CN119130163B - Enterprise risk intelligent management and control system and method based on data analysis technology - Google Patents
Enterprise risk intelligent management and control system and method based on data analysis technology Download PDFInfo
- Publication number
- CN119130163B CN119130163B CN202411641465.5A CN202411641465A CN119130163B CN 119130163 B CN119130163 B CN 119130163B CN 202411641465 A CN202411641465 A CN 202411641465A CN 119130163 B CN119130163 B CN 119130163B
- Authority
- CN
- China
- Prior art keywords
- risk
- risk assessment
- record
- data
- assessment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/067—Enterprise or organisation modelling
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an enterprise risk intelligent management and control system and method based on a data analysis technology, and relates to the technical field of risk management and control; the management and control method comprises the steps of classifying all risk assessment records in any risk assessment log, determining risk characteristic indexes of each type of risk assessment record and normal deviation amplitude of each risk characteristic index, calculating risk values of the risk assessment records, determining risk threshold values for judging that abnormality exists in the risk assessment records, analyzing relevance among various types of data, setting a plurality of types of high risk data, directly carrying out risk assessment on the new risk assessment records if the high risk data exists in the new risk assessment records, carrying out abnormality marking on the new risk assessment records if the obtained risk values exceed the risk threshold values, and carrying out warning on the risk assessment log if abnormality marks exist in a plurality of continuous risk assessment records in the certain risk assessment log.
Description
Technical Field
The invention relates to the technical field of risk management and control, in particular to an enterprise risk intelligent management and control system and method based on a data analysis technology.
Background
The enterprise risk assessment is a process of identifying, analyzing and assessing potential risks faced by enterprises and formulating coping strategies, and aims to find and describe enterprise risks, evaluate the influence degree and risk value of various identified risks on the realization of targets by the enterprises and the like,
The effective risk assessment can help enterprises prevent and reduce the influence of risks, ensure continuous and stable operation of the business, is of great importance for effective management and control of risks for timely discovering risks of the enterprises, and can cause continuous and subsequent risks to the enterprises if timely discovering the risks of the enterprises and finding the source causing the abnormality is impossible.
Disclosure of Invention
The invention aims to provide an enterprise risk intelligent management and control system and method based on a data analysis technology, so as to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the technical scheme that the enterprise risk intelligent management and control method based on the data analysis technology comprises the following steps:
Step 100, in an enterprise risk assessment system, generating corresponding risk assessment logs for risk assessments of all enterprises, carrying out risk assessment on any enterprise once every unit period, generating one risk assessment record in the risk assessment logs, classifying all risk assessment records in any risk assessment log, and determining risk characteristic indexes of each type of risk assessment record and normal deviation amplitude of each risk characteristic index;
Step 200, constructing a risk assessment model, obtaining the offset amplitude of any risk assessment record and a corresponding risk characteristic index, and calculating to obtain the risk value of the risk assessment record;
Step 300, randomly selecting a certain risk assessment log, acquiring all data stored in each risk assessment log, analyzing sources of various data to obtain relevance among various data, obtaining probability of occurrence of abnormality of various data according to abnormality of each risk assessment log and relevance among various data, and setting a plurality of types of high risk data;
Step 400, when a certain risk assessment log exists, generating a new risk assessment record in real time, if high risk data exists in the new risk assessment record, directly carrying out risk assessment on the new risk assessment record, if the obtained risk value exceeds a risk threshold, carrying out abnormal marking on the new risk assessment record, and if a plurality of continuous risk assessment records exist in the certain risk assessment log, carrying out warning on the risk assessment log.
Further, step S100 includes the steps of:
Step S101, acquiring an ith risk assessment record in a certain risk assessment log, and extracting data information stored in the ith risk assessment record; acquiring data sources of all data information, classifying all the data information according to the data sources, and generating a data set of an ith risk assessment record;
step S102, obtaining an evaluation result in the ith risk evaluation record, comparing the data type of the evaluation result with some data in the data set in a similarity way, and setting a similarity threshold value Wherein N i is the number of data categories in the ith risk assessment record; if the obtained similarity is larger than a similarity threshold, taking the certain type of data as characteristic data of the ith risk assessment record, and taking the type of data with the highest similarity as a risk characteristic index of the ith risk assessment record;
step S103, selecting all risk assessment records with the same risk characteristic index as the ith risk assessment record, and dividing the risk assessment records into a normal record set and an abnormal record set according to whether abnormality exists; setting the offset of a certain risk evaluation record on a risk characteristic index as P, and respectively extracting the offset of each risk evaluation record in a normal record set and an abnormal record set to obtain a normal offset range in the normal record set as P 1,P2 and an abnormal offset range in the abnormal record set as P 3,P4;
Step S104, continuously selecting a value P ' from small to large in an error range, counting the number of risk assessment records with the offset between (P 3,P') in a normal record set as M 3, counting the number of risk assessment records with the offset between (P ',P4) in an abnormal record set as M 4 until M 3>M12-M3 and M 4>M34-M4 are met, and taking the value P ' as the characteristic offset of the divided normal record set and the abnormal record set to obtain a normal amplitude range of a risk characteristic index of an ith risk assessment record as (0, P ');
when the offset range of the normal record set overlaps with the offset range of the abnormal record set, the overlapping range is subdivided by the distribution condition of the two record sets within the overlapping range, so that the offset evaluation range can be as accurate as possible.
Further, step S200 includes the steps of:
Step S201, obtaining the offset of the ith risk assessment record in the certain risk assessment log as P i, obtaining the normal range of the risk characteristic index of the ith risk assessment record as (0, P '), and constructing a risk assessment model:
N i is the number of data categories in the ith risk assessment record, and a and b are constant coefficients;
the evaluation of the risk value is to consider the offset with the risk characteristic index and the data quantity influenced by various data, and effectively reflect the magnitude of the risk value by taking the actual offset as a basic value and combining the offset degree;
Step S202, randomly selecting a plurality of risk assessment records in each risk assessment log, training a risk assessment model to obtain risk values of each risk assessment record in the plurality of risk assessment records, dividing the plurality of risk assessment records according to whether abnormality exists to obtain a normal record set and an abnormal record set, respectively obtaining risk value ranges of the normal record set and the abnormal record set, and determining values of a and b so that the risk values of each risk assessment record in the normal record set are smaller than the risk values of each risk assessment record in the abnormal record set;
Step 203, taking the rest risk assessment records as a test set, inputting the test set into a risk assessment model, and if the risk value of the risk assessment record in the normal record set is larger than the risk value of one risk assessment record in the abnormal record set, selecting a plurality of risk assessment records in the rest risk assessment records to retrain the risk assessment model;
Step S204, acquiring risk values of all risk assessment records with abnormality, and selecting the risk value with the smallest value as a risk threshold for judging that the risk assessment record has abnormality.
Further, step S300 includes the steps of:
Step 301, acquiring a data set of an ith risk assessment record in the certain risk assessment log to obtain a data source of each type of data information in the data set, setting the certain type of data information as derivative data if the data source of the certain type of data information is the same as one type of data information in the data set of any other risk assessment record, otherwise, setting the certain type of data information as original data to obtain a plurality of derivative data sets and original data sets;
step S302, randomly selecting one type of derivative data, and when the data source of the derivative data is another type of derivative data, acquiring the data source of the another type of derivative data again until the data source is original data, and generating a generation path of the derivative data;
Step S303, acquiring a risk characteristic index of an ith risk assessment record in the certain risk assessment log to obtain a plurality of generation paths for generating the risk characteristic index, setting the number of paths of the plurality of generation paths as L i, wherein the number of data types in the jth generation path is H j, and according to the formula:
The calculation of the degree of association G a;Li-(Ka between the class a data and the risk characteristic index reflects that among the generated paths, the paths exist because of different initial data, but the middle derived data are the same, the generated derived data are obtained through the common of multiple classes of initial data, and the paths are actually the same path and need to be eliminated;
Step S304, obtaining the number of records with abnormality in the risk assessment records corresponding to the risk characteristic indexes in the enterprise risk assessment system, obtaining the abnormality proportion beta of abnormality of the risk characteristic indexes, setting an abnormality proportion threshold beta max, if beta > beta max, selecting the data with the highest degree of association with the risk characteristic indexes, and setting the data as high risk data.
Further, step S400 includes the steps of:
step S401, when a certain type of high risk data is stored in the new risk assessment record, inputting a risk assessment model into the new risk assessment record, and calculating to obtain a risk value F new of the new risk assessment record;
Step S402, setting a risk threshold for judging that the risk assessment record is abnormal as F max, and when F new>Fmax, performing abnormal marking on the new risk assessment record;
Step S403, acquiring one risk assessment record closest to the generation time of the new risk assessment record in the risk assessment log corresponding to the new risk assessment record, and warning the risk assessment log if an abnormal mark exists in the latest one risk assessment record.
In order to better realize the method, an enterprise risk intelligent management and control system based on a data analysis technology is also provided, and the management and control system comprises a history analysis module, an enterprise risk analysis module, a risk data analysis module and a risk real-time analysis module;
The history analysis module is used for generating corresponding risk assessment logs for risk assessment of each enterprise in an enterprise risk assessment system, carrying out risk assessment on any enterprise once every other unit period, and generating one risk assessment record in the risk assessment logs;
The enterprise risk analysis module is used for constructing a risk assessment model, obtaining the offset amplitude of any risk assessment record and a corresponding risk characteristic index, and calculating to obtain the risk value of the risk assessment record;
The risk data analysis module is used for arbitrarily selecting a certain risk assessment log, acquiring all data stored in each risk assessment log, analyzing sources of various data, and obtaining relevance among various data;
The risk real-time analysis module is used for generating a new risk assessment record in real time when a certain risk assessment log exists, directly carrying out risk assessment on the new risk assessment record if high risk data exists in the new risk assessment record, carrying out abnormal marking on the new risk assessment record if an obtained risk value exceeds a risk threshold, and carrying out warning on the risk assessment log if abnormal marks exist in a plurality of continuous risk assessment records in the certain risk assessment log.
Further, the history analysis module comprises an evaluation record setting unit and an evaluation record dividing unit;
The evaluation record setting unit is used for generating corresponding risk evaluation logs for risk evaluation of each enterprise in the enterprise risk evaluation system, carrying out risk evaluation on any enterprise every other unit period, generating one risk evaluation record in the risk evaluation logs, and the evaluation record dividing unit is used for classifying all the risk evaluation records in any risk evaluation log to determine risk characteristic indexes of each type of risk evaluation record and normal deviation amplitude of each risk characteristic index.
Further, the enterprise risk analysis module comprises an evaluation model analysis unit and a risk threshold setting unit;
the evaluation model analysis unit is used for constructing a risk evaluation model, acquiring the offset amplitude of any risk evaluation record and a corresponding risk characteristic index, and calculating to obtain a risk value of the risk evaluation record; the risk threshold setting unit is used for extracting risk values of all risk assessment records with abnormality and determining a risk threshold for judging that the risk assessment records have abnormality.
Further, the enterprise risk analysis module comprises an evaluation model analysis unit and a risk threshold setting unit;
the evaluation model analysis unit is used for constructing a risk evaluation model, acquiring the offset amplitude of any risk evaluation record and a corresponding risk characteristic index, and calculating to obtain a risk value of the risk evaluation record; the risk threshold setting unit is used for extracting risk values of all risk assessment records with abnormality and determining a risk threshold for judging that the risk assessment records have abnormality.
Further, the risk data analysis module comprises a data association evaluation unit and a data abnormality analysis unit;
The data abnormality analysis unit is used for obtaining the probability of abnormality of various data according to the abnormality condition of various risk assessment records and the relevance between various data, and setting a plurality of types of high risk data.
Further, the risk real-time analysis module comprises a risk real-time assessment unit and an abnormality mark analysis unit;
The risk real-time evaluation unit is used for generating a new risk evaluation record in real time when a certain risk evaluation log exists, directly performing risk evaluation on the new risk evaluation record if high risk data exist in the new risk evaluation record, performing abnormal marking on the new risk evaluation record if an obtained risk value exceeds a risk threshold value, and warning the risk evaluation log if a plurality of continuous risk evaluation records exist in the certain risk evaluation log.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, by evaluating the risk value of the enterprise, effective management and risk control of the enterprise are realized, and abnormal enterprises are timely found and reminded, so that the normal operation of the enterprise is ensured;
2. The risk assessment records are classified according to the data stored in different risk assessment records and the risk characteristic indexes for risk assessment at last, and abnormal conditions of various risk assessment records can be reasonably reflected through different offsets;
3. According to the method, the degree of influence of various data on the final risk characteristic index is obtained by analyzing the relevance among various data, the situation that the same risk characteristic index continuously appears abnormal is considered, a plurality of types of high risk data are screened, when the generated risk assessment record records the high risk data, the risk assessment is directly carried out, the risk of the high risk data on an enterprise is avoided, the abnormality can be found and processed in time, and the loss of the enterprise is reduced.
Drawings
FIG. 1 is a schematic diagram of steps of an enterprise risk intelligent management and control method based on a data analysis technology;
fig. 2 is a schematic structural diagram of an enterprise risk intelligent management and control system based on a data analysis technology.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
1-2, The invention provides an enterprise risk intelligent management and control method based on a data analysis technology, which comprises the following steps:
Step 100, in an enterprise risk assessment system, generating corresponding risk assessment logs for risk assessments of all enterprises, carrying out risk assessment on any enterprise once every unit period, generating one risk assessment record in the risk assessment logs, classifying all risk assessment records in any risk assessment log, and determining risk characteristic indexes of each type of risk assessment record and normal deviation amplitude of each risk characteristic index;
wherein, step S100 includes the following steps:
Step S101, acquiring an ith risk assessment record in a certain risk assessment log, and extracting data information stored in the ith risk assessment record; acquiring data sources of all data information, classifying all the data information according to the data sources, and generating a data set of an ith risk assessment record;
step S102, obtaining an evaluation result in the ith risk evaluation record, comparing the data type of the evaluation result with some data in the data set in a similarity way, and setting a similarity threshold value If the obtained similarity is larger than a similarity threshold, taking the certain type of data as the characteristic data of the ith risk assessment record, and taking the type of data with the highest similarity as the risk characteristic index of the ith risk assessment record;
step S103, selecting all risk assessment records with the same risk characteristic index as the ith risk assessment record, and dividing the risk assessment records into a normal record set and an abnormal record set according to whether abnormality exists; setting the offset of a certain risk evaluation record on a risk characteristic index as P, and respectively extracting the offset of each risk evaluation record in a normal record set and an abnormal record set to obtain a normal offset range in the normal record set as P 1,P2 and an abnormal offset range in the abnormal record set as P 3,P4;
Step S104, continuously selecting a value P ' from small to large in an error range, counting the number of risk assessment records with offset between (P 3,P') in a normal record set as M 3, counting the number of risk assessment records with offset between (P ',P4) in an abnormal record set as M 4 until M 3>M12-M3 and M 4>M34-M4 are met, and taking the value P ' as the characteristic offset of the divided normal record set and the abnormal record set to obtain a normal amplitude range of risk characteristic indexes of an ith risk assessment record as (0, P ');
The method includes the steps of setting a normal offset range in a normal record set to be (0, 20%), setting an abnormal offset range in an abnormal record set to be (15%, 50%), obtaining an error range to be (15%, 20%), selecting an offset from the error range to be 17%, obtaining more offsets in the normal record set in the (15%, 17%), and obtaining an offset 17% as a characteristic offset when the offsets in the abnormal record set in the (17%, 20%) range are more, and obtaining a normal amplitude range of a risk characteristic index to be (0,17%);
Step 200, constructing a risk assessment model, obtaining the offset amplitude of any risk assessment record and a corresponding risk characteristic index, and calculating to obtain the risk value of the risk assessment record;
wherein, step S200 includes the following steps:
Step S201, obtaining the offset of the ith risk assessment record in the certain risk assessment log as P i, obtaining the normal range of the risk characteristic index of the ith risk assessment record as (0, P '), and constructing a risk assessment model:
N i is the number of data categories in the ith risk assessment record, and a and b are constant coefficients;
Setting the offset of the ith risk assessment record to be 10%, and setting the normal amplitude range to be (0,17%), wherein the number of data categories in the ith risk assessment record is 3, a=50%, and b=100, and obtaining a risk value of F i =10% × (1-0.7×50%) ×3+100= 100.195;
Step S202, randomly selecting a plurality of risk assessment records in each risk assessment log, training a risk assessment model to obtain risk values of each risk assessment record in the plurality of risk assessment records, dividing the plurality of risk assessment records according to whether abnormality exists to obtain a normal record set and an abnormal record set, respectively obtaining risk value ranges of the normal record set and the abnormal record set, and determining values of a and b so that the risk values of each risk assessment record in the normal record set are smaller than the risk values of each risk assessment record in the abnormal record set;
Step 203, taking the rest risk assessment records as a test set, inputting the test set into a risk assessment model, and if the risk value of the risk assessment record in the normal record set is larger than the risk value of one risk assessment record in the abnormal record set, selecting a plurality of risk assessment records in the rest risk assessment records to retrain the risk assessment model;
Step S204, acquiring risk values of all risk assessment records with abnormality, and selecting the risk value with the smallest value as a risk threshold for judging that the risk assessment record has abnormality.
Step 300, randomly selecting a certain risk assessment log, acquiring all data stored in each risk assessment log, analyzing sources of various data to obtain relevance among various data, obtaining probability of occurrence of abnormality of various data according to abnormality of each risk assessment log and relevance among various data, and setting a plurality of types of high risk data;
wherein, step S300 includes the following steps:
Step 301, acquiring a data set of an ith risk assessment record in the certain risk assessment log to obtain a data source of each type of data information in the data set, setting the certain type of data information as derivative data if the data source of the certain type of data information is the same as one type of data information in the data set of any other risk assessment record, otherwise, setting the certain type of data information as original data to obtain a plurality of derivative data sets and original data sets;
Step S302, randomly selecting one type of derivative data, and when the data source of the derivative data is another type of derivative data, acquiring the data source of the another type of derivative data again until the data source is original data, and generating a generation path of the derivative data;
Step S303, acquiring a risk characteristic index of an ith risk assessment record in the certain risk assessment log to obtain a plurality of generation paths for generating the risk characteristic index, setting the number of paths of the plurality of generation paths as L i, wherein the number of data types in the jth generation path is H j, and according to the formula:
K a is the same category number of the rest data as the derivative data generated by the class a data, and the degree of association G a between the class a data and the risk characteristic index is calculated;
The method comprises the steps of obtaining 5 generation paths for generating b-th data, wherein 3 generation paths have different original data to generate the same derivative data, so K a =2, and the number of data types of each generation path is 3;
Step S304, obtaining the number of records with abnormality in the risk assessment records corresponding to the risk characteristic indexes in the enterprise risk assessment system, obtaining the abnormality proportion beta of abnormality of the risk characteristic indexes, setting an abnormality proportion threshold beta max, if beta > beta max, selecting the data with the highest degree of association with the risk characteristic indexes, and setting the data as high risk data.
Step 400, when a certain risk assessment log exists, generating a new risk assessment record in real time, if high risk data exists in the new risk assessment record, directly carrying out risk assessment on the new risk assessment record, if the obtained risk value exceeds a risk threshold value, carrying out abnormal marking on the new risk assessment record, and if abnormal marks exist in a plurality of continuous risk assessment records in the certain risk assessment log, carrying out warning on the risk assessment log;
wherein, step S400 includes the following steps:
step S401, when a certain type of high risk data is stored in the new risk assessment record, inputting a risk assessment model into the new risk assessment record, and calculating to obtain a risk value F new of the new risk assessment record;
Step S402, setting a risk threshold for judging that the risk assessment record is abnormal as F max, and when F new>Fmax, performing abnormal marking on the new risk assessment record;
Step S403, acquiring one risk assessment record closest to the generation time of the new risk assessment record in the risk assessment log corresponding to the new risk assessment record, and warning the risk assessment log if an abnormal mark exists in the latest one risk assessment record.
The enterprise risk intelligent management and control system based on the data analysis technology comprises a history analysis module, an enterprise risk analysis module, a risk data analysis module and a risk real-time analysis module;
The history analysis module is used for generating corresponding risk assessment logs for risk assessment of each enterprise in an enterprise risk assessment system, carrying out risk assessment on any enterprise once every other unit period, and generating one risk assessment record in the risk assessment logs;
The enterprise risk analysis module is used for constructing a risk assessment model, obtaining the offset amplitude of any risk assessment record and a corresponding risk characteristic index, and calculating to obtain the risk value of the risk assessment record;
The risk data analysis module is used for arbitrarily selecting a certain risk assessment log, acquiring all data stored in each risk assessment log, analyzing sources of various data, and obtaining relevance among various data;
The risk real-time analysis module is used for generating a new risk assessment record in real time when a certain risk assessment log exists, directly carrying out risk assessment on the new risk assessment record if high risk data exists in the new risk assessment record, carrying out abnormal marking on the new risk assessment record if an obtained risk value exceeds a risk threshold, and carrying out warning on the risk assessment log if abnormal marks exist in a plurality of continuous risk assessment records in the certain risk assessment log.
The history analysis module comprises an evaluation record setting unit and an evaluation record dividing unit;
The evaluation record setting unit is used for generating corresponding risk evaluation logs for risk evaluation of each enterprise in the enterprise risk evaluation system, carrying out risk evaluation on any enterprise every other unit period, generating one risk evaluation record in the risk evaluation logs, and the evaluation record dividing unit is used for classifying all the risk evaluation records in any risk evaluation log to determine risk characteristic indexes of each type of risk evaluation record and normal deviation amplitude of each risk characteristic index.
The enterprise risk analysis module comprises an assessment model analysis unit and a risk threshold setting unit;
the evaluation model analysis unit is used for constructing a risk evaluation model, acquiring the offset amplitude of any risk evaluation record and a corresponding risk characteristic index, and calculating to obtain a risk value of the risk evaluation record; the risk threshold setting unit is used for extracting risk values of all risk assessment records with abnormality and determining a risk threshold for judging that the risk assessment records have abnormality.
The risk data analysis module comprises a data association evaluation unit and a data abnormality analysis unit;
The data abnormality analysis unit is used for obtaining the probability of abnormality of various data according to the abnormality condition of various risk assessment records and the relevance between various data, and setting a plurality of types of high risk data.
The risk real-time analysis module comprises a risk real-time assessment unit and an abnormality mark analysis unit;
The risk real-time evaluation unit is used for generating a new risk evaluation record in real time when a certain risk evaluation log exists, directly performing risk evaluation on the new risk evaluation record if high risk data exist in the new risk evaluation record, performing abnormal marking on the new risk evaluation record if an obtained risk value exceeds a risk threshold value, and warning the risk evaluation log if a plurality of continuous risk evaluation records exist in the certain risk evaluation log.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (6)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411641465.5A CN119130163B (en) | 2024-11-18 | 2024-11-18 | Enterprise risk intelligent management and control system and method based on data analysis technology |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411641465.5A CN119130163B (en) | 2024-11-18 | 2024-11-18 | Enterprise risk intelligent management and control system and method based on data analysis technology |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN119130163A CN119130163A (en) | 2024-12-13 |
| CN119130163B true CN119130163B (en) | 2025-06-10 |
Family
ID=93758938
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411641465.5A Active CN119130163B (en) | 2024-11-18 | 2024-11-18 | Enterprise risk intelligent management and control system and method based on data analysis technology |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119130163B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7006992B1 (en) * | 2000-04-06 | 2006-02-28 | Union State Bank | Risk assessment and management system |
| CN118966763A (en) * | 2024-07-27 | 2024-11-15 | 中国机电设备招标中心(工业和信息化部政府采购中心) | A supplier risk automatic evaluation control method and system in the bidding process |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8269617B2 (en) * | 2009-01-26 | 2012-09-18 | Drivecam, Inc. | Method and system for tuning the effect of vehicle characteristics on risk prediction |
| US9129257B2 (en) * | 2010-12-20 | 2015-09-08 | Verizon Patent And Licensing Inc. | Method and system for monitoring high risk users |
| CN115409372B (en) * | 2022-08-30 | 2023-07-04 | 南方电网调峰调频发电有限公司西部检修试验分公司 | Risk assessment method and system based on data analysis |
| CN117455026A (en) * | 2023-07-20 | 2024-01-26 | 福建迦百农信息技术有限公司 | Intelligent early warning method for retail customer offence risk based on big data |
-
2024
- 2024-11-18 CN CN202411641465.5A patent/CN119130163B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7006992B1 (en) * | 2000-04-06 | 2006-02-28 | Union State Bank | Risk assessment and management system |
| CN118966763A (en) * | 2024-07-27 | 2024-11-15 | 中国机电设备招标中心(工业和信息化部政府采购中心) | A supplier risk automatic evaluation control method and system in the bidding process |
Also Published As
| Publication number | Publication date |
|---|---|
| CN119130163A (en) | 2024-12-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lee et al. | Evaluation of fairness trade-offs in predicting student success | |
| CN118070202A (en) | Industrial data quality control system based on artificial intelligence | |
| CN115543973B (en) | Data quality rule recommendation method based on knowledge spectrogram and machine learning | |
| CN115619209A (en) | Risk assessment system for electric power construction projects integrated with revised parameter analytic hierarchy process | |
| WO2024222877A1 (en) | Method and system for sensing and assessing service effect of distributed system | |
| CN118211171B (en) | A target path mining method based on knowledge graph | |
| CN114757468A (en) | Root cause analysis method for flow execution abnormity in flow mining | |
| CN119647975A (en) | A risk early warning method based on food business risk information database | |
| CN105574666A (en) | Method and device for evaluating credit level of enterprise based on key data modeling | |
| CN118942606B (en) | Integrated intelligent integrated management and control system for hospital information | |
| CN119130163B (en) | Enterprise risk intelligent management and control system and method based on data analysis technology | |
| CN114663102B (en) | Method, device and storage medium for predicting default of bond issuer based on semi-supervised model | |
| CN118968379A (en) | A monitoring data analysis system based on deep learning | |
| CN119026982A (en) | An enterprise analysis and evaluation system and evaluation method | |
| CN118656676A (en) | Data quality management method and system applied to big data system | |
| CN118350535A (en) | Enterprise pollution discharge management method, device and equipment based on characteristic factors | |
| CN117952318A (en) | Industrial garden carbon emission data management system and method based on big data | |
| CN112732773B (en) | Method and system for checking uniqueness of relay protection defect data | |
| CN115481575A (en) | A Data-Driven Failure Mode and Effects Analysis Method | |
| CN114662981A (en) | Pollution source enterprise supervision method based on big data application | |
| WO2022079023A1 (en) | A method for assessing quality of open source projects | |
| Ouyang | Financial Risk Control of Listed Enterprises Based on Risk Warning Model | |
| CN114648670A (en) | Method, device and computer equipment for constructing a model for identifying a waybill with abnormal weight | |
| CN117273467B (en) | An industrial safety risk management and control method and system based on multi-factor coupling | |
| KR102767248B1 (en) | Method and apparatus for assessment of money laundering suspicious transaction risk |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |