Security token offerings

نویسندگان

چکیده

Abstract This paper posits that distinguishing security token offerings (STOs) from initial coin (ICOs) is important for the study of entrepreneurial finance. We first provide a working definition and present an overview STO market using unique sample. The activity developed after end ICO bubble. is, however, still nascent market. STOs are geographically dispersed but concentrated in jurisdictions with accommodating securities laws. Next, we explore success factors. show various issuer offering characteristics traditionally used literature also matter success. find associated good governance practices, consistent corporate finance literature. conclude by discussing implications native digital securities, next generation tokens,

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Design in Initial Public Offerings

We investigate an IPO security design problem when information asymmetries across investors lead to a winner’s curse. Firms that are riskier in down markets can lower the cost of going public by using unit IPOs, in which equity and warrants are combined into a non-divisible package. Furthermore, firms that have a sizeable growth potential even in bad states of the world can fully eliminate the ...

متن کامل

Modified USB Security Token for User Authentication

Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...

متن کامل

Authentication Using Mobile Phone as a Security Token

Today security concerns are on the rise in all areas industries such as banks, governmental applications, healthcare industry, militaryorganization, educational institutions etc, with one common weak link being “passwords”. Several proper strategies for using passwords have been proposed. Some of which are very difficult to use and others might not meet the company’s security concerns. The usag...

متن کامل

The WHO Hardware Token Security Model ( Position Paper )

Existing Internet applications usually rely on a secure communication channel (such as SSL) or users’ passwords to provide a secure communication. And usually we assume that the browser and the computer we are using are trustworthy. However, these assumptions are obviously unrealistic. In this paper, we try to address these issues, in particular, we describe a trust model, call the WHO model, w...

متن کامل

Security Token and Its Derivative in Discrete-Time Models

Aiming at modeling uncertain digital materials in the network society, we de ne the security token, which is abbreviated into a word coinage setok. Each setok has its explicit price, explicit values, and timestamp on it as well as the main contents. The values are uncertain and may cause risks. Several important properties of the setok are de ned. Then, in order to provide risk-hedging opportun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Small Business Economics

سال: 2021

ISSN: ['1573-0913', '0921-898X']

DOI: https://doi.org/10.1007/s11187-021-00539-9