理论研究

论大数据时代信息安全的新特点与新要求

  • 王世伟
展开
  • 上海社会科学院信息研究所 上海 200235
王世伟(ORCID:0000-0001-9179-9580),研究员,E-mail:swwang@sass.org.cn。

收稿日期: 2015-12-16

  修回日期: 2016-02-01

  网络出版日期: 2016-03-20

基金资助

本文系国家社会科学基金重大项目"大数据与云环境下国家信息安全管理范式及政策路径研究"(项目编号:13&ZD185)研究成果之一。

On the New Characteristics and Requirements of Information Security in the Era of Big Data

  • Wang Shiwei
Expand
  • Institute of Information, Shanghai Academy of Sciences, Shanghai 200235

Received date: 2015-12-16

  Revised date: 2016-02-01

  Online published: 2016-03-20

摘要

[目的/意义] 研究大数据时代信息安全的特点,探讨新环境下信息安全管理范式的转型,对于中国实施网络强国战略、国家大数据战略、国家安全战略以及推动全球信息安全治理体制变革完善,都具有重要的理论意义和实践价值。[方法/过程] 对全球数据驱动的发展趋势进行分析,对大数据时代信息安全的规模、泛在、跨域、综合、隐性等五大特点进行归纳阐述,对基于大数据时代的中国信息安全管理范式转型和全球治理体制变革分别进行多维度的研究论述。[结果/结论] 大数据时代的信息安全正在形成新特点,中国的信息安全管理范式需要创新转型,形成新模式、新路径和新政策;全球的治理体制变革需要用"共"的价值观来推进、尊重并维护信息主权、建立反恐情报共享合作机制。

本文引用格式

王世伟 . 论大数据时代信息安全的新特点与新要求[J]. 图书情报工作, 2016 , 60(6) : 5 -14 . DOI: 10.13266/j.issn.0252-3116.2016.06.001

Abstract

[Purpose/significance] The elaboration in this paper on big data and information security is of important theoretical and pragmatic significance on the implementation of the network power strategy, national data strategy, national security strategy and hence the promotion of the global information security management system as it concerns the characteristics of information security in the era of big data and the evolvement of information security management paradigm in the new environment.[Method/process] This paper provides a multifaceted view on information security management paradigmand the transformation of global governance in the trend of data-driven global development. It summarizes five main characteristics of information security in the era of big data, which is scale, extension, cross discipline, integration and recessiveness.[Result/conclusion] As the information security has entered into the new era of big data and the information security in the era of big data is taking new shape of characteristics, there is a requirement on the innovation of China's information security management paradigm to institute a new model, new development path and new policies; Meanwhile there is a necessity to promote the synergy of global governance system with an intension to respect and safeguard the information sovereignty and to establish cooperation mechanism of anti-terrorism information system.

参考文献

[1] 舍恩伯格,库克耶.大数据时代[G].盛杨燕,周涛,译.杭州:浙江人民出版社,2013:2-23.
[2] Big data research and development initiative[EB/OL].[2015-12-15].http://itlaw.wikia.com/wiki/Big_Data_Research_and_Development_Initiative.
[3] 国务院关于印发促进大数据发展行动纲要的通知[EB/OL].[2015-09-07].http://www.cac.gov.cn/2015-09/05/c_1116464398.htm.
[4] 苗圩.大数据:变革世界的关键资源[N].人民日报,2015-10-13(7).
[5] 王世伟.大数据时代信息安全的新挑战[N].社会科学报,2013-09-04(1).
[6] 习近平.把我国从网络大国建设成为网络强国[EB/OL].[2014-02-27].http://news.xinhuanet.com/2014-02/27/e-119538788.htm.
[7] HU Y. A risk society[OL].[2015-09-05].http://xueshu.baidu.com/s?wd=paperuri:(d92893bf32920ad6591737bab18ef65d)&filter=sc_long_sign&sc_ks_para=q%3DA+Risk+Society&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8.
[8] 21.5 million social security numbers stolen, U.S. Office of Personnel Management says[EB/OL].[2015-12-15].http://www.opposingviews.com/i/society/215-million-social-security-numbers-stolen-us-office-personnel-management-says.
[9] 刘军国.日本政府养老金机构用户信息泄露[N].人民日报,2015-06-02(22).
[10] ARDEN D.Report:hackers could use plane Wifi to hijack controls[EB/OL].[2015-12-15].http://www.newser.com/story/205483/report-hackers-could-use-plane-wifi-to-hijack-controls.html.
[11] 新华社.坚持总体国家安全观走中国特色国家安全道路[N].光明日报,2014-04-16(1).
[12] 部门联手网上拔毒瘤利用互联网传播制毒技术、销售毒品和制毒物品、聚众吸毒等违法犯罪活动猖獗[N].人民日报,2015-05-20(11).
[13] 互联网新闻研究中心.美国全球监听行动纪录[N].人民日报,2014-05-27(22).
[14] 王世伟.打造智慧安全的大城市[J].中国建设信息,2015(08上半期):16-19.
[15] 寇江泽.国家预警信息发布中心运行[N].人民日报,2015-05-19(2).
[16] KEITH WAGSTAFF.Could the CIA have prevented the Boston Marathon bombings?[EB/OL].[2015-12-15].http://theweek.com/articles/465072/could-cia-have-prevented-boston-marathon-bombings.
[17] 黄长著.大数据时代需注重数据管控[N].人民日报,2015-10-21(7).
[18] DARRELL H. Hou to lie with statistics[EB/OL].[2015-12-15].http://www.amazon.com/How-Lie-Statistics-Darrell-Huff/dp/0393310728/#reader_0393310728.
[19] 郝日虹.大数据为治理模式转型提供支撑[EB/OL].[2015-07-13].http://www.cssn.cn/zx/201507/t20150713_2074811.shtml.
[20] 十八届四中全会公报全文[EB/OL].[2014-10-23].http://www.kankanews.com/a/2014-10-23/0045657111.shtml.
[21] 国务院关于印发促进大数据发展行动纲要的通知[EB/OL].[2015-12-13]. http://www.forestry.gov.cn/sbj/4610/content-816959.html.
[22] Secretary-General's remarks to the Intergovernmental Negotiations on the Post-2015 Development Agenda (UN-United Nations)[EB/OL].[2015-01-20].http://www.press-report.net/clanek-38154867-secretary-generals-remarks-to-the-intergovernmental-negotiations-on-the-post-2015-development-agenda-un-united-nations.
[23] 柴逸扉,谭思,宇康晰,等.国人科学素质如何来衡量?——中国公民科学素质调查综述[N].人民日报(海外版),2015-10-09(7).
[24] 张朋辉."构建中美新型大国关系具有重大意义"——访哈佛大学教授约瑟夫·奈[N].人民日报,2015-09-17(3).
[25] 李木子,柳玉鹏.20国就网络空间准则达成一致[N].环球时报,2015-08-18(3).
[26] FRANKLIN K.Cyberpower and national security (National Defense University)[EB/OL].[2015-12-15].http://www.amazon.com/Cyberpower-National-Security-Defense-University/product-reviews/1597974234.
[27] 西格尔.美国报复"中国网袭"难度大[OL].[2015-08-05].http://www.guancha.cn/AdamSegal/2015_08_05_329400.shtml.
[28] 对抗恐怖主义或成中美网络合作突破口[EB/OL].[2015-11-28].http://www.cac.gov.cn/2015-11/23/c_1117222827.htm.
[29] 杨洁篪.积极承担国际责任和义务[N].人民日报,2015-11-23(6).
[30] 反恐执行局:各国应使用旅客信息预报系统以有效防止外国恐怖战斗人员旅行[EB/OL].[2015-06-13].http://www.un.org/chinese/News/story.asp?NewsID=24197.
[31] 首次中美打击网络犯罪及相关事项高级别联合对话成果声明[N].人民日报,2015-12-04(6).
[32] 中国对非洲政策文件(二○一五年十二月)[EB/OL].[2015-12-05].http://news.xinhuanet.com/2015-12/05/c_1117363276.htm.

文章导航

/