, Zynga, and so on.
6 Providing transaction information: Currently, through the Bloomberg termi-
nal, it is possible to browse real-time quote and transaction information on
SharesPost. Historical transaction data is also available.
7 Cost mode: SharesPost charges US$34 to each party in completed transactions,
not distinguishing between private or institutional investors.
Essentially, Internet sales of financial products match the suppliers and demanders of
financial products through Internet channels. The demanders of financial products
play a dominating role in the matching process. They search for financial products
and conduct asset allocation. Financial product providers aim at maximizing the
probability and amount of their financial products that are selected into demanders’
“allocation bracket” (a concept of collection of trading possibility). To achieve this
The internetization of finance 39
goal, they focus on demanders’ preference, disclose the risk-return characteristics of
their products, and conduct certain promotional activities. Some financial products
of low-volatility and high mobility are often linked to payment. It not only meets
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
demanders’ needs of investment needs, but also their needs for payment.
Next, we introduce the main model of Internet sales of financial products, then
analyze Yu’E Bao.Yu’E Bao significantly and unexpectedly changed the structure of
China’s fund industry when it started in 2013. Finally, we discuss the principles of
economics supporting financial products as payment instruments.
Notes
1 Yin, Long. 2012. “Internet Banking and Monetary Electronics - Network Theory of
Finance,” Southwestern University of Finance and Economics doctoral thesis.
2 Jiang, Jianqing. 2000. “Financial Development of High Technology and In-depth Impact
Study,” China Financial Publishing House.
3 Porteous, David. 2006. “The Enabling Environment for Mobile Banking in
Africa,”working paper.
4 Safaricom. 2013. www.safaricom.co.ke/.
5 Vodafone is a multinational mobile operator. Headquartered in Newbury, UK and
Dusseldorf, Germany, is one of the world's largest mobile communications operators, its
network covering 26 countries directly and providing network services together with
partners in another 31 countries.
6 At year-end December 2013, one Yuan equaled about 14 Shillings.
7 Wizzit. 2013. www.wizzit.co.za/.
8 WizzKids are generally young people who sign up as agents.
9 Globe. 2013. http://gcash.globe.com.ph/.
10 Retail stores, banks, Globe Telecom locations, and myriad other locations serve as agents.
11 At year-end 2013, 1 RMB = 6.6 pesos.
12 CGAP (Consultative Group to Assist the Poor). 2006. “Use of Agents in Branchless
Banking for the Poor: Rewards, Risks, and Regulation.”
13 Rural Social and Economic Investigation Department of National Bureau of Statistics
of China. 2010. “China’s Rural Household Survey Yearbook 2010,” China Statistical
Publishing House.
14 Zhang, Jin, and Yao Zhiguo. 2002. “The Network Finance,” Peking University Publishing
House.
15 Zhang, Jinsong. 2007. “The Theory and Practice of Network Finance,” Zhejiang Science
and Technology Publishing House.
16 Zhang, Jinsong. 2010. “The Network Financial,” Mechanical Industry Publishing House.
4 Mobile and third-party payments
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Paul Volcker, the former chairman of the Federal Reserve, once said that: “The only
useful thing banks have invented in 20 years is the ATM machine.” However, we
believe that the most significant innovation in the financial industry over the past
20 years arose in the field of payments.
1 Mobile payments
Mobile payments involve the transaction of monetary value with mobile
communication equipment and wireless communication technology, thus clearing
and settling the positions of creditors and debtors.1 These are made possible by
the spread of mobile terminals and the development of mobile Internet. With
the popularization of mobile terminals, it is possible that mobile payments will
be widely accepted in the transaction of products and services as well as in the
liquidation of debt. It will then be able to replace currency and credit cards, thus
becoming a key form of electronic currency. The basic traits of mobile payments
are as follows:
In China, Mobile payments have been developing rapidly. According to data from
iResearch, mobile payments reached Renminbi (RMB) 296.51 billion in transac-
tions by the third quarter of 2013, an explosive growth of 185.3%. The number of
smart phones in China reached 580 million in 2013, a year-over-year (YoY) increase
Mobile and third-party payments 41
of 60.3%, while mobile shopping made up 38.9% of the mobile Internet market.
2013 also witnessed the growth of mobile games, the market for which amounted
to RMB 11.24 billion, a YoY increase of 246.9%. The development of mobile
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Internet markets has also driven the development of mobile payments, which itself
is adding diverse formats such as SMS payments, near field communication (NFC)
payments, QR code payments, mobile banking payments, and even payments with
facial recognition, and so on.
2 Third-party payments
Third-party payments refer to helping clients quickly realize the function of
currency payments and fund settlements by making connection between clients,
third-party payment companies, and banks over the Internet, thus playing the role
of credit guarantor and technical support as well. According to data from iResearch,
the scale of market transactions of online third-party payments in China added
up to RMB 1.4 trillion in the third quarter of 2013, a link-relative growth rate of
26.7%. Alipay makes up 48.8% of this market, while Tenpay takes the second place
with 18.7%. At the same time, Easylink, quick money, remittance world, EPRO pay,
and IPS are also developing quickly (Figure 4.1).
YeePay
Others 2%
China Pay 3% IPS 3%
4%
Remittance
world 6% Alipay 49%
99Bill
7%
Easylink
7%
Tenpay 19%
YeeBao Others
1% 3%
Lakala Payment
21%
99Bill
1%
UniPay
4%
AliPay
QianDaiBao 58%
5%
Tenpay
Union Mobile
6%
Pay 1%
C‚P
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
p(n,n4e)
p(n,n3e)
p(n,n)
p(n,n2e) E2
E1
p(n,n1e)
payments become quite low, so the actual price that consumers pay becomes lower.
That is before reaching n0, the price of mobile payments moves the same way with
the number of users, while after n0, the two move inversely. When n is big enough,
lim n → 1 p(n, n ) = 0.
The key to understand the network scale effects is the consumers’ expectation
of the users of mobile payments.When people expect that the number of base users
is large, that is there will be a bright future for mobile payments, people are willing
to get involved. They are also willing to pay a higher price now because the price
will be low when the number of mobile payment users is large enough. Sometimes
the costs can approach zero.To make people expect that the number of mobile pay-
ment users will be high in the future, service providers and the government need
to cooperate. For instance, the government should lead the development of basic
infrastructure for mobile payments and set related rules and laws. This will send
a positive signal that leads to an improved outlook for mobile payments. On the
other hand, suppliers can provide consumers with subsidies and a more convenient
experience to make the consumers truly feel the advantages of mobile payments.
In conclusion, with the importance of network scale effects for mobile payments
and electronic currency, the range of application of electronic currency issued by
private enterprises will become wide spread. It can be used to purchase both virtual
commodities online and physical products in real life. Therefore, the importance
48 Mobile and third-party payments
of network scale effects for mobile payments and electronic currency means that
electronic currency will either replace the sovereign currency issued by the central
bank or coexist with it, which will have a significant impact on the monetary policy.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
collect interest. Only when there is a purchase will withdrawals be made through
a simple operation on computers or mobile phones for the exact amount to com-
plete the purchase. The emergence of mobile and third-party payments will reduce
the demand for currency as well as accelerate the velocity of circulation.
The emergence of mobile and third-party payments obscures the bound-
ary of currency arrangements. Using mobile terminals to send instructions, one
can quickly transform non-liquid currency into liquid currency. It is now hard
to distinguish whether a currency is a demand deposit, a saving deposit, or cash.
Furthermore, some nonbanking institutions have begun issuing electronic cur-
rency. For example, mobile carriers can issue electronic currency through virtual
accounts. Many of these electronic currencies were not considered currency before,
which greatly increased the difficulty of regulation.
Mobile and third-party payments are accompanied by private issuance of
electronic currency. Some nonbanking institutions are able to issue electronic cur-
rency autonomously. Most of them are mobile carriers and Internet companies.
Since there is not enough regulation, the reserve ratio of electronic currency is
a company’s own decision. Of course, companies will put some money aside as
reserves because their reputations are at stake. However, this is only a soft con-
straint. As long as electronic currency issuance remains unregulated, companies
may minimize their reserve in order to maximize profit. This could be a shock to
the currency supply.
At the current stage, the private supply of electronic currency will not end the
fundamental system of central bank currency issuance. However, changes in the
format of currency demand, the unclear boundary of currency arrangements, and
the diversification of currency issuers will certainly pose a threat to central banks.
1 A brief history
Since its start in 2013, Wechat Payment has rapidly spread across China. Businesses
that are currently supporting Wechat Payment include QQ top-up,Tencent voucher
center, Guangdong Unicom, WeLOMO, McDonald, Wechat Group Purchase, and
others. Banks’ personal financial services are also cooperating with Wechat, and
Tenpay has already started its cooperation with several banks, experimenting with
less risky fixed-rate products. Wechat Payment has also extended itself to payment
for everyday expenses. One example is the “Shenzhen Power Supply” service
provided by Shenzhen Power Supply Bureau, which provides services such as
online payment of electricity bills, electricity price checks, and balance inquiries.
Paying for everyday expenses may not be as profitable as credit cards and electronic
payments, but may increase client stickiness.
50 Mobile and third-party payments
In order to make payments more convenient, Wechat is gradually partnering
with some companies to push voice payments. Clients can simply say the products
they desire on their mobile phones, and then both purchase and payments are
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2 Operating principles
The name “Wechat Payment” implies two things: It is a mobile payment application
where transactions are made through the Tenpay third-party payment platform. It
is also a payment method in which payments are made through mobile banking
by accessing banks’ Wechat public accounts. The Wechat Payment that we generally
refer to is the former. It integrates social network platforms, third-party payment
companies, as well as mobile banking, thus maximizing the client experience.
The bank must have a Wechat public account to handle payments. Banks can
interact with clients on Wechat, and then direct their clients to their mobile banks
to complete the payment. Of course, the clients must have a mobile bank account.
The core characteristic of Wechat Payment is its integration of a social networking
platform, third-party payments, and mobile banking. It combines their strengths to
provide a new service to clients (Figure 4.4).
Third-party payments
(Tenpay)
Mobile
Transaction
Users social
completed
network
In order to achieve real-time redemption, there are two other methods. Both of
them, nevertheless, are on the edge of being illegal. One of them is to have Alipay
cover the cost, which Tian Hong later reimburses. The second method is for Tian
Hong to keep a reserve in Alipay’s payment account. When redemptions occur, the
reserve can be used to transfer money to the users (Figure 4.5).
Although Yu’E Bao has bypassed banking sales, it still cannot exist without banks.
Third-party payment companies needs banks to verify client information, transfer
funds and liquidate positions when necessary.
3 Risks
On top of IT risks,Yu’E Bao also has legal and market risks. Legally,Yu’E Bao lacks
risk disclosure to its users. “A Guide on Securities Investment Sales Applications”
states that institutions selling securities should investigate and evaluate the investor
risk tolerance at or before their first purchase. For investors who have already bought
securities, they should also investigate and evaluate the investor’s historical risk
tolerance. On Yu’E Bao redemptions, if Alipay covers the payments, it may violate
clause 23 of “Regulation on Excess Reserve for Payment Institutions” by complet-
ing payments requested by clients ahead of time. Tian Hong may also violate the
“Interim Measures for the Administration of Securities Investment Funds” with its
subscription and redemption activities.
There may also be market risks, since Yu’E Bao is not exactly savings. Users may
face interest rate declines or even losses due to mistakes in management. The initial
high return rate was possible due to a shortage of funds in the market, which is
likely to continue.Yu’E Bao may also be investing in non-monetary products with
high risk. If the economy slows down,Yu’E Bao could decide to take more risks in
pursuit of higher returns.
AliPay
be an instrument of payment when needed. This has blurred the line between
investment and payment, as well as financial products and currencies. With interest
rate marketization, these products are likely to grow in the next years. If their total
market cap reaches RMB 1 trillion, they could exert tremendous influence to the
financial system.
To be an instrument of payment, a financial product must have low volatility
and high liquidity. These two characteristics are closely correlated, but there is no
causality between them. Other than the composition of financial products, these
characteristics are also results of the market environment.
Statistically, low volatility requires a product to be stable in price over time,
which makes the product maintain its value. This is similar to the store of value
characteristic of currencies. Two approaches can be used to achieve low volatility.
Either the product is a diverse portfolio of securities, or the product has low risk
due to high quality issuers or counterparties, advantages in capital structure, short
maturities, or good contract terms.
Liquidity refers to a financial product’s ability to convert quickly to cash. On
some occasions, it may also refer to the product’s collateral quality—the higher the
quality, the lower the haircut.9 Market liquidity is plotted by the bid-ask spread in
the secondary market. If the spread is low, the liquidity is invariably high. In most
occasions, when the risk of securities is low, the secondary market is often well
equipped with high liquidity.
Most money market funds invest in treasury bonds, commercial paper, and
short-term financing bonds. They are generally low in volatility and highly liquid,
which makes them ideal for payments. In fact, M2 statistics include money market
funds and savings accounts with the ability to issue checks.
Nevertheless, money market funds are not risk free, and they are not protected
by deposit insurance as some savings accounts are. They are not always low in vola-
tility and highly liquid. In fact, money market funds experienced a major crisis in
September of 2008.Therefore, we can conclude that there are indeed risks to finan-
cial products combining third-party payment and funds. As a result, implementation
of appropriate regulations will be very important.
5 Main models
5.1 Self-built platforms to sell financial products
With the rise of Internet-based finance, major commercial banks have gradually
established their own e-commerce platforms. They provide both payment and
other one-stop financial services. For example, the “ShanRong” service of China
Construction bank is both a B2B and B2C platform. It is an in-depth incorporation
54 Mobile and third-party payments
of e-commerce and financial services. Self-built platforms aim to develop custom-
ers. However, because of the closed nature of the platform, less-diversified product
portfolio, and non-existence of a price advantage, customers are not very active on
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2 The services are actually provided by the subsidiaries of the telecom operators, including
Wing e-commerce(China Telecom), Unicom WO easypay(China Unicom), e-commerce
of CMCC(CMCC).
3 RFID-UIM card is a kind of mobile phone card with the function of radio frequency
identification.
4 Wan, Jianhua. 2003. “E-era of finance,” China Citic Press.
5 Jin, Chao, and Yanhua Leng. 2004, “Electronized Currency, Electronic Currency and
Money Supply”, Shanghai Finance.
6 Economides, Nicholas, and Charles Himmelberg. 1994? “Critical Mass and Network
Evolution in Telecommunications?” Working paper.
7 The p here can be understood as the transaction costs of mobile payments.
8 This diagram is built on “A Construction Bank’s Interpretation of Risks: How Will
Yu’E Bao Impact Banks”, especially its content involving Yu’E Bao’s structure.
9 Haircuts refer to reductions in the amount one can borrow based on collateral of a
certain present value.
5 Internet currency
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
This chapter examines the form of money in the Internet world. The core of our
idea is that many quality online communities with payment functions will issue
their own “Internet currencies.” Internet currency will be widely used for economic
activity on the Internet, and society will revert to the state where currency issued by
the central bank and that issued privately coexist. It will create new challenges to the
foundations of current monetary, currency, and central banking theory.
2 Either not regulated at all or very lightly regulated, especially by central banks
3 Exists in digital form
4 Issuing online community has an internal payments system
5 Accepted and used by the members of the online community
6 Can be used to purchase the online community’s virtual goods or real goods
7 Serves as a unit of exchange for online products
Number five indicates that the virtual currency can be used as a unit of exchange.
A few online communities have user numbers that surpass the population of
many countries. For example, Facebook’s monthly active users (MAU) come
from many countries and have now surpassed 1 billion. The sixth indicates the
unit of exchange function, and the seventh means it can function as a price
discovery mechanism. If we consider the purchasing power of Internet cur-
rency and the relative prices of goods purchased, it also has the “store of value”
function. Internet currencies thus fulfill all of the standard requirements to be
considered a currency (unit of exchange, store of value, and price discovery).
Internet currencies also defy borders. They are both international and exceed-
ingly powerful.
Up to now, most Internet currencies are essentially fiat money with a central-
ized issuer. The value depends on the trust people have in the issuer. Bitcoin is thus
an exception. There is no central issuer, and its characteristics more approach that
of money backed by precious metals. Later sections will go into further detail on
this point.
The distinction between digital and physical goods is becoming increasingly unclear.
Digital goods such as software, e-books, music, films, and news are all digitized
58 Internet currency
information.This means that consumer utility does not vary with their form. More
and more people recognize the value in these products. In the future, many prod-
ucts that do not require physical delivery will be produced, traded, and consumed
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
online (see Chapter 11).This type of goods will continually increase as a percentage
of total goods. For example, Tencent makes Renminbi (RMB) 22.8 billion from
online games, 51% of its total income. It is not necessary to use legal currency for
this type of activity.
It is also important to note that the relationship between the Internet economy
and the real economy is getting ever closer. Imagine the following scenario:
someone creates a software product online and sells it in exchange for Internet
currency. He then uses this currency to buy food at McDonalds, which in turn uses
this currency to buy digital products. The real and Internet economies combine
perfectly. Legal money is excluded and unnecessary.
Private organizations were the primary issuers at the beginning of stage three. Legal
currency only emerged when law specified the central bank’s currency as that
used in payment, settlement, and clearing, excluding others.The central bank, com-
mercial banks, savers, and lenders all participate in money creation. Base money
includes money in circulation and the reserves commercial banks store at the cen-
tral bank. Commercial bank credit and bond investments cause deposits to expand
to many times over. We separate money into three levels: M1, M2, or M3 based on
liquidity (from highest to lowest). Legal currency replaced private currency due to
the central bank’s creditworthiness and deep involvement in payment, clearing, and
settlement systems.
Internet currency 59
However, we have not yet reached the end of money’s evolution. Hayek and
Friedman already expressed doubts about this system all the way back in the
1950s. Hayek argued that government currency issuance since the eighteenth
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Bitcoin is the first ever electronic currency based on P2P technology. It is both issued
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
and traded online. It was announced by Satoshi Nakamoto in 2008 and officially
entered circulation on January 3, 2009.2 By the end of December 2013, 12 million
Bitcoins had been issued.3 Assuming a value of $900 per Bitcoin,4 the total value
amounted to $10 billion, higher than the GDP of more than 60 countries.5
Cryptography and universal Internet serve together as Bitcoin’s foundation.
Its uniqueness comes principally due to its ability to process payments and issue
currency without either the central bank or third-party payments, and its modern
verification system allows for relatively high anonymity. Its initial supporters were
tech fanatics, anarchists, and criminals, who viewed it as an embodiment of the spirit
of democracy. It challenges the banking system and those in power by breaking the
state’s monopoly on issuing currency. It protects its holders from expropriation
through inflation. As it increased convertibility with physical currencies, it gained
the attention of the media, governments, scholars, and others. It also sparked
significant controversy. Competitors such as Litecoin, Peercoin, and Primecoin have
already emerged.6 These competitors retain Bitcoin’s main idea, but they differenti-
ate themselves through special characteristics.
1 Working mechanism
In early 1998, Dai Wei explained the thinking behind Internet currency in a cryp-
tography-focused e-mail newsletter. It would be “provided to and by untraceable
entities” and “the government is … unnecessary.”7 Bitcoin is the development and
extension of this thinking. The most important innovation is the decentralized
model it uses for its payment system (Figure 5.1)
Node
Person
Person
Node
Person
Person
Node
through competition and finishes when this information is broadcast and finally
confirmed by the entire network.
Bitcoin’s new model requires it to deal with two important questions: how
to protect the anonymity of those transacting and how to ensure that the same
money is not used in two transactions. Bitcoin has dealt very creatively with these
problems. It uses public-key encryption to protect anonymity. There is a public key
that corresponds roughly to one’s address or account number at a bank, and there
is a private key held only by the Bitcoin holder. The public key acts as the address
for reception of Bitcoins, and the private key provides access to the account, its
Bitcoins, and payments. Thus the public key functions like an e-mail address, the
private its password.
Figure 5.2 shows how both keys are used for Bitcoin transactions. Assume that
in N transactions, person A wants to make a transfer to B, and in N + 1 transactions
B wants to further transfer the coins it received from A to a new person D. This
transaction requires four steps.
Person “A” first generates the information from the past N transactions, including
the connection from the last transaction, information from the current transaction
(including the amount to be transferred), and the public-key corresponding to
person “B”. “A” then uses his/her private key for the electronic verification process
Person B
Node E
N+1 The connection from 4
the last transaction Node F
3
Information from the
current transaction
The public-key
Person D corresponding to person D
will be sent over the entire network and saved. In the third step, B undertakes the
same steps for transaction N + 1 as A did in transaction N. In the fourth, the net-
work then undergoes the same confirmation process as in the second step.
This is the complete process for Bitcoin transactions. It must prevent that the
same coins are used multiple times. In a traditional economy, the central bank per-
forms this function. It uses a centralized account system for the requisite checks,
while Bitcoin uses decentralization and real-time technology. Each computer in the
network verifies new transactions by referring to the entire “transaction chain” of
those previously completed. Only transactions checked and confirmed against this
chain become official. In fact, each new transaction is responsible for addition to
the end of the transaction chain, and there is only one valid transaction chain.Thus,
although it is on every computer (decentralized), it is in actuality a system based on
one central confirmation (Figure 5.3).
Bitcoin requires complex calculation for a node to add a transaction to the chain
due to failed transactions, fraud, and other risks. The calculation requires expendi-
ture of a great deal of computing power, which serves as proof of work performed.
The incentive to perform this work comes in the form of “Bitcoin mining”, the
way in which new Bitcoins are created and the payment platform continues to
function.
Bitcoin’s reliance on the Internet allows it to easily cross borders. Its unlimited
nodes allow it to easily withstand attacks on any individual or group of nodes.
Users are completely anonymous and can possess any number of accounts. Bitcoin
is also cheap for users, as the transfer fees and exchange charges are extremely low.
Node
Person
Bitcoin
transaction Person
(see Figure 5.2)
Node
Bitcoin
transaction
(see Figure 5.2)
Person
data are available on the Internet. Finally, it is divisible up to eight decimal places,
or 0.00000001 Bitcoin.
Bitcoin is, however, not perfect. Some believe the massive expenditure of com-
puting power to create new transactions is a waste. Microsoft’s Moshe Babaioff and
collaborators published research point out a potential “red balloon effect” in Bitcoin
mining in which the decentralized network do not contribute to the transmis-
sion of transaction information.8 For example, some Bitcoin miners could change
their distribution codes so that other nodes are unable to receive new transaction
information.
2 Issuance mechanism
The payment terminals that successfully confirm transactions receive newly minted
Bitcoins.The system therefore does not need a central bank. At the beginning, each
completed transaction link creates 50 Bitcoins, but this number will decline by 50%
every four years until the total Bitcoins in circulation maxes out (expected in 2040
at 210 million total Bitcoins, see Figure 5.4). This create scarcity, which in turn
could very well lead to a deflationary tendency that manifests itself in declining
goods prices in terms of Bitcoins.This increase in Bitcoin value could cause hoard-
ing that reduces liquidity and further increases deflationary pressure.This deflation-
ary tendency becomes a barrier to financial products based on Bitcoin prices due to
the continually increasing real debt repayment burden. All currencies, even Bitcoin,
need price stability. Although Bitcoin has dealt with the inflationary tendency of
other currencies through a fixed issuance schedule, its deflationary tendency will
encumber its future growth. However, it remains possible to change the code. For
example, the issuance could be changed to base itself on a certain level of inflation.
We recommend a report by the Paolo Alto Research Center9 to readers particularly
interested in this subject.
Another problem is the diminishing returns on Bitcoin mining. In the early days
of Bitcoin, individual “miners” with personal computers could receive Bitcoins.
Today, the computing power required to harvest the same number of Bitcoins is
extremely high, so many computers have to work together and split the winnings,
giving rise to a “mining pool” (see Figure 5.5).
The “mining pool” distribution implies a somewhat monopolistic pay-
ment mechanism. If there is a limited number of effective payment nodes, then
Bitcoin supporters’ belief in its democratic purity declines along with the distinc-
tion between Bitcoin and money issued from a central bank. The biggest ques-
tion is how to keep the mechanism afloat once Bitcoin miners cannot receive any
more Bitcoins for their efforts. Bitcoin’s founder has suggested a transaction fee to
maintain the system, and the Bitcoin Association has created a plan to implement
it. Transactors would pay the confirming nodes to confirm their transactions in
64 Internet currency
21
18
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
15
12
0
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
Figure 5.4 Bitcoin’s volume of issuance (by the end of January 2014, in millions)
this model. However, these are all in the planning stages. The current system does
not involve nodes that collect confirmation fees.
3 Bitcoin’s effect
Bitcoin has already run up an impressive transaction volume and is convertible
into many currencies at rates that fluctuate freely with demand. Mt. Gox is the
world’s largest Bitcoin exchange. It is responsible for over 80% of Bitcoin exchanges
and publishes daily exchange rates between Bitcoin and major currencies. Other
Internet sites such as Bitcoin.local allow accountholders to directly exchange with
each other.
Bitcoin’s price is famously unstable. Both user numbers and prices increased
dramatically from June to July 2011. The price started below $1, then quickly
rocketed up to $30. Prices have fluctuated up ever since. Figure 5.6 indicates the
staggering price volatility in 2013, reaching $1,200 and then receding. Although
Bitcoin has had a relatively small footprint, some service, software, and clothing
companies accept Bitcoins. Some questionable uses have also emerged out of its
anonymity. WikiLeaks began to accept donations in Bitcoins when it was cut
off from traditional payments. Some drug dealers on the “Silk Road” Online
Marketplace accept payment only in Bitcoins. Nicholas Christin of Carnegie
Mellon University estimated that this website generated monthly transactions of
Internet currency 65
Person
Node Person
Person
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
The
“Mining pool”
node
Person Person
Node
Person
Person
Person
Node
$1.2 million in 2012.10 In May 2013, the FBI closed the site and took possession
of its Bitcoins.
In a systematic analysis of Bitcoin, Ron and Shamir discovered that Bitcoins are
mostly untraded and highly concentrated.11 Most existing Bitcoins have not moved
from their initial accounts, an indication that they have been either lost12 or hoarded.
90% of accounts have made less than ten transactions and possess very few Bitcoins,
an indication that Bitcoin can hardly be considered a lively marketplace.The break-
down in Table 5.1 shows that 97% of accounts possess 10 Bitcoins or less.
Table 5.1 confirms Bitcoin’s scarcity and tendency to both deflation and appre-
ciation expectations. Bitcoin holders tend to remain just that, holders who do not
use them. This cannot be good for Bitcoin’s popularization.
10,000 50,000 71 65
50,000 100,000 5 3
100,000 200,000 1 1
200,000 400,000 1 1
400,000 0 0
Fiat money is priced based on faith in the issuer and total issuance. That of
metal-backed currency is supported by its intrinsic value (use in jewelry and other
products) and stabilized by the tendency for gold to exit circulation when prices
decline and enter when prices rise. Bitcoin’s price combines elements of both. It
could decline if faith in its mechanism declines due to worries of hacker attacks,
loopholes, Bitcoin seizures, or counterfeit coins. The cost of computing power that
miners expend could also influence the price. Just like gold, it is influenced by the
price of fiat currencies in which the prices are expressed.14
The February 2014 hacker attack on the Mt. Gox Bitcoin exchange demon-
strates the risks associated with Bitcoin. The Bitcoin losses were so staggering that
the exchange applied for bankruptcy, and the price of Bitcoins fell 50% in a single
day.The emergence of similar, competing currencies such as Litecoin, Peercoin, and
Primecoin all pose risks to Bitcoin’s value.
Bitcoin currently resides in a legal gray area. Should Bitcoins be classified and
protected as wealth? Does it violate current laws? How should policymakers and
regulators deal with Bitcoin? How can we adjust current laws to deal with Internet
currencies? Many users doubt that Bitcoin is ready for an expanded role due to
this uncertainty. Its anonymity facilitates money laundering along with drug and
weapon sales. This must be changed. Insufficient regulation has inhibited tax col-
lection on Bitcoins and focused attention on a Bitcoin transaction tax. For example,
the United Kingdom is considering classification of Bitcoin as a money replace-
ment, which will allow it to impose a 20% value added tax.15 Norway, Germany, and
Singapore have already provided for Bitcoin taxes.
How does Bitcoin fit into the existing US legal framework? In a comprehensive
review published in 2011, Ruben Grinberg, now a lawyer at Davis Polk, argued
that the Stamp Payments and federal counterfeiting statutes would need substantive
revision to apply to the issuance of Bitcoin.16 They also do not quite fit the many
definitions of securities under securities laws. He did, however, point out significant
risk for the Bitcoin community in relation to money laundering laws, as Bitcoin
does not fulfill the registration requirements for money services and it is, “gener-
ally known that Bitcoin is used to promote illegal activities.” Nikolei Kaplanov
argued strongly against the regulation of Bitcoin in a paper published by the Temple
University Law Review.17 He compared Bitcoin with existing community curren-
cies and questioned the legal basis for the federal government, including the Federal
Reserve, to regulate the use of Bitcoins for transactions between willing parties.
These admonitions appear not to have convinced the federal government.
Bitcoin’s greatest risk is uncertainty regarding its regulation. Regulators around
the world are paying ever-increasing attention to Bitcoin’s development. In August
2013, a federal judge officially ruled that Bitcoin is subject to regulation accord-
ing to American Securities Laws. European officials are issuing warnings about the
threat it and other virtual currencies pose to the central bank’s ability to safeguard
68 Internet currency
fiscal and monetary stability. Russia, India, and Hong Kong have all issued warn-
ings and taken various steps such as investigation and temporary closure of Bitcoin
trading platforms (India) and bans on domestic transactions parallel with the Ruble
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
(Russia). However, these pale in comparison with the strict response from China.
In December 2013, the People’s Bank of China (PBoC) issued a directive banning
Bitcoin’s use as a liquid currency.18 The ban extended to financial institutions, pay-
ments companies, and retail businesses, which were forbidden from processing or
accepting payments in Bitcoins.
America’s attitude toward Bitcoin is still developing. Former Federal Reserve
Chairman Ben Bernanke expressed hope for Bitcoin’s ability to overcome legal
and supervisory questions to create a more effective international payments system
over the long term. On the state level, California’s House of Representatives passed
a bill permitting use of any alternative currency with monetary value in payments
and retail transactions in the state.19 It would put Bitcoin on the road to full legality
in California, but the bill still needs to pass through the state senate and receive the
governor’s approval to become law.
Based on this analysis, we have two recommendations. The first is that China
delays its clarification of Bitcoin’s legal role until the technical and market founda-
tions are fully developed. The second is to research ways to effectively regulate it
so as to protect consumers and prevent money laundering, speculation, and price
manipulation. The circulation of Internet currency indicates that it could one day
become an able competitor with central bank-issued legal money, especially if an
online currency emerges whose issuance is rules-based rather than predetermined
like Bitcoin. It could sensitively adjust issuance to take economic risk into account
rather than price and quantity, thus avoiding the deflationary pitfalls of Bitcoin and
the myriad issues with central bank-issued currency.There is a great deal of work to
do, but we see a bright future with many forms of currency on the horizon.
Notes
1 European Central Bank. 2012. “Virtual Currency Schemes.”
2 Nakamoto, Satoshi. 2008, “Bitcoin: A Peer-to-Peer Electronic Cash System.”
3 Blockchain.info. 2013. http://blockchain.info/charts/total-bitcoins.
4 Mt. Gox. 2012. www.mtgox.com/.
5 Gross Domestic Product. 2013. World Bank.
6 Sprankel, Simon. 2013. “Technical Basis of Digital Currencies,” Technische Universitaet
Darmstadt.
7 Source: http://weidai.com/bmoney.txt
8 Babaioff, Moshe, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. “On Bitcoin and
Red Balloons.” “Red Balloons” refers to a 2009 DARPA experiment in which par-
ticipants were to locate ten red balloons placed randomly across the United States. The
winner received $40,000. The core of the Red Balloon Phenomena is cooperation and
competition.
9 Barber, Simon, Xavier Boyen, Elaisn Shi, and Ersin Uzun. 2012. “Bitter to Better—How
to Make Bitcoin a Better Currency.”
10 Christin, Nicolas. 2012. “Travelling the Silk Road: A Measurement Analysis of the Silk
Road Anonymous Marketplace.”
Internet currency 69
11 Ron, Dorit and Adi Shamir. 2013. “Quantitative Analysis of the Full Bitcoin Transaction
Graph.”
12 Bitcoins can be linked to a specific piece of computer hardware. If that hardware breaks
or is lost, it may be impossible to access its linked Bitcoins.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Big data is a new concept that also goes by Big Scale Data or Massive Data. So far,
there exists no universal definition for the concept. However, it is well understood
that the so-called Big data has four features, that is 4Vs: large Volume, low in Value
density, Variety in sources and features, and rapid Velocity.
The concept has emerged from society’s digitization process (see Chapter 1),
especially with the development of online social networks and sensory devices.
Updated cloud computing and search engines provide efficient ways to analyze big
data.Yet the core lies in how to quickly identify valuable information from the wide
range and massive data sources. Big data is playing an increasingly significant role
in social analysis, scientific discovery, and business decision making. Finance is only
one example of such an application.
Today Big data has become a hot topic. Some believe that it is an important or
even strategic component of a nation’s resources, just like oil and gas. We will not
discuss each idea in detail. Rather, we believe that most of the discussion is theo-
retical. Since it does not explain the mechanism of big data analysis technically, we
aim to fill this gap.
Based on the findings of data science and data mining literatures, we start by
introducing the main types of big data, and then discuss the goals for big data analy-
sis. In the end, we will compare it to econometrics. Chapter 7 will focus on the
big-data-based credit investigation and Internet lending. Chapter 12 will discuss the
application of big data in securities investment and actuarial science.
The basic unit of big data is a data set. First we will introduce two relevant concepts
for data sets: data objects and properties, and discuss the three different types of data
set: recorded data, graphic-based data, and ordered data.
1 Basic concept
A data set is a collection of data objects. Accordingly, the data objects are its
components. In statistics, data objects are equal to statistical units or sample points
Big data 71
and are sometimes called records, points, vectors, models, events, cases, samples,
observations, or objects. The data objects are described via a set of properties.
The number of the data objects’ properties is called the “dimension.” A common
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
problem in the analysis of high dimensional data is the so-called curse of dimen-
sionality. The difference between the number of data objects and their dimensions
is the degrees of freedom. As the degrees of freedom decrease, some statistical meth-
ods will become inapplicable and the results will be less reliable. One way to deal
with this is dimensionality reduction, that is combining original dimensions into
a new one to reduce the number of dimensions. Usually, linear algebra methods
such as principal component analysis and singular value decomposition are used to
project high-dimensional data sets into lower ones.
In some data sets, object values in most properties are zero, and in most cases,
the nonzero terms account for less than 1%. This is known as sparseness. There are
certain ways to deal with the sparseness. Properties are equal to the variables in sta-
tistics, which stand for the data objects’ features or characters and vary from object
to object or from event to event. Properties are also called characters, fields, features,
or dimensions. The rules that connect numbers or symbols with the objects’ prop-
erties are the measurement scale. For example, GPA is one property of students, and
identifying a certain student’s score is actual measuring.
Properties can be divided into four categories based on their applicable
calculation types (i.e. comparison, order, addition and subtraction, multiplication
and division). The first category is a nominal property, of which the values are set
as different labels that provide sufficient information to identify each data objective.
For example, different IDs, genders, and so on. belong to this category. The second
category is the ordinal property, of which the values give information to order dif-
ferent data objects. House numbers belongs to this category.The third is the interval
property. The interval property has measurement units with meaningful differences
in properties. One example of this category is temperature. The fourth category
is the ratio property, of which the difference and ratio are both meaningful. For
instance, length and weight belong to this category. Of the four categories, nominal
and ordinal properties are qualitative properties while interval and ratio ones are
quantitative properties.
The possible number of values of each property can be divided into two catego-
ries. The first is a discrete property with limited or infinite numbers of values. The
second is the continuous property with values from the whole set of real numbers.
Usually, nominal and ordinal properties are discrete and interval and ratio properties
are continuous.
2 Recorded data
Recorded data is a collection of records (i.e. data objects) and each of them contains
fixed data fields (i.e. properties). For most basic forms of recorded data, the records
have no clear relevance to the fields. The recorded data is usually stored in flattened
files or relational databases. It is structural data and can be presented as a data matrix.
There are two conditions for this.
72 Big data
Condition I: If all data objects have the same data property set, these data objects
can be regarded as points (or vectors) in multi-dimensional space. Each dimension
represents a different property. Cross-sectional data used in econometrics can there-
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
4 Data in order
Sequential data is an expansion in recorded data in which each record includes
time-related information. For example, a supermarket cashier records the market
basket information for each customer. The recorded information is sequential data.
Also, all the time series data (such as macroeconomic series and financial price series
data) belong to sequential data.
Sequence data is the sequence of each entity. It is quite similar to time series,
except that sequence data do not have a timestamp. Typical sequence data includes
genome, word, or letter sequences.
Big data 73
Spatial data can also be regarded as an expansion in recorded data, only that
each record includes the space of the area feature related to this data. Typical
spatial data includes meteorological data collected from different geographic posi-
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
tions and different points in time, such as temperature, humidity and atmospheric
pressure.
Big data analysis is primarily used for prediction or description. For predic-
tion, it uses a set of independent variables to estimate or predict the value of
the dependent variable. Description summarizes potential correlations, trends,
clustering, and abnormal trajectories in the data. Descriptive tasks are usually
exploratory and often need post-processing to verify and interpret results. These
two types of tasks can be divided further into classification, regression, associa-
tion analysis, cluster analysis, recommender systems, anomaly detection, and link
analysis.
1 Classification
Classification aims to place data objects into a pre-defined target class. Typically,
these target classes are mutually exclusive. For example, credit rating agencies use
issuer data to place debt into categories based on creditworthiness from AAA (the
best rating) to D (default).
The input data is a collection of records. Each record is represented by the
tuple, (x, y), in which x is a collection of attributes and y is a special attribute that
indicates the class label record (also called categorical attributes or target attrib-
ute). The core of classification is to determine a target function by learning and
map each attribute set x to a pre-defined class number y. Sometimes, instead of
determining the set of attributes mapped to a certain category number y, x may be
mapped to all the target classes as long as it is subject only to a certain probability
distribution.
The general classification task has two steps.The first step requires a training test
consisting of records in which the label is known. It can develop into classifica-
tion models, including the Logit model, Probit model, decision tree classification,
rule-based classification, artificial neural networks, vector machines, and Bayesian
supported classification method (part of this model will be described in detail
in Chapter 7). Next, the classification model is applied to a test set consisting of
records in which the label is unknown. We then evaluate the classification model’s
performance by seeing which records were correctly classified.
Confusion matrices are often used in these problems. Table 6.1 is a typical con-
fusion matrix for a binary classification problem. There are positive and negative
types (a positive class usually represents a rare category while negative classes repre-
sents the majority); in each table entry, f ij indicates its actual class is i but is predicted
to be class j. The table contains four specific conditions:
74 Big data
Table 6.1 Confusion matrix
Predicted Class
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Positive Negative
higher output values as positive. Samples with lower output values are negative.
Recalculate TPR and FPR.
Step 4 repeats the third step; the test selects the sample with the highest output
value.
Step 5 connects all ( FPR ,TPR ) in turn and get the ROC curve (Figure 6.1).
Two classification models’ ROC curves are rather special. One is perfect clas-
sification TPR = 1, FPR = 0. Its ROC curve is the horizontal line at the top of
Figure 6.1. The other is random classification, that is divide samples randomly into
positive category according to a fixed probability and get a diagonal ROC curve.
Other models’ ROC curves are between that of perfect classification and random
classification. Models with curves closer to the upper left corner curves perform
better. Thus, area under curve (AUC) also functions as a performance metric.
2 Regression
Regression is similar to classification. The key difference is that in regression, the
target attribute y is continuous. In classification, however, the target attribute y
is discrete. In other words, classification predicts whether something will happen,
while regression is to predict how much.
Regression is the most commonly used tool in econometric analysis, especially
the linear regression model:
y = α + β1x1 + β 2 x 2 + … + β p x p + ε (6.1)
1
0.9
0.8
0.7
True positive rate
0.6
0.5
Perfect classification
0.4
Classification models
0.3
0.2 Random classification
0.1
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
False positive rate
performance. Suppose there are n samples and the i sample’s dependent variable
value is yi which is predicted to be yˆi by the regression model. Then the MSE is:
1 n
∑ ( yi − yˆi )
2
MSE = (6.2)
n i =1
In the linear regression model, the least squares method (LSM) gets parameter
estimates by solving the MSE minimization problem.
3 Association analysis
Association analysis focuses on market basket data.The goal is to find hidden mean-
ingful relations in big data sets. One popular (and humorous) example is diapers and
beer. Retailers found that many customers buy diapers and beer at the same time, so
they placed diapers and beer together in stores to promote cross-selling. Association
analysis tries to find a link rather than an explanation. Here, we face two essential
issues: first, the calculation cost may be too high; second, some correlations may
occur by accident. The core of the association analysis algorithm is to deal with
these problems, expressed as follows:
I = {i1 , i2 ,… , id } stands for all the items in the market basket data, and
T = {t1 , t 2 ,… , t N } represents all matters. Every item contained by matter ti is subset
of I. For item set X , its support is:
σ ( X ) = # {ti X ⊆ ti , ti ∈ T } (6.3)
support threshold;
Second, produce rules with high confidence from the previous step, which are
then called strong rules.
Typically, the amount of calculation to generate frequent item sets is much larger
than that of desired rules. Generating item sets frequently uses either the Apriori or
FP growth algorithm.
4 Cluster analysis
Cluster analysis divides data objects into groups based on descriptive objects and
their relationship information in the data. Objects are related within a group and
uncorrelated among different groups. The greater the homogeneity within the
group, the greater the gap between the two groups, which then improves the clus-
tering effect.
Cluster analysis and classification are similar. Clustering classes (clusters) can also
be considered as a data object classification, but this classification information can
only be derived from the data. In classification, however, the class labels are known
when the development of the object model is done. We then assign numbers to
new and unmarked objects. Thus, classification is also called supervised classifica-
tion, and clustering analysis is called unsupervised classification.
Common clustering algorithms include K-means, agglomerative hierarchical
clustering, and DBSCAN. They can be hierarchical/agglomerative or use point
assignment. The first type of algorithm regards each data object as a cluster at the
beginning and combines clusters according to their closeness, which can be defined
in many different ways. When the further combination leads to pre-defined unde-
sired results, the above combination process is ended. For example, combination can
stop when it reaches a pre-given number of clusters. The second category involves
point assignment process, which means considering each data object in a certain
order and assigning it to the most appropriate cluster. The process typically has a
short initial phase to estimate clusters. Some algorithms allow merging or splitting
for temporary clusters. They may also identify outliers when the data object may
not be assigned to any cluster.
5 Recommender system
The recommender system predicts user preferences. For example, an online news-
paper provides news reports based on the prediction of user interest, and online
retailers recommend products to customers that they might want to buy on the
basis of their shopping and/or goods search history.
There are two types of elements in recommender systems: users and items. User
preference for some items can be expressed as utility. Suppose there are N items
78 Big data
and R (u, i ) represents user u′ s utility from item i. Since it is impossible to observe
R (u, i ), the recommender system must work this out and get prediction Rˆ (u, i ).
After obtaining N predicted utility values Rˆ (u, i1 ) , Rˆ (u, i2 ) ,… , Rˆ (u, iN ), the recom-
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
mender system will first recommend K (usually much smaller than N) items on the
principle of utility maximization.
One type of recommender system is content-based. Such recommender sys-
tems use customers’ past preference to recommend similar ones. Similarity between
items is determined by calculating the similarity between attributes. Amazon uses
this to recommend books similar to the one currently viewed.
Another is collaborative filtering, which recommends items according to other
customers’ choice who have similar taste. The similarity between users depends on
their browsing and scoring records. For example, Dangdang’s “those bought this
item also bought” feature is a type of collaborative filtering. Collaborative filtering
is the most popular and also the most widely applied of all types.
Recommendations can also base themselves on demographic characteristics.
Such recommender systems recommend appropriate items based on users’ demo-
graphic characteristics (such as age, language, and country).
Knowledge-based systems make out yet another category. Such systems use
domain-specific knowledge to judge whether an item meets users’ needs, prefer-
ences, and practicability. The core is a similarity function used to measure users’
needs (i.e. description of the problem) and match degree of recommendations
(i.e. answers).
Community-based systems rely on the user’s friends. The basis for such recom-
mender systems is that people tend to accept the recommendation of friends. The
popularity of social networks has also promoted its development.
Hybrid recommender systems mix the above systems together. For example,
content-based recommender systems can make up for the new-item problems of
collaborative filtering.
6 Anomaly detection
Anomaly detection identifies characteristics that are significantly different from
other observed values.The abnormal observation value is called an anomaly or out-
lier. Anomaly detection tries to find real outliers and avoid false labeling. In statistics
parlance, a good anomaly detector must have a high detection rate and low false
alarm rate. Anomaly detection applications include fraud detection (such as credit
card fraud detection), network attacks, unusual disease patterns, and ecosystem
disturbance.
There are three main sources of outliers. First, data may come from different
classes. The statistician Douglas Hawkins defines outliers as observations with
differences so large that it seems impossible they come from the same mechanism.
For example, people who use credit cards fraudulently and legally are two different
types. The second source is natural variation. Many data sets can be modeled with
a statistical distribution (e.g. normal distribution) in which the probability of an
observation appearing decreases as it departs from the mean.The third source is data
Big data 79
measurement and collection errors. Such anomalies reduce the quality of the data
analysis and should be thrown out.
There are a variety of ways to detect abnormalities. Many anomaly detection
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
techniques first create a model without points that are not perfectly fit. For
example, the data distribution model can be created by the parameter estima-
tion of probability distributions. If an object does not fit well with the model
(that is, not subject to the distribution), it is an outlier. If the model is a set of
clusters, then the outlier is not the object of any significant clusters. When using
the regression model, anomalies are relatively far from the predicted value of the
object.
Proximity-based techniques, on the other hand, measure the distance between
objects. Outliers are those objects furthest away from most of the other objects.
When the data can be displayed in a two-dimensional or three-dimensional scat-
ter chart, outliers can be detected visually by finding points separate from the
majority.
We also have techniques based on density. The relative density of an object can
be estimated directly, especially when there is already a proximity measure between
objects. Low-density areas relatively far from the nearest neighbor objects may be
seen as outliers. A more sophisticated approach is to consider that the data set may
have different density areas. Only if the local density of a point is significantly lower
than most of its neighbors can they be classified as outliers.
7 Link analysis
Google’s PageRank is representative of the link analysis algorithm. Before Google,
there were many search engines, most of which used a web crawler to obtain data
from the Internet, and then list the lexical items of each page with an inverted
index. When a user submits a search query, all pages containing these words are
extracted from its inverted index and listed in a way that that reflects inside items.
Therefore, words appearing on the page header items have a higher correlation
than lexical items that appear in text, and the more occurrences of lexical items, the
more relevant the web page. In this case, “term spam appeared” in large numbers
and some unrelated Web pages modified themselves (such as a large number of
duplicate keywords) to deceive search engines.To solve lexical item falsification, the
PageRank algorithm has developed two innovations.
First, it simulates the behavior of Internet surfers. These imaginary surfers start
from random web pages and pick a next destination link randomly selected from
current page. This multi-step process can be iterated. Ultimately, these surfers will
converge on a page. Pages with more visitors become more important than those
of few visits. PageRank measures this “importance” of web pages. Google lists pages
according to PageRank when answering queries.
Second, in determining the content of the page, both lexical items that appear
on the page and word entry point links to the page should be considered. The
implicit assumption is that web owners tend to link to good or useful web pages
instead of bad or useless ones. Even if spammers can easily add false lexical items on
80 Big data
pages under their control, they can hardly do the same thing on pages referring to
theirs. Link spam has been developed to work against link analysis, which builds a
webpage collection that is called a “junk farm” to increase the PageRank of certain
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
∀t, n ( )
f X t + 1 X t , X t − 1, … , X t − n = f ( X t + 1 X t ) (6.6)
pij = Pr ( X t +1 = j X t = i ) (6.7)
vit = Pr ( X t = i ) (6.8)
V t +1 = P ⋅ V t (6.9)
∀V 0 ,limV t = π (6.10)
t →∞
Big data 81
The steady-state distribution π satisfies π = P ⋅ π (i.e. starting from the steady
state, the next moment is still a steady-state), so π is actually an eigenvector of
Matrix P with corresponding eigenvalue 1.
π i is the i component of π in the steady state that shows surfers’ probability to
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
1 Introduction to econometrics2
Econometrics is the dominating quantitative empirical analysis used in the economic
and financial fields. Econometrics adds empirical content to economic theory,
which allows theories to be tested and used for solving real problems, especially
for forecasting and policy evaluation of government and enterprises. Econometrics
studies random economic relations by dealing with data from real observations,
usually without artificial control, with mathematic methods to build models and
reveal quantitative relations for an objective economic system.
Econometric analysis is generally based on four steps: variables and data selec-
tion, model specification, model fitting and testing, and applications. It should be
noted that model specification and testing are closely connected in real studies.
Y = g ( X,θ ) + ε (6.11)
History, reality, and future must have a consistent economic structure for the same
econometric model to have stable parameters. Explanatory variables for the next
period are known. The model must also have predictive ability and reach desired
accuracy. If economic development processes are not steady, lack standardized
behavior, or the model is out of date, then prediction will fail.
Second, we have the economic structure of the analysis, including fit with pre-
dictions of economic theory and quantitative relations between economic variables,
such as marginal analysis, elasticity analysis, and comparative static analysis.
The final step is policy evaluation. Econometric results can help us both evaluate
existing policies and select the appropriate solution for future policy.
is 0 or two arguments are equal. If the null hypothesis is valid, the sample data or
its constructed test statistics should follow a known probability distribution. If the
actual value of sample data or the test statistic only occurs with small probability
(i.e. the confidence level, for example 1%, 5%), then the sample data are considered
to correspond to the null hypothesis. One negates the null hypothesis under a cer-
tain confidence level. Otherwise, the null hypothesis cannot be rejected (but never
say “accept the null hypothesis”). Through hypothesis testing, econometrics falsifies
or supports (not confirms) economic theories.
In addition, parameter estimation is one of the important contents in econometric
analysis. However, hypothesis testing for parameters is more important than para-
meters’ specific values. Econometrics can forecast, but mainly in policy research areas.
In leading academic research, econometrics is mainly used to test economic theory.
In contrast, big data analysis is more pragmatic. Prediction occupies a large pro-
portion of the big data analysis. We use classification and regression to reveal rela-
tions between variables and further predict unknown variables. Association analysis,
cluster analysis, recommender systems, and anomaly detection detect potentially
relevant data, trends, clustering, trajectory, and abnormal patterns.These patterns are
expected to be useful on other occasions or in the future and have practical value.
Therefore, the assessment of predicted effect is an important part of data analysis
embodied in the confusion matrix, ROC curves, and other tools.
sation. Theoretical analysis of big data is also based on theory of probability and
statistics.
Third, big data analysis is not a panacea. Estimation based on big data can
be abstractly described as: X is known information; Y is unknown information;
looking for a function h ( X ) of X to forecast Y . Prediction error is Y − h ( X ).
E [Y − h ( X )] (similar to the MSE) used to measure the predicted effect. It can be
2
E [Y − h ( X )] = E ⎡⎣h ( X ) − E (Y X ) ⎤⎦ + E ⎡⎣Y − E (Y X ) ⎤⎦
2 2 2
(6.12)
and
E [Y − h ( X )] ≥ E ⎡⎣Y − E (Y X ) ⎦⎤
2 2
(6.13)
3.2.2 Econometrics
3.2.1.1 LINEAR REGRESSION
y = β1 x 1 + β 2 x 2 + … + β p x p + ε
Suppose there are n samples. In the i sample, the dependent variable is yi , and the
independent variable is ( xi 1 , xi 2 ,…, xip ). Introducing the following notation
⎛ y1 ⎞ ⎛ xi 1 ⎞ ⎛ X 1' ⎞ ⎛ β1 ⎞
⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎜ ⎟
⎜ y2 ⎟ ⎜ xi 2 ⎟
'
⎜ X2 ⎟ ⎜ β2 ⎟
Y = ⎜ X = X = ⎜ β =⎜
f ⎟, i ⎜ f ⎟, f ⎟, f ⎟
⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎜ ⎟
⎜ yn ⎟⎠ ⎜ xip ⎟ ⎜ X' ⎟ ⎜ β ⎟
⎝ ⎝ ⎠ ⎝ n ⎠ ⎝ n ⎠
βˆ = ( X ' X ) X 'Y
−1
(6.14)
⎛ x 01 ⎞
⎜ ⎟
⎜ x 02 ⎟
Consider a new sample. The independent variable X 0 = ⎜ f ⎟ is known, so
the dependent variable is predicted to be ⎜ ⎟
⎜ x 0 p ⎟⎠
⎝
n
(6.15)
∑ ⎡⎣ X ( X X )
−1
= '
0
'
X i ⎤⎦ yi
i =1
⋅ represents the vector mode (length). When the angle between two vectors is
0, the cosine similarity is equal to 1. When two vectors are orthogonal, the cosine
similarity is equal to 0.When the angle between two vectors is 180 degrees (i.e. the
opposite direction), the cosine similarity equals to −1. Cosine similarity coefficient
corresponds to essentially random variables.
Therefore, ŷ0 can be further expressed as
n
yˆ 0 = ∑
i =1
Λ 1/2 ΓX 0 ⋅ Λ 1/2 ΓX i ⋅ cos ( Λ 1/2 ΓX 0 , Λ 1/2 ΓX i ) ⋅ yi (6.18)
Equation (6.18) shows that the predicted value ŷ0 is weighted by the
known sample’s dependent variable. Wherein the i sample’s weights is
Λ 1/2 ΓX 0 ⋅ Λ 1/2 ΓX i ⋅ cos ( Λ 1/2 ΓX 0 , Λ 1/2 ΓX i ). Given Λ 1/2 ΓX 0 and Λ 1/2 ΓX i ,
the higher cosine similarity of vectors Λ 1/2 ΓX 0 and Λ 1/2 ΓX i (i.e. more in the same
direction), the bigger i sample weight.
The core logic of maximum likelihood is that the most reasonable estimate of the
parameters should allow the largest probability to pick samples in a group that is
randomly selected from the model population.
Assuming the overall distribution is f (Y θ ), f (⋅) represents the data generation
mechanism. θ is an unknown parameter vector to be estimated. Assuming
X 1 , X 2 ,…, X n is a set of observations from the overall sample distribution, and is
independently and identically distributed.The definition of the likelihood function
is the joint density function of the sample:
n
L (θ X ) = ∏ f (X θ )
i =1
i (6.19)
The maximum likelihood method has tight logical link with anomaly detection
in big data analysis. An anomaly detection method based on density supposes an
object outlier score is the inverse of density. The common definition of density is
the number of objects around in a specified distance. Next, we use the density and
anomaly score to interpret the maximum likelihood method.
88 Big data
Assume the value of the parameter vector θ is estimated within Θ. For every
θ ∈ Θ, we generate independent and identically distributed random variables
Y1 ,Y2 ,…,Ym following f (Y θ ). In the random variable space, the distribution
f (Y θ ) is represented by point set {Y1 ,Y2 ,…,Ym }. Thus, there is a series of point
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
density ( X i, d ) =
{
# Z Z ∈ {Y 1,Y 2,...,Y m } and Z − X i ≤d } (6.21)
m• ∫ dZ
Z − X i ≤d
∫ f (Z θ ) dZ
lim denisty ( X i , d ) =
Z − Xi ≤d
m→∞
∫ Z − Xi ≤d
dZ
above analysis, when m is sufficiently large and d is sufficiently small, the abnormal-
point scores of observed sample are close to the inverse of the likelihood function:
n n
1 1 1
lim
m → ∞ ,d → 0
∏ denisty ( X , d ) = ∏ f ( X θ ) = L (θ X )
i =1 i i =1 i
(6.23)
analytical methods.This shows that big data analysis still has much room for innova-
tion beyond the seven major tasks in this chapter.
Notes
1 Qian, Minping, and Gong, Guanglu. 1998. “The Application of Stochastic Processes,”
Peking University Press.
2 This chapter mainly refers to: Jin,Yunhui and Sainan Jin. 2007.“Advanced Econometrics,”
Peking University Press.
3 Mayer-Schonberger, Viktor, and Kenneth Cukier. 2013. “Big Data: A Revolution That
Will Transform How We Live, Work And Think,” Eamon Dolan/Houghton Mifflin
Harcourt.
4 Durrett, Richard. 1996. “Probability: Theory and Examples,” 2nd ed., Duxbury Press.
7 Big data-based credit and
Internet lending
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
The core of loan provision is the management of credit risk. This begins with an
evaluation of the creditworthiness of borrowers, and then determines the interest
rate and term of the loan. Thus, creditworthiness is also the basis of Internet loan
provisions. In this chapter, we first introduce the process of credit provision based
on big data by contrasting the credit center of People’s Bank of China (PBoC), a
typical traditional means of credit, and that of Alibaba, one based on big data. We
then introduce lending based on big data by contrasting Kabbage (USA) and Ali
Small Loan (China).
1 Basic concepts1
Credit is mainly about evaluating clients’ willingness and ability to repay loans based
on their financial status, behavior, occupation, and credit record. The result of this
evaluation is manifest in credit ratings and credit scores.
Credit rating involves the use of models and analytical methods to
comprehensively evaluate different economic entities’ credibility and ability to
repay principal and interest. This process is undertaken by professional credit rating
agencies. It is also an overall evaluation of repayment risk. Credit rating consists of
the evaluation of willingness and ability to pay, with ability as an objective param-
eter and willingness as a subjective one. The credit rating procedure combines
quantitative and qualitative methods. It emphasizes qualitative methods and uses
quantitative estimates for reference. The results of credit rating is presented in sim-
ple grades, such as AAA, AA, A, BBB, BB, B, CCC, CC, C, and D. Every grade
can be subdivided into three subcategories, positive such as AA+, the neutral AA,
and negative such as AA−. In addition, each grade suggests a certain probability of
default (PD). For example, the historical default rate of BBB bonds is approximately
3%, while that of AAA bonds is 0.003%.
A credit score is a score for individuals or small companies. Credit agencies
extrapolate them from mathematical models based on credit reports to evaluate
and estimate their creditworthiness. The higher the credit score, the better the
creditworthiness.
Big data-based credit and Internet lending 91
Credit then becomes a problem of categorization (see Chapter 6). It categorizes
individuals and companies according to their default probabilities. Mathematically,
if we use X to represent the characteristics, features, and historical information
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Data collection
Data submission
Organization Product
/individual processing R&D
1 Data provision: extracts data in various ways from queues, documents and
databases
2 Data exchange: verifies data in format and logic and loads it into the basic
library
3 Basic data: stores verified data as post source layer and provides data for further
data processing
4 Data processing: differentiates and integrates credit institution information
5 Product processing: processes basic and value-added products
6 Data movement: includes dispatch, transfer, formatting, and other functions.
Data source1
Data source1
Ground data
Data source2
data store
Data source6 ……
Manual
recording
Data source n
Other
sources
The core of data analysis is the PD model, mainly applied in loan provision,
automatic approval of loans, and post-approval risk monitoring.
option with the asset of the company as underlying asset and the total liabilities of
the company as the strike price (Figure 7.4). First, it calculates the market value
of the company and volatility of stock based on historical stock prices, and then
calculates the probability that the company becomes insolvent. The Moody’s KMV
model is a commercialized form of the Merton model, and the progressive single
factor risk model applies the same logic.
The mathematics of the Merton model are illustrated here. We assume the
following: the total debt of a company is D and matures at time T; (to simplify, we
ignore interest payments), the market value (not the book value) of the company
assets is V0 at the present and will be VT at time T, the volatility of the stock price is
a constant σV (these three variables cannot be attained directly but can be calculated
from market data), the market value of equity is E0 at present, and will be ET at
time T, and the volatility of the equity value is a constant σ E (these three variables
also must be calculated).
Due to limited liability, we have the equation ET = max (VT − D,0 ). Thus,
E0 can be deemed the present value of a European call option with VT as the under-
lying asset and D as the strike price. According to the Black–Scholes formula,
E0 = V0 ⋅ Φ (d1 ) − D ⋅ e − rT ⋅ Φ (d 2 ) (7.1)
with
ln (V0 / D ) + ( r + σ V2 / 2 )T
d1 =
σV T
d 2 = d1 − σ V T
σ E ⋅ E0 = Φ (d1 ) ⋅ σ V ⋅ V0 (7.2)
Y * = X 'β + ε
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
(7.5)
⎧1When Y * > 0
Y = ⎨ (7.6)
⎩0 When Y ≤ 0
*
eX β
'
Pr (Y = 1 X ) = (7.8)
1 + eX β
'
Equation (7.8) is the core of the Logit model. By determining what independent
variables to include in X and examining the methodology according to empirical
data, such as the borrower characteristics, category, empirical information, and
default status, we can estimate the indicator coefficient β , Equation (7.8) that can
then be used to estimate PD.
The Logit model is very flexible in the selection of independent variables. For
example, more than 100 indicators in 7 categories can be adapted to non-retail
clients, such as: financial leverage indicators including asset-liability ratio, adjusted
asset-liability ratio, all-capitalization rate; solvency and liquidity indicators including
liquidity ratio, quick ratio, cash ratio, interest coverage ratio, operating net cash flow/
total debt ratio, operating profit/total loan ratio; profitability indicators including
operating profit/sales revenue ratio, EBIT/sales revenue ratio, and profit margin
volatility in the last three years; return indicators including ROA, ROE, adjusted
ROA and adjusted ROE; operating efficiency indicators, including asset turnover,
fixed asset turnover, inventory turnover, accounts receivable turnover and liquid
asset turnover; scale indicators including total assets, equity, sales revenue, operat-
ing profit, and the average of these indicators over the last three years; and growth
indicators including total asset growth rates, sales revenue growth rate, equity
growth rate, profit growth rate, and time since establishment. For online business,
Internet-based indicators such as online sales, numbers of hits, client comments,
shipment rates, logistics records, and promotion and activity on social networks.
98 Big data-based credit and Internet lending
4.4 Bayesian Criterion7
We use Ω to represent the sample space. Assume that there are k overall
distributions, with probability density functions f 1 ( x ) , f 2 ( x ) ,…, f k ( x ). The
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
k
priory probability is sequentially q1 , q2 ,…, qk, while ∑q i = 1.
i =1
Assume that D1 , D2 ,…, Dk divide the sample space into k non-overlapping
k
comprehensive regions. Thus ∪D
i =1
i = Ω and Di ∩ D j = ∅ for any i ≠ j , ∅
referring to the empty set. We define the criterion as if a sample x ∈ Di , we take
that x is from overall distribution Gi . We use D = {D1 , D2 ,…, Dk } to represent the
criterion.
Under criterion D, the probability that a sample from the overall distribution Gi
is mistaken as from G j is:
Pr ( j i, D ) = ∫ f i ( x ) dx (7.9)
Dj
We use L (i, j ) to represent the loss caused by mistaking one sample from Gi for
being in G j . Thus, the total average loss under criterion D is:
k k
g (D ) = ∑∑q i ⋅ Pr ( j i, D ) ⋅ L (i, j ) (7.10)
i =1 j =1
D1 = {x : q1 ⋅ f 1 ( x ) ⋅ L (1,2 ) ≥ q2 ⋅ f 2 ( x ) ⋅ L ( 2,1)}
D2 = {x : q1 ⋅ f 1 ( x ) ⋅ L (1,2 ) < q2 ⋅ f 2 ( x ) ⋅ L ( 2,1)} (7.11)
If we further assume that the two overall distributions are the normal distributions
N ( μ1 , Σ ) and N ( μ2 , Σ ) , with μ1 , μ2 , Σ known and Σ referring to the covariance
matrix of the two overall distributions, it can be proven that the Bayesian Criterion
Equation (7.11) is equivalent to:
D1 = {x : w ( x ) ≥ d }
(7.12), with w ( x ) = ( x − μ ) Σ −1 ( μ1 − μ2 ),
'
D2 = {x : w ( x ) < d }
μ1 + μ2 q ⋅ L ( 2,1)
μ = and d = ln 2 .
2 q1 ⋅ L (1,2 )
Big data-based credit and Internet lending 99
If that Criterion function w ( x ) is linear, there exists a weight vector A and
threshold B, deducting Equation (7.12) into:
D1 = {x : A' ⋅ x ≥ B}
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
By Equations (7.13) and (7.14), our strategy is to decline clients whose credit
score is below threshold B and to accept those above it.
1 Analysis on Kabbage8
Kabbage was founded in 2008 with the goal of supplying operating capital for
online businesses that do not qualify for loan requirements by commercial
banks. Numerous small- and medium-sized online businesses come together on
e-commerce platforms such as eBay,Yahoo, and Amazon. Their demands for capital
are characterized by a short duration and small amounts. However, because these
businesses’ FICO credit scores are often below 720 and their owners are reluctant
to put up their personal assets as collateral, it is very difficult for them to obtain
bank loans. Kabbage focuses on these businesses and provide them loans by analyz-
ing Internet-based statistics. Kabbage has now exceeded 100,000 customers, and
the annual total loan amount is now around 200 million. The average Kabbage
customer receives ten loans per year.
We introduce the business model of Kabbage in three aspects: data sources, loans
issuance, and post-lending management (Figure 7.5).
Loan
Electronic application
Kabbage
businesses Credit
rating
On-time
payment PayPal
Allocation
of funds
The online business has the incentive to provide more useful information
in order to obtain credit, and increased information also means better terms
for loans from Kabbage. The Kabbage Score and other related reports can help
online business-owners supervise the operation of their businesses and may also be
provided to third parties. Business owners could find their operational problems
and devise solutions accordingly, thus improving both their businesses and their
Kabbage Score. They would then receive a larger line of credit, which all leads into
a virtuous cycle. The interests of Kabbage and the online businesses it serves are
ultimately very well aligned.
Big data-based credit and Internet lending 101
1.2 Loan issuance
Kabbage’s slogan is, “Fund your business in 7 minutes.” After an online business
submits its registration, the Kabbage background system automatically checks
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
whether the business has online sales data over a sufficiently long period of time.
Online businesses can only submit their application for loans after they have passed
the vetting process, which is automatically carried out by Kabbage’s system. It
decides whether to issue lines of credit, in addition to the amounts, interest rates,
and maturities based on the credit assessment. The Kabbage algorithm guarantees
that the vetting results can be provided and money transferred to an appointed
account in a third-party online payment system within seven minutes. The loans
issuance can provide customized solutions tailored to every applicant’s need, such
as automatically adjusting the line of credit, maturity and interest rate according to
different purposes of loans and operational situations.
Kabbage has several patents including “an approach to provide liquidity loans in
online auctions and online exchanges.” Online businesses can apply for loans from
Kabbage by using inventories as collateral, and then repay the loans when the goods
are sold and payments are received. In this process, Kabbage receives interest or fees
from loans, and the online businesses receives cash flows in advance to maintain
working capital.
The lines of credit that Kabbage provide range from $500 to $40,000. Interest
rates are determined by maturities (up to six months) and the creditworthiness of
the businesses, from 2% to 7% in thirty days and 10% to 18% in six months.
Businesses
Consumption
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Xyb100
(A risk
Ali loan TaoBao loan Factoring managing
platform)
TrustPass credit loan Taobao/Tmall Travel factoring 0-down payment loan
E-Business loan Purchase Order loan Travel credit loan Payment on digital
CBU purchase order loan Taobao/Tmall AE advance payment Entertainment
credit loan
Tmall start-up loan
Tmall supply
Chain finance
Taobao/Tmall
Juhuasuan margin loan
small and micro companies in e-business in China. Ali Small Loan issues loans
based on the mountains of data it accumulates on trade platforms such as Alibaba,
Taobao, and T-mall (see Figure 7.6 for main categories of loans). It does not require
collateral or guarantees, and it generally issues loans under RMB 1 million. The
whole lending process is completed online and issued through Alipay, so no off-line
vetting is required. The time it takes to issue a loan with this system is only three
minutes. Clients with excellent credit can apply for extra loans through a manual
review process to receive amounts up to RMB 10 million.
By 2013, Ali Small Loan had provided loans for more than 490,000 clients and
issued loans totaling more than RMB 12 billion. Since its foundation, it has issued
more than RMB 100 billion loans. On average, each client receives lines of credit
of around RMB 130,000 and loans for around RMB 40,000. The bad debt rate is
under 1%. As the source of capital, Ali Small Loan has around RMB 2 billion of
assets and has transferred RMB 8 billion assets in 2013.
We will introduce Ali Small Loan through four aspects: loan application, loan
approval, post-lending management, and IT systems (Figure 7.7).
Behavioral
Credit rating
data
Guarantee
Electronic Ali small Provide in transaction
business loan guarantee platform
Pay on time
AliPay
Transfer funds
comments, credit reports, and bank statements of the applicant on the B2B platform
Alibaba, the C2C platform Taobao, the B2C platform T-mall, and visits to the
applicant’s facilities. During these visits, Ali Small Loan authorizes third-party inves-
tigators to visit companies that apply for loans and check on the operation of the
companies, then the client manager of Ali Small Loan communicates with the
client to confirm the materials that investigators have submitted for application.
It is worth mentioning that Ali Small Loan uses a hydrological transaction
forecast model (in Figure 7.8) to actively promote its business to clients. The
basic principle of the model is to use hydrological variables to forecast future
transaction amounts on Taobao, excluding the seasonal business fluctuation, and
to judge the amount of both client capital and ability to repay loans. It focuses
on marketing when the clients are at the peak of demand for capital. All the
marketing and feedback is recorded in the system and is further optimized in the
response model.
Transaction
Peak
sales
#/$
Peak
payments
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Marketing
Financial point
requirement Sales
trend Weeks
Figure 7.8 The hydrological transaction forecast model of Ali Small Loan.
Significant Variable 1
Personal Information Variable 1 Significant Variable 2
Variable 2 Significant Variable 3
Credit Information Variable 3
Variable Qualification Significant Variable 10
Customer History
Variable 10,000
Transactional Information
Variable N
Operating Status PD Rating
......
Performance Performance Forecast Window
Record Window
Observation Point
the online businesses in the Ali ecological system is fully utilized and considered as
the grounds for loan approval, settling the information asymmetry and complicated
procedure in loans for individuals and small and middle enterprises in traditional
commercial banking (Figure 7.9).
Big data-based credit and Internet lending 105
Ali Small Loan determines the lines of credit, interest rates and maturities of
loans according to the credit scores of the online businesses, financing, and guaran-
tees in transaction platforms. If the loan is approved, the client must sign a contract
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
with Ali Small Loan to connect the legal representative’s personal account to the
business’s Alipay account. Ali Small Loan then verifies the applicant’s real name and
the Alipay account to confirm the loan in the Alipay account.
Ali Small Loan perfectly merges the transaction and financing platforms. Lenders
have saved costs by providing required information as an independent third party
and discovering the opportunity to provide financing as one party in the transac-
tion in real time and at the frontier, improving the allocation of financial assets and
productivity.9
2.4 IT system
Ali Small Loan has designed a management system that covers the whole life cycle
of a loan, including: management before lending, management during and after
lending, anti-fraud, market analysis, and credit system.
For now, the following two types of models have been completed:
• Risk models including PD, operational risk models, monitoring and scoring
models, debt-collection scoring, and loss given default model
• Marketing models including client response, churn, client loyalty, life cycle,
cross-marketing, event-marketing, and client value.
• Anti-fraud models which are essential for online financial transactions, includ-
ing false trading model, false identity model, and account hacking model.
• Models for client behavior including drip-type growth analysis model, custom-
ized differentiation pricing model, and hydrological transaction forecast model.
• Ali credit model including address standardization, individual identification,
natural and legal persons identification, credit scoring, credit evaluation of sell-
ers, credit evaluation of buyers, and performance ability model.
106 Big data-based credit and Internet lending
Ali Small Loan’s decision-making system processes tens of millions of clients,
transactions and messages and over 10 terabytes data and outputs lines of credits for
RMB tens of billions.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Considering the 79.8 million registered users of Alibaba, with 10.3 million
online businesses and over one million paying members, if Ali Small Loan could
obtain a banking license, allowing it to absorb public savings and opening up its
ability to source capital, it would be very competitive.
Notes
1 Niu, Luchen. 2012. “Research on Loaning Reputation: Theory and Practice in a Credit
Center.”
2 As is pointed out in Chapter 6, the best estimate in theory is E(Y|X). Setting and
adjusting predictive function is to make the function g(X) as close to E(Y|X) as possible.
The Internal Rating-Based approach has four parameters to predict risk: (a) Probability
to Default (PD), the possibility that the borrower defaults in a certain period of time in
the future; (b) Loss Given Default (LGD), the percentage of economic loss in the total
risk exposure once a borrower defaults; (c) Exposure at Default (EAD), the estimate of
exposure on the bank once a borrower defaults; (d) Maturity (M). IRB measures two
dimensions of risk, the default risk of a borrower in Client Rating and the specific risk
in trade in Facility Rating. Client Rating, the rating on the default risk of the borrower,
suggests the credit status of the borrower itself, and adopts PD as the core variable.
Facility Rating, the rating of risk in a specific trade, suggests the specific risk in a trade,
such as collateral, priority, and the kind of trade, and adopts LGD as the core variable.
3 In this section, unless specified, all the materials on Ali Small Loan are from the speech,
“How We Operate Internet Finance.” by Lou Jianxun, manager of the Department of
Micro Loans in Ali Small and Mini Financial Services Group, in the Second Annual
Conference of the Zhejiang Finance Society in November 30, 2013.
4 Duffie, Darrell, and Kenneth Singleton. 2003. “Credit Risk: Pricing, Measurement, and
Management,” Princeton University Press.
5 The precise estimation of PD requires solving the CDS pricing problem. It is both very
complicated and technical. Interested readers may consult Hull, John, 2006. “Options,
Futures, and Other Derivatives,” 5th ed., Pearson Education Asia Limited.The net premi-
ums determined in life insurance that we discuss in Chapter 12 are in theory very similar
to CDS pricing. The Default Density Model we will discuss is the core of CDS pricing.
6 Our introduction on the Logit model mainly refers to Yunhui, Jin, and Sainan Jin. 2007.
“Advanced Econometrics,” Peking University Press.
7 Our introduction of Bayesian Criterion refers to Shidong, Liang. 2011. “The Theory and
Application of Measurement of Risk in Commercial Banking: The Core Techniques in
‘Basel Capital Accord’,” China Financial Publishing House.
8 Our analysis on Kabbage mainly refers to Liao, li. 2013. “Lectures on Internet Finance,”
PBC School of Finance, Tsinghua University.
9 This reveals the relationship between Internet exchange economy and Internet finance
that we discuss in Chapter 11.
8 P2P network loans
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
The P2P network loan is a new model of person-to-person lending which has been
developed in recent years. The reality that formal finance has not efficiently solved
the financing problems of small and medium-sized enterprises as well as replacing
private finance became the background for the development of P2P network loans.
However, information technology, especially the Internet, has significantly reduced
asymmetrical information and transaction costs. This gives new impetus to person
to person lending which can be seen as the earliest financial model and make up for
the inefficiency of formal financial institutions. P2P network loans can benefit both
investors (lenders) and borrowers. In this way, borrowers can enjoy more conveni-
ent financing channels and lower borrowing costs, while investors can obtain better
returns than bank deposits pay.
Zopa, the world’s first P2P network loan platform, was established in the United
Kingdom in March 2005. At present, in the P2P network loan industry, Lending
Club and Prosper are in the spotlight. Their operation is standardized, regulatory
measures are comprehensive, and information disclosure is sufficient. Between
them, the development of Lending Club is the most advanced. As a result, we will
focus on the analysis of Lending Club and take it as an example to discuss the eco-
nomics of P2P network loans.
Lending Club began operations in 2007 with its head office in Los Angeles, no sub-
sidiaries, and all business conducted by telephone or via the Internet. By the end of
October 2013, Lending Club had facilitated US$2.77 billion in credit transactions
and generated US$250 million interest income and now it is the world’s largest P2P
network loan platform. It is also still developing rapidly (Figure 8.1).
2,030 M
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
1,740 M
1,450 M
1,160 M
870 M
580 M
290 M
0
2007
2008
2009
2010
2011
2012
2013
Figure 8.1 Credit transactions facilitated by Lending Club.
Web Bankcash
monthly repay-provide
lending platform Raise money
Lending Club
Obtain note payment
Provide note
transactions Buy notes
Cash
flow
Lending Lending Lending
members members members
Although P2P means “peer to peer,” with respect to the operational framework
of Lending Club, legally speaking there are no direct obligatory relationships
between investors and borrowers. In fact, they register with an account name, which
is anonymous and unknown to other users. They are also not allowed to know the
other party’s real name and address. Investors purchase notes issued by Lending
Club according to the securities laws of United States. Loans to borrowers are
initially provided by WebBank and then transferred to Lending Club. Each series
of notes correspond to a sum of loans, and one is similar to mirror image of the
other. Excluding the service fee charged to investors by Lending Club, the monthly
principal and interest collected from the borrower is paid by Lending Club to the
holder of notes. If a borrower defaults, a corresponding holder of notes will not
receive any payment from Lending Club (Lending Club provide no guarantees for
investors).This does not constitute a breach of contract because Lending Club does
not take on credit risks related to credit transactions. As for WebBank, as lending to
P2P network loans 109
borrowers and transfers to Lending Club occur almost simultaneously, credit risks
related to credit transactions are not taken by WebBank. It is similar to the role of a
custodian bank. Credit risks are borne by investors.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2.39%
4.79%
0.91% 1.85%
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
0.78%
Refinance
5.87%
Repayment of credit card
Home improvement
House purchase
from high to low, and each grade has five segments (the total is thus thirty-five credit
rating levels).The ratings are generated in two steps. Step 1 goes according to the bor-
rower’s FICO credit score and other credit characteristics. Lending Club has a model
rank, and every model rank corresponds to a standard credit rating. Step 2 revises the
original rating according to loan amount and gives a final credit rating.The larger the
loan amount and the longer the loan period, the larger the downgrade from the stand-
ard credit rating (Table 8.1).
1 2 3 4 5
Credit rating A 1 2 3 4 5
B 6 7 8 9 10
C 11 12 13 14 15
D 16 17 18 19 20
E 21 22 23 24 25
(The relationship between standard credit rating and model rank)
A B C–E
$5,000–<$10,000 0 0 0
P2P network loans 111
A B C–E
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
$10,000–<$15,000 0 0 0
$15,000–<$20,000 0 0 –1
$20,000–<$25,000 0 –1 –2
$25,000–<$30,000 –1 –2 –3
$30,000–<$35,000 –2 –3 –4
$35,000 –4 –5 –6
(Loan amount and credit rating adjustment)
3 years A–G 0
5 years A–G –8 to –4
(Loan period and credit rating adjustment)
Interest Grade
1 2 3 4 5
rowers through normal electronic fund transfers. Lending Club also has recourse to
any defaulted loans and is empowered to decide whether or when to transfer the
loans to a third-party collection agency.
3 Investors
For investors, Lending Club has set qualifications such as minimum income and
wealth (measured by net assets), and investment on Lending Club can be no more
than 10% of his/her total wealth, but a credit check is not necessary. Moreover,
Lending Club has established an investment consulting company called LC
Advisors. LC Advisors resembles a fund manager, raising external capital to invest
in notes issued by Lending Club.
Investors can choose notes that they wish to purchase on Lending Club’s
website. Due to the great amount of notes, it provides search and filter tools in
addition to a portfolio building tool. The minimum investment in each note is
US$25. For example, Lending Club will recommend a notes portfolio after the
investor specifies risk and return parameters (Figure 8.4).
For investors, it is a very effective method of risk diversification. For instance,
statistics indicate that if an investor purchases 100 notes, the possibility of incurring
loss is 1%. If an investor purchases 400 notes, the possibility of incurring loss is 0.2%.
If an investor purchases 1,000 notes, incurring loss is nearly impossible (Figure 8.5).
Later we will explain this phenomenon.
A 1 1.11% 3.00%
C
14.37%
Risk / Reward
To be clear, when investors subscribe to notes, the notes are actually not
issued and loans are not made. When the subscription is full, notes are issued to
investors and Lending Club receives the subscription payment (historically, 99%
of notes are fully subscribed). Meanwhile, WebBank makes corresponding loans
and transfers those loans to Lending Club. The notes that Lending Club issued
will not be listed and traded on any exchange, but Lending Club has established
a notes transaction platform called FOLIOfn to provide notes transfer services
with investors, equivalent to setting up a secondary market for notes to provide
liquidity.
45%
Percent of Lending Club investors
40%
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
35% 33.61%
30% 28.74%
25%
20%
15% 14.64%
11.12%
10% 8.93%
5%
1.00% 1.96%
0%
< 0% 0% – 3% 3% – 6% 6% – 9% 9% – 12% 12% – 15% > 15%
Net annualized return
100 loans
45%
Percent of Lending Club investors
40%
36.66%
35% 32.40%
30%
25%
20%
15% 14.96%
10% 7.86%
7.33%
5%
0.20% 0.59%
0%
< 0% 0% – 3% 3% – 6% 6% – 9% 9% – 12% 12% – 15% > 15%
Net annualized return
400 loans
45%
Percent of Lending Club investors
40% 38.33%
35% 33.33%
30%
25%
20%
15.32%
15%
10%
6.42% 6.27%
5%
0.00% 0.34%
0%
< 0% 0% – 3% 3% – 6% 6% – 9% 9% – 12% 12% – 15% > 15%
Net annualized return
800 loans
SEC+
FDIC UT DFI state
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
regulators
Certificate $ SEC
LC Advisors
Funds &
SEC(IA) A Lending Club
SMAs
Company Management
There are many perspectives we may use to analyze P2P network loans. The
first is the legal perspective, which analyzes legal contracts and legal risks of P2P
network loans. There is much debate as to whether it involves illegal fund-raising
and illegal pooling of deposits. The second perspective analyzes the capital flows
of P2P network loans. The third perspective is risk, which analyzes major risk
types, risk-taking behavior, and risk transfer. We will follow the third perspective
because we consider it the best way to examine the economic impact of P2P
network loans.
member fee paid by other feet of society in every round should deduct the interest
portion that the collector is willing to pay. In premium bid, after the member who
collects member fee receives the current member fee, he/she pays other members
an agreed amount of interest.3
The head grants a loan and repays it in amortization.The last round foot of soci-
ety essentially make an installment saving. Middle feet of society participate in an
installment saving and then obtain a loan with amortized repayment.To better ana-
lyze the debt and liability relationship of bidding society, we describe a four-person
bidding society. Relevant conclusions are true even in more complicated situations.
Assume the member fee is m dollars, the bidding price of second and third
round collectors are b2 and b3, then the cash flow is
⎛ 3m −m −m −m ⎞
⎜ −m 3m −m −m ⎟
⎜ ⎟ (8.1)
⎜ − m − m − b2 3m + b2 −m ⎟
⎜ − m − m − b2 − m − b3 3m + b2 + b3 ⎟⎠
⎝
Each row indicates the cash flow of every participant in sequence.The first row
is the cash flow of the head of society and the last row is the last collector’s cash flow,
and so on. Every column indicates the cash flow of participants in t = 1, 2, 3, 4, ….n
round in sequence. A plus sign signifies capital inflow while minus sign is a capital
outflow. We can decompose the cash flow of this bidding society:
⎛ 3m −m −m −m ⎞
⎜ −m 3m −m −m ⎟
⎜ ⎟
⎜ −m −m − b2 3m + b 2 −m
⎟ (8.2)
⎜⎝ −m −m − b2 −m − b3 3m + b 2 + b 3 ⎟⎠
⎛ m −m 0 0 ⎞ ⎛ m 0 −m 0 ⎞ ⎛ m 0 0 −m ⎞
⎜ −m m 0 0 ⎟ ⎜ 0 0 0 0 ⎟ ⎜ 0 0 0 0 ⎟
= ⎜ ⎟ + ⎜ ⎟ + ⎜ ⎟
⎜ 0 0 0 0
⎟ ⎜ −m 0 m 0
⎟ ⎜ 0 0 0 0
⎟
⎝ 0 0 0 0 ⎠ ⎝ 0 0 0 0 ⎠ ⎝ −m 0 0 m ⎠
⎛ 0 0 0 0 ⎞ ⎛ 0 0 0 0 ⎞ ⎛ 0 0 0 0 ⎞
⎜ 0 m −m 0 ⎟ ⎜ 0 m 0 −m ⎟ ⎜ 0 0 0 0 ⎟
+⎜ ⎟ +⎜ ⎟ +⎜ ⎟
⎜ 0 −m − b2 m + b2 0
⎟ ⎜ 0 0 0 0
⎟ ⎜ 0 0 m −m
⎟
⎜⎝ 0 0 0 0
⎟⎠ ⎜⎝ 0 −m − b2 0 m + b2 ⎟⎠ ⎜⎝ 0 0 −m − b3 m + b3 ⎟⎠
P2P network loans 117
Equation (8.2) decomposes the bidding society to a series of debt and credit
⎛ 0 0 0 0 ⎞
⎜ 0 m −m 0 ⎟
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
credit expands, risk control mechanisms become ineffective, and risk accumulates.
Private credit will then rack up bad debts and harm social networks’ trust relation-
ship. Incremental private credit will then sharply decrease, and a credit squeeze
will result. This credit squeeze will directly affect the local real economy, whose
weakness will weigh on the private finance market.The squeeze can only be termi-
nated after bad debts have been written off, balance sheets have been repaired, and
private social trust relations are rebuilt. In recent years, this case actually happened
in Wenzhou and Ordos in China. P2P network loans are different. They involve
an impersonal transaction that does not considerably rely on social networks, so
investors are sufficiently diversified. On the other hand, P2P network loans may be
subject to a credit cycle.
3 Core technology
3.1 Risk pricing
The core technologies of P2P network loans for borrowers are mainly internal credit
rating and lending rate determination. Internal credit rating is essentially the classifica-
tion problem discussed in Chapter 6 (the main models are in Chapter 7), which means
dividing borrowers into different grades by the probability of default. If lower credit
P2P network loans 119
ratings mean the credit profile is worse, the credit rating system is effective. One of the
measurement tools is Receiver operating characteristic (ROC) curves. The larger the
area below the ROC curve, the more effective the credit rating. For instance, the ROC
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
curve of Lending Club indicates that it is more effective than FICO08 (see Figure 8.7).
Theoretically, interest rate pricing of P2P network loans resembles bond pricing.
The lending rate equals the risk-free interest rate plus a risk premium. The lower
the credit rating, the higher the risk premium must be in order to reach a balance
(Table 8.4).
90%
80%
70%
60%
50%
40%
Pricing model KS: 27.1%
30%
FICO08 KS: 14.5%
20%
Random
10%
0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Credit rating Bad loan ratio Average lending rate Net annual rate
of return
value:
n
E (L ) = ∑ w ⎡⎣(1-P ) r
i i i − Pi λi ⎤⎦ (8.3)
i =1
The risk characteristics of the loan portfolio can be depicted by Credit Value at
Risk (CVaR). Assume confidence level as θ , let CVaR ( L ,θ ) indicate the credit risk
value under a certain confidence level, and the definition is:
Credit risk value actually also describes the distribution of the portfo-
lio’s rate of return. For example, assuming the cumulative distribution func-
tion of L is G (l ) = Pr ( L ≤ l ), we have an implicit function relationship:
G ( −CVaR ( L ,θ )) = 1 − θ .
In the Asymptotic Single Risk Factor (ASRF)5 model, the value at risk of the
loan portfolio equals the sum of every sum of loan value at risk
n
CVaR ( L ,θ ) = ∑ w CVaR ((1 − X ) r
i i i − X i λi ,θ ) (8.5)
i =1
⎛ Φ −1 ( Pi ) ρi ⎞
CVaR ((1 − X i ) ri − X i λi ,θ ) = λi Φ ⎜ + Φ −1 (θ )⎟ (8.6)
⎝ 1 − ρi 1 − ρi ⎠
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
⎛ 1 − e −50 P ⎞ i
Of which, ρi = 0.12 ⎜ 2 −
⎝ ⎟ , Φ (⋅) indicates a cumulative distribution
1 − e −50 ⎠
function with standard normal distribution. Equations (8.4) through (8.6) describe
the risk characteristics of the loan portfolio. By similar means we can explain the
risk diversification effect of P2P network loan investors. For brevity, assume in the
above model that investments are even in every sum of loans and the risk charac-
1
teristics of loans are the same. That is, w i ≡ , ri ≡ r , Pi ≡ P , λi ≡ λ , i = 1, 2,… , n .
n
1 n
Then the rate of return for a loan portfolio is L = ∑ L i .We introduce an indicator
n i =1
⎧⎪ 1 Default 1 n
that indicates if the loan i defaults: L*i = ⎨ and define L* = ∑ L*i
0 No Default n i =1
⎩⎪
to indicate the ratio of default in the loan portfolio. As L i = r − ( r + λ ) L i , the rate
*
⎛ 1 − ρ Φ −1 ( x ) − Φ −1 ( P ) ⎞
F ( x ) = Pr ( L* ≤ x ) = Φ ⎜ ⎟ (8.7)
⎝ ρ ⎠
⎛ 1 − e −50 P ⎞
Of which ρ is 0.12 ⎜ 2 − ⎟ , the probability of facing a loss for the
⎝ 1 − e −50 ⎠
portfolio is:
Pr ( L < 0 ) = Pr ⎛ L* >
r ⎞
= 1− F⎛
r ⎞
(8.8)
⎝ r + λ⎠ ⎝r + λ⎠
can offer a credit insurance function. After investors pay a certain insurance pre-
mium (the rate is determined by big data analysis, as in Chapter 12), part or all of
the borrowers’ credit risk can be transferred out. This will not only provide inves-
tors with new risk control tools but also extend the transaction probability frontier
of P2P network loans.
Notes
1 Refer to “Internet Finance Handouts,”Wudaokou school of finance,Tsinghua University.
2 Abbreviations in this graph mean: (1) UT DFI, Utah Department of Financial Institutions;
(2) FDIC, Federal Deposit Insurance Corporation; (3) SEC, Securities and Exchange
Commission.
3 Description of bidding society in this period in cited from: Xiang Zhang, Chuanwei
Zou: “Generating Mechanism of Bidding Society,” “Financial Research,” 2007–2011.
4 Xie, Ping, and Chuanwei Zou. 2013. “Fundamental Theoretical Research on Bank’s
Macroprudential Regulation.”
5 Gordy, M. 2003. “A Risk-Factor Model Foundation for Ratings-Based Bank Capital
Rules.” Journal of Financial Intermediation, no. 12, 199–232.
6 Vasicek, O. 2002. “Loan Portfolio Value.” Risk, no. 15, 160–162.
7 Mainly two documents: BCBS, 2004, “International Convergence of Capital
Measurement and Capital Standards: A Revised Framework” and BCBS, 2005, “An
Explanatory Note on the Basel II IRB Risk Weights Function.”
9 Crowdfunding
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
5 Kickstarter guidelines7
In order to keep its focus on innovative project financing, Kickstarter asks all
fundraisers to obey following three criteria:
Kickstarter has additional requirements for hardware and product design projects
including: prohibiting the use of photo-realistic renderings and simulations to dem-
onstrate product, limiting the amount of individual projects or “set of ideas” project
donations, requiring physical prototypes, and a requirement to lay out plans. These
guidelines are intended to support Kickstarter's policy of supporting funding to
complete projects rather than seek product orders. Kickstarter has also stressed the
notion that the creation of a project depends on a collaboration of fundraisers
and funders. All types of projects should describe the risks and challenges faced
Crowdfunding 125
in the creative process. To educate the public and encourage their contribution to
society is also one of Kickstarter’s goals.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Loan
Front-end sales
Donation Sponsor
Reward
Application
Information
Bank
forms in the United States, Britain, France, the Netherlands, Belgium, and Finland
to sketch the developments (see Table 9.2). Our ten crowdfunding samples
include Kickstarter (US), IndieGoGo (US), RocketHub (US), SliceThePie
(UK), Sonicangel (UK), Ulule (France), MyMajor (France), PledgeMusic
(US and UK), SellaBand (Netherlands and Belgium), and Grow VC (Finland
and UK). From this examination, we outline a few salient characteristics of
crowdfunding.
First, crowdfunding platforms can usually be classified as emerging enterprises.
The longest amount of time from the launch date to the time of the literature
references9 given (as of January, 2011) is fifty-three months. The shortest is only six
months. Second, crowdfunding projects depend on platform visibility and sound
rules. Kickstarter issued a total number of 12,000 projects in this time period,
an average of 571 per month. In total, the ten platforms we examined released
51,477 items and averaged 258 projects per month.
Second, only a small fraction of released projects will be chosen. Among
Kickstarter’s 12,000 items, more than 5,000 projects were funded.This selection rate
(the number of projects funded by the selected/number of items released) is slightly
greater than 42%. The ten platforms together selected a total of 11,414 items, with
a selection rate of around 25%.
Third, the number of successful crowdfunding projects is even lower. Under
the crowdfunding provision point mechanism (explained in detail below), the pro-
ject cannot carry on once it failed to get enough funding during a defined period
and needs to return previously raised funds to investors. Pre-selected items may
not be able to reach a predetermined threshold. 3,500–4,000 projects succeeded
during the period, with a success rate (number of successfully funded projects/
number of items chosen by funders) of 70%–80%. The success rate over the ten
platforms was 64%.
Fourth, a large number of funders participate in crowdfunding. Kickstarter
funders total 400,000, an average of 19,000 per month of operation; seven
crowdfunding platforms indicated that the average number of contributors is
84,200, which means each platform has an average of 3,900 funders per month
of operation.
Fifth, the minimum financial contribution is low. Kickstarter raised €24.6 million
for an average per project over €4,920, and the total amount over ten platforms
is €45 million for an average of €3,942 per project. Each funder contributed an
average of €62.9.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Platform (country) Field Start date Projects Selected Successful Number Funding Paid Average Platform
(moment till amount projects(selecting amount (suc- of funders amount € amount funding fee
2011.1) (monthly) rate) cessful rate) (monthly) (each pro- (€) (€)
ject) (€)
Kickstarter (US) For-profit 2009.4 (21) 12,000 >5,000 3,500–4,000 >400,000 >€24.6 m ? 50 5%
(571) (>42%) (70%–80%) (>19,000) (>4,920)
SellaBand Music 2006.8 (53) ? 54 38 CDs >70,000 >€ 2.7 m 2.7 m 41 15%
(NL/DE) (70%) (>1,320) (>50,000)
Ulule (F) Any 2010.10 (4) 169 (42) 53 (31%) 42 (80%) 4,818 €100,000 70,000 32 0%
(1,204) (1,887)
PledgeMusic Music 2009.7 (19) >2,700 2,079 (77%) 132 (6%) 74,000 ? ? 65 15%
(UK/US) (>115) (3,895)
Sonicangel (B) Music 2010.4 (11) 1,500 (142) 13 (0.8%) 12 (92%) 3,500 (318) ? ? 46 0%
(dividend)
(continued)
Crowdfunding
129
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Platform (country) Field Start date Projects Selected Successful Number Funding Paid Average Platform
(moment till amount projects(selecting amount (suc- of funders amount € amount funding fee
2011.1) (monthly) rate) cessful rate) (monthly) (each pro- (€) (€)
ject) (€)
Crowdfunding
MyMajor (F) Music 2007.10 18,000 (473) 36 (0.2%) 15 (42%) 3,0000 (789) €5 m 360,000 150 0%
(38) (13,8889) (dividend)
Grow VC (FIN Startup 2010.8 (6) 1,758 (293) 73 (4.1%) ? 7,229 €11.6 m ? ? 25% of
UK internat.) (1,205) (148,904) ROI
Total or average 51,477 (258) 11,414 (25%) 64% 84,200 >€45m 62.9
(51.7) (3,942)
Crowdfunding 131
SECTION 3: THE ECONOMICS OF CROWDFUNDING11
1 Common characteristics
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2 Incentives
Project managers, funders, and platforms are the three major players in the
crowdfunding process. Here we discuss their incentives.
1 Better matching: Project managers can match investors with the highest
willingness to fund. Funders of these projects are no longer limited to specific
areas (e.g., in close geographic proximity).
2 Bundling: During the crowdfunding process, funders can get products in
advance and confirm innovative value under certain conditions. However, to
132 Crowdfunding
some extent, crowdfunding also helps project managers bundle share sales to
obtain funding and reduce the cost of capital by pre-selling the product.
3 Information: To some extent, crowdfunding can produce more information
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2.2 Funders
One of the key benefits to funders is the ability to seek investment opportunities.
Early corporate funders are traditionally located near businesses, but crowdfunding
offers investment global opportunities.14 Another benefit is early access to new
products. Crowdfunding projects turn product fans into early shareholders, and
their participation can enhance the value of the company. Crowdfunding also func-
tions as a built-in social network. For investors, crowdfunding is essentially a social
activity through which they can achieve improved, low cost communication with
project managers. Investors can also support a product, service, or idea. Charity
plays an important role on crowdfunding platforms. Some funders neither receive
tangible material rewards nor participate in related online communities. Their goal
is simply to find new products and new businesses with high potential.
media attention and coverage, which further expands existing funders, enhances
projects’ probability of success and benefits the platforms.
3 Crowdfunding risks
3.1 Project manager
Information disclosure is the number one problem for crowd fundraisers. In most
cases, a project manager must reveal some private information to early funders
before selling his/her goods. However, the recipients are limited, which poses
far fewer risks than posting similar information on the Internet for all, including
potential competitors and imitators, to see. It could also be detrimental to bargain-
ing power with potential suppliers.
Another problem stems from the fact that crowdfunders tend not to be profes-
sional investors. Angel investors and venture capitalists tend to bring additional value
to the company through expertise and networks that can help a company further
develop its capacity. Crowdfunders on the other hand provide limited investment,
bring little experience or value and are not likely to make much post-investment
effort.
Additionally, the cost of managing funders may rise significantly as funders
multiply. Unlike angel investors or other venture capital, crowdfunding typically
requires small amounts of money from a large audience in order to obtain the
expected capital scale for project operational needs. This dispersion of ownership
can add costs to dividend payment, voting, and eventual reorganization of a com-
pany or its equity.
asymmetry: reputation signaling, rules and regulation, group due diligence, and
provision point mechanisms.The first three reduce information asymmetry between
producers and funders, while the fourth helps to reduce the free-rider problem.
service results in positive evaluations, which then attract new customers. The
literature confirms the importance of seller and customer evaluations on Internet
platforms.22 However, even a good producer is not likely to raise money repeatedly
on crowdfunding platforms over a short time period. A potential solution is to
divide a sizeable project into a series of smaller ones.
them to “free ride” on due diligence done by others. However, a large number of
funders means an examination of the project’s prospects from many different angles,
which together could lead to a unique sort of due diligence.
However, problems such as herding may reduce the effectiveness of collective
due diligence. Research shows that crowdfunders regard accumulated capital as
an important signal of quality. Project financing generally increases in accordance
with the degree of difficulty (see Figure 9.1). In the initial phase, crowdfunders
invest in projects sponsored by the project owner’s relatives and friends, which stand
in for quality and professional acceptance. Funders thus “herd” by choosing pro-
jects that are already funded. Besides, project managers may use prophase-financing
data to attract funders. In extreme conditions, producers may take advantage of
this by devoting much capital in early stages to then attract new funders, then
withdraw the capital they invested earlier. Platform rules can work to prevent this
from happening.
funds and equity transactions to meet their needs.This activity is also beneficial due
to a positive spillover effect. In particular, crowdfunding focuses on enterprises in
early stages, many of which may produce innovative products. The production this
finances meets societal needs that may otherwise go unsatisfied.
Crowdfunding is, however, not perfect. It will definitely result in some social
loss. For example, new forms of fraudulent activity and new securities sales methods
could lead inexperienced or reckless individuals to make imprudent investment
decisions. Regulation should be designed to minimize these effects while maximiz-
ing the positive aspects.
After the most recent financial crisis, we believe that governments should regulate
Internet finance. However, it is also necessary to take into account the special char-
acteristics of Internet finance.
1 Necessities of regulation
When the market is efficient (the ideal case of Internet finance, see Chapter 1), mar-
ket participants are rational and their self-interested behaviors make it possible to
automatically achieve market equilibrium through the “invisible hand.” The market
both balances prices fully and accurately reflects all available information.When this
point is reached, Internet finance regulation should follow the concept of “laissez-
faire,” the key objectives of which are to remove factors causing market inefficien-
cies and to allow the market mechanism to play a role with little or no regulation.
We justify this assertion through three principal assumptions. First, the market price
signals will be correct, so we can rely on market discipline to take effective control
of harmful risk-taking behavior. Second, we make it possible for financial insti-
tutions to fail, thus achieving the survival of the fittest in a competitive market.
Finally, it is not necessary to supervise financially innovative products. Unnecessary
or non-value-creating innovations will be eliminated under market competition
and discipline.Well-regulated financial institutions will not develop high-risk prod-
ucts, and consumers with full information will only choose products that meet their
own needs. Additionally, in terms of determining whether the financial innovation
is valuable or not, regulatory authorities may not take the best position. Instead,
regulation may inhibit beneficial financial innovation. However, before reaching the
140 The regulation of Internet finance
ideal situation, non-effective factors like asymmetric information and transaction
costs still exist, making the concept of laissez-faire regulation not applicable.
First of all, individuals may be irrational in Internet finance. For example, in
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
P2P network loans, investors lend personal credit loans to borrowers. Even if the
P2P platform accurately reveals the borrower’s credit risk and the investment is
diversified enough, it remains a high risk investment. Investors may not be able to
fully understand the impact on individuals when the investment fails. Therefore,
for P2P network loans, it is necessary to introduce regulation to protect investors.
Second, individual rationality does not necessarily imply that collective ration-
ality is achieved. For example, in the “third-party-payments plus money market
fund,” exemplified by Yu’E Bao, investors buy fund shares in the money market (see
Chapter 3). Investors can redeem their fund at any time, but money market fund
positions generally have a longer maturity. This means one may be forced to sell at
a discount in the secondary market, initiating problems like maturity mismatch or
insufficient liquidity. If money market volatility occurs, investors may redeem their
funds in order to control risks, which is absolutely rational from the individual’s
perspective. It is problematic that money market funds will encounter a run if there
are large-scale redemptions, which is irrational from the collective point of view. In
September 2008, one of the oldest US Money market funds, the Reserve Primary
Fund, suffered this after the bankruptcy of Lehman Brothers. The Reserve Primary
Fund was exposed to Lehman Brothers, and the writedowns on the Lehman com-
mercial paper they held led them to “break the buck,” or fall below a net asset value
(NAV) of $1. Therefore, institutional investors scrambled to redeem their invest-
ments although the net loss was no more than 5%. Thus, the fund had to be liqui-
dated.The whole money market fund industry then suffered the hit of redemptions
overnight. The liquidity crunch had also spread to the entire financial system, and
the central banks of related countries had to team up to launch massive liquidity
support measures. Such collectively irrational behavior exhibited by institutional
investors is entirely possible for individual investors as well.
Third, market discipline may not able to control harmful risk-taking behaviors.
In China, there exist various implicit and explicit guarantees against investment risks
(e.g. implicit deposit insurances, implicit promises from banks for financial products
sold at their branches), and investors have become accustomed to “fixed pay-outs.”
This implies that risk-based pricing mechanisms have failed. In this environment,
some Internet financial institutions have launched high-risk and high-yield products.
They try to attract investors and achieve a large scale through expected high-returns.
However, they may not truthfully reveal risks. There is a huge moral hazard.
Fourth, if Internet financial institutions involve in large number of users and
reach a certain scale of funds, it is difficult to solve the problem by clearing the
market in a crisis situation. If the institution provides payment, clearing, and other
basic financial services, its bankruptcy may also damage the infrastructure of the
financial system, posing a systemic risk. For instance, the scale of people involved
and business funds are so large in Alipay and Yu’E Bao that they have reached
systemic importance.
The regulation of Internet finance 141
Fifth, Internet financial innovation may have major defects. For example, P2P
network loans in China appear to be a mixed bag. In some P2P platforms, customer
funds and platform funds are not effectively separated. There are thus situations in
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
which platform managers escape with customer’s money. Some P2P platforms
have aggressive marketing strategies, selling high-risk products to people who do
not have the capacity for risk identification and risk bearing (e.g. retired people).
Some P2P platforms even breached the regulatory red line of illegal fund-raising
and illegal deposits. Take Bitcoin as another example: because of the characteristic
of anonymity, it is used in money laundering, drug trafficking and other illegal
activities.
Sixth, there may be fraud and irrational behavior in the consumption of Internet
financial products, finance institutions may develop or sell overly risky products,
and consumers may buy products they do not understand. For example, when
sold online, some products generally disclose their expected rate of return without
explaining how they achieve it or the potential risk factors. Some products even
use subsidies, guarantees, “loss leaders,” and other ways to magnify gains, which are
not pure market competitive behaviors. On the other hand, some consumers are
even unclear on the differences between P2P network loans, deposits and bank
financial products because of their limited financial knowledge and, expectation of
“fixed-payouts.”
Meanwhile, behavioral finance also supports the need for regulation of Internet
finance. It studies the irrational behavior of individuals and problems with the
market. On the one hand, psychological research on cognition and preferences
are introduced, implying that individual behavior does not necessarily meet the
description of the rational expectations hypothesis; on the other hand, it studies the
limits of arbitrage, which can hinder the achievement of market equilibrium. Thus,
it can prove that the efficient market hypothesis is not necessarily true. The revela-
tion behavioral finance gives us when considering questions in Internet finance
are as follows: first, we must curb excessive speculation. For instance, the deflation-
ary effect of Bitcoin comes with serious problems of speculation (see Chapter 5).
Second we should restrict market access. Internet financial institutions and investors
are not completely rational, so certain markets or products should only open to
those who satisfy certain conditions. Third, we should strengthen the supervision
of Internet financial innovations and promptly correct any problems. Fourth, we
must strengthen protection for financial consumers. Fifth, we need regulation that
fits investor needs.
Therefore, for Internet finance, we cannot adopt the concept of laissez-faire
because of its immaturity, instead we should promote it with regulation. We need
to encourage limited, well-regulated innovation in Internet finance.
2 Specialties of regulation
Compared with traditional finance, Internet finance has two unique characteristics.
These present several risks to which we should pay attention.
142 The regulation of Internet finance
2.1 Information technology risks
Because of increased connectivity (see Chapter 1), IT risk becomes a problem in
the Internet finance, such as computer viruses, computer hacking, insecure pay-
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
ments, online financial fraud, financial phishing sites, customer data leaks, illegal
identity theft, or tampering. The Vice Chairman of the China Banking Regulatory
Commission, Yan Qingmin, explained that information technology risk can be
understood from three perspectives: exposure source, objects impacted, and the
influence on responsible units.1
Sources of information technology risk are divided into four categories:
1 Security risks, such as information that has been tampered with, stolen or used
by unauthorized organizations
2 Availability risks, which means information or applications are unavailable due
to system failures or natural disasters
3 Performance risks, meaning that the poor performance of systems, applica-
tions, or personnel lead to low efficiency of transaction and operation, as well
as value destruction
4 Compliance risks, including the handling and processing of information
that does not meet the requirements of laws, regulations or policies made by
The regulation of Internet finance 143
IT or financial institutions, which may damage the reputation of financial
institutions
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
The core of functional regulation is to set regulation based on the business and risks
of Internet finance. Internet finance should accept regulation consistent with that
of traditional finance if its function is similar. Different Internet financial institu-
tions should be subjected to the same regulation if they are engaged in the same
business or are subject to the same risks, otherwise it is likely to cause regulatory
arbitrage. This is not only harmful to fair competition in the market, but also gives
rise to regulatory blind spots. Institutional regulation also corresponds with func-
tional regulation. Although institutional regulation is clearer in regulatory issues,
functional regulation involves more basic theories and methodology. It is necessary
to discuss this before discussing institutional regulation.
Functional supervision mainly refers to supervision of risk. It is based on
risk identification, measurement, prevention, early warning, and disposal. Like
traditional finance, the risks of Internet finance mean the possibility of future loss.
Conceptual and analytical frameworks of market risks,4 credit risks,5 liquidity risks,6
operational risks,7 reputational risks,8 and legal compliance risks9 are adaptable to
Internet finance.10 There also exist problems of misleading consumers, exaggerated
marketing, fraud, etc. Therefore, there are no significant differences between
144 The regulation of Internet finance
conventional finance and Internet finance in the functional regulation area. They
can be divided into three categories: prudential regulation, behavioral regulation,
and protection for consumers of financial products (although specific measures may
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
1 Prudential regulation
The goal of prudential regulation is to control the externalities of Internet finance and
protect the public interest.11 According to microeconomic theory, externalities refer
to a situation in which the behavior of economic actors will directly affect the welfare
of other consumers and the production capacity of other vendors. If additional restric-
tions are not imposed on the market, the equilibrium yield is lower than the socially
optimal level when the externality is positive, while higher when the externality is
negative (in general, the financial sector belongs to the latter case). The basic meth-
odology of prudential supervision is to introduce a series of risk management tools
based on risk identification (generally using methods of regulatory limits) to control
risk-taking behaviors of Internet financial institutions and the negative externalities
they produce for society. Therefore, the socially optimal level may be reached.
At the moment, the externalities of Internet finance revolve primarily around
externalities of credit and liquidity risks. To deal with this, we can design practices
of banking regulation according to the principle of “substance is over form,” and
design regulatory measures for Internet finance.12
reserve pools (e.g. 2% of total loans) to offer capital protection for investors. Risk
reserve pools are functionally consistent with bank reserves for asset losses. How do
we determine the appropriate size of the risk reserve pool? The capital adequacy
ratio for banks is 8%, calculated as the bank’s capital divided by risk-weighted assets.
The average risk weight is about 50%, thus bank capital assets must account for 4%
of total assets. Correspondingly, the risk reserve pool of P2P platforms should be
4% of total loans. Of course this is just a simple calculation to illustrate the relevant
regulatory logic. More specific standards for risk reserve pools should be deter-
mined according to risk measurement.
2 Behavioral regulation
Behavioral regulation, including regulation of Internet financial infrastructure,
financial institutions, and related behavior of participants, is aimed to make Internet
146 The regulation of Internet finance
finance transactions more secure, fair and effective. In a certain sense, behavioral
regulation optimizes Internet finance operations.
We first emphasize regulation of the shareholders and managers of Internet
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
financial institutions.The certification process should exclude those who are impru-
dent, lack requisite capacity, are dishonest, or have a poor record as shareholders
and managers. On the other hand, once operations have started, regulators should
strictly control transactions among shareholders, managers, and Internet financial
institutions to prevent them from damaging the legal interests of Internet financial
institutions and customers through means of asset expropriation and fraud, etc.
Second, behavioral regulation focuses on deposits, trusts, the trading and clearing
system of funds, and securities related to Internet finance. On the one hand, we
must improve the efficiency of Internet financial operations and control operation
risks; on the other hand, platform-based Internet financial institutions must prevent
misappropriation of client funds by clearly separating platform and customer’s
money, and taking measures against other potential malfeasance.
Third, Internet financial institutions are required to have a sound organizational
structure, internal control system and risk management measures, business premise,
IT infrastructure, and security arrangements.
quasi-fraud activities are generally difficult to stop and punish. Many cannot even be
disclosed. In this case, self-regulation will fail, and the government will take manda-
tory regulatory powers. The primary measures which must be taken are as follows:
First, we must require financial institutions to strengthen information disclosure.
Terms and conditions of Internet financial products should be simple and clear, and
the information must be transparent. Then, consumers of financial products can
understand the relationship between risks and returns.
Second, we should give consumers their own advocacy channels. The first is
a compensation mechanism. Just as those who buy electrical equipment are able
to ask for compensation when encountering fake products, consumers of finan-
cial products should also be able to make a claim when they encounter situations
of misleading or exaggerated marketing and fraud. The second requirement is an
action mechanism. The original provisions of US law stipulated that class actions
lawsuits are only available for stock investment. However, after this round of finan-
cial crisis, consumers are allowed to sue banks, insurance companies and securities
companies if there is fraud, and sales agencies may also be forced to take joint
responsibility. This mechanism can be used in consumer protection.
Third, we must be able to detect regulatory loopholes promptly by receiving
complaints from consumers and taking swift action. At the moment, some quasi-
fraudulent products are difficult to be discovered by regulators, but this must be
improved.
Fourth, the Internet should be used as a platform to allow consumer complaints
to be broadcast widely.When a consumer of financial products finds problems with
products and publishes them online, other consumers can become “free riders.”
Protection thus expands to all consumers of the financial product.This is equivalent
to the use of the principles of social networking and big data.
Among the six major types of Internet finance listed in this book (see Chapter 1),
P2P network loans and public financing loans most urgently require regulation.
Other forms more or less already have an established regulatory framework. This
section will focus on the regulation of P2P network and public financing loans.14
Organizational regulation operates on the premise that similar institutions engage
in similar businesses and produce similar risks. They should therefore be subject to
similar regulation. However, there have been mixed results for this approach so far
in Internet finance. In this case, we need to formulate regulatory measures from
an organizational perspective according to specific businesses and risks of financial
institutions. We must also coordinate supervision more effectively.
148 The regulation of Internet finance
1 Current regulatory framework
Online banking, mobile banking, online securities companies, online insurance
companies and online financial trading platforms (see Chapter 1) act as substitutes for
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Second, cooperative products of “third party payments and money market fund”
are required to fully disclose information of fund distribution (including security
types, issuers, counterparties, amounts, duration, rating, and other dimensions) and
redemption.16
Third, cooperative products of “third party payment and money market funds”
should meet conditions like average duration, rating, and investment concentra-
tion to ensure that there are sufficient liquidity reserves to cope with large investor
withdrawal under stress scenarios.
1 There is no direct credit and debt between investors and borrowers. Investors
purchase bills (i.e. usufruct certificate) registered and issued by P2P platforms
according to US Securities Law, while loans to borrowers are first offered by
third-party banks, and then transferred to the P2P platform.
2 The relationship between bills and loans is like a mirror. Borrowers repay the
loan principle and interest, and P2P platforms pay holders of corresponding
bills in the same quantity.
3 If the borrower defaults on the loan, the holder of the corresponding notes
will not receive payment from P2P platforms (i.e., P2P platforms do not offer
guarantees for investors), but this does not constitute a breach of contract for
the P2P platform itself.
4 Personal credit is highly developed (such as FICO credit score). P2P platforms
do not have to carry out a much due diligence.
Overall, Chinese P2P network loans are more similar to private loans over the
Internet. Currently, Chinese P2P network loans exceed other countries in terms of
both the number of loan institutions and total loans issued. The “Chinese” process of
P2P network loans has produced many unique business models, operating systems
and potential risks. Some regulators have already expressed their concern with this
growing business. The deputy governor of the People’s Bank of China Liu Shiyu
(also the group leader of “Development and Regulation of Internet Finance” in the
State Council) stated on December 4, 2013 that central banks and financial regula-
tory authorities will cooperate with security organs and all levels of government to
deal a “heavy blow” to violators in order to promote the healthy development of
Internet finance. Illegal fund-raising and illegal deposits from the public are two red
lines which cannot be crossed. Capital pools are thus unacceptable, especially for P2P
platforms.
We believe that the regulation of P2P network loans should introduce
the following measures, whose core idea is “open access, tracing activity, and
post-issuance accountability.”
5 Protect the security of customers’ information. They should not use this
information for purposes not related to the lending or borrowing activity
requested by the customer, and any such use should require customers’ express
authorization.
2 For specific regulatory measures, interested readers can refer to the book written by Yan
Qingmin mentioned on the previous page.
3 More discussion about “free-rider” issues can be found in Chapter 9.
4 Risks of losses caused by adverse changes of market prices.
5 Risks of losses caused by failure of debtors to fulfill debt obligations.
6 Risks of being unable to obtain sufficient funds timely or at reasonable cost to compensate
for with asset growth or paying debts due.
7 Risks of losses caused by inadequate or failed internal processes, personnel and
information technology systems, or external events.
8 Risks of negative evaluation for financial institutions from stakeholders caused by
inappropriate management, administration, and other activities or external events.
9 Risks caused by financial institutions failing to comply with laws, regulations, regulatory
requirements, rules made by self-regulatory organizations, or codes of conduct applicable
to financial institutions in their business activities, and may be subject to legal sanctions
or regulatory sanctions, material financial loss or loss of reputation.
10 This was discussed in more details in the section on IT risks.
11 Prudential regulation can be divided into two categories: microprudential supervision
and macroprudential supervision. Microprudential supervision refers to regulation for
safety and soundness of single Internet financial institutions; macroprudential supervision
is aimed to the regulatory impact of the Internet for safety and soundness of the financial
system and the real economy.
12 For more information about the banking regulatory measures involved, interested
readers can refer to: Xie Ping, Zou Chuanwei. 2013. “Basic Theory of Macroprudential
Supercision of Banks,” China Financial Publishing House.
13 Xie Ping. 2010. “Consumer-Oriented Financial Regulation,” New Century.
14 Chapter 5 discussed the currency regulation of Internet (especially Bitcoin).
15 China always has reservations about various of financial trading platforms hold by
non-central-government institutions. In 2011, the State Council has made policies of
“Decision on Straighten Out All Kinds of Trading Venues and Effectively Guard Against
Financial Risks” (i.e. “No. 38”).
16 Not necessarily the details of each position.
11 Internet exchange economy
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
The exchange economy is the economic concept that describes exchange after
products are produced and find themselves in the hands of owners. The problem
then becomes the allocation of these goods between different people.The exchange
economy abstracts away the process of production and consumption from eco-
nomic activities, and its foundation is the different resource endowments or divi-
sion of work from person to person. It is essentially everywhere, from goods trade
markets to art auctions. The Internet-based exchange economy is a concept we
propose to highlight the influence that the Internet has on patterns of exchange,
which represents both e-commerce and the sharing economy.
In this book on Internet finance, we discuss the Internet-based exchange econ-
omy in a single chapter because there is a close connection between two con-
cepts. First, Internet finance can be regarded as a special case of the Internet-based
exchange economy, and some perspectives in this chapter are actually complemen-
tary to Chapter 2. Second, Internet finance can quickly apply its innovations to
the Internet-based economy, which also helps drive the development of Internet
finance itself.We study the Internet-based exchange economy mainly by discussing
some basic economic concepts in the context of the Internet: such as preference,
utility, market, exchange, and resource allocation, which help us understand the
mechanisms of Internet finance.
2 Case analyses
We will primarily introduce four cases in this section, Airbnb, Zipcar, TaskRabbit,
and BarterCard. From the logistics demands of exchanging, Airbnb, ZipCar,
TaskRabbit just represent three different types. On Airbnb, houses (i.e. the
exchangeable goods) cannot move. On TaskRabbit, little tasks can be delivered over
the Internet. However, BarterCard represents bartering in the Internet era.
2.1 Airbnb
Airbnb, founded in 2008 and headquartered in San Francisco, focuses on home
exchange. It offers an online service platform for homeowners to rent out unused liv-
ing space (including the whole house, single rooms, beds, boats, and even tree rooms)
over a short period to tourists who travel to cities in which the homeowners live.
The business model of Airbnb is much more like the hotel industry than an ordinary
housing rental intermediary. Moreover, landlords can benefit from otherwise idle res-
idences through Airbnb while tenants can get a cheaper and more personalized hous-
ing experience than they can with hotels. By September 2013, users of Airbnb have
come from 192 countries and 33,000 cities, with more than 500,000 total rentals.
Landlords and tenants need to register and create a profile on Airbnb.com. It
encourages landlords and tenants to validate their identities and evaluate each other,
so as to establish their reputations for the site. The identification process may be
completed either by scanning ID cards or associating with websites such as Google,
Facebook or LinkedIn. Additionally, landlords must supply basic information and
photos of the housing. They can make the price flexible through negotiations with
potential renters or reduce rates for longer leases.
Potential tenants search Airbnb by city, travel dates, and specific housing
requirements (such as types of housing, prices, sizes, surroundings, facilities, and
acceptance of pets.), Airbnb then returns the best match to potential tenants.
156 Internet exchange economy
Airbnb also set a response rate index system for each supplier to measure their
responsiveness to tenants’ questions and booking applications.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2.2 ZipCar
ZipCar is an online car-sharing company founded in 2000 with business in cities and
college campuses in the United States, Canada, Spain, Australia, and other countries.
ZipCar both manages and owns cars. People who want to rent cars must first
become members of ZipCar, and then obtain membership cards with antenna chips
embedded inside. As of July 2013, ZipCar has 10,000 cars and 810,000 mem-
bers. Each ZipCar is equipped with Radio frequency identification (RDIF) tran-
sponders to connect membership cards. ZipCar’s central system tracks car positions,
members’ rental periods and distances.
ZipCars are parked at special parking lots near residential areas. Members can
reserve cars online or over the phone at any time in any participating city, either
to use right now or up to one year later. After receiving the reservation, ZipCar
offers car profiles and prices on the e-map for members to choose according to the
distance between cars and members. Members obtain the cars from special parking
lots. At the designated reservation time, membership cards will activate. This allows
the member to enter and start the car. In order to protect members’ privacy, ZipCar
does not track cars during the rental period, but the car security systems remain
activated. Members must return cars to the original parking places within the res-
ervation time and lock them with their membership cards.
ZipCar’s completely self-service rental model not only reduces labor costs, but
also gives consumers more choice. The fee structure includes an application fee, an
annual fee and a reservation fee, for each use. Cars are paid by the hour, including
gas and insurance. Electronic bills are conveniently sent by ZipCar over the Internet
and paid automatically.
2.3 TaskRabbit
TaskRabbit, founded in 2008, is an online post and claim tasks community with
the concept of “Do More, Live More, Be More.” The platform allows some users
called TaskPosters to distribute small tasks to others called TaskRabbits.TaskRabbits
are then paid after completing tasks from the TaskPosters. On the website of
TaskRabbit, TaskPosters can solve many problems at low prices. On the other
hand, TaskRabbits get opportunities to show their abilities. TaskRabbit’s business
is mainly located in big cities around the east and west coast of the US including
Boston, Chicago, New York, San Francisco, Los Angeles. TaskPosters can post just
about any task on TaskRabbit, including everything from installing furniture to dog
walking. They just describe the tasks and set price caps based on the prices paid for
similar ones.
The other side of the equation is the TaskRabbits, who offer help. They are
mainly retirees or full-time parents who have the time and ability to fulfill tasks.
Internet exchange economy 157
If one wants to become a TaskRabbit, he or she must apply on the website,
including a video interview and criminal background check. Those who pass will
be distributed to different communities depending on their location and skills.
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2.4 Bartercard
Bartercard mainly operates in Australia, New Zealand, the United Kingdom, the
United States, and Thailand. It currently has 55,000 cardholders throughout the
world, who together trade in excess of US$60 million per month. Members earn
Bartercard Trade Dollars for the goods and services they sell. This value is recorded
electronically in the member’s account database or goes toward repaying credit that
the member may have used. Bartercard provides services like billing, matching, and
providing monthly statements. It makes its money through service fees on transac-
tions between its members.
There are three main reasons why barter exchanges like Bartercard can still thrive
in modern society. First, the development of Internet technology expands the scope
of barter and promotes the “double coincidence of wants” (see Section2 1.2 below).
Second, Bartercard uses credit as a medium of exchange. In fact, the use of credit in
barter has a very long history. For example, reciprocity among relatives and friends
can be regarded as a form of barter. If Alice gives Bob a gift or does Bob a favor, Bob
will not immediately pay Alice back with money. Instead, Bob will think of himself
as owning Alice a favor. He will then give a gift to Alice or return Alice a favor
afterward. Here the “favor” can be regarded as a kind of credit. Third, this Internet-
based barter has a background in environmental protection and consumer culture.
1 Basic framework
Combining e-commerce and the sharing economy, we consider three key elements
of the Internet-based exchange economy: the exchanged commodity, the medium
of exchange, and those who undertake the exchange.
158 Internet exchange economy
1.1 Exchanged commodity
The exchanged commodity is the commodity which is being exchanged. It can be
one single item or multiple items.What is most important is the commodity’s form
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
of existence, its divisibility, the form of property transfer, and whether it is a public
good or a private good.
1.1.1 Form
Exchanged commodities can be classified into four forms:The first is substantial and
electronic goods, such as houses, cars, books, electronics, clothing, household goods,
music, and videos. The second includes services such as health care, education, and
tasks on TaskRabbit. The third is information, such as news and knowledge. The
fourth includes rights, such as ownership, use rights, and operation rights. Because
stocks, bonds, loans, and other financial instruments are in essence claims on an
individual or an organization (see Chapter 1), they also count as rights.
1.1.2 Divisibility
According to the divisibility concept, exchanged commodities fall into two
categories. The first is indivisible commodities, which must be exchanged as a
whole. When merchandise is being exchanged, it is usually indivisible. The other
type is composed of divisible commodities. When financial resources are being
exchanged, they can be divided into a number of small and homogeneous shares.
For example, the sale of financial products on the Internet (Chapter 3), notes of P2P
loans (Chapter 8), and equities in crowdfunding (Chapter 9).
The two main forms of property transfer are exchanges which are accompanied
by the transfer of ownership, and exchanges in which rights to use or to operate
are transferred but the ownership remains the same. In the sharing economy, most
exchanged commodities belong to this category. For example, landlords on Airbnb
own the houses and ZipCar owns the cars.Tenants on Airbnb and ZipCar members
have only temporary access to the houses or the cars.
Public and private goods are two opposing concepts in economics. In simple terms,
public goods can be used by a group of people, while private goods can only be
used by one person at any time. A person can only consume items. To distinguish
these two more rigorously, we need to introduce two concepts: exclusivity and
rivalry. A good is called exclusive if it is possible to prevent other people from
having access to it. A good is rivalrous if consumption by one consumer prevents
simultaneous consumption by other consumers.
Internet exchange economy 159
Thus, exchanged commodities include public goods that are both non-exclu-
sive and non-rivalrous, such as national defense, television and radio broadcast-
ing, and clean air. Public goods rarely become exchanged commodities. They also
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
include private goods that are both exclusive and rivalrous. Most exchange com-
modities are private goods, such as commodities, financial resources, and health care.
Additionally, many exchanged commodities fall between public goods and private
goods. For example, some music, videos, information, educational resources, and so
forth on the Internet are exclusive but non-rivalrous.These are called “club goods.”
1.3.1 One-to-one
One-to-one means there is only one supplier and one demander. This type rarely
occurs in the Internet exchange economy.
1.3.2 One-to-many
In this type, there can be either one supplier and many demanders or vice versa.
This is a more common form of Internet-based exchange than one-to-one, but is
less common than many-to-many.
1.3.3 Many-to-many
Most Internet-based economies thrive in this form. There are many sup-
pliers and demanders interacting together in a market that can shift into
160 Internet exchange economy
one-to-many transactions. A P2P lending platform clearly illustrates this
phenomenon. Multiple investors face multiple potential investment projects
and are thus clearly many-to-many. From the perspective of a single project, it is
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
one-to-many, with one project and many funders. From that of an individual inves-
tor, it is a many-to-one with one funder and many projects.
Different types of exchanges have very different modes of resource allocation.
One-to-one functions like negotiation; one-to-many is similar to an auction; and
for many-to-many, there are many different modes, such as the Edgeworth Box and
stable matching. These forms involve very complex economic problems that we
discussed in detail in a later section.
and logistics industry are connected. Logistics give rise to relatively large transac-
tion costs for e-commerce, but new technology has the potential to significantly
reduce these costs.
One of these new technologies is intelligent logistics, which uses sensor tech-
nologies like RDIF to track the location of every piece of merchandise in real time,
feeding back information that includes aspects of the goods’ location and status.
Intelligent logistics reduce transaction costs by optimizing the geographical distri-
bution of warehouses so as to better match customer needs. It can also save costs by
optimizing warehouse management, minimizing inventory, using less capital, and
increasing inbound, storage, and outbound efficiency. Optimization of the trans-
portation routes with these methods can also reduce transportation time and cost.
The second technology is 3D printing, which allows for a new type of “additive”
rather than “subtractive” manufacturing. It prints objects layer by layer using digital
files as the model and powdered metal or plastic as the material. 3D printing digi-
talizes physical commodities, which allows the creation of more personalized and
customized products. E-commerce of the future will allow consumers to purchase
the plans for products, and then print them out nearby or even at home. 3D print-
ing will make exchange of physical goods become like the exchange of electronic
goods today. It can be carried out on the Internet, significantly reducing or even
eliminating the demand for logistics. We can see that Intelligent logistics and 3D
printing together will both lower costs and bring the exchange economy of physi-
cal commodities increasingly online.
3 Information processing
Just as we saw in Internet finance, big data is the core information processing
technology in the Internet-based exchange economy. Since data usage makes no
fundamental distinction between finance and real economy, both can use the same
data analysis tools.
The Internet-based exchange economy generates large amounts of informa-
tion. One key type of information involves preference and utility, two fundamental
economic concepts. Preference shows how much consumers enjoy goods, mainly
reflecting consumer priority when selecting among several goods. Utility is a quan-
tification of preference that measures how consumption satisfies consumer needs
and wants. We will illustrate these two concepts with some examples.
Investors allocate their funds, subject to a budget constraint, among various
financial products, such as crowdfunding, P2P network loans, or traditional financial
products. Their preferences are, however, not uniform For example, young people
tend to select stocks due to their high expected return while the old prefer bonds
because of the increased stability of payment and lower volatility. We can express
their preferences with utility functions that describe the risk-return characteristics
of financial products. The most important parameter is investor risk aversion.
162 Internet exchange economy
In e-commerce, every consumer can choose between many goods. For instance,
if one wants to buy a book on Internet finance online, he/she will make the pur-
chasing decision based on the contents, authors, price, reviews, and many other
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
factors. Websites like Amazon and Dangdang use browsing and purchasing histories
to predict consumer preferences, according to which they recommend books (see
Chapter 6).
We can similarly understand decision making in sharing economy. For example,
Airbnb helps tenants and landlords select each other according to certain prefer-
ences. ZipCar lets members select cars according to distance, price, and model. The
ultimate goal of information processing is to discover preference and increase the
utility of exchanges.The essential problem is information asymmetry.2 For instance,
the realized return for financial products is not knowable ex-ante. Book customers
are not usually able to read the whole book themselves before purchase. Property
owners on Airbnb cannot be sure how well prospective tenants will take care of
their property. Such examples abound in all exchanges, online and off, meaning
that virtually all decisions are made in the presence of asymmetric information.
Mitigating asymmetric information can thus reduce non-beneficial exchanges and
provide more efficient resource allocations.
4 Resource allocation
The core of resource allocation is to increase utility by matching demand and supply.
First, it is important to design a matching mechanism based on the set of transactors.
Generally, more transactors lead to a more efficient allocation of resources through
a diversification of supply and demand. Following the logic outlined in Chapter
2, we can prove that the set of possible exchanges will increase as transaction cost
and/or information asymmetry decline. For instance, strangers are able to lend to
each other through P2P network loans because of the innovative credit evaluation
system. It is possible now to stay in strangers’ homes because of the trust we place in
the evaluation system provided by Airbnb. These examples show that the Internet
exchange economy expands the range of possible transactions by making it possible
to accept recommendations from people other than friends and family. Below we
introduce four representative supply and demand matching mechanisms.
4.1 Auction3
The auction is one of the oldest market mechanisms. Auctions differ based on two
main parameters: open- vs. sealed-bid and ascending vs. descending price. In a
sealed bid auction, bidders submit their prices simultaneously without knowledge
of others’ bid amounts. In an open auction, bidders bid directly against each other
until the final sale price is reached with the highest bid. In ascending-price auc-
tions, the auctioneer continues raising the price until the highest bid emerges and
the sale concludes. In a descending-price auction, the auctioneer begins with a high
asking price. This price is then lowered until a participant is willing to accept the
auctioneer’s price.
Internet exchange economy 163
There are four primary forms of auction used today. English auctions, the most
common form of auction, are open ascending-price auctions. Companies such as
eBay use this form. Dutch auctions are open, descending-price auctions.TaskRabbit
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
takes this form, as TaskPosters select the lowest price among TaskRabbits with the
same skills. In a first-price sealed auction, all bidders simultaneously submit sealed
bids. The highest bidder wins and pays the price they submitted. A second-price
sealed or “Vickery auction” is identical to the first-price sealed auction except that
the winning bidder needs to pay the second highest bid.
Bidders offer prices based on their valuation of the good, which in turn is a
function of the utility they expect to gain from its ownership. If a bidder knows
his/her expected value, the auction is termed “private value.” In this case, a bidder
is not able to accurately know or influence others’ valuations. Most Internet-based
exchange auctions are in the private value category. Another kind of auction is
common value auction, which means that the item’s value is the same to all the bid-
ders, but the bidders are unsure of the value. For example, in an offshore oil-license
auction, bidders have different valuations based on their exploration, but no matter
who the winner is, the oil license has the same market value because oil reserves
are certain.
Y
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
ωB y
Endowment
ωAy
Aaron ωAx X
convex to the origin.The utility declines when indifference curves get further away
from the origin. Our two exchangers correspond to two sets of indifference curves.
The equilibrium resource allocation is marked with a red star in the Figure 11.1.
Three lines are tangent at this point: the line from the red-star point to the ini-
tial endowment point (blue line in Figure 11.1), A’s indifference curve and B’s
indifference curve. It is Pareto efficient because A and B’s indifference curves are
tangential at this location. At any place other than this point, possible exchanges
lower either A’s utility or B’s utility or both. Therefore, each exchanger achieves
maximum utility. The slope of the blue line also shows the equilibrium price for
the two items.
In the deferred acceptance algorithm, the power of the initial choice first influences
both the final matching results and the welfare effects.
Assume that the rate of return and the covariance of financial products are
μ = ( μ1 , μ2 ,..., μn ) , Σ = (σ ij ) , in which μi = E ( ri ), σ ij = cov ( ri , r j ). The
'
i , j =1,2,...,n
optimization problem becomes:
n
min
w
σ w2 = w ' Σw = ∑σ ij wi w j
i, j =1
n n (11.1)
s.t. w 'e = ∑w i = 1, w ' μ = ∑w μ i i = μ
i =1 i =1
in which e = (1,1,...,1)'.
We can prove that if the expected rates of return for n kinds of financial products
μi are all different, then the covariance matrix Σ is positive definite. If the expected
rate of return of portfolio μ is given, then Equation (11.1) has a unique solution:
⎛ μ ⎞
w = Σ −1 ( μ , e) A −1 ⎜ ⎟ (11.2)
⎝ 1 ⎠
166 Internet exchange economy
in which A = ( μ, e ) Σ −1 ( μ, e ).
'
⎛ a b ⎞ ⎛ μ ' Σ −1 μ e ' Σ −1 μ ⎞
Denote A = ⎜ ⎟ = ⎜ ⎟ , then the expected rate of
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
0.1
0.09
0.08
0.07
Efficient frontier
Rate of return
0.06
0.05
0.02
Inefficient frontier
0.01
0
0.05 0.1 0.15
Deviation
income insufficient to repay the debt, and other situations.The basis of this approach
is that credit risks have a clearly identified causal chain.
However, in many real cases, the causal chain of credit risks is not so clear (especially
ex-ante). Also, in a rapidly changing market, causal analysis is not conducive to
capturing changes in credit risks. More importantly, financial statements only reflect
a small portion of an individual or an organization’s information, while a large
amount of their behavioral information on the Internet remains unused. Sometimes
it is hard to see if there is a causal relationship between behavioral information
and credit risks. The key of behavioral information application is to predict, and
these predictions are based on correlation, not causation (see Chapter 6).Therefore,
as long as the behavioral information on credit risks has predictive abilities, the
behavioral information is certainly valuable to the pragmatic evaluator.
In credit risk management, analysis methods based on causality are called
structural approaches, represented by the Merton model. Analysis methods based
on behavioral information are called simple approaches, such as the credit default
swap (CDS) model, the Logit model, the Bayesian Criterion (see Chapter 7), and
the default density model (introduced in Chapter 12). Simple approaches turn out
to be superior to structured approaches when applied in practice, and are thus
becoming more mainstream.10
Notes
1 Since Chapter 4 is devoted to payments, so we will not repeat the discussions here.
2 Information asymmetry typically arises when the buyer is unable to obtain all relevant
information about the product he is buying, which can lead to situations in which the
seller takes advantage of this informational advantage.
3 Data sources: (a) Varian, Hal R. 2009. “Intermediate Microeconomics: A Modern
Approach,” 8th ed., W. W. Norton & Company, Inc.; (b) Wolfstetter, Elmar. 1999. “Topics
in Microeconomics: Industrial Organization, Auctions and Incentives,” Cambridge
University Press.
4 Data sources: (a) Ping, Xinqiao. 2001. “Eighteen Lessons of Microeconomics,” Peking
University Press. (b) Varian, Hal R. 2009. “Intermediate Microeconomics: A Modern
Approach,” 8th ed., W. W. Norton & Company, Inc.
5 Pareto optimality implies a state in which no party can be made better off without
making another worse off.
6 A has x of ω Aχ unit and y of ω Ay unit.
7 The graph is selected from a public lecture of Hal R.Varian.
8 Huang, Chi-fu, and Robert H. Litzenberger. 1988. “Foundations for Financial
Economics,” Elsevier Science Publishing Co., Inc.
9 Figures in the graph are for demonstration purposes only.
10 See Duffie, Darrell, and Kenneth Singleton. 2003. “Credit Risk: Pricing, Measurement,
and Management,” Princeton University Press.
12 Issues requiring further research
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
In this book, we have already outlined the principles and basic types of Internet
finance. However, much of Internet finance is still open. There are many unde-
veloped areas and unanswered questions that deserve thorough discussion. In this
chapter, we focus on big data’s utilization in two areas: securities investment and
actuarial science. We both share our understanding on these two questions and
welcome interested readers to undertake further research that could lead to future
breakthroughs.
Utilizing big data in securities investment has always been a sensitive topic. If the
securities market is fully functional, then the price should fully reflect all informa-
tion available to investors. In this case, choosing any security would only yield
a gain equal to the investment risk. In reality, however, investors seeking excess
returns (alpha), tend to perform active portfolio management and diverge from the
benchmark index. This indicates that investors do not believe the securities market
is fully efficient. Investors create value by conducting market studies to form dis-
tinctive judgments and decisions. Insider information, however, is not part of big
data. Utilizing big data in securities investment is very different from insider trading.
We will start by introducing two famous models in active portfolio management—
the Black–Litterman model and the fundamental law of active management to
show how information affects decision-making. Afterwards, we will discuss how big
data plays an important role in securities investment.
With w being the weight of the assets, μ being the expected excess return on
assets over the risk-free rate, Σ being the covariance matrix of the excess return, λ
being the coefficient of absolute risk aversion.
Without any constraints, when solving for w , we obtain:
1 −1
w = Σ μ (12.2)
λ
The Black–Litterman model considers the opposite scenario: given the weight
of each asset in the portfolio, what would be the expected excess return on assets?
The solution to this reverse optimization problem is:
μ = λΣw (12.3)
The implied excess equilibrium return ∏ is the starting point of the Black–
Litterman model.
cates that the investor rejects the view completely. The Black–Litterman model
assumes that the views are independent of each other.
The absolute view involves judgment on the ROA of a single asset, for example:
– View 1: The excess return on the housing market is 0.5% (25% confidence
level). The relative view, on the other hand, involves comparing the ROA of
multiple assets, for example:
– View 2: The ROA of the global stock market will be 2% higher than that of
the global bond market (65% confidence level).
– View 3: The ROA of the Chinese stock market will be 3.5% higher than that
of the other emerging markets (50% confidence level).
A key question to the Black–Litterman model is: how do you quantify the
investors’ views? We will use the three views mentioned above as examples.
Assuming there are nine types of assets, as shown in Table 12.12:
Set the excess return of the nine assets as r = ( rC , rUS , rDE , rEE , rGFI , rHY , rPE , rRE , rHF )′.
View 1 only involves Real Estate (RE) and can be expressed as rRE = 0.5% + ε 1,
where ε 1 follows a normal distribution N ( 0,ω 1 ), which reflects the uncertainty
of the view. A greater value of ω 1 translates to a higher level of uncertainty (lower
confidence level). Next, we will discuss the method of setting the value of ω 1
relative to the confidence level.
View 2 involves the global stock market, which includes Chinese stocks (C),
US stocks (US), stocks of developed (Non-US) economies (DE), and stocks of
Chinese stocks C
US stocks US
High yield HY
Private equity PE
Real estates RE
Hedge fund HF
172 Issues requiring further research
emerging (Non-Chinese) economies (EE). It also involves the global bond market,
which includes global fixed income (GFI) and high yield (HY).
As shown by View 2, relative views always have two elements: a set of
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
outperforming assets and a set of underperforming assets. The relative view implies
the existence of a portfolio with both a long and short side—going long outper-
forming assets and shorting underperforming assets.There is no guidebook when it
comes to the asset allocation, so we can allocate them evenly or according to their
market cap. We will choose the former in this example.
View 2 can be expressed by the following equation:
0.25rC + 0.25rUS + 0.25rDE + 0.25rEE − 0.5rGFI − 0.5rHY = 2% + ε 2, where ε 2
follows a normal distribution N ( 0,ω 2 ). Similarly, view 3 can be expressed as
rC − rEE = 3.5% + ε 3, where ε 3 follows the normal distribution N ( 0,ω 3 ). The
implication of ω 2 and ω 3 are the same as before.
We introduce the following symbols:
p1 = ( 0,0,0,0,0,0,0,1,0 ) , q1 = 0.5%
p2 = ( 0.25,0.25,0.25,0.25, −0.5, −0.5,0,0,0 ) , q2 = 2%
p3 = (1,0,0, −1,0,0,0,0,0 ) , q3 = 3.5%
⎛ p1 ⎞ ⎛ q1 ⎞ ⎛ ε1 ⎞ ⎛ ω1 0 0 ⎞
⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎜ ⎟
P = ⎜ p2 ⎟ , Q = ⎜ q2 ⎟ , ε = ⎜ ε 2 ⎟ , Ω = ⎜ 0 ω2 0 ⎟
⎜ p3 ⎟ ⎜ q3 ⎟ ⎜ ε3 ⎟ ⎜ 0 0 ω3 ⎟
⎝ ⎠ ⎝ ⎠ ⎝ ⎠ ⎝ ⎠
excess return.
( −1
r ~ N ⎡⎣(τΣ )−1 + P ′T Ω−1P ⎤⎦ ⎡⎣(τΣ )−1 ∏ +P ′Ω−1Q ⎤⎦ , ⎡⎣(τΣ )−1 + P ′Ω −1P ⎤⎦
−1
) (12.6)
E ( rmkt − rrf )
λ = (12.8)
σ2
Where E ( rmkt ) is the expected return of the market portfolio, rrf is the risk-free
rate, σ 2 = w mkt
′ Σw mkt is the variance of the excess return on the market portfolio.
Thomas Idzorek3 has proposed a calculation for Ω. The logic behind his cal-
culation is that for every view, if the confidence level of that view is 100%, then a
strategy for asset allocation can be determined. If the confidence level of that view
is 0%, then the assets should be allocated according to their market capitalization,
which is w mkt . If the confidence level of the view is between 0% and 100%, then the
allocation strategy should be based on w mkt (the asset allocation strategy for a 0%
confidence level), and tilt toward the asset allocation strategy for a 100% confidence
level.
We use view k , pk ⋅ r = qk + ε k as an example. If the confidence level of this
view is c k (c k is between 0% and 100%), we can introduce a indicative vector
indexk : if a certain element of pk is not 0, then the respective element of index k
equals 1. On the other hand, if an element of pk is equal to 0, then the respective
element of index k equals 0. In short, index k shows the non-zero elements in pk ,
which is the asset mentioned in view k . Idzorek’s calculation follows the following
six steps.
Step 1: if the confidence level is 100%, the expected posterior distribution of the
excess return can be calculated using the following formula:
w k ,100% = ( λΣ ) E ( rk ,100% )
−1
(12.10)
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Step 3: calculating the difference between the asset allocation strategy at a 100%
confidence level and w mkt :
Where . ∗ represents the pair-wise multiplication, the above formula shows that
the calculation of tilt involves only the assets mentioned in view k , as the confi-
dence level c k rises, the tilt also steepens.
Step 5: calculating the asset allocation strategy resulted from the tilt method:
w k ,c = w mkt + Tilt k
k
(12.13)
For every view, we use the six steps listed above to calculate ω k , k = 1,2,..., m, the
⎛ ω 1 0 ... 0 ⎞
⎜ ⎟
⎜ 0 ω 2 ... 0 ⎟
result is the following: Ω = ⎜ .
f f _ f ⎟
⎜ ⎟
⎜⎝ 0 0 ... ω m ⎟⎠
r = β ⋅ rB + θ (12.15)
1 θ = A⋅x
2 The components of x are not correlated; their expected values are 0, and their
standard deviations are 1
3 Σθ = A ⋅ A ′
1 z = B⋅y
2 The components of y are uncorrelated; their expected values are 0, and their
standard deviations are 1
3 Σ z = B ⋅ B ′.
a ( z ) = E (θ | z ) = A ⋅ P ⋅ D ⋅ z (12.16)
C = var (θ | z ) = A ⋅ ( I − P ⋅ P ′ ) A ′ (12.17)
176 Issues requiring further research
2.2 Investment target
We use N × 1 vector hp to demonstrate the allocation ratio of the securities, N × 1
vector h = hP − hB, which demonstrates the active positions relative to the market
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
benchmark index, where the projected rate of return for investors is:
Where hP′ ⋅ β is the beta coefficient of the investors relative to the market
benchmark index, and h ′ ⋅ θ is the active return of the investors relative to the
market benchmark index. The volatility of h ′ ⋅ θ is called the tracking error, which
demonstrates the active risk of investors who deviate from the market benchmark
index.
Given active position h and signal z, the expected active return of the inves-
tors can be written as E ( h ′ ⋅ θ | z ) = h ′ ⋅ α ( z ), and the active risk squared is
var ( h ′ ⋅ θ | z ) = h ′ ⋅ C ⋅ h .
Hypothesis 4: Investor utility is expressed as a quadratic function with avoid-
ance level of active risk λ .
Thus, with signal z already provided, the utility function of the investors is
h′ ⋅ α ( z ) − λ ⋅ h′ ⋅ C ⋅ h (12.19)
1
A′ ⋅ h ( z ) = ⋅E ⋅P ⋅D ⋅Z (12.21)
2λ
IR 2 = E [ IR 2 ( z )] = Trace ( P ′ ⋅ E ′ ⋅ P ) (12.22)
Where Trace (⋅) indicates the trace of the matrix (sum of the elements on the
diagonal line).
Through a series of approximation, the following can be proved5
Issues requiring further research 177
N BR
IR 2 ≈ Trace ( P ′ ⋅ P ) = ∑∑ ρ 2
n ,b (12.23)
n =1 b =1
N
We use ξb2 = ∑ρ
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
2
n ,b to demonstrate the sum of squares of each correla-
n =1
tion coefficient within signal zb and residual return θ ; this reflects the value of
signal zb . Therefore,
BR
IR 2 = ∑ξ 2
b (12.24)
b =1
Hypothesis 5: All signals have the same connotation, for every b, the following
is true ζ b2 = IC2.
Under hypothesis 5, the fundamental law of active management can express the
information ratio:
IR = IC ⋅ BR (12.25)
1 The market benchmark index is the starting point of investment activities and
the default portfolio.This means that to some extent, the models imply a belief
in market efficiency.
178 Issues requiring further research
2 Investors can only deviate from the market benchmark index if they decide
to make forecasts that differ from the average market forecast. Of course, they
would have to evaluate the validity of their forecasts. In the models, this is
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Big data analysis is mostly used in step 1 and step 2.These two steps are typically
taken together. Investors can extract signals by using economic principles or data
mining.The basic principle is that the signals must be useful to improve the forecasts,
otherwise they are just noise. Richard Grinold and Ronald Kahn have established
the following formula for the basic forecast:
Where r is the return of the security, g is the signal, E ( r ) represents the aver-
age market forecast, and E ( r | g ) represents the forecast based on signals. Equation
(12.26) is the general form of Equation (12.16).
If r and g are both random variables and not random vectors, then Equation
(12.26) can be simplified as:
g − E ( g)
φ = corr ( r , g ) ⋅ std ( r ) ⋅ (12.27)
std ( g )
Data
Signal
Projection
Feedback
and
correction
Strategy
Evaluation
deviations the signal deviates from the average, we call it the z-score. The connota-
tion of Equation (12.27) is:
We will use the article written by Hristidis et al. to exemplify how big data is
used by securities investors. This article focused on correlation between informa-
tion on Twitter and stock prices. They started by analyzing all the data on Twitter
about one stock, and designed several quantitative indexes to measure its activity on
Twitter. The result showed that some indices were significant correlated with the
trade volume of the stock in the next 1–3 days, as well as with the rate of return.
The above demonstrated the first step—extracting signals from data.
Next, they created a Twitter-augmented regression on the rate of return using
the aforementioned Twitter activity indexes. This model used vector auto-regres-
sion (VAR) with the rate of return of the stocks as the dependent variable, while
the independent variables included the historical rate of return of the stocks as well
as the Twitter activeness indexes. This is step 2—forming forecasts based on signals.
Step 3 was the formulation of strategy based on forecasts. This was done by
investing in the stocks with the highest projected rate of return based on the
Twitter-augmented regression.
At last, they used back tests to compare the result of their strategy with other
strategies. The following were used in this comparison: (a) a portfolio that pas-
sively invested only in the market benchmark index; (b) a randomly selected
stock; (c) a portfolio whose stocks were selected based on market cap, size, total
liability, and so on; (d) a portfolio that invested in several stocks with the highest
projected rate of return provided by the auto regression. Essentially this was very
similar to the Twitter strategy, except that it did not include the Twitter activity
indices.
In the end, they found out that the Twitter-based strategy had the best result.
This proved that information on Twitter can actually be used in security investment.
The above summarized steps 4 and 5—evaluation, feedback, and correction.
We would like to suggest that in Internet finance, the securities market may pos-
sess characteristics described in both behavioral finance and the efficient markets
hypothesis. Investors affect each other in decision-making thanks to the prevalence
of social networks, which means that their behavior will be similar to that described
in behavioral finance. For example, they may exhibit a greater level of conformity,
which could affect a particular security or even the entire securities market. On the
other hand, big data is closing the gap in obtaining information. Securities pricing,
which used to require complex calculations, is now made simple by apps. Pricing
efficiency is becoming extremely high. As a consequence, the behavior of securities
markets may be similar to the efficient markets hypothesis.
180 Issues requiring further research
SECTION 2: BIG DATA IN ACTUARIAL SCIENCE
Risk events that require compensation can be either personal or property. The
two major types of insurance, personal insurance and property insurance, are the
result. Actuarial science analyzes future risk events and calculates their potential
consequences. These calculations help to set the premium and margin. It is also
divided into two categories, life contingencies and non-life contingencies. Though
the fundamentals of the two categories are the same, the methods they implement
diverge greatly.
We will provide a brief summary of life contingencies and non-life contingen-
cies with a special focus on contingency rate setting. Afterwards, we will discuss
how big data can be used in actuarial science.
F ( x ) = Pr ( X ≤ x ) , x ≥ 0 (12.29)
S ( x ) = Pr ( X > x ) , x ≥ 0 (12.30)
The survival function of ( x )’s time until death is marked t px , which is the prob-
ability of a person at the age of x living beyond x + t years old:
S (x + t )
px = Pr (T ( x ) > t ) = Pr ( x > x + t | X > x ) = (12.32)
S (x )
t
Issues requiring further research 181
The force of mortality at the age of x is μx , which means that a person can live
to x years old, and dies right after that moment:
Pr ( x ≤ X ≤ x + Δx | X > x ) S′ (x )
μx = lim = −
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
(12.33)
Δx → 0 Δx S (x )
The correlation between the force of mortality and the survival function is
demonstrated in the follow equation:
( x
)
S ( x ) = exp − ∫ μ s ds , t px =
0
S (x + t )
S (x ) ( x +t
= exp − ∫ μ s ds
x ) (12.34)
d
The density function of the remaining life duration T ( x ) is fT ( t ) = t q x, thus
d d dt
S (x + t ) S (x + t )
fT ( t ) = − dt = μx + t ⋅ t px fT ( t ) = − dt = μx + t ⋅ t px (12.35)
S (x ) S (x )
Generally speaking, the curve of the force of mortality is bowl shaped. Infants
have high forces of mortality, while the forces of mortality are lowest during youth.
The forces of mortality then gradually increase as people grow older. Some of
the most famous models for the force of mortality are: the De Moivre model, the
Gompertz model, the Makeham model, and the Weibull model.
zt = bt ⋅ vt (12.36)
182 Issues requiring further research
The density function at the moment of payment is f T (t ), and the expected
compensation function is:
E (Z t ) = ∫z f (t ) dt
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
t T (12.37)
E ( zt ) =
w w
∫
0
zt ⋅ f T (t ) dt = ∫
0
v t ⋅ t px ⋅ μx +t dt (12.38)
lx
The life table provides the life distribution in whole numbers. In practice, the
survival rate of the integer years is often used to estimate the probability of survival
and mortality between the integer years. This is basically an interpolation problem.
Provided ( x, l x ) and ( x + 1, l x +1 ), estimate one point between the integer years
( x + t,lx +t ), 0 < t < 1. Three approaches are used to solve this problem. The first
uses linear interpolation in between the integer years. The second uses geometrical
interpolation, and the last is harmonic interpolation.
In reality, the compound risk model is used to plot the total loss of one policy
or policy set over a period of time:
1 A model for one policy: assuming that one policy will encounter N losses
within a certain period, and X i represents the amount of loss of i, the total
N
policy loss of is ∑ X i .
i =1
2 A model of a set of policies: assuming that N policies within the policy set will
encounter losses within a certain period, and X i is the amount of loss incurred
N
by policy i, the total loss of the set is ∑ X i .
i =1
N
In the mixed risk model S = ∑X , X i t is called the individual loss, and its dis-
i =1
tribution is called the individual loss distribution or the loss distribution. Some
common examples include: normal distribution, logarithmic normal distribution, Γ
distribution, B distribution, and Pareto distribution.
N is the number of claims, and its expectation E ( N ) is called the claim fre-
quency. Common distributions of N include: the Poisson, binomial, and negative
binomial distributions.
184 Issues requiring further research
In the compound risk model, the following is true:
E (S ) = E ( N ) ⋅ E ( X i ) (12.40)
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
Therefore, the expected loss of the model is equal to the product of claim fre-
quency and individual loss.This is the theoretical basis of non-life contingency setting.
The risk premium of the risk unit policy = The claim frequency of the risk unit policy
* The average coverage of each payment
(12.41)
The third step is to find the formula for calculating the risk premium:
The risk premium of the policy = The risk premium of the risk unit policy
* The risk amount of the policy (12.42)
Z ⋅ X + (1 − z ) ⋅ μ (12.44)
n
∑X i
n E [ v ( Θ )]
i =1
Where X = , credibility factor z = (k = ).
n n+k var ( μ ( Θ ))
The credibility factor z illustrates the reliability of future risk premiums on
historical data. When z = 1, the future risk premium relies completely on its own
historical data X . This is called complete credibility. When 0 < z < 1, the future
risk premium relies on both X and μ, the weight of μ is less than 1. This is called
partial credibility.
Sk ≤T } (12.45)
k =0
Where 1{⋅} represents the indicative function, the value is 1 if the logic in the
parenthesis is true, 0 in all other cases.
The time point of loss also involves the stopping time concept. If we look for-
ward from Sk , the occurrence of loss number k , we can describe the duration of
time before loss k + 1 by using the intensity of loss event:
Pr (t ≤ Tk ≤ t + Δt | Tk > t )
λ (t ) = lim (12.46)
Δx → 0 Δt
λ (t ) fully describes the distribution of claim frequency N (T ).
Consequently, the force of mortality μx and the occurrence of loss have the same
statistical connotation in reaching intensity λ (t ).
pit = Pr (τ i ≤ t + 1 | τ i > t, X it )
Downloaded by [Run Run Shaw Library, City University of Hong Kong] at 03:25 05 September 2017
(12.49)
exp (α + β ′ X it )
pit = (12.50)
1 + exp (α + β ′ X it )
Next, we will estimate α and β in Equation (12.50) based on the observation
{( X it , N it ) : i
= 1, 2,…, n, t = 1, 2,…,T }.
N iT = 0 means that until reaching time point T, the beneficiary i does not
experience a risk event, where τ i > T . N iT = 1 means that the beneficiary i expe-
rienced risk events before reaching T. In this case, data after τ i has no significance.
Consequently, we define Di = min (τ i ,T ).
For the following equations
⎧ Pr (τ = D ) N = 1
⎪ i i iD
L ⎡⎣ N iD | X it ,1 ≤ t ≤ Di ⎤⎦ = ⎨
i
⎪⎩ Pr (τ i > Di ) N iD = 0
i
(12.51)
i
= Pr (τ i = Di ) Pr (τ i > Di )
N iDi 1− N iDi
Di − 2 Di −1
Where Pr (τ i = Di ) = piD −1 ∏ (1 − pit ), Pr(τ i > Di ) =
i ∏(1 − p ). it
t =0 t =0
We define the likelihood function as:
n
L ⎡⎣α , β | ( X it , N it ) : i = 1, 2,…, n, t = 1, 2,…,T ⎤⎦ = ∏ ⎡⎣ N
i =1
iD
i
| X it ,1 ≤ t ≤ Di ⎤⎦
1 − piD −1
+ ∑ ∑ log (1 − p ) it (12.52)
i =1 i i =1 t = 0
while the insurance company oversees the insurance payment transfer. Of course,
it is impossible to foretell which policyholders will experience losses and which
will not, thus it is impossible to predict the direction in which payments will flow.
Therefore, we can conclude that the risking sharing with insurance is different
from the risk shifting of usual derivatives (options, futures, swaps, etc.). The former
is a group contract and the latter is a bilateral contract. In Internet finance, even
if the level of information asymmetry and the transaction costs are low, the core
characteristic of insurance being a group contract will not change.10 While the busi-
ness model of insurance remains the same, the specific organizational structures are
subject to change. For example, a group of individuals with similar risk level can
sign a contract through the Internet stating that if one of them suffers unexpected
losses, the rest will be obligated to provide compensation. Once this group reaches
a certain size, it could replace insurance companies.
Notes
1 This is different from the mean-variance optimization problem (Equation 11.1). However,
it can be proven that if a utility function is quadratic, or if the excess return is normally
distributed, then we can conclude that this problem is equivalent to the mean-variance
optimization.
2 This is designed solely for demonstrational purposes and does not necessarily reflect
reality.
3 Idzorek, Thomas. 2004. “A Step-by-Step Guide to the Black-Litterman Model:
Incorporating User-Specified Confidence Levels.”
4 Grinold, Richard, and Ronald Kahn. 1999. “Active Portfolio Management:
A Quantitative Approach for Providing Superior Returns and Controlling Risk,” 2nd
edition, McGraw-Hill.
5 We can decompose E = ( I − P ⋅ P ′ ) to E = I + P ⋅ P ′ + P ⋅ P ′ ⋅ P ⋅ P ′ + ….
−1
Overview of SFI
Founded on July 14, 2011, the Shanghai Finance Institute (SFI) is a leading
non-governmental, non-profit institute dedicated to professional academic financial
research. SFI is operated by the China Finance 40 Forum (CF40) and has a strategic
cooperation with the Shanghai Huangpu District government. The Shanghai
Financial Services Office is SFI’s regulator, and SFI is registered with the Shanghai
Administration of Social Organizations.
The mission of SFI is to explore new trends in the global financial market, pursue
solutions to novel problems associated with China’s financial development, and
support the development of Shanghai as an international financial center.
Known for its professionalism and openness, SFI is an independent think tank
dedicated to promote academic exchange. It conducts high-level research activities
to provide first-class research products.
SFI hosts events such as closed-door seminars, the Shanghai Annual Conference of
New Finance, and the Bund Forum of Internet Finance. It also conducts research
projects and is responsible for the publication of the New Finance Review, the
New Finance Book Series, various academic journals and articles, and media
columns.
Organizational structure
Members of SFI Advisory Committee:
FANG Xinghai Director, International Economic Bureau, Office of the
Central Leading Group for Financial and Economic Affairs
HU Huaibang Chairman, China Development Bank
JIANG Yang Vice Chairman, China Securities Regulatory Commission
TU Guangshao Executive Vice Mayor of Shanghai
WANG Jiang Professor of Finance, MIT Sloan School of Management
Weng Zuliang Secretary of CPC Huangpu District Committee, Shanghai
WU Xiaoling Vice Chairman, the Financial and Economic Affairs Committee,
the National People’s Congress of the People’s Republic of
China
YAN Qingming Vice Mayor, Tianjin
YI Gang Deputy Governor, the People’s Bank of China; and Chief
Administrator, State Administration of Foreign Exchange
YUAN Li Vice President, China Development Bank
Members:
CHINA RAPID FINANCE
HUCHEN Investment
HUAHUI Fortune
NI WO DAI
YIBank
TAIRAN Internet Finance
100credit.com
SFI Supervisors:
GUAN Tao Senior Fellow, China Finance 40 Forum
WU Cheng Deputy Governor, Huangpu District, Shanghai