Comparative Analysis of ICO, DAOICO, IEO and STO. Case Study
The article examines the problem of the ICO (Initial Coin Offering, from English — “initial offer of coins, initial placement of coins”). The information source is the ICO rating data of the return on investment in blockchain startups. The methodological base of the research is a situational comparative analysis of the ICO, DAOICO, IEO and STO and systematization of information. The author analyzes three new ICO models. The first one includes elements of Decentralized Autonomous Organizations (DAO). Its aim is to minimize the difficulties and risks associated with the ICO. The second model (Initial Exchange Offering (IEO), from English — “primary exchange offer”) is designed to minimize risks, liquidity problems and a delay in listing tokens at the end of the token sale. The third model — the Security Token Offering (STO, from English — “offer of security token”) — was designed to support real assets and comply with the SEC requirements. These models are a new direction for small and medium enterprises and investors. The absence of any scientific work emphasizes the relevance and scientific novelty of the study. The article is a follow-up of the empirical work related to the success of the ICO, as well as the basis for its revision using the case study results.
Th e purpose of this article is to form the multipronged view on the essence and methodology of the case study as a research method with the researcher. Research design, types of case studies and tactics for dealing with four tests used to establish the quality of an empirical research are regarded in this work. Th is article will be useful for researchers in every field, including management.
In this paper the authors propose a new approach to teaching practical information security in higher school based on case studies. They justify its place in information security curriculum by providing an example from the experience of using the approach for BSc and MSc students of Higher School of Economics in the courses on «Technical and Organizational Aspects of Information Security and Information Security Technologies». This paper fills the gap in existing practices for teaching information security which currently lack in guidelines for designing case studies and integrating them into the curriculum.
The paper examines the structure, governance, and balance sheets of state-controlled banks in Russia, which accounted for over 55 percent of the total assets in the country's banking system in early 2012. The author offers a credible estimate of the size of the country's state banking sector by including banks that are indirectly owned by public organizations. Contrary to some predictions based on the theoretical literature on economic transition, he explains the relatively high profitability and efficiency of Russian state-controlled banks by pointing to their competitive position in such functions as acquisition and disposal of assets on behalf of the government. Also suggested in the paper is a different way of looking at market concentration in Russia (by consolidating the market shares of core state-controlled banks), which produces a picture of a more concentrated market than officially reported. Lastly, one of the author's interesting conclusions is that China provides a better benchmark than the formerly centrally planned economies of Central and Eastern Europe by which to assess the viability of state ownership of banks in Russia and to evaluate the country's banking sector.
The paper examines the principles for the supervision of financial conglomerates proposed by BCBS in the consultative document published in December 2011. Moreover, the article proposes a number of suggestions worked out by the authors within the HSE research team.