{"id":"https://openalex.org/W4409955740","doi":"https://doi.org/10.1177/14727978241300787","title":"Exploring enterprise information security management and risk assessment through big data and the Internet of Things","display_name":"Exploring enterprise information security management and risk assessment through big data and the Internet of Things","publication_year":2024,"publication_date":"2024-11-14","ids":{"openalex":"https://openalex.org/W4409955740","doi":"https://doi.org/10.1177/14727978241300787"},"language":"en","primary_location":{"id":"doi:10.1177/14727978241300787","is_oa":false,"landing_page_url":"https://doi.org/10.1177/14727978241300787","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101507232","display_name":"Hongfang Yu","orcid":"https://orcid.org/0000-0002-5219-1780"},"institutions":[{"id":"https://openalex.org/I39521962","display_name":"Hunan City University","ror":"https://ror.org/01vd7vb53","country_code":"CN","type":"education","lineage":["https://openalex.org/I39521962"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hong Yu","raw_affiliation_strings":["College of Management, Hunan City University, Yiyang, China"],"affiliations":[{"raw_affiliation_string":"College of Management, Hunan City University, Yiyang, China","institution_ids":["https://openalex.org/I39521962"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101507232"],"corresponding_institution_ids":["https://openalex.org/I39521962"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.48612585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":"1519","last_page":"1534"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7074418067932129},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5433372855186462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5386090278625488},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5180573463439941},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5049877762794495},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4418729245662689},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40348905324935913},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.37979769706726074},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3542172908782959},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.19598841667175293},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12401190400123596},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.090381920337677}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7074418067932129},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5433372855186462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5386090278625488},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5180573463439941},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5049877762794495},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4418729245662689},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40348905324935913},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.37979769706726074},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3542172908782959},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.19598841667175293},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12401190400123596},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.090381920337677},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/14727978241300787","is_oa":false,"landing_page_url":"https://doi.org/10.1177/14727978241300787","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2921980263","https://openalex.org/W2982102463","https://openalex.org/W3003933912","https://openalex.org/W3006161904","https://openalex.org/W3017359960","https://openalex.org/W3039476817","https://openalex.org/W3081075281","https://openalex.org/W3087287021","https://openalex.org/W3109815903","https://openalex.org/W3113280383","https://openalex.org/W3116587385","https://openalex.org/W3130473649","https://openalex.org/W3132720873","https://openalex.org/W3157340262","https://openalex.org/W3158717526","https://openalex.org/W3179212946","https://openalex.org/W3182779748","https://openalex.org/W3204203612","https://openalex.org/W4200162146","https://openalex.org/W4200526850","https://openalex.org/W4210486492","https://openalex.org/W4210727921","https://openalex.org/W4210957183","https://openalex.org/W4211020381","https://openalex.org/W4220679496","https://openalex.org/W4220704242","https://openalex.org/W4225706872","https://openalex.org/W4226144297","https://openalex.org/W4226396247","https://openalex.org/W4228997215","https://openalex.org/W4282032734","https://openalex.org/W4285820421","https://openalex.org/W4292998851","https://openalex.org/W4293526675","https://openalex.org/W4312311256","https://openalex.org/W4322580663","https://openalex.org/W4382236851","https://openalex.org/W6886103381"],"related_works":["https://openalex.org/W4256374004","https://openalex.org/W4310892428","https://openalex.org/W2120971814","https://openalex.org/W2384723023","https://openalex.org/W3048948897","https://openalex.org/W2777401565","https://openalex.org/W2144394323","https://openalex.org/W2362334938","https://openalex.org/W2056794087","https://openalex.org/W2033357182"],"abstract_inverted_index":{"With":[0],"the":[1,32,45,90,100,112,127,146,159,191,234,246,277,282],"rapid":[2],"evolution":[3,236],"of":[4,20,37,47,52,66,92,104,165,193,237,248,281],"information":[5,8,38,68,134,169,195,224,240,249,263],"technology,":[6],"enterprise":[7,59,67,105,133,194,223,239,262],"security":[9,39,69,101,135,170,196,225,241,250,264,280],"management":[10,65,197,242],"and":[11,35,50,61,77,102,121,143,150,208,251,271,279],"risk":[12,153,252],"assessment":[13],"have":[14],"gained":[15],"paramount":[16],"importance.":[17],"The":[18,155],"objective":[19],"this":[21,254],"study":[22,113,255],"is":[23,42,71,148],"to":[24,98,152,221,257,269,276],"offer":[25],"a":[26,80,218,229],"comprehensive":[27],"solution":[28,202],"aimed":[29],"at":[30,177],"bolstering":[31],"accuracy,":[33],"security,":[34],"efficiency":[36,247],"management.":[40],"This":[41,83,185],"achieved":[43],"through":[44,85],"integration":[46],"big":[48,96,141],"data":[49,60,97,142,174],"Internet":[51],"Things":[53],"(IoT)":[54],"technologies,":[55],"thereby":[56,274],"safeguarding":[57],"critical":[58],"private":[62],"information.":[63],"Effective":[64],"systems":[70],"imperative":[72],"for":[73,117,167,190,233],"upholding":[74],"confidentiality,":[75],"integrity,":[76],"availability,":[78],"necessitating":[79],"holistic":[81],"approach.":[82],"study,":[84],"in-depth":[86],"theoretical":[87],"analysis,":[88],"proposes":[89],"combination":[91],"blockchain":[93],"technology":[94],"with":[95,109,172],"enhance":[99],"trustworthiness":[103],"IoT":[106,118,136],"systems.":[107,243],"Starting":[108],"practical":[110],"issues,":[111],"stores":[114],"identification":[115,163],"cards":[116],"sensor":[119],"devices":[120],"related":[122],"information\u2019s":[123],"hash":[124],"values":[125],"in":[126,261],"blockchain,":[128],"thus":[129],"establishing":[130],"an":[131,162,200],"integrated":[132],"system":[137,168],"model":[138,147,160],"that":[139,158,203],"combines":[140],"blockchain.":[144],"Finally,":[145],"tested":[149],"subjected":[151],"assessment.":[154],"results":[156],"show":[157],"achieves":[161],"accuracy":[164],"90.941%":[166],"management,":[171,265],"stable":[173],"transmission":[175],"latency":[176],"around":[178],"192":[179],"milliseconds,":[180],"significantly":[181],"outperforming":[182],"other":[183],"algorithms.":[184,213],"research":[186],"carries":[187],"significant":[188],"implications":[189],"field":[192],"by":[198],"presenting":[199],"innovative":[201],"demonstrates":[204],"lower":[205],"communication":[206],"overhead":[207],"higher":[209],"throughput":[210],"than":[211],"alternative":[212],"It":[214],"not":[215],"only":[216],"pioneers":[217],"novel":[219],"approach":[220],"managing":[222],"but":[226],"also":[227],"establishes":[228],"robust":[230],"experimental":[231],"groundwork":[232],"future":[235],"intelligent":[238],"By":[244],"enhancing":[245],"assessments,":[253],"aims":[256],"propel":[258],"forward":[259],"advancements":[260],"potentially":[266],"mitigating":[267],"risks":[268],"businesses":[270],"individuals":[272],"alike,":[273],"contributing":[275],"stability":[278],"digital":[283],"society.":[284]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
