Dynamic financial and monetary security risk assessment based on information service security assessment model and blockchain

被引:0
|
作者
Li, Jia [1 ]
机构
[1] Northwest Univ, Xian 710127, Peoples R China
关键词
D O I
10.1038/s41598-023-45977-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of blockchain technology, the financial and monetary (FM) blockchain fields also began to collide. Therefore, this study aims to explore the relationship between the two fields and efficiently evaluate the security of financial information. Firstly, this study introduces the theoretical basis of blockchain in the dynamic linkage mechanism of FM and gives the overall framework of digital currency based on blockchain. Meanwhile, the relationship between blockchain and digital finance is empirically analyzed and designed. Secondly, the framework of financial information service security assessment (ISSA) is created using blockchain technology, and the frame of security risk evaluation is verified by taking electronic invoice information as the research object. Finally, the results show that: (1) foreign exchange (forex) events and major stock index decline events have a significant impact on the return of Bitcoin (BTC) in the short term. Moreover, more than 70% of uncertainty events will make BTC's abnormal return (AR) significantly positive; (2) Under the influence of forex uncertainty events, only one BTC's AR is remarkably negative in short order, while the other seven times are markedly positive. In the uncertainty events of major stock indexes, only two times are significantly negative, and the other six times are positive. This indicates that uncertain events in the short run make prominent AR of BTC; the proposed blockchain-based ISSA model and assessment index are scientific, feasible, and operable.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
    Das, Saini
    Mukhopadhyay, Arunabha
    Saha, Debashis
    Sadhukhan, Samir
    [J]. INFORMATION SYSTEMS FRONTIERS, 2019, 21 (05) : 959 - 977
  • [32] Risk Assessment of Power Information Risk Security Based on Risk Matrix
    Wang Xu
    Chen Tao
    Wang Yujie
    Guo Qinrui
    Teng Yangxin
    [J]. PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1494 - 1498
  • [33] An Organisational Model for Information Security Assessment
    McKissack, Jeremy
    Hooper, Val
    Hope, Beverley
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2010, : 218 - 227
  • [34] pISRA: privacy considered information security risk assessment model
    Wei, Yu-Chih
    Wu, Wei-Chen
    Lai, Gu-Hsin
    Chu, Ya-Chi
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (03): : 1468 - 1481
  • [35] Classified Information System Security Risk Assessment Model of the Research
    Peng, Chong
    Shao, Liping
    [J]. 2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [36] pISRA: privacy considered information security risk assessment model
    Yu-Chih Wei
    Wei-Chen Wu
    Gu-Hsin Lai
    Ya-Chi Chu
    [J]. The Journal of Supercomputing, 2020, 76 : 1468 - 1481
  • [37] Construction of Information Security Risk Assessment Model in Smart City
    Hui, Pan
    [J]. 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 393 - 396
  • [38] An information security control assessment methodology for organizations' financial information
    Otero, Angel R.
    [J]. INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2015, 18 : 26 - 45
  • [39] Assessment Model of Cloud Service Security Level Based on Standardized Security Metric Hierarchy
    Li X.
    Yang R.
    Chen X.
    Liu Y.
    Wang Q.
    [J]. Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (03): : 159 - 167
  • [40] Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
    Kim, Ae Chan
    Lee, Su Mi
    Lee, Dong Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 191 - 200