Emotional Computing Technology Applications in Information Systems Security and Their Risk Prevention

被引:0
|
作者
Huang G. [1 ]
Xu X. [1 ]
机构
[1] School of Electronic and Information Engineering, Wuhan Donghu University, Hubei, Wuhan
关键词
Emotion recognition method; Emotion vector; Information system security; Risk index; Vector space model;
D O I
10.2478/amns-2024-0335
中图分类号
学科分类号
摘要
This paper applies the emotion extraction method based on emotion lexicon to the group emotion analysis of the information system, combines the vector space model to process the text emotion in the information system, expresses the emotion in the form of vectors, and divides the different types of emotion according to the distance between the emotion vectors for identification. The five-level index system in fuzzy mathematics is chosen to measure the value of emotional intensity, and by analyzing the emotional state of the group in the information leakage incident, a decision in line with the user’s emotion is made based on the emotion of the information system security. Accordingly, the security defense index of the information system is improved according to the information security risk index. The results show that in identifying the emotions of the information system security events, the group’s emotions are mainly biased towards the negative. The proportion of negative emotions is the largest of 98%, which indicates that attention should be paid to the confidentiality of the user group’s information in the security of the information system. The maximum security event risk value in the evaluation in the information system is in the T8 period, with a value of 0.819, indicating that the security defense of the information system should be strengthened in the T8 period. © 2023 Gaofeng Huang and Xiangjun Xu, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [1] Neuro-Computing Applications in Security of Network Information Systems
    Yao Min(DepartmeNt of Computer
    JournalofSystemsEngineeringandElectronics, 1999, (02) : 65 - 68
  • [2] Information Systems Security and Its Affiliation to Information Technology Risk Management
    Jahankhani, Hamid
    Nkhoma, Mathews
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 195 - +
  • [3] Information Security Technology under Cloud Computing Technology
    Zhao Xiaojin
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1157 - 1160
  • [4] Security risk assessment challenges in port information technology systems
    Makrodimitris, Georgios
    Polemi, Nineta
    Douligeris, Christos
    Makrodimitris, Georgios, 1600, Springer Verlag (441): : 24 - 35
  • [5] Quantum computing and security of information systems
    Berezin, A. A.
    SAFETY AND SECURITY ENGINEERING II, 2007, 94 : 149 - 159
  • [6] Information security technology based on DNA computing
    Cui, Guangzhao
    Qin, Limin
    Wang, Yanfeng
    Zhang, Xuncai
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 288 - +
  • [7] "Glitch Logic" and Applications to Computing and Information Security
    Stoica, Adrian
    Katkoori, Srinivas
    2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009), 2009, : 107 - +
  • [9] Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1084 - 1089
  • [10] Analysis of Financial Data Risk and Network Information Security by Blockchain Technology and Edge Computing
    Liu, Siting
    Wang, Changlin
    Zhou, Yong
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 12579 - 12592