中文    English

›› 2017, Vol. 29 ›› Issue (5): 35-38.doi: 10.13998/j.cnki.issn1002-1248.2017.5.008

• Information forum • Previous Articles     Next Articles

Review on the Influencing Factors of Enterprise Information Security in the Environment of big data

WANG Xuetao, MA Xiaoqi   

  1. College of Information Management, Heilongjiang University, Heilongjiang Harbin 150080, China
  • Received:2016-12-11 Online:2017-05-20 Published:2017-05-24

Abstract: Based on the systematic review of relevant domestic and foreign literature, this paper analyzed the research progress on the influencing factors of enterprise information security from three aspects of subject distribution, chronological distribution of relevant papers and high-frequency keyword statistics, and discussed the research contents and hotspots.

Key words: big data

CLC Number: 

  • F270.7
[1] 赵伯琪.浅谈企业信息安全治理框架[J].信息安全与技术,2013,(5):19-21.
[2] 涂兰敬.专家观点:“大数据”与“庞大数据”的区别[J].网络与信息,2011,(12):37-38.
[3] 郭建,顾志强.电力企业信息安全现状分析及管理对策[J].信息技术,2013,(1):180-183,187.
[4] 张艳欣,符森.互联网企业用户信息安全问题探究[J].图书馆学研究,2013,(21):41-44.
[5] 孙力.电力企业信息安全管理研究[D].南京邮电大学,2014.
[6] 涂子沛.大数据[M].广西师范大学出版社,2012,(161):304-306.
[7] 洪娟.大数据环境下商业银行“小微贷”竞争策略研究[J].南方金融, 2014,(451):80-83.
[8] 巴曙松.大数据可解小微企业融资瓶颈[J].中国经济报告,2013,(6).
[9] 王欣.基于大数据的企业竞争情报系统的重构[D].黑龙江大学硕士研究生学位论文,2014.
[10] 黄启发,宋彪.基于协同学的企业信息安全综合评价模型[J].现代情报,2012,(8):113-117.
[11] 邬贺铨.大数据时代的机遇与挑战[J].求是,2013(4):47-49.
[12] 王婷婷.政府对中小企业信息安全建设中的作用研究[D].苏州大学,2014.
[13] 张国力.基于模糊综合评价的国有大型企业信息安全管理研究[D].北京邮电大学,2012.
[14] 冯伟.大数据时代面临的信息安全机遇和挑战[J].中国科技投资,2012,(12):24-2 5.
[15] 肖棍.浅议网络环境下的企业信息安全管理[J].标准科学,2010,(8):20-23.
[16] Sabherwal, R. and Chan, Y.E. (2001), “Alignment between business and IS strategies: a study of prospectors, analyzers and defenders”, Information Systems Research, Vol.12 No.1,pp.11-33.
[17] Friedman, B., Kahn, P. Jr and Howe, D. (2000), “Trust online”, Communications of the ACM, Vol. 43 No.12, pp.34-40.
[18] Eloff, M.M. and von Solms, S.H. (2000), “Information security management: an approach to combine process certification and product evaluation”, Computers & Security, Vol. 19 No.3,pp.698-709.
[19] Dhillon, G. and Backhouse, J. (2000), “Information system security management in the new millennium”, Communications of the ACM, Vol. 43 No.7,pp.125-8.
[20] S.G. Sutton, V. Arnold, T. Benford and J. Canada, Why Enterprise Risk Management is Vital: Learning from Company Experiences with Sarbanes-Oxley Section 404 Compliance, Altamonte Springs, FL: Institute of Internal Auditors Research Foundation, 2009.
[21] Taylor, M. and Murphy, A. (2004), “SMEs and e-business”, Journal of Small Business and Enterprise Development, Vol.11 No.3,pp.280-289.
[22] Labuschagne, L., 2006. A comparative framework for evaluating information security risk management methods. Technical report, Standard Bank Academy for Information Technology, Rand Afrikaans University.
[23] Basie von Solms.Information Security---The Third Wave?.[J]Computers&Security, 2000,19:615-620.
[1] CHANG ZhiJun, XU LiYuan, YU QianQian, ZHANG JianYong, WANG YongJi. Scientific and Technical Literature Data Management System Based on Life Cycle Model [J]. Journal of Library and Information Science in Agriculture, 2022, 34(6): 36-49.
[2] SONG Kai, RAN Congjing. Digital Technologies Aid Intelligent Epidemic Prevention and Control: Community-based Rapid Detection and Tracking Platform of COVID-19 [J]. Journal of Library and Information Science in Agriculture, 2022, 34(5): 92-101.
[3] SONG Shanshan, BAI Wenlin. A Review of Big Data Governance Research in China [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 4-17.
[4] CHAI Miaoling, ZOU Yixing, TAN Rongzhi, ZENG Yi, REN Yunyue. Research and Practice on Association of Scientific Data and Scientific Literature Oriented to Knowledge Service of Agricultural Industry [J]. Journal of Library and Information Science in Agriculture, 2022, 34(3): 37-50.
[5] FENG Maolin, DONG Jianfeng. Construction of the Rural Information Service Platform under Big Data Environment [J]. Journal of Library and Information Science in Agriculture, 2021, 33(7): 63-71.
[6] SUN Tan, HUANG Yongwen, XIAN Guojian, CUI Yunpeng, LIU Juan. Considerations for the Development of Agricultural Informatization Driven by a New Generation of Information Technologies [J]. Journal of Library and Information Science in Agriculture, 2021, 33(3): 4-15.
[7] CAO Shujin, YUE Wenyu. Research on Library User Profiles for Precision Services [J]. Journal of Library and Information Science in Agriculture, 2021, 33(10): 4-19.
[8] LIU Yiming, JIANG Xinyu, DUAN Yizhi. Block Chain Technology: Promoting the Digital Resource Construction of University Library in Big Data Era [J]. Journal of Library and Information Science in Agriculture, 2020, 32(6): 15-22.
[9] MA Xiaoyue, XUE Pengzhen. The Cross-integration Development Path of Information Science and Communication Science in the Background of Artificial Intelligence and Big Data [J]. Journal of Library and Information Science in Agriculture, 2020, 32(3): 37-43.
[10] JIANG Enbo, LI Na. Analysis and Evaluation of Chinese Open Government Agricultural Data [J]. Journal of Library and Information Science in Agriculture, 2020, 32(10): 4-15.
[11] ZHAO Ruixue, LI Jiao, ZHANG Jie, ZHANG Dandan. Construction of Multi-Scenario Agricultural Knowledge Service System [J]. Journal of Library and Information Science in Agriculture, 2020, 32(1): 4-11.
[12] LI Xueqing, ZHENG Meiyu, WU Jianhong, HUANG Changqing, XUE Hua. Research on University Libraries Personalized Services Based on Big Data and ontology Technology [J]. Agricultural Library and Information, 2019, 31(9): 75-81.
[13] DU Jian. Biomedical Knowledge Discovery Based on Big Data Linkage Analysis [J]. Agricultural Library and Information, 2019, 31(3): 4-9.
[14] HOU Ru. On the Expansion of Evaluation in Humanities and Social Sciences field in Big Data Environment [J]. Agricultural Library and Information, 2019, 31(2): 36-42.
[15] LIU Wenjiang, HU Zhidan, JIA Fengling. Research on the Development Trend of Big Data in Library and Information Science of China [J]. Agricultural Library and Information, 2019, 31(12): 56-63.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!