期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
试论商业银行信息安全系统管理体系的构建
1
作者 马凌 《电脑编程技巧与维护》 2020年第8期113-114,117,共3页
社会在不断进步,我国的金融市场也在快速发展,各种新技术的出现给我国商业银行信息系统的安全、稳定运行提出了全新要求。目前,我国的商业银行在信息安全工作方面,面临着十分严峻的挑战,在全新形势下商业银行防范以及化解金融风险隐患,... 社会在不断进步,我国的金融市场也在快速发展,各种新技术的出现给我国商业银行信息系统的安全、稳定运行提出了全新要求。目前,我国的商业银行在信息安全工作方面,面临着十分严峻的挑战,在全新形势下商业银行防范以及化解金融风险隐患,是保证商业银行稳定、健康运行的基本前提,也是整个行业所要面临的全新话题,是目前金融机构安全风险管理工作的重中之重。阐述了构建商业银行信息安全系统管理的意义,分析了商业银行信息安全管理体系构建存在的问题,在此基础上提出了相关的安全系统管理构建策略,旨在为相关人士提供参考意见。 展开更多
关键词 商业银行 信息安全系统管理 必要性 现状 策略
下载PDF
Design and implementation of coal mine safety management system based on Ajax and RFID
2
作者 Zhentao Ni Jiantao Zhao Chang Liu 《International Journal of Technology Management》 2013年第8期122-124,共3页
This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing... This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents. 展开更多
关键词 coal mine safety information management Ajax: RFID
下载PDF
DEA-based Empirical Research on the Performance Analysis of China's Commercial Bank Information Security System Application
3
作者 Xinghua LU 《International Journal of Technology Management》 2013年第6期35-38,共4页
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super... In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded. 展开更多
关键词 DEA Operating Performance Empirical Research
下载PDF
Information Security Service Support-Helping End-Users Cope with Security
4
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 Information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部