{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:27:11Z","timestamp":1771003631960,"version":"3.50.1"},"reference-count":38,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:p>With the rapid evolution of information technology, enterprise information security management and risk assessment have gained paramount importance. The objective of this study is to offer a comprehensive solution aimed at bolstering the accuracy, security, and efficiency of information security management. This is achieved through the integration of big data and Internet of Things (IoT) technologies, thereby safeguarding critical enterprise data and private information. Effective management of enterprise information security systems is imperative for upholding confidentiality, integrity, and availability, necessitating a holistic approach. This study, through in-depth theoretical analysis, proposes the combination of blockchain technology with big data to enhance the security and trustworthiness of enterprise IoT systems. Starting with practical issues, the study stores identification cards for IoT sensor devices and related information\u2019s hash values in the blockchain, thus establishing an integrated enterprise information security IoT system model that combines big data and blockchain. Finally, the model is tested and subjected to risk assessment. The results show that the model achieves an identification accuracy of 90.941% for system information security management, with stable data transmission latency at around 192 milliseconds, significantly outperforming other algorithms. This research carries significant implications for the field of enterprise information security management by presenting an innovative solution that demonstrates lower communication overhead and higher throughput than alternative algorithms. It not only pioneers a novel approach to managing enterprise information security but also establishes a robust experimental groundwork for the future evolution of intelligent enterprise information security management systems. By enhancing the efficiency of information security and risk assessments, this study aims to propel forward advancements in enterprise information security management, potentially mitigating risks to businesses and individuals alike, thereby contributing to the stability and security of the digital society.<\/jats:p>","DOI":"10.1177\/14727978241300787","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T03:15:24Z","timestamp":1745896524000},"page":"1519-1534","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring enterprise information security management and risk assessment through big data and the Internet of Things"],"prefix":"10.1177","volume":"25","author":[{"given":"Hong","family":"Yu","sequence":"first","affiliation":[{"name":"College of Management, Hunan City University, Yiyang, China"}]}],"member":"179","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.09.033"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103304"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12031598"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101051"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102393"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102884"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395331"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc7020090"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3168575"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2022.119273"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369052"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-022-00536-0"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"issue":"2","key":"e_1_3_2_15_2","first-page":"2199","article-title":"Communication security analysis of intelligent transportation system using 5G internet of things from the perspective of big data","volume":"24","author":"He Y","year":"2022","unstructured":"He Y, Kong M, Du C, et al. Communication security analysis of intelligent transportation system using 5G internet of things from the perspective of big data. IEEE Trans Intell Transport Syst 2022; 24(2): 2199\u20132207.","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2022.3150270"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2021.1973570"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101656"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101761"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1080\/09537325.2020.1841158"},{"issue":"32","key":"e_1_3_2_21_2","first-page":"434","article-title":"Formation of the system of financial-information support of environmentally-oriented management of the enterprise","volume":"1","author":"Akimova LM","year":"2020","unstructured":"Akimova LM, Osadcha OO, Bashtannyk VV, et al. Formation of the system of financial-information support of environmentally-oriented management of the enterprise. Financ credit activ prob theor pract 2020; 1(32): 434\u2013443.","journal-title":"Financ credit activ prob theor pract"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1812006"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.14704\/WEB\/V18SI02\/WEB18073"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.3390\/su122410571"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/info13020058"},{"issue":"9","key":"e_1_3_2_26_2","first-page":"1","article-title":"Technological tools for data security in the treatment of data reliability in big data environments","volume":"11","author":"Shihab LA","year":"2020","unstructured":"Shihab LA. Technological tools for data security in the treatment of data reliability in big data environments. Int Trans J Eng Manag Appl Sci Technol 2020; 11(9): 1\u201313.","journal-title":"Int Trans J Eng Manag Appl Sci Technol"},{"issue":"9","key":"e_1_3_2_27_2","first-page":"1","article-title":"Differential privacy technology of big data information security based on ACA-DMLP","volume":"13","author":"Han Y","year":"2022","unstructured":"Han Y, Wang L, He D. Differential privacy technology of big data information security based on ACA-DMLP. Int J Adv Comput Sci Appl 2022; 13(9): 1\u20139.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000154"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi14090250"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.12.007"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3095192"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22041304"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107903"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12125893"},{"issue":"2","key":"e_1_3_2_36_2","first-page":"29","article-title":"Integrated agri-food supply chain model: an application of IoT and blockchain","volume":"13","author":"Hasan I","year":"2023","unstructured":"Hasan I, Habib MM, Mohamed Z, et al. Integrated agri-food supply chain model: an application of IoT and blockchain. Am J Ind Bus Manag 2023; 13(2): 29\u201345.","journal-title":"Am J Ind Bus Manag"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2022.3191688"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-06-2018-0140"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12178664"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241300787","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14727978241300787","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241300787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:32:24Z","timestamp":1771000344000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14727978241300787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.1177\/14727978241300787"],"URL":"https:\/\/doi.org\/10.1177\/14727978241300787","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,14]]}}}