scholarly journals Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment

2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
Ran Wei ◽  
Sheng Yao

With the deepening of business informatization, all kinds of business application data are rapidly gathering, which promotes enterprises to enter the era of big data. Enterprises begin to build the concept of big data, deepen the understanding of big data, extract potential data value, and improve the operation ability of enterprises and information systems. At the same time, big data brings internal control information to the system, which is becoming more and more challenging, so enterprises pay more and more attention to the security of the information system. This paper aims to introduce the enterprise financial risk identification and information security management and control under the big data environment and master the enterprise financial risk identification method so that the enterprise can adapt to the needs of the times competition faster and better. This paper introduces the method of identifying financial risk in the background of big data by classifying the methods of financial risk identification and designing the factor model. Through the experimental investigation of the company's financial asset rate, the enterprise financial risk situation is displayed, and the enterprise can improve the internal management to control the financial risk within a certain range. The experimental results show that from 2016 to 2020, the internal control and asset rate of the enterprise affect the financial risk of the enterprise, 82% of the operators only have a reasonable debt structure and sufficient solvency, the operator can operate in a safe state and then maintain a low financial risk, and the operator should also take measures to prevent the occurrence of risk in advance and realize the business goal of maximizing benefits.

2018 ◽  
Vol 6 ◽  
pp. 277-281
Author(s):  
Elda Kuka

Public sector organizations are in the early stages of adopting information security management in Albania. Organizations who have adopted these processes have underestimated information security within the governance framework. This study specifically investigates the information security management within public sector organizations. Its objective is to align local organizations with international standards and frameworks in terms of integrating information security management and information technology audits, risks, and control measures. A survey of selected organizations is completed and results are presented in this paper identifying the maturity level of information security management in Albanian organizations.


Author(s):  
Jarmila Šalgovičová ◽  
Vanessa Prajová

Abstract Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Jian Xiao

Based on the unprecedented development of current information technology, under the prevalence of third-party payment, in order to increase the utilization rate of idle resources and meet the diversified economic needs of today’s era, as an emerging economic model-the “sharing economy”, combined with Internet big data, it has effectively realized the perfect connection between supply and demand, and it has quickly swept through all walks of life. However, while promoting economic development, the lack of regulatory measures and the imperfect credit system have severely restricted the further development of the sharing economy. Blockchain technology (BT), as a new distributed infrastructure and computing method, has always been the core technology of Bitcoin. Based on the development of generalized economic model and BT, this paper analyzes the shortcomings of generalized economic model and blockchain technology through information fusion big data and proposes a kind of information based on information fusion big data+public BT. The security management system adapts to the status quo of the sharing economy and uses the functions of information fusion big data+blockchain technology to solve the current information security risks faced by the sharing economy. The experimental results of this article show that the sharing economy information security management system based on information fusion big data+blockchain technology has good protection capabilities. The interception rate of external information reached 95%, and the interception rate of system information reached 93%. Better protection of privacy leaks is needed.


Sign in / Sign up

Export Citation Format

Share Document