›› 2017, Vol. 29 ›› Issue (5): 35-38.doi: 10.13998/j.cnki.issn1002-1248.2017.5.008
• Information forum • Previous Articles Next Articles
WANG Xuetao, MA Xiaoqi
CLC Number:
[1] 赵伯琪.浅谈企业信息安全治理框架[J].信息安全与技术,2013,(5):19-21. [2] 涂兰敬.专家观点:“大数据”与“庞大数据”的区别[J].网络与信息,2011,(12):37-38. [3] 郭建,顾志强.电力企业信息安全现状分析及管理对策[J].信息技术,2013,(1):180-183,187. [4] 张艳欣,符森.互联网企业用户信息安全问题探究[J].图书馆学研究,2013,(21):41-44. [5] 孙力.电力企业信息安全管理研究[D].南京邮电大学,2014. [6] 涂子沛.大数据[M].广西师范大学出版社,2012,(161):304-306. [7] 洪娟.大数据环境下商业银行“小微贷”竞争策略研究[J].南方金融, 2014,(451):80-83. [8] 巴曙松.大数据可解小微企业融资瓶颈[J].中国经济报告,2013,(6). [9] 王欣.基于大数据的企业竞争情报系统的重构[D].黑龙江大学硕士研究生学位论文,2014. [10] 黄启发,宋彪.基于协同学的企业信息安全综合评价模型[J].现代情报,2012,(8):113-117. [11] 邬贺铨.大数据时代的机遇与挑战[J].求是,2013(4):47-49. [12] 王婷婷.政府对中小企业信息安全建设中的作用研究[D].苏州大学,2014. [13] 张国力.基于模糊综合评价的国有大型企业信息安全管理研究[D].北京邮电大学,2012. [14] 冯伟.大数据时代面临的信息安全机遇和挑战[J].中国科技投资,2012,(12):24-2 5. [15] 肖棍.浅议网络环境下的企业信息安全管理[J].标准科学,2010,(8):20-23. [16] Sabherwal, R. and Chan, Y.E. (2001), “Alignment between business and IS strategies: a study of prospectors, analyzers and defenders”, Information Systems Research, Vol.12 No.1,pp.11-33. [17] Friedman, B., Kahn, P. Jr and Howe, D. (2000), “Trust online”, Communications of the ACM, Vol. 43 No.12, pp.34-40. [18] Eloff, M.M. and von Solms, S.H. (2000), “Information security management: an approach to combine process certification and product evaluation”, Computers & Security, Vol. 19 No.3,pp.698-709. [19] Dhillon, G. and Backhouse, J. (2000), “Information system security management in the new millennium”, Communications of the ACM, Vol. 43 No.7,pp.125-8. [20] S.G. Sutton, V. Arnold, T. Benford and J. Canada, Why Enterprise Risk Management is Vital: Learning from Company Experiences with Sarbanes-Oxley Section 404 Compliance, Altamonte Springs, FL: Institute of Internal Auditors Research Foundation, 2009. [21] Taylor, M. and Murphy, A. (2004), “SMEs and e-business”, Journal of Small Business and Enterprise Development, Vol.11 No.3,pp.280-289. [22] Labuschagne, L., 2006. A comparative framework for evaluating information security risk management methods. Technical report, Standard Bank Academy for Information Technology, Rand Afrikaans University. [23] Basie von Solms.Information Security---The Third Wave?.[J]Computers&Security, 2000,19:615-620. |
[1] | CHANG ZhiJun, XU LiYuan, YU QianQian, ZHANG JianYong, WANG YongJi. Scientific and Technical Literature Data Management System Based on Life Cycle Model [J]. Journal of Library and Information Science in Agriculture, 2022, 34(6): 36-49. |
[2] | SONG Kai, RAN Congjing. Digital Technologies Aid Intelligent Epidemic Prevention and Control: Community-based Rapid Detection and Tracking Platform of COVID-19 [J]. Journal of Library and Information Science in Agriculture, 2022, 34(5): 92-101. |
[3] | SONG Shanshan, BAI Wenlin. A Review of Big Data Governance Research in China [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 4-17. |
[4] | CHAI Miaoling, ZOU Yixing, TAN Rongzhi, ZENG Yi, REN Yunyue. Research and Practice on Association of Scientific Data and Scientific Literature Oriented to Knowledge Service of Agricultural Industry [J]. Journal of Library and Information Science in Agriculture, 2022, 34(3): 37-50. |
[5] | FENG Maolin, DONG Jianfeng. Construction of the Rural Information Service Platform under Big Data Environment [J]. Journal of Library and Information Science in Agriculture, 2021, 33(7): 63-71. |
[6] | SUN Tan, HUANG Yongwen, XIAN Guojian, CUI Yunpeng, LIU Juan. Considerations for the Development of Agricultural Informatization Driven by a New Generation of Information Technologies [J]. Journal of Library and Information Science in Agriculture, 2021, 33(3): 4-15. |
[7] | CAO Shujin, YUE Wenyu. Research on Library User Profiles for Precision Services [J]. Journal of Library and Information Science in Agriculture, 2021, 33(10): 4-19. |
[8] | LIU Yiming, JIANG Xinyu, DUAN Yizhi. Block Chain Technology: Promoting the Digital Resource Construction of University Library in Big Data Era [J]. Journal of Library and Information Science in Agriculture, 2020, 32(6): 15-22. |
[9] | MA Xiaoyue, XUE Pengzhen. The Cross-integration Development Path of Information Science and Communication Science in the Background of Artificial Intelligence and Big Data [J]. Journal of Library and Information Science in Agriculture, 2020, 32(3): 37-43. |
[10] | JIANG Enbo, LI Na. Analysis and Evaluation of Chinese Open Government Agricultural Data [J]. Journal of Library and Information Science in Agriculture, 2020, 32(10): 4-15. |
[11] | ZHAO Ruixue, LI Jiao, ZHANG Jie, ZHANG Dandan. Construction of Multi-Scenario Agricultural Knowledge Service System [J]. Journal of Library and Information Science in Agriculture, 2020, 32(1): 4-11. |
[12] | LI Xueqing, ZHENG Meiyu, WU Jianhong, HUANG Changqing, XUE Hua. Research on University Libraries Personalized Services Based on Big Data and ontology Technology [J]. Agricultural Library and Information, 2019, 31(9): 75-81. |
[13] | DU Jian. Biomedical Knowledge Discovery Based on Big Data Linkage Analysis [J]. Agricultural Library and Information, 2019, 31(3): 4-9. |
[14] | HOU Ru. On the Expansion of Evaluation in Humanities and Social Sciences field in Big Data Environment [J]. Agricultural Library and Information, 2019, 31(2): 36-42. |
[15] | LIU Wenjiang, HU Zhidan, JIA Fengling. Research on the Development Trend of Big Data in Library and Information Science of China [J]. Agricultural Library and Information, 2019, 31(12): 56-63. |
|