期刊文献+

大数据交易业务流程中的风险因素识别研究 被引量:16

Research on Risk Factor Identification in Business Process of Big Data Transaction
下载PDF
导出
摘要 [目的/意义]大数据交易的发展有效促进了数据的流通和共享,提高了数据利用率。但是大数据交易有很多不确定性,交易过程存在着很多风险。从交易平台的角度出发,分析大数据交易过程可能存在的风险,有利于平台进行风险管理,促进大数据交易的发展与进步。[方法/过程]文章从大数据交易的业务流程出发,将其分为交易前、交易中、交易后三个阶段,分析各阶段可能存在的风险因素。[结果/结论]研究发现,大数据交易过程可能存在的风险有产品质量风险、信息风险、营销风险和监管风险,并根据识别结果提出规避风险的建议,为大数据交易的发展提供借鉴。 [Purpose/significance]The development of big data transaction has effectively promoted the circulation and sharing of data,improved the utilization rate of data.But there are many uncertainties in big data trading,there are many risks in the trading process.This paper analyzes the possible risks of the big data transaction process from the perspective of the trading platform.This research is conducive to the platform for risk management and promotes the development and progress of big data transaction.[Method/process]This paper starts from the business process of big data transaction,and divides it into three stages:pre-transaction,transaction,and post-transaction,and then analyzes the possible risk factors at each stage.[Result/conclusion]The study found that the risks that may exist in the big data transaction process are product quality risk,information risk,marketing risk and regulatory risk.According to the identification results,suggestions for risk avoidance are proposed to provide reference for the development of big data transaction.
作者 王卫 张梦君 王晶 Wang Wei
出处 《情报理论与实践》 CSSCI 北大核心 2019年第9期80-85,共6页 Information Studies:Theory & Application
基金 国家社会科学基金一般项目“生态系统视角下开放政府数据价值实现研究”的成果之一,项目编号:19BTQ068
关键词 大数据 大数据交易 业务流程 风险识别 big data big data transaction business process risk identification
  • 相关文献

参考文献10

二级参考文献85

  • 1马本江,邱菀华.一次交易中的讨价还价策略及其博弈分析[J].管理工程学报,2005,19(4):123-125. 被引量:5
  • 2姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 3[美]乔万尼·萨托利.民主新论[M].冯克利,阎克文,译.上海:上海人民出版社,2009:187一188.
  • 4[英]维克托·迈尔·舍恩伯格,肯尼思·库克耶著.盛杨燕,周涛译.大数据时代[M].杭州:浙江人民出版社,2013.
  • 5维克托.迈尔.舍恩伯格,肯尼思.库克耶.大数据时代生活、工作与思维的大变革[M].杭州:浙江人民出版社,2013.
  • 6X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 7Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 8Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 9Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)
  • 10Yingwei Cui,Jennifer Widom,Janet L. Wiener.Tracing the lineage of view data in a warehousing environment[J].ACM Transactions on Database Systems (TODS).2000(2)

共引文献950

同被引文献235

引证文献16

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部