skip to main content
10.1145/3640872.3640883acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdeConference Proceedingsconference-collections
research-article

Research and analysis of the security risk management strategy of big data technology in the financial industry

Published:20 February 2024Publication History

ABSTRACT

With the continuous deepening of financial business informationization, the rapid spread of all kinds of financial data, promoting the financial field to enter the era of big data, and the structural transformation and dynamic development of the financial industry face new challenges.In the context of big data, the study of financial information security prevention and guarantee system will be conducive to guarantee the storage and application of users' information.This paper first analyzes the application and characteristics of big data technology in the financial industry, and then deeply analyzes the risks of the application of big data in the financial industry from the three dimensions of technology, management and compliance, and puts forward the corresponding security risk control strategy.

References

  1. Jiangrun Chen. Reconstruction and governance innovation of the financial regulatory system in the era of digital finance [J]. Time Finance, 2023 (10): 93-95.Google ScholarGoogle Scholar
  2. YiXian Ye. Analysis of the development of the financial industry under the background of big data [J]. Industrial Innovation Research, 2023 (08): 89-91.Google ScholarGoogle Scholar
  3. Cheng Lling, Zeng Shike. The latest development of big data technology and its application in the field of financial regulation [J], industrial technology innovation. 2023,5(01):75-77.Google ScholarGoogle Scholar
  4. Loris Di Nallo, Daniele Marandola, Rocco Battista, Maria Lucetta Russotto.Financial system and big data: state of the art[J]. 2023. PP 141-154.Google ScholarGoogle Scholar
  5. Zhou Feng, Chen Wei, Li Li, Lin Jiajia. Research on the financial regulatory platform based on big data [J]. Technology wind. 2022(24):52-54.Google ScholarGoogle Scholar
  6. Zhang Dujuan. Research on the Protection of Personal Financial Information in the Background of Big Data [J]. Law system and the economy. 2021,30(10):102-106.Google ScholarGoogle Scholar
  7. Huang Wei, Zhu Tao. Research on Risk Management of Internet Finance under the background of Big Data [J], Technology and market. 2023,30(05): 184-186.Google ScholarGoogle Scholar
  8. [Zhang Junwei. Analysis on the application and development of big Data in the financial market [J], in the public relations world. 2023(09):134-135.Google ScholarGoogle Scholar
  9. Li Danfeng, Xu Weina. Research on Bond Default Risk Early Warning based on Big Data Technology [J], Times Finance. 2023(02):73-76.Google ScholarGoogle Scholar
  10. Ding Ruiyuan. Prevention of financial risks of enterprises in the era of big data [J], investment and cooperation. 2022(01):5-6.Google ScholarGoogle Scholar
  11. Sun Bo. Application and risk control of big data technology in the financial industry [J], Management informatization in China. 2022,25(05):144-147.Google ScholarGoogle Scholar
  12. Gong Yi, Cong Peihua. How to prevent systemic financial risks in the era of big data [J], business culture. 2021(14):56-57.Google ScholarGoogle Scholar
  13. Wang Changyi. The deep integration of big data technology and the financial industry [J], business culture. 2021(16):108-109.Google ScholarGoogle Scholar

Index Terms

  1. Research and analysis of the security risk management strategy of big data technology in the financial industry

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      BDE '23: Proceedings of the 2023 5th International Conference on Big Data Engineering
      November 2023
      80 pages
      ISBN:9798400708695
      DOI:10.1145/3640872

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 February 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)18
      • Downloads (Last 6 weeks)8

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format