2022
DOI: 10.1155/2022/7138515
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology

Abstract: This work is conducted to deal with the information security of enterprise management under the background of current global informatization, popularize the modern Internet of Things (IoT) management technology of enterprises, and maintain the information security of enterprises and provide modern upgrading means for enterprise management. In this work, it firstly introduces the application scenarios of current Internet and Artificial Intelligence (AI) technology and expounds the IoT technology. Secondly, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…As can be seen from the above results:  The most frequent words are still "big data", "Internet of Things", "blockchain" and other emerging hot words, which are important areas in the current era of rapid information development. In the current era of rapid information development, these are all important areas and are closely related to information security, so in order to promote the development of information security, we must also continue to plough deeper into these areas [15][16][17].…”
Section: Keyword Co-occurrence Analysismentioning
confidence: 99%
“…As can be seen from the above results:  The most frequent words are still "big data", "Internet of Things", "blockchain" and other emerging hot words, which are important areas in the current era of rapid information development. In the current era of rapid information development, these are all important areas and are closely related to information security, so in order to promote the development of information security, we must also continue to plough deeper into these areas [15][16][17].…”
Section: Keyword Co-occurrence Analysismentioning
confidence: 99%
“…al, 2021;Skafi et al, 2020).Due to criminal actors, regular Internet users have lost confidence in the platform. Management and precautions against threats to information security are not a one-and-done deal; they must be continually reviewed as threats evolve (Kakish, 2007;Sun & Bai, 2022;EL-Khalil, 2018). A small or medium-sized enterprise's security strategy has to be flexible enough to meet the evolving needs of the company.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of information technology in today's era has promoted the interconnections between people, between people and things, and even between things, and enabled long-distance communication and exchanges [1][2][3][4][5][6][7][8][9][10]. Under the Internet+ environment, college students' employment and labor relations can be defined as the bond between college students and employers and the key to the mutual understanding and two-way selection of the two sides [11][12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%