Current location - Music Encyclopedia - Today in History - Papers on Big Data Application (2)
Papers on Big Data Application (2)
The second part is about the application of big data and the impact of big data technology on financial management.

Abstract: Big data can quickly help the financial department to establish financial analysis tools, rather than simply making accounts. Big data should not only be limited to the micro data of its own unit, but also pay attention to the macro data of other units. Big data technology not only brings convenience and challenges to the financial data collection of enterprises and institutions, but also leads to many active explorations on the confidentiality of employees' personal information. This paper mainly studies the influence of big data technology (metadata or big data) on the financial management of enterprises and institutions, with a view to providing analytical basis and guarantee for the security of financial data management.

Keywords: big data; Financial management; Science and technology; Knowledge progress

Data is a neutral concept. The brilliant changes of mankind for thousands of years from ancient times to the present are nothing more than the process of data collection and use. Throughout the world, the communication and cooperation between people are full of intrigue and intrigue, so what are they fighting for? In fact, it is competing for information resources; In fact, the wars of various appearances in history are not for maintaining the so-called justice and peace, or for the right path of the world, but for the right to use data; ? Prosperity is for profit, prosperity is for profit? The logic of long-term change has given way to the philosophical laws of data games. The technology invented by mankind since the British industrial revolution, despite its euphemistic name? Frontier technology of the fourth scientific and technological revolution? Actually, it's just? 0? And then what? 1? It's just a frolic of two numbers. As some scholars have pointed out, automobile technology, life science technology, gene technology, atomic energy technology, space technology, nanotechnology and computer technology look beautiful, but in fact they imply murder. That's because people regard technology as an end, which leads to? Technical autocracy? After that? Technical corruption? And then what? Technical disaster? . On the one hand, under the temptation of lazy genes, human beings invented many so-called mechanical devices, China called? Smart? ; On the other hand, under the diligent culture, many systems and mechanisms have been invented to restrain laziness. Originally, I wanted to be frugal, but the result was more and more extravagant; I want to save, and the result is more and more wasteful; I wanted to be kind, but the result became more and more evil; I wanted to be beautiful, but it got uglier and uglier. As Lametti said: What is a person? Half angel, half beast. When people desperately want to be angels, they will gradually become beasts; When people want to worship wild animals, the result will gradually approach angels. ? We are not preaching fatalistic technology, we are just predicting the fate of technology. This paper mainly studies the influence of big data technology (metadata or big data) on the financial management of enterprises and institutions, with a view to providing analytical basis and guarantee for the security of financial data management.

First of all, big data technology makes it more difficult to collect financial data.

The collection of financial data is a complex systematic project, and the principle of relativity is generally adopted in the world, that is, first, the data is calculated preliminarily with the knowledge of incomplete statistics, then the rough data is listed systematically, and finally the typed data is sorted out. If users want to access the database, they must have a registered user name and password. Because the international supervision of network data adopts the mode of real-name registration, once users want to steal data after entering the core database, they will generally expose their bug address sources. Network administrators can follow this uniqueness and quickly find the IP address of network terminals through cloud computing. Therefore, according to the principle of human-computer interaction and the monitoring platform installed in various Internet cafes, the database plagiarist can be found quickly. According to the logic of the above data changes, the collection of financial data seems to be a piece of cake, but it is not. Because: ① the quantitative index of data is subject to the security of cloud computing server. When the cloud server is hit by force majeure, such as earthquake, flood, plague, plague, fire, atomic energy leakage or various man-made destruction, the data will be scattered. At this time, data loss will become a digital disaster; (2) It is difficult to realize seamless connection between all kinds of data copyright owners. For example, it is difficult to realize the real free circulation between different data streams passing through different servers. As experts pointed out, resource sharing is difficult to achieve until the personnel data of public institutions, confidential data of personnel management departments of administrative departments, military data of military units, data of medical and health undertakings, data of industrial and commercial registration, and data of foreign affairs can not cross the trap of actual power division. At this time, the so-called data collection will evolve into? Incomplete sampling? Digital illusion. The database derived from this is only a part of useless data at best.

Second, big data technology affects the accuracy of financial data analysis.

For people engaged in financial management, the collection of financial data is only the premise of effective allocation of resources, and the truly valuable or most critical link is the analysis of financial data. So-called? Financial data analysis? Refers to professional accountants or auditors to carry out complex human resources information in their own units? Despire? This process. So-called? Despire? It refers to the interconnection, cross-level communication and cross-border cooperation between coarse and fine, false and true, external and internal. In a strict academic sense, analysis difficulties widely exist in the daily life of financial personnel. Although big data technology provides a convenient method for data collection, it also increases the workload and difficulty of financial personnel. Data calculation, which was originally easy to solve on abacus or draft paper, can only be modeled by computer and cloud map. For some employees who have risen to the financial management department with the help of political power or economic interests, or with their own interpersonal factors, a greater challenge has begun. They don't know how to analyze the graph of data flow, the degradation classification of integrated circuit technology based on computer software technology, the template stamping technology of hydraulic transmission technology based on nonlinear configuration, and the reverse network model to solve the problem of tampering with external normal financial variables. Because the technology is not too hard, the tasks assigned by the leaders cannot be completed within the specified time, and the cases that are completed in a hurry will also be given a handle because of the backwardness of data analysis technology. Some leaders with bad temper may be furious; A good-tempered leader only suppresses his inner anger, and the boldness and quietness of static braking are even more fascinating. Therefore, the increase in the difficulty of data analysis is not due to the lack of conscience or poor foundation of financial personnel, but largely due to the sharp challenges brought about by technological progress and the concept of big data. For ordinary financial managers without family and social background, what they can or can only do is to respect the cyclical law of historical development, fear the endless scientific revolution, seriously understand the strategic intention of the CEO, improve their data analysis ability and sublimate it into their own? Hard power? . Otherwise, covet the conscience discovery and negligence of leaders, expect technology to be static or retrogressive, or naively think that we can coexist peacefully after committing crimes, and may only die in the end? As great as a lost dog? Situation.

Third, big data technology has brought challenges to financial and personnel management.

The financial and personnel management of a unit involves all aspects, and its significance cannot be underestimated. Generally speaking, most units will make a comprehensive balance from four aspects when choosing managers in the financial management department. However, this? Four criteria? But it implies potential crisis and inevitable long-term threat, because of the complexity and unpredictability of human nature. History and reality have repeatedly told people that simply looking at the current achievements and flowery rhetoric can not only accurately evaluate the quality of talents, but also lead to long-term corruption and hidden corruption of officials. For the corruption in China, most people in China pay attention to the origin of system and morality, but often ignore the factors of financial management. Imagine if the financial manager firmly practices it? Giojuru spirit? If no regime is given the green light, how can state-owned assets flow out of the state treasury without anyone knowing? In fact, all corruption in China, no matter the loss of state-owned assets abroad or at home, is largely related to financial personnel. Some managers may emphasize that this is not their own responsibility. The cashier's signature is instructed by the leader, and the accounting expenses are clearly stated by the Chief Executive. In fact, signature, seal, cash withdrawal, circulation and disguised money laundering are all illegal and even criminal. Indirect intent should also be investigated for responsibility. Happily, with the evolution of digital simulation technology, corruption in financial management and scientific personnel management has been greatly improved. The behavior of relevant leaders asking for money from finance will not only be limited by data entry authority, but also be monitored by data retention. As long as the scientific and technical personnel of the unit are given enough authority, it will be very simple to find out the whereabouts of any sum of money and know the information of the people who handle each sum of money like the back of their hands. To some extent, this reduces the incubation probability of officers who can only command computers.

Fourth, big data technology increases the difficulty of information confidentiality.

Raef, vice president of research and development of IMA (American Institute of Certified Accountants)? Dr. Lawson once pointed out: Objectively speaking, the positive role of big data technology is very obvious, but it is an unavoidable fact that big data technology poses more and more severe challenges to the security of financial information. We have noticed that there have been various protests based on data leakage in Europe and America. These activities involve the data eavesdropping scandal in the United States, the Russian compulsory comrade-in-arms action against military data, the case of Israeli data experts selling economic data in the Arab world, and some top hackers who made a fortune by stealing data from China and Hongkong. ? In the topological field of data integration, the confidentiality challenge of big data technology stems from the inherent defects of ant colony algorithm. Originally, the control of data flow depended on various so-called transaction passwords. In fact, these security passwords are just another classification and combination of data. In the mode of nonlinear combination of data and vacuum assembly of lines, any password only blocks the temporary action of technical dwarfs, without exceeding the inertia of technology itself. When hackers master the media contact technology of the source code, all that remains is the collection of information and data. As long as there are enough data sources, it is almost easy for users to obtain information.

In 2003, a firewall security software named Feita Company in Beijing was listed in Zhongguancun Science and Technology City. The developer of security control software randomly developed a software called maze Skynet and adopted it. Attack its shield with its spear? Offensive and defensive strategies. The test results show that although the source code of the maze adopts 24-ary butterfly encryption technology, FortiGate firewall technology can still prevent the malicious Trojan from copying and illegally using the information of computer end users. FortiWeb has passed the global authoritative ICSA certification, which can intercept cross-site scripts, SQL injection, buffer overflow, remote file inclusion and denial of service, prevent sensitive databases from leaking, and provide professional application security protection for Web applications in enterprises and institutions. The reason why Feita Company spends manpower and material resources to develop this new generation of products lies in the influence of the era of big data on the confidentiality of unit information. Imagine, if a unit can't safely store even the minimum personal information of its employees, where can financial management be scientific and humanized? It can only be said that even in a legal environment with weak awareness of human rights protection, we should try our best to enhance the awareness of confidentiality and strengthen the protection and rational use of personal information.

Author: Tian Huidong (1967-), female, Han nationality, Dingxing, Hebei, deputy senior accountant, bachelor degree, research direction: financial management, Setting: Baoding First Hospital.

?