Characteristics of global foreign direct investment
In the past 20 years, global foreign direct investment has shown a rapid growth trend. However, after entering 200 1, due to the bursting of the new American economic bubble, the American economy continued to decline, affecting Western Europe and Japan. Especially after the "9. 1 1" incident, the American economy is not only hopeless, but worse, the global economic recession has further intensified, and foreign direct investment has also fallen sharply. According to the World Investment Report 200 1 issued by the United Nations on September 8, 20001,it is estimated that the annual investment will drop to 760 billion US dollars, a decrease of nearly 1/3.
The biggest feature of the development of foreign direct investment is that developed countries and regions are both the protagonists of the outflow of foreign direct investment and the inflow of foreign direct investment. Since the beginning of foreign direct investment, developed countries and regions have been the protagonists of foreign direct investment. From the 1980s to the early 1990s, the status of developing countries in the development of foreign direct investment was once improved. From 65438 to 0993, the proportion of foreign direct investment in developing countries reached 16. 1% in the 20th century, and the proportion of domestic direct investment reached 39.9%.
Statistics show that from 1995 to 2000, the outflow of foreign direct investment in developed countries increased from $305.8 billion to1046.3 billion, and the inflow of foreign direct investment increased from $203.4 billion to1005.2 billion, increasing by 242.2% and 336.3% respectively, both exceeding the same period. As a result, the proportion of developed countries in foreign direct investment has increased significantly, with the outflow of foreign direct investment rising from 86. 1% to 9 1.0% and the inflow of foreign direct investment rising from 6 1.4% to 79. 1%. In contrast, the proportion of developing countries in global foreign direct investment decreased significantly during the same period. Among them, the outflow of foreign direct investment decreased from 13.8% to 8.6% (influenced by the Southeast Asian financial crisis,198 decreased to 4.8%), and the inflow of foreign direct investment decreased from 34.2% to18.9% (196 increased to 38.9%).
Another feature of the development of foreign direct investment is that mutual investment between developed countries is very active. During the period of 1995- 1999, the mutual investment between the United States and western Europe increased from $84 billion to $286.3 billion, an increase of 240.8%. Among them, US investment in the EU increased from US$ 48.8 billion to US$ 58.2 billion, and EU investment in the US increased from US$ 356,543.8 billion to US$ 228,654.38 billion. It increased by 19.3% and 549.9% respectively. Due to the rapid growth of mutual investment between the United States and the European Union, the proportion of mutual investment in foreign direct investment (calculated by domestic direct investment) rose from 25.3% in 1995 to 33. 1% in 1999. In addition, the EU 1999 reached 31800 million euros, and reached 436 billion euros in 2000, equivalent to 6.9 times of the 63 billion euros of 1995, accounting for more than 60% of the EU's inward direct investment.
Countermeasures for Developing China's Foreign Direct Investment
China enterprises' foreign investment starts from 1979. In the middle and late 1980s, some large and medium-sized production enterprises, central and local international trust and investment companies, comprehensive management enterprises and even private enterprises also joined the ranks of foreign investment. According to incomplete statistics, as of the end of September 20001,China's foreign direct investment, including trade and non-trade enterprises, totaled 65 13, with the agreed investment of11795 million US dollars and the agreed investment from China of 7.903 billion US dollars. Under the background of economic and financial globalization, we should take various measures to promote the development of China's foreign direct investment to cope with the new changes in global foreign direct investment.
1. We should clearly realize that the purpose of developing foreign direct investment is to obtain economic benefits.
China develops foreign direct investment in order to "make full use of two kinds of resources and two markets" and obtain greater economic benefits by effectively allocating resources in the international market. China enterprises "going out" should not only obtain microeconomic benefits, but also give consideration to macroeconomic benefits. On the one hand, the development of foreign direct investment obeys and serves China's national economic security. We should not only focus on the current investment profit, but also focus on the long-term development and security of the national economy, seize the opportunity, increase overseas investment, develop and utilize foreign resources, and pay special attention to the reserves of strategic materials that are very scarce but significant in China. On the other hand, "going out" should meet the needs of national industrial development. In recent years, some industries in China have formed a large number of high-tech production capacity through technology introduction and technology development, but the total domestic production capacity greatly exceeds the demand.
2. We should speed up the construction of modern enterprise system and cultivate microeconomic subjects for the development of foreign direct investment.
Multinational enterprises are the micro-subjects to implement the "going out" strategy. Whether this topic is reasonable or not, to a great extent, restricts the level of economic benefits that China can obtain from developing foreign direct investment. Judging from the current situation in China, most of the subjects of foreign direct investment are state-owned and state-controlled enterprises. On the one hand, the development ideas of "setting goals" and "planning" are inevitable. On the other hand, although the mechanism of many enterprises has changed after years of reform, the problem of "soft budget constraint" still exists, and the problems of competing for investment and projects and ignoring benefits and risks have not been completely solved. For those enterprises whose systems are not smooth, the mechanisms are not active, the management is lax, the supervision of state-owned assets is not in place, and they lack internal development motivation, overseas investment is likely to become a new channel for the loss and loss of state-owned assets. According to Deng Ning's international production compromise theory, micro-factors, that is, the characteristics of enterprises themselves, are one of the important factors that determine foreign direct investment. Therefore, only in accordance with the requirements of the market economy, realize the transformation, make the enterprise truly become an independent, self-financing legal entity and the main body of market competition, the enterprise will have a long-term unremitting "going out" internal incentive and self-restraint mechanism. Under the current conditions, private enterprises can be encouraged to actively go out and become an important force for China enterprises to "go out".
3. According to the economic interests, determine the regional and industrial flow direction of developing foreign direct investment in China.
By the end of September, 20001year, Hong Kong and Macao had the largest overseas investment, accounting for 46.8%. Followed by North America, accounting for13.7%; The third is Asia, accounting for11%; The fourth is Africa, accounting for 9.2%; The fifth is Latin America, accounting for 7.5%; The sixth is Oceania, accounting for 6.2%; Europe is the least, accounting for only 6%. Generally speaking, North America, Europe and other countries and regions are very developed in science, technology and management, with broad market, political stability and sound legal system. Developing countries and regions such as Asia, Africa and Latin America are rich in natural resources, but their markets and legal systems are lagging behind and their politics are relatively unstable. At present, China's overseas investment has gradually expanded from trade and catering to the development of resources such as minerals, forests, fisheries and energy, overseas processing trade such as home appliances, textiles and clothing, mechanical and electrical products, agricultural and agricultural products development, catering, tourism, commercial retail, consulting services and other industries. Although trading enterprises (accounting for 49.7%) still account for half of China's overseas investment, in recent years, overseas processing trade (accounting for 22.2%) and resource development (18. 1%) have grown rapidly. We should determine the regional structure and industrial structure of developing foreign direct investment in China according to microeconomic and macroeconomic interests, so as to obtain the maximum economic benefits.
This paper expounds the basic concepts of online banking, and probes into the factors influencing the security of online banking and its security prevention strategies.
[Keywords:] network banking network security prevention strategy
With the development of computer and network communication technology, the information dissemination mode of human society has gradually changed from the initial matrix communication to the network and distributed communication. Human society has entered the era of digital revolution with network application as the core, and the financial industry is inevitably deeply influenced by computer network technology, thus forming a brand-new business model-network finance oj. Online finance has caused a series of complex problems, among which oj, the most common and urgent security problem related to online banking, needs to be solved. 2iqmdvy3
I introduction of online banking
Online banking, also known as online banking and online banking, has two meanings. One is the traditional online banking (oj) with Internet background. It is a kind of financial innovation and the development of banking business oj. It uses computer technology to establish outlets on the Internet to replace oj, which is a variety of services that need to be operated on the counter. Secondly, in addition to the traditional banks, another bank based on Internet technology (Internet Bank) oj has emerged. It is a kind of financial differentiation and a virtual mechanism oj based on the Internet. It has no independent financial information processing system outside the network, so it is a challenge to the status of traditional banks. Online banking is the form of most online banking at present, but online banking is the future development trend of oj.
From 65438 to 0995, three American banks jointly established the world's first online bank "Security First Online Bank" (SFNB)oj. Stimulated by SFNB, almost all financial institutions in the world are studying the opportunities provided by the Internet and scrambling to open traditional financial services to online oj. In this wave of financial electronization, the financial circles in China have also started to take action, oj. 1March, 998, the first real online banking transaction in China was successful, which opened the curtain of online banking in China, oj. At present, more than 200 branches of more than 20 banks have websites and homepages, among which more than 50 oj branches carry out online banking business. According to online surveys and estimates, these online banks have more than 20,000 individual customers and 6,543,800 corporate customers.
Second, the factors affecting the security of online banking
The development of online banking is in full swing, but as a new thing, it has many problems to be solved urgently, the most urgent of which is the security problem oj. There are many factors affecting the security of online banking, but in summary, there are two main aspects.
1. The system security of the network itself mainly includes the following four factors:
(1) network system factors. First of all, there are many security loopholes in our network system, and online banking is built on these systems and networks. The early Internet was an open Internet serving researchers and a completely non-profit information sharing carrier. Therefore, almost all Internet protocols do not consider the security mechanism.
(2) irresistible disaster. Such as earthquakes, lightning strikes, typhoons and other natural disasters, as well as fires, power outages and other accidents, may cause network problems, instability and destruction of the host computer, resulting in data errors or losses, thus seriously affecting the security of online banking.
(3) human factors oj. For example, the dereliction of duty and mistakes of the staff cause the abnormality of the network system and the security problem of the network banking system.
(4) The openness of the Internet makes various viruses spread oj on the Internet. It is one of the main threats to the normal operation of online banking, especially the gradual opening of banking network, which provides convenience for the rapid spread of viruses and brings greater threats.
2. The security problems caused by various active attacks are mainly the following three factors. (1) Hacking. Another factor that leads to the insecurity of the Internet is that it is easy for people to obtain relevant core technical data from the Internet, especially the original codes of various applications (such as TCP/IP, Sendmail, FTP, etc.). Related to the technical data of the Internet itself (such as RFC and FAQ documents), the original codes of various security tools are also open and free, such as Satan, cracking and other controversial oj. The idea of taking out these materials is good, but it will inevitably backfire, oj. Because hackers will use these materials to illegally invade the online banking system through the Internet, thus destroying the system and data.
(2) Criminals use online banking to commit economic crimes, which is the so-called high IQ crime oj. Online banking is a system of monetary payment and settlement, so it is easy to attract the attention of economic criminals, who may cause huge losses to banks in a few seconds through various means.
(3) oj crime of insiders. Bank internal staff use their work to enter the banking system, which poses a security threat to oj. Third, the security strategy of online banking
The factors that affect the security of online banking are not isolated, but interrelated and mutually causal, so the security precautions of online banking can start from the following aspects.
1. Basic work First of all, when building online banking, we should comprehensively consider the requirements of software and hardware, use the security management ability of operating system (try to use high-level security operating system) and various security mechanisms to enhance the security of online banking, constantly detect various network intrusions, audit security records, check whether there are loopholes that pose a security threat to online banking, and find and deal with oj in time. In addition, it should be considered that the security of online banking is not only affected by system software, but also by the security performance of application software. Therefore, it is very necessary to actively develop the online banking security system and application software with China characteristics and independent intellectual property rights.
Secondly, the security of online banking should consider human factors. Human factors mainly include the quality and technical level of internal managers and engineers of bank websites, as well as the safety awareness and self-protection awareness of customers who use online banking. For example, establish internal staff safety management system, strengthen internal staff computer safety education, improve staff quality, and pay close attention to internal staff moral quality.
2. Computer virus technology. Computer virus is actually a kind of functional program that can infect and invade computer system in the process of running. Computer virus, especially the virus spread through the network, is extremely harmful and is one of the main threats affecting the normal operation of online banking.
Internet banks should take various measures and methods to prevent viruses. Online banking clients should be equipped with a safe and effective virus prevention system, check and scan regularly, and solve problems in time. However, online banking is more important. The prevention and control of virus should start from a comprehensive perspective. The administrator should scan and check the virus situation through the network management host, set up an online alarm system, and call the police immediately once the virus is found, so as to solve it in the management center. At the same time, a multi-level prevention system should be adopted. The new anti-virus measures should integrate the functions of virus detection, multi-layer data protection and centralized management to form a multi-layer defense system. In addition, physical and policy measures will also play a huge role in virus prevention.
3. Firewall technology. A firewall is a system or a group of systems that implement access control policies between networks. The actual implementation of firewall is different, but in principle it can be considered as a pair of mechanisms: one is to block the transport stream, and the other is to allow the transport stream to pass through oj. Firewall technology is a method to strengthen network security by isolating network topology and service type. Because the object of firewall protection is the network block with clear closed boundary in the network, and the object to be guarded against is the security threat from the outside of the protected network block, firewall technology is most suitable for enterprise private network, especially in the case of interconnection between enterprise private network and public network. The online banking system is just in line with this model, and firewall technology can be used to ensure the network security of online banking oj. At present, there are several technologies used in firewall products: (1) Packet filtering technology selectively passes packets at the network layer (IP layer). After checking each packet in the data stream according to the preset filtering logic in the system, it is determined whether to allow the packet to pass according to the source address of the packet, the TCP/UDP port used by the destination address and the TCP link state.
(2) Application gateway technology is protocol filtering based on application layer. It can aim at a special network application service protocol-data filtering protocol, analyze data packets and form relevant reports, strictly control some communication environments that are easy to log in, control all input and output, and prevent valuable programs and data from being stolen.
(3) Proxy service technology acts on the application layer. It is a high-level application gateway as a proxy server to accept external application connection requests, and then connect with the protected network application server after security check, so that external service users can use the service oj of the intranet under the premise of control. Similarly, service connections between internal networks and external networks can also be monitored. The proxy service entity applying the gateway will log all the connections through it in order to check the security vulnerabilities and collect relevant information oj. The high-level proxy service entity using application gateway has the following advantages: log recording is convenient for network management; Information such as hidden information and internally protected host names is not known to the outside world; Application gateway can proxy RPC service for security control.
4. Data encryption technology and authentication technology
Data encryption technology is the most basic and core technical measure and theoretical basis to ensure information security, which is used to ensure the privacy, integrity and non-repudiation of online banking data. Commonly used encryption technologies include symmetric key encryption, public key encryption and mixed key encryption. Among them, mixed key encryption not only ensures data security, but also improves the encryption and decryption speed. This encryption technology is widely used in e-commerce.
Authentication technology is mainly to prevent information from being illegally forged, tampered with and counterfeited in the process of information exchange. If a hacker enters the online banking system, publishes false information or changes real information, he can make a judgment through authentication technology. Authentication technologies mainly include: (1) message authentication. Refers to the process oj in which each communicator checks the received information to ensure that the received information is true after establishing communication contact between two communicators. (2) recognition. Mainly refers to the identification of the authenticity of user identity in the network system. (3) digital signature oj. It refers to the identity authentication technology between the information receiver and the sender when receiving and sending information, which can make the information sender and the receiver unable to modify the signed documents and shirk their responsibilities according to their own interests, and the third party can arbitrate in case of disputes.
5. Security protocol support
Security protocol is a data exchange standard to ensure the security and interoperability of e-commerce. Because TCP/IP, the internet communication protocol, hardly considers security factors, the most serious security incidents at present are IP spoofing and eavesdropping to obtain the login information of legitimate users, so security protocol is equally important in online banking. At present, the main security protocols between client and online banking are SSL (Secure Socket Protocol) and SET (Secure Electronic Transaction).
The transaction server of online banking is actually a Web server, and the client uses a browser, but it has higher security requirements than the information publishing Web server. Using certificate is a standard method to realize two-way authentication between browser and Web server, which is mainly realized by SSL3.0 protocol. At present, most browsers and Web servers support SSL3.0. The main tasks of this protocol include: realizing authentication exchange based on public key technology and completing two-way authentication between browsers and Web servers; Cryptographic algorithm negotiation, using public key technology to realize key exchange between browser and Web server; Encrypt/decrypt data.
SET is a more complex protocol developed by VISA and MASTCARD. It is an open standard oj to ensure the security of card payment in online transactions on the Internet. With the support of many large companies such as IBM, HP, Microsoft, NetScape, VeriFone, GTE, VeriSign, etc., it has now formed a de facto industrial standard and has been recognized by IETF standards. It defines the security norms of online transactions among consumers, merchants and banks, and requires the installation of server software support set in the payment gateway of online banks.
6. Establish and improve relevant laws and regulations.
The emergence of online banking has led to many gaps in the field of law in China and even in the world. In order to make the development of online banking have a standardized and clear legal environment, the legislature should pay close attention to the latest development and technological innovation of online banking and its impact on the financial industry and supervision, and concentrate on studying, formulating and perfecting relevant laws and regulations, such as digital signature law, encryption law and electronic evidence law. It is necessary to clearly define the rights and obligations of all parties (consumers, merchants, banks and CA centers) in electronic transactions, make full use of the standardization, stability and compulsion of laws and regulations, and more effectively protect the legitimate rights and interests of all parties in online banking transactions.
2iqmdvy3
As the product of the new economy, online banking is the development and extension of traditional banks, and it is also an important bargaining chip for the banking industry to win in the market competition in the future. Online banking has just started in China, and its business points and online services are still being explored. As a credit-based banking industry, when building online banking, we must consider all kinds of risks faced by online banking and put security issues in the first place. At the same time, the whole system should also have the conditions of system risk assessment, security strategy implementation, system operation control, disaster recovery function and post supervision mechanism, so as to provide an all-round and three-dimensional defense system for online banking. Only in this way can online banking have vitality and develop healthily and rapidly.
refer to
1 Li cheng. Research on Technical Risks of Online Banking in China. China Financial Computer, 2003,
Yang. Restrictive factors, functional orientation and countermeasures of online banking development in China. China Financial Computer, March 2003, Li, Ba. Overview of network information security technology. Semiconductor technology, 2002,
4 Han Hong, Yang Zengrong. Network security and security technology. Journal of Baoji University of Arts and Sciences (Natural Science Edition), 2002,
5 He Jianhua. Security strategy of online banking. Computer world news, 200 1,
6 An, Cao Su 'e. Application of network security technology in e-commerce. Fujian Computer, 2003,
7 Wang Xiaolan. Reflections on the development of online banking in China. Journal of Southwest University for Nationalities (Philosophy and Social Sciences Edition), 2002,
8 Fang Zhuo. Economic explanation of online banking. Northern economy and trade, 2003,