2023
DOI: 10.4018/jgim.324465
|View full text |Cite
|
Sign up to set email alerts
|

Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment

Abstract: Nowadays, the application of enterprise management information has been deeply rooted in daily business activities, and the management risk of enterprise information security (EIS) has also increased. The use of advanced means to provide security protection for it has become the top priority. To optimize the EIS management system, and carry on the risk assessment (RA), firstly, this study analyzes the current situation of the enterprise's internal information management and summarizes the shortcomings and secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Many studies of protection-motivation theory have focused on the components of fear and fear appeals, while other components have not been explored in information-security research (Haag et al, 2021). The theory has been used in research to determine the factors that can improve individuals' security behavior and security outcomes in organizations (Wall et al, 2022) and the level of employees' information security policy compliance (Ajmi et al, 2019;Hanus & Wu, 2016;Ifinedo, 2012;Menard et al, 2018;Sommestad et al, 2019;Wang et al, 2023).…”
Section: Protection-motivation Theorymentioning
confidence: 99%
“…Many studies of protection-motivation theory have focused on the components of fear and fear appeals, while other components have not been explored in information-security research (Haag et al, 2021). The theory has been used in research to determine the factors that can improve individuals' security behavior and security outcomes in organizations (Wall et al, 2022) and the level of employees' information security policy compliance (Ajmi et al, 2019;Hanus & Wu, 2016;Ifinedo, 2012;Menard et al, 2018;Sommestad et al, 2019;Wang et al, 2023).…”
Section: Protection-motivation Theorymentioning
confidence: 99%
“…It should be emphasized that the global supply chain suffered a serious breakdown at the beginning of the pandemic, identifying the importance of supply chain resilience. Experts in both the academic and industrial arenas are seeking ways to improve the stability of the supply chain through digital solutions (Wang, Xue, et al, 2023). The studies have illustrated deep insight into the relevance of the supply chain field.…”
Section: Introductionmentioning
confidence: 99%
“…Leverage technology to address recipient's ACAP (recipient's absorptive capacity) will be beneficial for the development of new technologies, especially in electronic learning and customized teaching methods(Dolmark et al, 2023) [33]. Security control measures for risks in the era of big data, to strengthen the enterprise's information management innovation and implement the application of data security technology(Wang et al, 2023) [34]. These concepts, technologies, learning methods, and management models of information management provide inspiration for the innovative development of ethnic sports.The results of the backbasket embroidery ball competition are developing towards a fast, accurate, and stable direction.…”
mentioning
confidence: 99%