Abstract:Assessing the development trend of data security in China is essential for promoting high-quality digital economy growth.Using panel data from 30 provinces and municipalities between 2014 and 2023,we created a comprehensive evaluation index system for data security.The entropy weight TOPSIS method measured trends at national,provincial,municipal,and regional levels.We analyzed spatial differences and dynamic evolution using the Dagum Gini coefficient,Moran's I,kernel density estimation method,and Markov chain analysis.An agile response mechanism was proposed.The results indicate that China's overall data security shows a consistent upward trend with a distribution pattern of “east > central > west”.Significant regional variations exist.The eastern region exhibits greater disparities than the western region,which are the main source of spatial differences.Data security development demonstrates notable positive spatial agglomeration characteristics and strong stability.At both national levels and within eastern and western regions,there is multi-polarization in development trends.However,polarization in the central region is less pronounced but gradually decreases over time.Overall,the outlook for data security development is promising with strong stability and evidence of club convergence.Nonetheless,cross-type transfer probabilities remain low while high-level provinces exert significant radiation effects.
[1]蔡莉妍.数字经济时代数据安全风险防范体系之构建与优化[J].大连理工大学学报 (社会科学版),2024,45 (3):107-114. [2]李华晨.企业数据安全管理:实现路径、构成要素和基本要求[J].中国科技论坛,2024 (12):146-154. [3]WANG Z,WANG N,SU X,et al.An empirical study on business analytics affordances enhancing the management of cloud computing data security[J].International Journal of Information Management,2020,50:387-394. [4]聂辉华,王一兆,李靖.数据安全、组织边界与自主创新战略[J].社会科学,2022 (12):109-118. [5]赵梓羽.生成式人工智能数据安全风险及其应对[J].情报资料工作,2024,45 (2):30-37. [6]郑荣,高志豪,王晓宇,等.复杂信息环境下的产业数据安全治理:概念界定、治理体系与场景实践[J].情报资料工作,2024,45 (2):86-96. [7]胡剑,戚湧.基于区块链跨链机制的政务数据安全治理体系研究[J].现代情报,2023,43 (9):85-97,164. [8]王龙.政府数据安全风险治理的机理逻辑与优化策略[J/OL].科学学研究,1-13 (2024-07-09)[2025-02-23].https://doi.org/10.16192/j.cnki.1003-2053.20240705.001. [9]LI Y,YANG R,LU Y K.A privacy risk identification framework of open government data:A mixed-method study in China[J].Government Information Quarterly,2024,41 (1):101916. [10]吴志祥,周星宇,朱晓峰.国家数据安全的风险预警情报体系研究:认知、框架与实施[J/OL].情报理论与实践,1-11 (2024-12-18)[2025-02-23].http://kns.cnki.net/kcms/detail/11.1762.g3.20241217.1728.006.html. [11]CHEN B,LIU Y J.Promotion and advancement of data security governance in China[J].Electronics,2024,13 (10):1905. [12]陈珍妮.数据跨境的自由流动与安全保护[J/OL].科学学研究,1-7 (2025-01-14)[2025-02-23].https://doi.org/10.16192/j.cnki.1003-2053.20250114.002. [13]刘昭阁,张瑞金,李向阳,等.基于案例源证据推理法的城市安全大数据治理能力成熟度评价[J].系统管理学报,2023,32 (6):1243-1254. [14]金波,杨鹏.大数据时代档案数据安全治理能力成熟度模型构建[J].档案学通讯,2022 (1):29-36. [15]黄海瑛,文禹衡.数据主权安全能力的成熟度模型构建研究[J].图书与情报,2021 (4):29-38. [16]ZHANG Y Y,ZHANG C,XU Y J.Effect of data privacy and security investment on the value of big data firms[J].Decision Support Systems,2021,146:113543. [17]张齐林,孙伟增.中国城市数字政府发展水平测度、时空演变趋势及影响因素:基于地方政府网站工作年度报表大数据的分析[J].地理研究,2024,43 (11):2847-2869. [18]鲍坤.数据平台下个人数据保护规则形态的优化:从软法对硬法的嵌入谈起[J].中国科技论坛,2022 (3):156-165,175. [19]张茂月.大数据时代个人信息数据安全的新威胁及其保护[J].中国科技论坛,2015 (7):117-122. [20]郑曦,杨宇轩.司法领域关键信息基础设施安全保护问题研究[J].学习与探索,2024 (7):76-86. [21]唐长乐,张晓娟.建立数字信任:数据要素可信流通的信任基础、内在逻辑与实现框架[J/OL].图书馆论坛,1-11 (2024-12-12)[2025-07-01].http://kns.cnki.net/kcms/detail/44.1306.G2.20241212.1400.002.html. [22]龚强,班铭媛,刘冲.数据交易之悖论与突破:不完全契约视角[J].经济研究,2022,57 (7):172-188. [23]孟庆国,王友奎,王理达.公共数据开放利用与授权运营:内涵、模式与机制方法[J].中国行政管理,2024,40 (9):43-53,159. [24]于改之.从控制到利用:刑法数据治理的模式转换[J].中国社会科学,2022 (7):56-74,205. [25]李海舰,赵丽.数据价值理论研究[J].财贸经济,2023,44 (6):5-20. [26]欧阳日辉.数据基础设施保障数据安全及高效流通[J].人民论坛,2024 (7):70-75. [27]于文轩.ChatGPT与敏捷治理[J].学海,2023 (2):52-57.