Affiliation:
1. School of Management, China University of Mining and Technology, Xuzhou 221116, Jiangsu, China
2. School of Accounting, Shandong Women’s University, Jinan 250300, Shandong, China
Abstract
With the deepening of business informatization, all kinds of business application data are rapidly gathering, which promotes enterprises to enter the era of big data. Enterprises begin to build the concept of big data, deepen the understanding of big data, extract potential data value, and improve the operation ability of enterprises and information systems. At the same time, big data brings internal control information to the system, which is becoming more and more challenging, so enterprises pay more and more attention to the security of the information system. This paper aims to introduce the enterprise financial risk identification and information security management and control under the big data environment and master the enterprise financial risk identification method so that the enterprise can adapt to the needs of the times competition faster and better. This paper introduces the method of identifying financial risk in the background of big data by classifying the methods of financial risk identification and designing the factor model. Through the experimental investigation of the company's financial asset rate, the enterprise financial risk situation is displayed, and the enterprise can improve the internal management to control the financial risk within a certain range. The experimental results show that from 2016 to 2020, the internal control and asset rate of the enterprise affect the financial risk of the enterprise, 82% of the operators only have a reasonable debt structure and sufficient solvency, the operator can operate in a safe state and then maintain a low financial risk, and the operator should also take measures to prevent the occurrence of risk in advance and realize the business goal of maximizing benefits.
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Computer Science Applications
Reference22 articles.
1. Real time intrusion detection system for ultra-high-speed big data environments
2. Time optimization of multiple knowledge transfers in the big data environment;C. Wu;Computers, Materials and Continua,2018
3. Public security management in the big data environment% public security management in the big data environment;Z. Zhu;Journal of Shanghai Public Security College (Public Security Theory and Practice),2016
4. Adaptive immune genetic algorithm for weapon system portfolio optimization in military big data environment
5. Ghost identification based on single-pixel imaging in big data environment;C. Wen;Optics Express,2017
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献