SERVICE RESEARCH

Analysis Framework and Configuration Analysis for Public Data Security Management Performance

  • Zou Chunlong ,
  • Ma Haiqun ,
  • Wang Jin
Expand
  • 1 Research Center of Information Resources Management, Heilongjiang University, Harbin 150080;
    2 School of Economics and Management, Harbin University of Science and Technology, Harbin 150080

Received date: 2022-12-14

  Revised date: 2023-04-09

  Online published: 2023-07-11

Abstract

[Purpose/Significance] The Report of the Twentieth Congress points out that national security is the foundation of national rejuvenation, and social stability is the premise of national prosperity. As a key construction area of national security, speeding up the research on public data security and strengthening public data security management have become important topics in the digital economy era. [Method/Process] On the basis of clarifying the concept and connotation of public data, combined with the TOE theoretical framework, this study constructed a public data security management performance analysis framework that included technology, organization and environment. Then the condition configuration analysis of public data security management in 24 provinces and municipalities directly under the Central Government was conducted based on the QCA method to explore the linkage effect of multiple factors on public data security management performance. [Result/Conclusion] The research shows that the public data security management performance is the result of a combination of multiple factors. On this basis, three modes of public data security management are generalized, namely centralized, reactive and technology oriented. This study is helpful to understand the resource value advantage and security guarantee significance of public data in the digital era, and provides reference for the improvement of public data security management performance level.

Cite this article

Zou Chunlong , Ma Haiqun , Wang Jin . Analysis Framework and Configuration Analysis for Public Data Security Management Performance[J]. Library and Information Service, 2023 , 67(13) : 70 -77 . DOI: 10.13266/j.issn.0252-3116.2023.13.008

References

[1] SAFAROV I. Institutional dimensions of open government data implementation: evidence from the Netherlands, Sweden, and the UK[J]. Public performance & management review, 2020, 43(6): 1359-1389.
[2] 罗娇, 刘细文. 知识产权视角下科学数据安全管理的策略选择 [J]. 图书情报工作, 2021, 65(12): 38-46.
[3] 范玉吉, 张潇. 数据安全治理的模式变迁、选择与进路[J]. 电子政务, 2022(4): 114-124.
[4] 林伟. 人工智能数据安全风险及应对[J]. 情报杂志, 2022, 41(10): 105-111, 88.
[5] PARK S. Why information security law has been ineffective in addressing security vulnerabilities: evidence from California data breach notifications and relevant court and government records[J]. International review of law and economics, 2019, 58: 132-145.
[6] SHAO D S, SAXENA S. Barriers to open government data (OGD) initiative in Tanzania: stakeholders’ perspectives[J]. Growth and change, 2019, 50(1): 470-485.
[7] 李洪晨, 马捷, 胡漠. 面向健康医疗大数据安全保护的医疗区块链模型构建[J]. 图书情报工作, 2021, 65(2): 37-44.
[8] 冉连, 张曦. 省级政府数据开放中数据安全管理绩效的影响因素—— 基于20个省级政府样本的定性比较分析[J]. 情报科学, 2022, 40(6): 59-65, 81.
[9] 胡峰. 基于压电式理论的政府数据安全治理体系构建及实现路径研究[J]. 电子政务, 2021(11): 103-116.
[10] 郑大庆, 黄丽华, 郭梦珂, 等. 公共数据资源治理体系的演化模型:基于整体性治理的建构[J]. 电子政务, 2022(5): 79-92.
[11] 齐英程. 作为公物的公共数据资源之使用规则构建[J]. 行政法学研究, 2021(5): 138-147.
[12] 郑春燕, 唐俊麒. 论公共数据的规范含义[J]. 法治研究, 2021(6): 67-79.
[13] 赵加兵. 公共数据归属政府的合理性及法律意义[J]. 河南财经政法大学学报, 2021, 36(1): 13-22.
[14] 王本刚, 马海群. 公共数据的公共价值研究—— 以国内外相关政策和报告为核心的解读[J]. 情报理论与实践, 2022, 45(10): 1-10.
[15] TORNATZKY L G, FLEISCHER M. The processes of technological innovation[M]. Lexington: Lexington Books, 1990.
[16] 邱泽奇. 技术与组织: 多学科研究格局与社会学关注[J]. 社会学研究, 2017, 32(4): 167-192, 245-246.
[17] 丁依霞, 徐倪妮, 郭俊华. 基于TOE框架的政府电子服务能力影响因素实证研究[J]. 电子政务, 2020(1): 103-113.
[18] 谭海波, 范梓腾, 杜运周. 技术管理能力、注意力分配与地方政府网站建设—— 一项基于TOE框架的组态分析[J]. 管理世界, 2019, 35(9): 81-94.
[19] 邱泽奇. 技术与组织的互构—— 以信息技术在制造企业的应用为例[J]. 社会学研究, 2005(2): 32-54, 243.
[20] 陶克涛, 张术丹, 赵云辉. 什么决定了政府公共卫生治理绩效? —— 基于QCA方法的联动效应研究[J]. 管理世界, 2021, 37(5): 128-138, 156, 10.
[21] AWA H O, OJIABO O U. A model of adoption determinants of ERP within TOE framework[J]. Information technology & people, 2016, 29(4): 901-930.
[22] ZHANG N, ZHAO X, ZHANG Z, et al. What factors drive open innovation in China’s public sector? a case study of official document exchange via microblogging( ODEM) in Haining[J]. Government information quarterly, 2017, 34(1): 126-133.
[23] 刘淑妍, 王湖葩. TOE框架下地方政府数据开放制度绩效评价与路径生成研究—— 基于20省数据的模糊集定性比较分析 [J]. 中国行政管理, 2021(9): 34-41.
[24] 王宛秋, 王雪晴, 刘晓燕, 等. 基于TOE框架的企业跨界技术并购绩效的提升策略研究—— 一项模糊集的定性比较分析 [J]. 南开管理评论, 2022, 25(2): 136-148.
[25] 丁伟峰. 政务数据安全风险与法律规制[J]. 人民论坛· 学术前沿, 2022(9): 106-108.
[26] 高一乘, 杨东. 应对元宇宙挑战:数据安全综合治理三维结构范式[J]. 行政管理改革, 2022(3): 41-50.
[27] 郭春镇, 张慧. 我国网络安全法治中的国家能力研究[J]. 江海学刊, 2021(1): 163-170, 255.
[28] 陆莉, 邵瑞华. 公共安全数据治理体系:交叉学科视角下的要素范畴与逻辑框架解析[J]. 情报资料工作, 2022, 43(1): 32-40.
[29] 杨勇. 数字技术影响产业链内部创新分工的机制研究[J/ OL]. 科学学研究:1-14[2023-06-02]. https://doi.org/10.16192/j.cnki.1003-2053.20220614.002.
[30] 王静. 新发展格局下中国产业链供应链安全稳定战略的逻辑转换[J]. 经济学家, 2021(11): 72-81.
[31] 李国新. 推动普惠性非基本公共文化服务发展[J]. 图书情报知识, 2022, 39(5): 6-11.
[32] 邹纯龙, 马海群, 王今. 基于国家竞争优势理论的美国科技情报工作制度变革动因研究[J]. 情报理论与实践, 2021, 44(5): 15-21.
[33] 邹纯龙, 马海群, 王今. 美国国家情报评估的影响因素与模式概化研究[J]. 图书情报工作, 2022, 66(2): 13-21.
[34] RAGIN C C, FISS P C. Net effects analysis versus configurational analysis: an empirical demonstration[M]. Chicago: University of Chicago Press, 2008.
[35] DB11/T 1918-2021政务数据分级与安全保护规范引用[S]. 北京 : 北京市市场监督管理局, 2021.
Outlines

/