
Underlying-Dynamics Paradigm Shift of Global Digital Ecosystems: Characteristics and Enlightenment
Hong Zou, Fan Zhang, Yuting Shang, Jiangxing Wu
Strategic Study of CAE ›› 2025, Vol. 27 ›› Issue (1) : 98-110.
Underlying-Dynamics Paradigm Shift of Global Digital Ecosystems: Characteristics and Enlightenment
Nowadays, the world is embarking on a process of transformation in the underlying dynamics of the digital ecosystem. With the aim of mitigating systematic cyber risks and reshaping the global competition landscape of digital industries, the developed countries are pushing the paradigm shift in the underlying dynamics of the digital ecosystems. Thorough research on this subject holds immense significance for boosting China's strength in cyber, digital, and intelligent development. Focusing on major developed countries, this study integrates literature reviews, intelligence analysis, and comparison study to investigate the essence, driving factors, primary objectives, and outlook of this shift. Drawing upon the fundamental principles of a paradigm shift, the study explores the core features of this underlying-dynamics shift, spanning aspects like mindset, methodology, practical norms, advancement strategies, security commitments, and ecological incubation models. Additionally, it delineates emerging trends, technological frameworks, and associated governance principles related to this paradigm shift. Challenges faced by developed countries' transformation strategies are discussed, along with the enabling advantages of China's endogenous security and safety (ESS) theory. The research puts forward five recommendations: (1) leveraging the first-mover advantage of the ESS theory to overcome limitations; (2) addressing pain points in critical areas of digital transformation; (3) maximizing the advantages of the large-scale domestic market by introducing more effective industrial policies to bolster novel paradigm shifts; (4) renewing the concept of personal training by cultivating responsible developers with "security-by-design" capabilities; and (5) enhancing the trustworthiness of Chinese digital products through technological innovation, thus facilitating China's Going Global initiative.
cyberspace security / digital ecosystem / endogenous security and safety / cyber resilience
[1] |
Office of Cybersecurity, Energy Security, and Emergency Response. National cyber-informed engineering strategy [R]. Washington DC: The US Department of Energy, 2022.
|
[2] |
European Commission. The European cyber resilience act (CRA) [R]. Brussels: European Commission, 2023.
|
[3] |
中国互联网络信息中心. 第53次中国互联网络发展状况统计报告 [R]. 北京: 中国互联网络信息中心, 2024.
China Internet Network Information Center. The 53rd statistical report on China's Internet development [R]. Beijing: China Internet Network Information Center, 2024.
|
[4] |
洪延青, 朱玲凤, 张朝, 等. 欧盟提出"技术主权" 概念 引领欧盟数字化转型战略 [J]. 中国信息安全, 2020 (3): 70‒74.
Hong Y Q, Zhu L F, Zhang Z, et al. The EU puts forward the concept of "technical sovereignty" to lead the EU's digital transformation strategy [J]. China Information Security, 2020 (3): 70‒74.
|
[5] |
王守都. 拜登政府的网络空间战略体系构建: 发展现状、具体特征及未来趋势 [J]. 情报杂志, 2024, 43(2): 25‒32.
Wang S D. The construction of the Biden administration's cyberspace strategy system: Status quo, features and trends [J]. Journal of Intelligence, 2024, 43(2): 25‒32.
|
[6] |
宫云牧. 网络空间与霸权护持——美国网络安全战略的迭代演进与驱动机制 [J]. 国际展望, 2024, 16(1): 54‒74, 159.
Gong Y M. Cyberspace and hegemony maintenance: The evolution and driving mechanisms of U.S. national cybersecurity strategies [J]. Global Review, 2024, 16(1): 54‒74, 159.
|
[7] |
Krivý M. Digital ecosystem: The journey of a metaphor [J]. Digital Geography and Society, 2023, 5: 100057.
|
[8] |
Acs Z J, Song A K, Szerb L, et al. The evolution of the global digital platform economy: 1971—2021 [J]. Small Business Economics, 2021, 57(4): 1629‒1659.
|
[9] |
Boley H, Chang E. Digital ecosystems: Principles and semantics [R]. Cairns: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, 2007.
|
[10] |
Zeb S, Mahmood A, Ali Hassan S, et al. Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey [J]. Journal of Network and Computer Applications, 2022, 200: 103309.
|
[11] |
Senyo P K, Liu K C, Effah J. Digital business ecosystem: Literature review and a framework for future research [J]. International Journal of Information Management, 2019, 47: 52‒64.
|
[12] |
吴江, 陶成煦. 激活数据要素 赋能千行万业——《"数据要素×"三年行动计划(2024—2026年)》政策解读 [J]. 情报理论与实践, 2024, 47(3): 16‒19.
Wu J, Tao C X. Activating data elements empowers thousands of businesses: Policy interpretation of "the data elements×" Three-Year Action Plan (2024—2026) [J]. Information Studies (Theory & Application), 2024, 47(3): 16‒19.
|
[13] |
余建川. 欧盟网络安全建设的新近发展及对我国的启示——基于《欧盟数字十年网络安全战略》的分析 [J]. 情报杂志, 2022, 41(3): 87‒94.
Yu J C. The recent development and enlightenment of EU cyber security construction—Based on the EU's cybersecurity strategy for the digital decade [J]. Journal of Intelligence, 2022, 41(3): 87‒94.
|
[14] |
The White House. National cybersecurity strategy [R]. Washington DC: The White House, 2023.
|
[15] |
Rahman M A, Hossain M S. A deep learning assisted software defined security architecture for 6G wireless networks: IIoT perspective [J]. IEEE Wireless Communications, 2022, 29(2): 52‒59.
|
[16] |
Steve Morgan. Boardroom cybersecurity report on cybercrime [R]. California: Cybersecurity Ventures, 2023.
|
[17] |
Kuhn T S. The structure of scientific revolutions [M]. Chicago: University of Chicago Press, 1962.
|
[18] |
HackerOne. 2022 Hacker-powered security report [R]. San Francisco: HackerOne, 2022.
|
[19] |
Gianmarco B, Josefa B, et al. Cybersecurity, our digital anchor: A European perspective [M]. Luxembourg: Publications Office of the European Union, 2020.
|
[20] |
Cybersecurity & Infrastructure Security Agency. Cybersecurity strategic plan FY2024—2026 [R]. Washington DC: Cybersecurity & Infrastructure Security Agency, 2023.
|
[21] |
俞能海, 张丽, 邹宏. 风险管理视角下的数据安全与隐私保护 [J]. 中国网信, 2024 (1): 41‒44.
Yu N H, Zhang L, Zou H. Data security and privacy protection from the perspective of risk management [J]. China Internet Information, 2024 (1): 41‒44.
|
[22] |
桂畅旎, 刘星. 2023年国际网络空间形势回顾及发展动向 [J]. 中国信息安全, 2023 (12): 19‒23.
Gui C N, Liu X. Review and development trend of international cyberspace in 2023 [J]. China Information Security, 2023 (12): 19‒23.
|
[23] |
Fischerkeller M P, Goldman E O, Harknett R J. Cyber persistence theory: Redefining national security in cyberspace [M]. Oxford: Oxford University Press, 2022.
|
[24] |
European Commission. NIS 2 directive [R]. Brussels: European Commission, 2022.
|
[25] |
Cyber and Infrastructure Security Centre. Critical infrastructure resilience strategy [R]. Canberra: Department of Home Affairs, Australian Government, 2023.
|
[26] |
The Cyber Security Agency of Singapore. Media fact sheet of cybersecurity labeling scheme [R]. Singapore: Cyber Security Agency of Singapore, 2020.
|
[27] |
National Institute of Standards and Technology. Recommended criteria for cybersecurity labeling for consumer Internet of things (IoT) products [R]. Gaithersburg: National Institute of Standards and Technology, 2022.
|
[28] |
The White House. National cybersecurity strategy implementation plan [R]. Washington DC: The White House, 2023.
|
[29] |
Young S D, Walden K E. Administration cybersecurity priorities for the FY 2025 budget [R]. Washington DC: U.S. Executive Office of the President, 2023.
|
[30] |
Office of The National Cyber Director, Executive Office of The President. National cyber workforce and education strategy: Unleashing America's cyber talent [R]. Washington DC: The White House, 2023.
|
[31] |
Kerman A, Borchert O, Rose S, et al. Zero trust architecture [R]. Gaithersburg: National Institute of Standards and Technology, 2020.
|
[32] |
Vacca J R. Computer and information security handbook [M]. Amsterdam: Elsevier, 2013.
|
[33] |
Alsaqour R, Majrashi A, Alreedi M, et al. Defense in depth: Multilayer of security [J]. International Journal of Communication Networks and Information Security (IJCNIS), 2021, 13(2): 242‒248.
|
[34] |
National Institute of Standards and Technology. The NIST Cybersecurity Framework (CSF) 2.0 [R]. Gaithersburg: National Institute of Standards and Technology, 2024.
|
[35] |
Souppaya M, Scarfone K, Dodson D. Secure software development framework (SSDF) version 1.1: Recommendations for mitigating the risk of software vulnerabilities [R]. Gaithersburg: National Institute of Standards and Technology, 2022.
|
[36] |
Boyens J M, Smith A, Bartol N, et al. Cybersecurity supply chain risk management practices for systems and organizations [R]. Gaithersburg: National Institute of Standards and Technology, 2024.
|
[37] |
Möller D P F. Guide to cybersecurity in digital transformation: Trends, methods, technologies, applications and best practices [M]. Cham: Springer, 2023.
|
[38] |
Bodeau D J, Graubart R D, McQuaid R M, et al. Cyber resiliency metrics, measures of effectiveness, and scoring [R]. Bedford: MITRE, 2018.
|
[39] |
Li Z S, Wu G Y, Cassandro R, et al. A review of resilience metrics and modeling methods for cyber-physical power systems (CPPS) [J]. IEEE Transactions on Reliability, 2024, 73(1): 59‒66.
|
[40] |
邬江兴. 内生安全赋能网络弹性工程 [M]. 北京: 科学出版社, 2023.
Wu J X. Endogenous safety and security (ESS) theory enabled cyber resiliency engineering [M]. Beijing: Science Press, 2023.
|
[41] |
邬江兴, 季新生, 贺磊, 等. 内生安全赋能网络弹性研究 [J]. 信息通信技术, 2023, 17(4): 4‒11.
Wu J X, Ji X S, He L, et al. Research on network elasticity of endogenous security empowerment [J]. Information and Communications Technologies, 2023, 17(4): 4‒11.
|
[42] |
邬江兴, 邹宏, 薛向阳, 等. 内生安全赋能网络弹性的构想、方法与策略 [J]. 中国工程科学, 2023, 25(6): 106‒115.
Wu J X, Zou H, Xue X Y, et al. Cyber resilience enabled by endogenous security and safety: Vision, techniques, and strategies [J]. Strategic Study of CAE, 2023, 25(6): 106‒115.
|
[43] |
邬江兴, 季新生, 贺磊, 等. 从设计安全到内生安全技术白皮书 [R]. 南京: 紫金山实验室, 2023.
Wu J X, Ji X S, He L, et al. Technical white paper: From security by design to endogenous security [R]. Nanjing: Purple Mountain Laboratory, 2023.
|
[44] |
Petrenko S. Cyber resilience [M]. Aalborg: River Publishers, 2019.
|
[45] |
Gunduz M Z, Das R. Cyber-security on smart grid: Threats and potential solutions [J]. Computer Networks, 2020, 169: 107094.
|
[46] |
Spagnuelo D, Bartolini C, Lenzini G. Metrics for transparency [R]. Heraklion: 11th International Workshop, DPM2016 and 5th International Workshop, QASA2016, 2016.
|
[47] |
Ross R, Pillitteri V, Graubart R, et al. Developing cyber-resilient systems: A systems security engineering approach [R]. Gaithersburg: National Institute of Standards and Technology, 2021.
|
/
〈 |
|
〉 |