security information management
Recently Published Documents





Mathematics ◽  
2021 ◽  
Vol 9 (14) ◽  
pp. 1631
Emilio Abad-Segura ◽  
Alfonso Infante-Moro ◽  
Mariana-Daniela González-Zamar ◽  
Eloy López-Meneses

The scope of blockchain technology, initially associated with the cryptocurrency Bitcoin, is greater due to the multiple applications in various disciplines. Its use in accounting lies mainly in the fact that it reduces risks and the eventuality of fraud, eliminates human error, promotes efficiency, and increases transparency and reliability. This means that different economic sectors assume it as a recording and management instrument. The aim is to examine current and emerging research lines at a global level on blockchain technology for secure accounting management. The evolution of the publication of the number of articles between 2016 and 2020 was analyzed. Statistical and mathematical techniques were applied to a sample of 1130 records from the Scopus database. The data uncovered a polynomial trend in this period. The seven main lines of work were identified: blockchain, network security, information management, digital storage, edge computing, commerce, and the Internet of Things. The ten most outstanding emerging research lines are detected. This study provides the past and future thematic axes on this incipient field of knowledge, which is a tool for decision-making by academics, researchers, and directors of research investment programs.

2021 ◽  
pp. 1-11
Yanjie Zhu ◽  
Lizhi Zheng

In order to solve the security problems of the ideological and political teaching system itself, the ideological and political teaching information management technology needs to be further improved. According to actual needs, based on artificial intelligence and data security models, this paper studies and implements a network security information management system based on artificial intelligence and security models. The system can effectively manage the contents of safe work and increase the ability of information sharing and collaborative work. According to the actual needs of most current systems, with data mining, data recognition, and security management as the goals, this paper builds the structure of the functional modules and adopts the function cascade to finally realize the safety information management of this system. In addition, this article designs experiments to verify the performance of the model constructed in this article. The research results show that the model has good performance and meets actual needs.

2014 ◽  
Vol 701-702 ◽  
pp. 40-43 ◽  
Ning Zhang ◽  
Jin Fu Zhu

In the study, the method based on the combination of analytic hierarchy process(AHP) and fuzzy theory is proposed to evaluate civil aviation airport security information management. Assessment indexes of civil aviation airport security information management are studied and given, and the hierarchic tree is formulated based on assessment indexes of civil aviation airport security information management. On the basis of describing evaluation indexes for civil aviation airport security information management, and the evaluation model of civil aviation airport security information management is constructed based on fuzzy analytic hierarchy process. Finally, the case is used to testify the effectiveness of the proposed fuzzy analytic hierarchy process method.

2013 ◽  
Vol 347-350 ◽  
pp. 2734-2738
Wan Li Cao

The social security information management system based on three-tier model and the client-server framework is built, which in close connection with social security archives information. At the same time, the amount of data, namely the underlying architecture code design, system architecture design, and resolve client desktop three levels to form. The social security system has the formation of the window, which informs retrieval of data management applications for comprehensive

Sign in / Sign up

Export Citation Format

Share Document