On the New Characteristics and Requirements of Information Security in the Era of Big Data

  • Wang Shiwei
Expand
  • Institute of Information, Shanghai Academy of Sciences, Shanghai 200235

Received date: 2015-12-16

  Revised date: 2016-02-01

  Online published: 2016-03-20

Abstract

[Purpose/significance] The elaboration in this paper on big data and information security is of important theoretical and pragmatic significance on the implementation of the network power strategy, national data strategy, national security strategy and hence the promotion of the global information security management system as it concerns the characteristics of information security in the era of big data and the evolvement of information security management paradigm in the new environment.[Method/process] This paper provides a multifaceted view on information security management paradigmand the transformation of global governance in the trend of data-driven global development. It summarizes five main characteristics of information security in the era of big data, which is scale, extension, cross discipline, integration and recessiveness.[Result/conclusion] As the information security has entered into the new era of big data and the information security in the era of big data is taking new shape of characteristics, there is a requirement on the innovation of China's information security management paradigm to institute a new model, new development path and new policies; Meanwhile there is a necessity to promote the synergy of global governance system with an intension to respect and safeguard the information sovereignty and to establish cooperation mechanism of anti-terrorism information system.

Cite this article

Wang Shiwei . On the New Characteristics and Requirements of Information Security in the Era of Big Data[J]. Library and Information Service, 2016 , 60(6) : 5 -14 . DOI: 10.13266/j.issn.0252-3116.2016.06.001

References

[1] 舍恩伯格,库克耶.大数据时代[G].盛杨燕,周涛,译.杭州:浙江人民出版社,2013:2-23.
[2] Big data research and development initiative[EB/OL].[2015-12-15].http://itlaw.wikia.com/wiki/Big_Data_Research_and_Development_Initiative.
[3] 国务院关于印发促进大数据发展行动纲要的通知[EB/OL].[2015-09-07].http://www.cac.gov.cn/2015-09/05/c_1116464398.htm.
[4] 苗圩.大数据:变革世界的关键资源[N].人民日报,2015-10-13(7).
[5] 王世伟.大数据时代信息安全的新挑战[N].社会科学报,2013-09-04(1).
[6] 习近平.把我国从网络大国建设成为网络强国[EB/OL].[2014-02-27].http://news.xinhuanet.com/2014-02/27/e-119538788.htm.
[7] HU Y. A risk society[OL].[2015-09-05].http://xueshu.baidu.com/s?wd=paperuri:(d92893bf32920ad6591737bab18ef65d)&filter=sc_long_sign&sc_ks_para=q%3DA+Risk+Society&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8.
[8] 21.5 million social security numbers stolen, U.S. Office of Personnel Management says[EB/OL].[2015-12-15].http://www.opposingviews.com/i/society/215-million-social-security-numbers-stolen-us-office-personnel-management-says.
[9] 刘军国.日本政府养老金机构用户信息泄露[N].人民日报,2015-06-02(22).
[10] ARDEN D.Report:hackers could use plane Wifi to hijack controls[EB/OL].[2015-12-15].http://www.newser.com/story/205483/report-hackers-could-use-plane-wifi-to-hijack-controls.html.
[11] 新华社.坚持总体国家安全观走中国特色国家安全道路[N].光明日报,2014-04-16(1).
[12] 部门联手网上拔毒瘤利用互联网传播制毒技术、销售毒品和制毒物品、聚众吸毒等违法犯罪活动猖獗[N].人民日报,2015-05-20(11).
[13] 互联网新闻研究中心.美国全球监听行动纪录[N].人民日报,2014-05-27(22).
[14] 王世伟.打造智慧安全的大城市[J].中国建设信息,2015(08上半期):16-19.
[15] 寇江泽.国家预警信息发布中心运行[N].人民日报,2015-05-19(2).
[16] KEITH WAGSTAFF.Could the CIA have prevented the Boston Marathon bombings?[EB/OL].[2015-12-15].http://theweek.com/articles/465072/could-cia-have-prevented-boston-marathon-bombings.
[17] 黄长著.大数据时代需注重数据管控[N].人民日报,2015-10-21(7).
[18] DARRELL H. Hou to lie with statistics[EB/OL].[2015-12-15].http://www.amazon.com/How-Lie-Statistics-Darrell-Huff/dp/0393310728/#reader_0393310728.
[19] 郝日虹.大数据为治理模式转型提供支撑[EB/OL].[2015-07-13].http://www.cssn.cn/zx/201507/t20150713_2074811.shtml.
[20] 十八届四中全会公报全文[EB/OL].[2014-10-23].http://www.kankanews.com/a/2014-10-23/0045657111.shtml.
[21] 国务院关于印发促进大数据发展行动纲要的通知[EB/OL].[2015-12-13]. http://www.forestry.gov.cn/sbj/4610/content-816959.html.
[22] Secretary-General's remarks to the Intergovernmental Negotiations on the Post-2015 Development Agenda (UN-United Nations)[EB/OL].[2015-01-20].http://www.press-report.net/clanek-38154867-secretary-generals-remarks-to-the-intergovernmental-negotiations-on-the-post-2015-development-agenda-un-united-nations.
[23] 柴逸扉,谭思,宇康晰,等.国人科学素质如何来衡量?——中国公民科学素质调查综述[N].人民日报(海外版),2015-10-09(7).
[24] 张朋辉."构建中美新型大国关系具有重大意义"——访哈佛大学教授约瑟夫·奈[N].人民日报,2015-09-17(3).
[25] 李木子,柳玉鹏.20国就网络空间准则达成一致[N].环球时报,2015-08-18(3).
[26] FRANKLIN K.Cyberpower and national security (National Defense University)[EB/OL].[2015-12-15].http://www.amazon.com/Cyberpower-National-Security-Defense-University/product-reviews/1597974234.
[27] 西格尔.美国报复"中国网袭"难度大[OL].[2015-08-05].http://www.guancha.cn/AdamSegal/2015_08_05_329400.shtml.
[28] 对抗恐怖主义或成中美网络合作突破口[EB/OL].[2015-11-28].http://www.cac.gov.cn/2015-11/23/c_1117222827.htm.
[29] 杨洁篪.积极承担国际责任和义务[N].人民日报,2015-11-23(6).
[30] 反恐执行局:各国应使用旅客信息预报系统以有效防止外国恐怖战斗人员旅行[EB/OL].[2015-06-13].http://www.un.org/chinese/News/story.asp?NewsID=24197.
[31] 首次中美打击网络犯罪及相关事项高级别联合对话成果声明[N].人民日报,2015-12-04(6).
[32] 中国对非洲政策文件(二○一五年十二月)[EB/OL].[2015-12-05].http://news.xinhuanet.com/2015-12/05/c_1117363276.htm.

Outlines

/