An Analysis of the Application of Computer Information Management Technology in Network Security

Authors

  • Wen Tang Hunan College of Traditional Chinese Medicine, Zhuzhou, Hunan 412000

DOI:

https://doi.org/10.53469/jtpms.2025.05(5).02

Keywords:

Computer Information Management Technology, Network security, Application inquiry

Abstract

With the deepening development of network informatization, the network has become the infrastructure for various information technologies and applications.The internet not only brings convenience to people's lives, but also faces increasing security risks.Cybersecurity issues have become a focus of attention for people.The emergence of cybersecurity issues not only affects the security of individuals, organizations, and countries, but also brings difficulties to the protection of various information systems, network infrastructure, important equipment, and critical information.Therefore, ensuring network security has become an important task for social development.As an important technical means, computer information management technology can play a significant role in network security.This article explores the application of computer information management technology in network security, hoping to provide some research assistance for optimizing and innovating network security management work.

References

Zhao, S., Xu, Z., Zhu, Z., Liang, X., Zhang, Z., & Jiang, R. (2025). Short and Long-Term Renewable Electricity Demand Forecasting Based on CNN-Bi-GRU Model. IECE Transactions on Emerging Topics in Artificial Intelligence, 2(1), 1-15.

Luo, H., Wei, J., Zhao, S., Liang, A., Xu, Z., & Jiang, R. (2024). Intelligent logistics management robot path planning algorithm integrating transformer and gcn network. IECE Transactions on Internet of Things, 2(4), 95-112.

Li, Huaxu, et al. "Enhancing Intelligent Recruitment With Generative Pretrained Transformer and Hierarchical Graph Neural Networks: Optimizing Resume-Job Matching With Deep Learning and Graph-Based Modeling." Journal of Organizational and End User Computing (JOEUC) 37.1 (2025): 1-24.

Wang, Meng, et al. "CPLOYO: A pulmonary nodule detection model with multi-scale feature fusion and nonlinear feature learning." Alexandria Engineering Journal 122 (2025): 578-587.

Xu, Y., & Lin, Y. (2024, November). Exploring the Influence of User-Perceived Value on NEV-Enterprises Using an Empirical Computer Model. In 3rd International Conference on Financial Innovation, FinTech and Information Technology (FFIT 2024) (pp. 4-10). Atlantis Press.

Shan, X., Xu, Y., Wang, Y., Lin, Y. S., & Bao, Y. (2024, June). Cross-Cultural Implications of Large Language Models: An Extended Comparative Analysis. In International Conference on Human-Computer Interaction (pp. 106-118). Cham: Springer Nature Switzerland.

Yang, Wei, and Jincan Duan. "Knowledge Graph Construction for the US Stock Market: A Statistical Learning and Risk Management Approach." Journal of Computer Technology and Applied Mathematics 2.1 (2025): 1-7.

Lu, Jialang, et al. "DeepSPG: Exploring Deep Semantic Prior Guidance for Low-light Image Enhancement with Multimodal Learning." arXiv preprint arXiv:2504.19127 (2025).

Tu, Tongwei. "Reliable Vehicle Platooning via Redundant 5G Link Aggregation in Smart Roads." (2025).

Ma, Haowei, et al. "Maternal and cord blood levels of metals and fetal liver function." Environmental Pollution 363 (2024): 125305.

Lu, Jingyuan, et al. "Chemotherapy-mediated lncRNA-induced immune cell plasticity in cancer immunopathogenesis." International Immunopharmacology 141 (2024): 112967.

Jiang, Xiaohong, et al. "Tumor Microenvironment Reprogrammed Bimetallic Hybrid Nanostimulator for Triggering Radio‐Cuproptosis‐Immunotherapy." Advanced Healthcare Materials 13.30 (2024): 2401902.

Ma, Haowei. "Automatic positioning system of medical service robot based on binocular vision." 2021 3rd International Symposium on Robotics & Intelligent Manufacturing Technology (ISRIMT). IEEE, 2021.

Downloads

Published

2025-06-02

How to Cite

Tang, W. (2025). An Analysis of the Application of Computer Information Management Technology in Network Security. Journal of Theory and Practice of Management Science, 5(5), 6–11. https://doi.org/10.53469/jtpms.2025.05(5).02