您当前的位置:首页 > 论文详情

总体国家安全观下大数据安全能力组态路径研究:基于PLS-SEM与QCA方法

请选择邀稿期刊:

摘要: 【目的/意义】总体国家安全观迫切需要提升大数据安全能力,揭示大数据安全能力多重影响因素耦合下的多元路径,不仅有助于促进地区数据资源合理利用与管理,提升大数据协同安全能力,而且有助于构建国家安全保障体系。【方法/过程】基于改进的TOE理论框架从技术层面、组织能力、环境要素、数据要素四方面构建大数据安全影响因素框架,以31个省(市、自治区)为研究对象,利用结构方程模型(PLS-SEM)和定性比较(QCA)相结合的方法,探寻各因素间的关系以及组态视角下的我国大数据安全能力路径。【结果/结论】技术层面、组织能力、环境要素、数据要素关系越紧密,大数据安全能力水平越高;信息基础设施、创新能力、组织治理与安全、经济水平、受教育程度、数据资源建设和数据要素流通均无法单独成为实现大数据安全能力的必要条件,需要各个条件之间相互组合联动匹配;高大数据安全能力组态路径包括组织—数据均衡型、数据治理—要素流通型、数据资源建设主导型、数据要素流通主导型,非高大数据安全能力组态路径包括技术—环境—数据综合缺失型、数据—基础缺失型、技术—资源缺失型、技术缺失型;我国应该遵循总体国家安全观指导思想,从各地方的优势出发,结合各地区的组态视角,选择适合各地区大数据安全能力发展的路径。

Abstract: [Purpose/Significance] The overall national security concept urgently needs to enhance big data security capabilities, revealing the multiple paths under the coupling of multiple influencing factors of big data security capabilities. This not only helps to promote the rational utilization and management of regional data resources, enhance regional big data collaborative security capabilities, but also helps to build a national security guarantee system. [Method/Process]Based on an improved TOE theoretical framework, a framework for influencing factors of big data security was constructed from four aspects: technical level, organizational capability, environmental factors, and data elements. 31 provinces (cities, autonomous regions) were selected as research objects, and a combination of Structural Equation Modeling (PLS-SEM) and Qualitative Comparison (QCA) was used to explore the relationships between various factors and the path of China’s big data security capability from a configuration perspective. [Result/Conclusion]The closer the relationship between technical level, organizational ability, environmental factors, and data elements, the higher the level of big data security capability; Information infrastructure, innovation capability, organizational governance and security, economic level, education level, data resource construction, and data element circulation cannot be the necessary conditions for achieving big data security capabilities alone, and they need to be combined and matched with each other; The configuration paths for high-level data security capabilities include organization data balance type, data governance element circulation type, data resource construction dominant type, and data element circulation dominant type. The configuration paths for non high-level data security capabilities include technology environment data comprehensive deficiency type, data foundation deficiency type, technology resource deficiency type, and technology deficiency type; China should follow the guiding ideology of the overall national security concept, start from the advantages of each region, combine the configuration perspective of each region, and choose a path suitable for the development of big data security capabilities in each region.

版本历史

[V1] 2024-08-13 22:27:35 PSSXiv:202408.01046V1 下载全文
点击下载全文
在线阅读
许可声明
metrics指标
  •  点击量683
  •  下载量190
  • 评论量 0
评论
分享
邀请专家评阅
收藏