A survey on FinTech

被引:247
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ,2 ]
Sun, Xiaotong [1 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
关键词
FinTech; Cloud computing; Cyber security; Big data; Financial computing; Data-driven framework; ACCESS-CONTROL MODEL; BIG DATA-STORAGE; CLOUD; PRIVACY; SECURITY; TRUST; VISUALIZATION; PROTOCOL; NETWORKS; CLASSIFICATION;
D O I
10.1016/j.jnca.2017.10.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a new term in the financial industry, FinTech has become a popular term that describes novel technologies adopted by the financial service institutions. This term covers a large scope of techniques, from data security to financial service deliveries. An accurate and up-to-date awareness of FinTech has an urgent demand for both academics and professionals. This work aims to produce a survey of FinTech by collecting and reviewing contemporary achievements, by which a theoretical data-driven FinTech framework is proposed. Five technical aspects are summarized and involved, which include security and privacy, data techniques, hardware and infrastructure, applications and management, and service models. The main findings of this work are fundamentals of forming active FinTech solutions.
引用
收藏
页码:262 / 273
页数:12
相关论文
共 153 条
[1]   Trust, Security and Privacy in Emerging Distributed Systems [J].
Abawajy, Jemal ;
Wang, Guojun ;
Yang, Laurence T. ;
Javadi, Bahman .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :224-226
[2]   A survey of anomaly detection techniques in financial domain [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Islam, Md. Rafiqul .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :278-288
[3]  
[Anonymous], 2013, Proceedings of the 22Nd USENIX Conference on Security, SEC'13
[4]  
[Anonymous], CONCURRENCY COMPUTAT
[5]   A Compact Evolutionary Interval-Valued Fuzzy Rule-Based Classification System for the Modeling and Prediction of Real-World Financial Applications With Imbalanced Data [J].
Antonio Sanz, Jose ;
Bernardo, Dario ;
Herrera, Francisco ;
Bustince, Humberto ;
Hagras, Hani .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2015, 23 (04) :973-990
[6]   Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph [J].
Asamoah, Claude ;
Tao, Lixin ;
Gai, Keke ;
Jiang, Ning .
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, :240-246
[7]   Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario [J].
Banu, R. Vidya ;
Nagaveni, N. .
INFORMATION SCIENCES, 2013, 232 :437-448
[8]   Understanding Interfirm Relationships in Business Ecosystems with Interactive Visualization [J].
Basole, Rahul C. ;
Clear, Trustin ;
Hu, Mengdie ;
Mehrotra, Harshit ;
Stasko, John .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2013, 19 (12) :2526-2535
[9]  
Basu Arkaprava, 2013, ACM SIGARCH Comput.Archit. News, DOI 10.1145/2508148.2485943
[10]   Toward intelligent assistance for a data mining process: An ontology-based approach for cost-sensitive classification [J].
Bernstein, A ;
Provost, F ;
Hill, S .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (04) :503-518