Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (4): 71-79.doi: 10.11959/j.issn.2096-109x.2019044
• Papers • Previous Articles Next Articles
Revised:
2019-08-02
Online:
2019-08-15
Published:
2019-08-20
Supported by:
CLC Number:
Jianming ZHU,Hongrui YANG. Data security challenges and countermeasures in financial technology[J]. Chinese Journal of Network and Information Security, 2019, 5(4): 71-79.
[21] | GB/T 36073-2018,Data management capability maturity assessment model[S]. Beijing:China National Standardization Administration Committee, 2018. |
[22] | 朱红儒 .信息安全技术数据安全能力成熟度模型[R]. 北京:全国信息安全标准化技术委员会, 2018. |
ZHU H R . Information security technology data security capability maturity model[R]. Beijing:National Information Security Standardization Technical Committee, 2018. | |
[23] | 郑斌 . 企业数据安全能力框架——数据安全能力成熟度模型的构建及应用[J]. 信息安全与通信保密, 2017(11): 70-78. |
[1] | 尹志超, 余颖丰 . 重视金融科技在金融发展中的作用[N]., 光明日报,理论,2018-11-20. |
YIN Z C , Yu Y F . Pay Attention to the role of financial technology in financial development[N]. Guangming Daily,Theory,2018-11-20. | |
[2] | 普华永道.2018年中国金融科技调查报告[R]. 2018. |
PwC.2018 China financial technology survey report[R]. 2018. | |
[3] | Verizon.2019 data breach investigations report(12th edition)[R]. 2019. |
[4] | 吴信东, 董丙冰, 堵新政 ,等. 数据治理技术[J]. 软件学报, 2019,30(9): 1-22. |
WU X D , DONG B B , DU X Z ,et al. Data governance technology[J]. Journal of Software, 2019,30(9): 1-22. | |
[5] | 张明英, 潘蓉 . 《数据治理白皮书》国际标准研究报告要点解读[J]. 信息技术与标准化, 2015(6): 54-57. |
ZHANG M Y , PAN R . Interpretation of the key points of the international standards research report on data governance white paper[J]. Information Technology & Standardization, 2015(6): 54-57. | |
[6] | 李文红, 蒋则沈 . 金融科技(FinTech)发展与监管:一个监管者的视角[J]. 金融监管研究, 2017(3): 1-13. |
LI W H , JIANG Z S . FinTech development and supervision:a regulator's perspective[J]. Financial Supervision Research, 2017(3): 1-13. | |
[7] | 中国信息通信研究院.人工智能发展白皮书-产业应用篇(2018)[R]. 2018. |
China Academy of Information and Communications Technology. Artificial intelligence development white paper—industrial application(2018)[R]. 2018. | |
[8] | 赵维平 . 大数据为金融创新插上翅膀[J]. 中国金融, 2019(4): 21-22. |
ZHAO W P . Big data inserts wings for financial innovation[J]. China Finance, 2019(4): 21-22 | |
[9] | 肖翔, 陈则栋, 战天舒 ,等. 我国商业银行金融科技发展现状、问题与建议[J]. 当代金融家, 2018(8): 76-79. |
XIAO X , CHEN Z D , ZHAN T S ,et al. Status quo,problems and suggestions on the development of financial technology in China's commercial banks[J]. Contemporary Financiers, 2018(8): 76-79. | |
[10] | 王冠, 张敏 . 区块链商业金融的应用层次、问题与对策建议[J]. 商业经济研究, 2018(7): 162-165. |
WANG G , ZHANG M . Application levels,problems and countermeasures of blockchain commercial finance[J]. Business Economics Research, 2018(7): 162-165. | |
[11] | 中国信息通信研究院.金融行业云计算技术调查报告(2018)[R]. 2018. |
China Academy of Information and Communications Technology. Financial industry cloud computing technology survey report(2018)[R]. 2018. | |
[12] | 周志华 . 机器学习[M]. 北京: 清华大学出版社, 2016. |
ZHOU Z H . Machine learning[M]. Beijing: Tsinghua University PressPress, 2016. | |
[13] | 李连朋, 罗宏 . 国内外金融业信息安全综述[J]. 网络与信息安全学报, 2017,3(2): 9-19. |
LI L P , LUO H . Review of domestic and international financial security[J]. Chinese Journal of Network and Information Security, 2017,3(2): 9-19. | |
[14] | PWC.Global economic crime survey[R]. 2016. |
[15] | 朱建明, 高博 . 社交金融的信息安全风险分析与防范[J]. 网络与信息安全学报, 2016,2(3): 46-51. |
ZHU J M , GAO B . Social financial information security risk analysis and prevention[J]. Chinese Journal of Network and Information Security, 2016,2(3): 46-51. | |
[16] | 石光 . 金融科技“双刃剑”[J]. 中国金融, 2019(6): 74-76. |
SHI G . Financial technology double-edged sword[J]. China Finance, 2019(6): 74-76. | |
[17] | 数据安全治理白皮书2.0[R]. 北京:北京安华金和科技有限公司, 2019. |
Data security governance white paper 2.0[R]. Beijing:Beijing AnhuaJinhe Technology Co.,Ltd., 2019. | |
[18] | 刘宇 . 我国金融科技监管框架完善路径浅析[J]. 中国金融电脑, 2019(7): 35-37. |
LIU Y . Analysis on the perfection path of China's financial science and technology supervision framework[J]. China Financial Computer, 2019(7): 35-37. | |
[19] | KOPP E , KAFFENBERGER L , WILSON C . Cyber risk,market failures,and financial stability[M]. International Monetary Fund, 2017. |
[20] | 丁丽媛 . 基于数据生命周期的金融数据安全管理研究[J]. 信息安全研究, 2018(6): 548-554. |
DING L Y . Research on financial data security management based on data life cycle[J]. Information Security Research, 2018(6): 548-554. | |
[21] | GB/T 36073-2018,数据管理能力成熟度评估模型[S]. 北京:中国国家标准化管理委员会, 2018. |
[23] | ZHENG B . Organizational data security capability framework——development and implementation of data security competency maturity model[J]. Information Security and Communication Confidentiality, 2017(11): 70-78. |
[1] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[2] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[3] | Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG. Access control relationship prediction method based on GNN dual source learning [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55. |
[4] | Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU. Hardcoded vulnerability detection approach for IoT device firmware [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 98-110. |
[5] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[6] | Jiashun ZHOU, Na WANG, Xuehui DU. Multi-party efficient audit mechanism for data integrity based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 113-125. |
[7] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
[8] | Zhenhua CAI,Jiayun LIN,Fang LIU. Blockchain storage:technologies and challenges [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 11-20. |
[9] | Qiuyue SU, Xingshu CHEN, Yonggang LUO. Access control model for multi-source heterogeneous data in big data environment [J]. Chinese Journal of Network and Information Security, 2019, 5(1): 78-86. |
[10] | Tuosiyu MING, Hongchang CHEN. Research progress and trend of text summarization [J]. Chinese Journal of Network and Information Security, 2018, 4(6): 1-10. |
[11] | De-yu YUAN,Xiao-juan WANG,Jian-chao WAN. Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9. |
[12] | Yun-fei CI,Guo-zhen SHI,Rong-na XIE,Yao-ming PAN,Feng YANG,Si-shui YE. Time based incremental backup scheme for mobile cloud computing [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 48-53. |
[13] | Kai-min WEI,Jian WENG,Kui REN. Data security and protection techniques in big data:a survey [J]. Chinese Journal of Network and Information Security, 2016, 2(4): 1-11. |
[14] | Shang LI,Zhi-gang ZHOU,Hong-li ZHANG,Xiang-zhan YU. Prospect of secure-efficient search and privacy-preserving mechanism on big data [J]. Chinese Journal of Network and Information Security, 2016, 2(4): 21-32. |
[15] | Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG. Survey of big-data-analysis-resistant privacy protection [J]. Chinese Journal of Network and Information Security, 2016, 2(4): 44-55. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|