全球数字生态系统底层驱动范式转型特征及研究启示
Underlying-Dynamics Paradigm Shift of Global Digital Ecosystems: Characteristics and Enlightenment
当前,全球正在开启数字生态系统底层驱动范式转型的进程;深入研究主要发达国家通过数字生态系统底层驱动范式转型防范系统性网络风险、重塑数字产业竞争新格局,对我国高质量建设网络强国、数字中国、智慧社会具有重要借鉴意义。本文以主要发达国家为研究对象,运用文献调研、情报分析、比较研究等方法,剖析了全球数字生态系统底层驱动范式转型的内涵、动因、主要目标以及发展愿景。按照范式研究的一般规律,从思维视角、方法论、实践规范、推进策略、安全承诺、生态孵化模式等方面分析了转型的基本特征、发展趋势、采用的技术框架、配套的治理规则等,提出了主要发达国家面临的转型挑战,总结了我国原创的内生安全理论所具有的赋能增益优势。研究建议,发挥内生安全理论先发优势,跳出“牵鼻子”困境;针对数字化转型关键领域痛点问题精准发力;发挥国内大市场优势,用更有效的产业政策助力新范式发展;更新人才培养理念,努力培养具有设计安全能力的负责任开发者;坚持开放可控、包容多样,增强我国数字产品“走出去”的公信力保证。
Nowadays, the world is embarking on a process of transformation in the underlying dynamics of the digital ecosystem. With the aim of mitigating systematic cyber risks and reshaping the global competition landscape of digital industries, the developed countries are pushing the paradigm shift in the underlying dynamics of the digital ecosystems. Thorough research on this subject holds immense significance for boosting China's strength in cyber, digital, and intelligent development. Focusing on major developed countries, this study integrates literature reviews, intelligence analysis, and comparison study to investigate the essence, driving factors, primary objectives, and outlook of this shift. Drawing upon the fundamental principles of a paradigm shift, the study explores the core features of this underlying-dynamics shift, spanning aspects like mindset, methodology, practical norms, advancement strategies, security commitments, and ecological incubation models. Additionally, it delineates emerging trends, technological frameworks, and associated governance principles related to this paradigm shift. Challenges faced by developed countries' transformation strategies are discussed, along with the enabling advantages of China's endogenous security and safety (ESS) theory. The research puts forward five recommendations: (1) leveraging the first-mover advantage of the ESS theory to overcome limitations; (2) addressing pain points in critical areas of digital transformation; (3) maximizing the advantages of the large-scale domestic market by introducing more effective industrial policies to bolster novel paradigm shifts; (4) renewing the concept of personal training by cultivating responsible developers with "security-by-design" capabilities; and (5) enhancing the trustworthiness of Chinese digital products through technological innovation, thus facilitating China's Going Global initiative.
网络空间安全 / 数字生态系统 / 内生安全 / 网络弹性/韧性
cyberspace security / digital ecosystem / endogenous security and safety / cyber resilience
| [1] |
Office of Cybersecurity, Energy Security, and Emergency Response. National cyber-informed engineering strategy [R]. Washington DC: The US Department of Energy, 2022. |
| [2] |
European Commission. The European cyber resilience act (CRA) [R]. Brussels: European Commission, 2023. |
| [3] |
中国互联网络信息中心. 第53次中国互联网络发展状况统计报告 [R]. 北京: 中国互联网络信息中心, 2024. |
| [4] |
China Internet Network Information Center. The 53rd statistical report on China's Internet development [R]. Beijing: China Internet Network Information Center, 2024. |
| [5] |
洪延青, 朱玲凤, 张朝, 等. 欧盟提出"技术主权" 概念 引领欧盟数字化转型战略 [J]. 中国信息安全, 2020 (3): 70‒74. |
| [6] |
Hong Y Q, Zhu L F, Zhang Z, et al. The EU puts forward the concept of "technical sovereignty" to lead the EU's digital transformation strategy [J]. China Information Security, 2020 (3): 70‒74. |
| [7] |
王守都. 拜登政府的网络空间战略体系构建: 发展现状、具体特征及未来趋势 [J]. 情报杂志, 2024, 43(2): 25‒32. |
| [8] |
Wang S D. The construction of the Biden administration's cyberspace strategy system: Status quo, features and trends [J]. Journal of Intelligence, 2024, 43(2): 25‒32. |
| [9] |
宫云牧. 网络空间与霸权护持——美国网络安全战略的迭代演进与驱动机制 [J]. 国际展望, 2024, 16(1): 54‒74, 159. |
| [10] |
Gong Y M. Cyberspace and hegemony maintenance: The evolution and driving mechanisms of U.S. national cybersecurity strategies [J]. Global Review, 2024, 16(1): 54‒74, 159. |
| [11] |
Krivý M. Digital ecosystem: The journey of a metaphor [J]. Digital Geography and Society, 2023, 5: 100057. |
| [12] |
Acs Z J, Song A K, Szerb L, et al. The evolution of the global digital platform economy: 1971—2021 [J]. Small Business Economics, 2021, 57(4): 1629‒1659. |
| [13] |
Boley H, Chang E. Digital ecosystems: Principles and semantics [R]. Cairns: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, 2007. |
| [14] |
Zeb S, Mahmood A, Ali Hassan S, et al. Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey [J]. Journal of Network and Computer Applications, 2022, 200: 103309. |
| [15] |
Senyo P K, Liu K C, Effah J. Digital business ecosystem: Literature review and a framework for future research [J]. International Journal of Information Management, 2019, 47: 52‒64. |
| [16] |
吴江, 陶成煦. 激活数据要素 赋能千行万业——《"数据要素×"三年行动计划(2024—2026年)》政策解读 [J]. 情报理论与实践, 2024, 47(3): 16‒19. |
| [17] |
Wu J, Tao C X. Activating data elements empowers thousands of businesses: Policy interpretation of "the data elements×" Three-Year Action Plan (2024—2026) [J]. Information Studies (Theory & Application), 2024, 47(3): 16‒19. |
| [18] |
余建川. 欧盟网络安全建设的新近发展及对我国的启示——基于《欧盟数字十年网络安全战略》的分析 [J]. 情报杂志, 2022, 41(3): 87‒94. |
| [19] |
Yu J C. The recent development and enlightenment of EU cyber security construction—Based on the EU's cybersecurity strategy for the digital decade [J]. Journal of Intelligence, 2022, 41(3): 87‒94. |
| [20] |
The White House. National cybersecurity strategy [R]. Washington DC: The White House, 2023. |
| [21] |
Rahman M A, Hossain M S. A deep learning assisted software defined security architecture for 6G wireless networks: IIoT perspective [J]. IEEE Wireless Communications, 2022, 29(2): 52‒59. |
| [22] |
Steve Morgan. Boardroom cybersecurity report on cybercrime [R]. California: Cybersecurity Ventures, 2023. |
| [23] |
Kuhn T S. The structure of scientific revolutions [M]. Chicago: University of Chicago Press, 1962. |
| [24] |
HackerOne. 2022 Hacker-powered security report [R]. San Francisco: HackerOne, 2022. |
| [25] |
Gianmarco B, Josefa B, et al. Cybersecurity, our digital anchor: A European perspective [M]. Luxembourg: Publications Office of the European Union, 2020. |
| [26] |
Cybersecurity & Infrastructure Security Agency. Cybersecurity strategic plan FY2024—2026 [R]. Washington DC: Cybersecurity & Infrastructure Security Agency, 2023. |
| [27] |
俞能海, 张丽, 邹宏. 风险管理视角下的数据安全与隐私保护 [J]. 中国网信, 2024 (1): 41‒44. |
| [28] |
Yu N H, Zhang L, Zou H. Data security and privacy protection from the perspective of risk management [J]. China Internet Information, 2024 (1): 41‒44. |
| [29] |
桂畅旎, 刘星. 2023年国际网络空间形势回顾及发展动向 [J]. 中国信息安全, 2023 (12): 19‒23. |
| [30] |
Gui C N, Liu X. Review and development trend of international cyberspace in 2023 [J]. China Information Security, 2023 (12): 19‒23. |
| [31] |
Fischerkeller M P, Goldman E O, Harknett R J. Cyber persistence theory: Redefining national security in cyberspace [M]. Oxford: Oxford University Press, 2022. |
| [32] |
European Commission. NIS 2 directive [R]. Brussels: European Commission, 2022. |
| [33] |
Cyber and Infrastructure Security Centre. Critical infrastructure resilience strategy [R]. Canberra: Department of Home Affairs, Australian Government, 2023. |
| [34] |
The Cyber Security Agency of Singapore. Media fact sheet of cybersecurity labeling scheme [R]. Singapore: Cyber Security Agency of Singapore, 2020. |
| [35] |
National Institute of Standards and Technology. Recommended criteria for cybersecurity labeling for consumer Internet of things (IoT) products [R]. Gaithersburg: National Institute of Standards and Technology, 2022. |
| [36] |
The White House. National cybersecurity strategy implementation plan [R]. Washington DC: The White House, 2023. |
| [37] |
Young S D, Walden K E. Administration cybersecurity priorities for the FY 2025 budget [R]. Washington DC: U.S. Executive Office of the President, 2023. |
| [38] |
Office of The National Cyber Director, Executive Office of The President. National cyber workforce and education strategy: Unleashing America's cyber talent [R]. Washington DC: The White House, 2023. |
| [39] |
Kerman A, Borchert O, Rose S, et al. Zero trust architecture [R]. Gaithersburg: National Institute of Standards and Technology, 2020. |
| [40] |
Vacca J R. Computer and information security handbook [M]. Amsterdam: Elsevier, 2013. |
| [41] |
Alsaqour R, Majrashi A, Alreedi M, et al. Defense in depth: Multilayer of security [J]. International Journal of Communication Networks and Information Security (IJCNIS), 2021, 13(2): 242‒248. |
| [42] |
National Institute of Standards and Technology. The NIST Cybersecurity Framework (CSF) 2.0 [R]. Gaithersburg: National Institute of Standards and Technology, 2024. |
| [43] |
Souppaya M, Scarfone K, Dodson D. Secure software development framework (SSDF) version 1.1: Recommendations for mitigating the risk of software vulnerabilities [R]. Gaithersburg: National Institute of Standards and Technology, 2022. |
| [44] |
Boyens J M, Smith A, Bartol N, et al. Cybersecurity supply chain risk management practices for systems and organizations [R]. Gaithersburg: National Institute of Standards and Technology, 2024. |
| [45] |
Möller D P F. Guide to cybersecurity in digital transformation: Trends, methods, technologies, applications and best practices [M]. Cham: Springer, 2023. |
| [46] |
Bodeau D J, Graubart R D, McQuaid R M, et al. Cyber resiliency metrics, measures of effectiveness, and scoring [R]. Bedford: MITRE, 2018. |
| [47] |
Li Z S, Wu G Y, Cassandro R, et al. A review of resilience metrics and modeling methods for cyber-physical power systems (CPPS) [J]. IEEE Transactions on Reliability, 2024, 73(1): 59‒66. |
| [48] |
邬江兴. 内生安全赋能网络弹性工程 [M]. 北京: 科学出版社, 2023. |
| [49] |
Wu J X. Endogenous safety and security (ESS) theory enabled cyber resiliency engineering [M]. Beijing: Science Press, 2023. |
| [50] |
邬江兴, 季新生, 贺磊, 等. 内生安全赋能网络弹性研究 [J]. 信息通信技术, 2023, 17(4): 4‒11. |
| [51] |
Wu J X, Ji X S, He L, et al. Research on network elasticity of endogenous security empowerment [J]. Information and Communications Technologies, 2023, 17(4): 4‒11. |
| [52] |
邬江兴, 邹宏, 薛向阳, 等. 内生安全赋能网络弹性的构想、方法与策略 [J]. 中国工程科学, 2023, 25(6): 106‒115. |
| [53] |
Wu J X, Zou H, Xue X Y, et al. Cyber resilience enabled by endogenous security and safety: Vision, techniques, and strategies [J]. Strategic Study of CAE, 2023, 25(6): 106‒115. |
| [54] |
邬江兴, 季新生, 贺磊, 等. 从设计安全到内生安全技术白皮书 [R]. 南京: 紫金山实验室, 2023. |
| [55] |
Wu J X, Ji X S, He L, et al. Technical white paper: From security by design to endogenous security [R]. Nanjing: Purple Mountain Laboratory, 2023. |
| [56] |
Petrenko S. Cyber resilience [M]. Aalborg: River Publishers, 2019. |
| [57] |
Gunduz M Z, Das R. Cyber-security on smart grid: Threats and potential solutions [J]. Computer Networks, 2020, 169: 107094. |
| [58] |
Spagnuelo D, Bartolini C, Lenzini G. Metrics for transparency [R]. Heraklion: 11th International Workshop, DPM2016 and 5th International Workshop, QASA2016, 2016. |
| [59] |
Ross R, Pillitteri V, Graubart R, et al. Developing cyber-resilient systems: A systems security engineering approach [R]. Gaithersburg: National Institute of Standards and Technology, 2021. |
中国工程院咨询项目“人工智能关键应用系统及安全战略研究”(2023-XZ-11)
中国工程院咨询项目(2023-XZ-93)
/
| 〈 |
|
〉 |