Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3573428.3573642acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Research on Information Security of Enterprise Group Financial Sharing in Cloud Computing Environment

Published: 15 March 2023 Publication History

Abstract

With the continuous development of the economy and technology in the information age, a series of problems such as high financial cost, low efficiency of financial management and structural redundancy appear in large enterprise groups with large business scale and numerous subordinate groups. In this context, more and more enterprises have begun to provide services through financial sharing to solve internal problems. [1] At the same time, cloud computing promotes the construction of a highly process-oriented financial sharing operation system, and greatly improves the data storage capacity and computational analysis ability of the system. It can improve the quality of accounting information and provide technical support for the financial sharing service center of enterprise groups to better perform financial functions, enhance decision support and strategic impetus. However, with the increasing scale of financial sharing services of enterprise groups, the urgent problem to be solved is how to ensure the financial sharing services provided by enterprises in the cloud computing environment. This paper will take the AHP-fuzzy comprehensive evaluation method as the core, on the basis of a concise scientific principle, dynamic principle, objectivity principle and comprehensive principle, combined with index classification method, expert guidance method, questionnaire survey method and literature research method to complete the construction of financial sharing information security evaluation system, which will play a certain reference role in the information security research of financial sharing of enterprise groups.

References

[1]
Shize Nan. Research on Information Security of Enterprise Group Financial Sharing in Cloud Computing Environment [C]. Taiyuan University of Technology, 2018.
[2]
Qi Hui.Information Security of Financial Sharing of Enterprise Groups in Cloud Environment [J]. Value Engineering, 2022, 41 (22): 20-22.
[3]
Liu Fangzhu; Wen Shuang; Jiang Na. Analysis and Evaluation System of Big Data Cloud Computing Information Security Issues [J]. Nongjia Staff, 2019, (20): 177.
[4]
Liu Yinfeng; Fu Sen; Zhao Wei. Application Research of Ningxia S Enterprise Information Security Evaluation System Based on AHP-Fuzzy Method [J]. Modern Industrial Economy and Informatization, 2022, 12 (01): 128-131+135.
[5]
Chen Xi. Network information security evaluation system and evaluation model under the background of big data [J]. Mobile communication, 2021, 45 (05): 130-134.
[6]
Ji Hua; takata. Research and Application of Information Security Evaluation System Based on AHP Method [J]. Harbour Engineering Technology, 2015, 52 (05): 89-93.
[7]
Wang Lili. Research on the construction of evaluation index system of college students ' network information security literacy based on AHP [J]. Network security technology and application, 2022, (07): 85-87.
[8]
Zhao Chen. Evaluation of Information Security System Construction of China Southern Airlines Dalian Branch Based on Fuzzy Comprehensive Evaluation [C]. East China Jiaotong University, 2020.
[9]
Dou Zhuo. Problems and solutions of financial integration under the background of financial sharing-Taking Y construction enterprise as an example [J]. Time-honored brand marketing, 2022, (15): 101-103.
[10]
Cai Jing. Some Thoughts on the Operation and Management of Financial Shared Service Center of State-owned Enterprises [J]. Chinese Market, 2022, (24): 195-197.

Index Terms

  1. Research on Information Security of Enterprise Group Financial Sharing in Cloud Computing Environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    EITCE '22: Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering
    October 2022
    1999 pages
    ISBN:9781450397148
    DOI:10.1145/3573428
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 March 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. AHP
    2. Cloud Computing
    3. Financial Sharing
    4. Information Safety
    5. System Construction

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    EITCE 2022

    Acceptance Rates

    Overall Acceptance Rate 508 of 972 submissions, 52%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 37
      Total Downloads
    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Aug 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media