{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T04:58:42Z","timestamp":1772341122581,"version":"3.50.1"},"reference-count":22,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71572189"],"award-info":[{"award-number":["71572189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,9,6]]},"abstract":"<jats:p>With the deepening of business informatization, all kinds of business application data are rapidly gathering, which promotes enterprises to enter the era of big data. Enterprises begin to build the concept of big data, deepen the understanding of big data, extract potential data value, and improve the operation ability of enterprises and information systems. At the same time, big data brings internal control information to the system, which is becoming more and more challenging, so enterprises pay more and more attention to the security of the information system. This paper aims to introduce the enterprise financial risk identification and information security management and control under the big data environment and master the enterprise financial risk identification method so that the enterprise can adapt to the needs of the times competition faster and better. This paper introduces the method of identifying financial risk in the background of big data by classifying the methods of financial risk identification and designing the factor model. Through the experimental investigation of the company's financial asset rate, the enterprise financial risk situation is displayed, and the enterprise can improve the internal management to control the financial risk within a certain range. The experimental results show that from 2016 to 2020, the internal control and asset rate of the enterprise affect the financial risk of the enterprise, 82% of the operators only have a reasonable debt structure and sufficient solvency, the operator can operate in a safe state and then maintain a low financial risk, and the operator should also take measures to prevent the occurrence of risk in advance and realize the business goal of maximizing benefits.<\/jats:p>","DOI":"10.1155\/2021\/7188327","type":"journal-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T20:35:16Z","timestamp":1631046916000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment"],"prefix":"10.1155","volume":"2021","author":[{"given":"Ran","family":"Wei","sequence":"first","affiliation":[{"name":"School of Management, China University of Mining and Technology, Xuzhou 221116, Jiangsu, China"},{"name":"School of Accounting, Shandong Women\u2019s University, Jinan 250300, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5003-2532","authenticated-orcid":true,"given":"Sheng","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Management, China University of Mining and Technology, Xuzhou 221116, Jiangsu, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1615-5"},{"issue":"3","key":"2","first-page":"269","article-title":"Time optimization of multiple knowledge transfers in the big data environment","volume":"54","author":"C. Wu","year":"2018","journal-title":"Computers, Materials and Continua"},{"key":"3","first-page":"90","article-title":"Public security management in the big data environment% public security management in the big data environment","author":"Z. Zhu","year":"2016","journal-title":"Journal of Shanghai Public Security College (Public Security Theory and Practice)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0596-3"},{"issue":"14","key":"5","doi-asserted-by":"crossref","first-page":"16509","DOI":"10.1364\/OE.25.016509","article-title":"Ghost identification based on single-pixel imaging in big data environment","volume":"25","author":"C. Wen","year":"2017","journal-title":"Optics Express"},{"issue":"4","key":"6","first-page":"32","article-title":"Mathematical model of precision education and several problems in big data environment","volume":"6","author":"L. Bo","year":"2017","journal-title":"Mathematical Modeling and Its Applications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-189007"},{"issue":"19","key":"8","first-page":"66","article-title":"Risk identification and response in financial and accounting treatment of security company","volume":"035","author":"N. Wen","year":"2016","journal-title":"Value Engineering"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1111\/fima.12119"},{"issue":"3","key":"10","first-page":"383","article-title":"DODD-Frank and the spoofing prohibition in commodities markets","volume":"22","author":"M. Sar","year":"2017","journal-title":"Fordham Journal of Corporate and Financial Law"},{"issue":"1","key":"11","doi-asserted-by":"crossref","first-page":"105","DOI":"10.24136\/oc.2018.006","article-title":"Management of financial risks in Slovak enterprises using regression analysis","volume":"9","author":"M. Kovacova","year":"2018","journal-title":"Oeconomia Copernicana"},{"issue":"1","key":"12","first-page":"15","article-title":"Prediction of wilful defaults: an empirical study from Indian corporate loans","volume":"11","author":"L. Karthik","year":"2018","journal-title":"International Journal of Intelligent Technologies and Applied Statistics"},{"issue":"2","key":"13","first-page":"109","article-title":"Systemic risk determinants in the European banking industry during financial crises, 2006-2012","volume":"126","author":"C. B. Pellegrini","year":"2018","journal-title":"Rivista Internazionale di Scienze Sociali"},{"issue":"2","key":"14","first-page":"32","article-title":"Detecting financial statements fraud: the evidence from Russia","volume":"11","author":"F. Natalia","year":"2017","journal-title":"Journal of Corporate Finance Research"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1108\/jrf-05-2018-0083"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.18267\/j.polek.1125"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2762-6"},{"issue":"2","key":"18","first-page":"100","article-title":"The balanced scorecard: suggestions for rebalancing","volume":"4","author":"E. J. Lusk","year":"2017","journal-title":"Problems and Perspectives in Management"},{"key":"19","article-title":"Application of bootstrap-DEA with fuzzy computing in performance evaluation of forklift leasing supplier","volume":"8","author":"L. Yin","year":"2019","journal-title":"IEEE Access"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0129153"},{"key":"21","article-title":"Cyber security in smart cities: a review of deep learning-based applications and case studies","volume":"66","author":"D. Chen","year":"2020","journal-title":"Sustainable Cities and Society"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-179121"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/7188327.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/7188327.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/7188327.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T20:35:28Z","timestamp":1631046928000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/7188327\/"}},"subtitle":[],"editor":[{"given":"Sang-Bing","family":"Tsai","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,6]]},"references-count":22,"alternative-id":["7188327","7188327"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7188327","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9,6]]}}}