• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网中数据驱动的信息安全人力资源管理与预测模型探索

Exploration on human resource management and prediction model of data-driven information security in Internet of Things.

作者信息

Niu Xuejie

机构信息

College of Economics and Management, Shanxi University, Taiyuan, 030006, Shanxi, China.

出版信息

Heliyon. 2024 Apr 15;10(9):e29582. doi: 10.1016/j.heliyon.2024.e29582. eCollection 2024 May 15.

DOI:10.1016/j.heliyon.2024.e29582
PMID:38699015
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11064086/
Abstract

The advent of the Internet of Things (IoT) has accelerated the pace of economic development across all sectors. However, it has also brought significant challenges to traditional human resource management, revealing an increasing number of problems and making it unable to meet the needs of contemporary enterprise management. The IoT has brought numerous conveniences to human society, but it has also led to security issues in communication networks. To ensure the security of these networks, it is necessary to integrate data-driven technologies to address this issue. In response to the current state of human resource management, this paper proposes the application of IoT technology in enterprise human resource management and combines it with radial basis function neural networks to construct a model for predicting enterprise human resource needs. The model was also experimentally analyzed. The results show that under this algorithm, the average prediction accuracy for the number of employees over five years is 90.2 %, and the average prediction accuracy for sales revenue is 93.9 %. These data indicate that the prediction accuracy of the model under this study's algorithm has significantly improved. This paper also conducted evaluation experiments on a wireless communication network security risk prediction model. The average prediction accuracy of four tests is 91.21 %, indicating that the model has high prediction accuracy. By introducing data-driven technology and IoT applications, this study provides new solutions for human resource management and communication network security, promoting technological innovation in the fields of traditional human resource management and information security management. The research not only improves the accuracy of the prediction models but also provides strong support for decision-making and risk management in related fields, demonstrating the great potential of big data and artificial intelligence technology in the future of enterprise management and security.

摘要

物联网(IoT)的出现加快了各个行业的经济发展步伐。然而,它也给传统人力资源管理带来了重大挑战,暴露出越来越多的问题,使其无法满足当代企业管理的需求。物联网给人类社会带来了诸多便利,但也引发了通信网络中的安全问题。为确保这些网络的安全,有必要整合数据驱动技术来解决这一问题。针对当前人力资源管理的现状,本文提出将物联网技术应用于企业人力资源管理,并将其与径向基函数神经网络相结合,构建企业人力资源需求预测模型。还对该模型进行了实验分析。结果表明,在该算法下,五年内员工数量的平均预测准确率为90.2%,销售收入的平均预测准确率为93.9%。这些数据表明,本研究算法下模型的预测准确率有了显著提高。本文还对无线通信网络安全风险预测模型进行了评估实验。四次测试的平均预测准确率为91.21%,表明该模型具有较高的预测准确率。通过引入数据驱动技术和物联网应用,本研究为人力资源管理和通信网络安全提供了新的解决方案,推动了传统人力资源管理和信息安全管理领域的技术创新。该研究不仅提高了预测模型的准确性,还为相关领域的决策和风险管理提供了有力支持,展示了大数据和人工智能技术在企业管理和安全未来发展中的巨大潜力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/c6830c93dc0c/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/5a699ae7b427/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/5a616899e388/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/8782018a4bf1/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/b0e48b9ac9e2/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/50e7f73a30dd/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/c16243a37024/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/d93f0147cf70/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/5320a02eaad2/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/969da51a2f77/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/c6830c93dc0c/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/5a699ae7b427/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/5a616899e388/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/8782018a4bf1/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/b0e48b9ac9e2/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/50e7f73a30dd/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/c16243a37024/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/d93f0147cf70/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/5320a02eaad2/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/969da51a2f77/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b9dc/11064086/c6830c93dc0c/gr10.jpg

相似文献

1
Exploration on human resource management and prediction model of data-driven information security in Internet of Things.物联网中数据驱动的信息安全人力资源管理与预测模型探索
Heliyon. 2024 Apr 15;10(9):e29582. doi: 10.1016/j.heliyon.2024.e29582. eCollection 2024 May 15.
2
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology.利用物联网与人工智能技术的企业信息安全管理。
Comput Intell Neurosci. 2022 Jun 14;2022:7138515. doi: 10.1155/2022/7138515. eCollection 2022.
3
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
4
Data Analytics, Self-Organization, and Security Provisioning for Smart Monitoring Systems.数据分析、自组织和智能监控系统的安全配置。
Sensors (Basel). 2022 Sep 22;22(19):7201. doi: 10.3390/s22197201.
5
Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review.利用区块链技术确保物联网中的安全和隐私方面:系统文献回顾。
Sensors (Basel). 2023 Jan 10;23(2):788. doi: 10.3390/s23020788.
6
Optimization of STP Innovation Management Mechanisms Driven by Advanced Evolutionary IoT Arithmetic.先进进化物联网算法驱动的 STP 创新管理机制优化。
Comput Intell Neurosci. 2021 Dec 29;2021:1698089. doi: 10.1155/2021/1698089. eCollection 2021.
7
Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.网络-互联网安全框架,利用机器学习技术攻克物联网相关网络攻击。
Comput Intell Neurosci. 2022 Sep 29;2022:8803586. doi: 10.1155/2022/8803586. eCollection 2022.
8
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks.基于动态系数对称多项式的物联网(IoT)网络安全密钥管理方案
PeerJ Comput Sci. 2023 Dec 15;9:e1726. doi: 10.7717/peerj-cs.1726. eCollection 2023.
9
Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges.物联网(IoNT):从架构到安全和隐私挑战的全面综述。
Sensors (Basel). 2023 Mar 3;23(5):2807. doi: 10.3390/s23052807.
10
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.

本文引用的文献

1
Smart Workplaces for older adults: coping 'ethically' with technology pervasiveness.老年人的智能工作场所:“道德地”应对技术普及
Univers Access Inf Soc. 2023;22(1):37-49. doi: 10.1007/s10209-021-00829-9. Epub 2021 Jul 20.