专题:数据主权安全治理

数据主权安全能力成熟度评估应用研究*——以DSSCMM模型应用于中国的评估为例

  • 文禹衡 戴文怡
展开
  • 1.湘潭大学知识产权学院
文禹衡(1989-),男,湘潭大学知识产权学院讲师,研究方向:数据主权、数据产权与数据权力;戴文怡(1994-),女,湘潭大学知识产权学院硕士研究生,研究方向:数据主权。

收稿日期: 2020-07-30

  网络出版日期: 2022-05-18

基金资助

*本文系2021年国家社会科学基金青年项目“数据要素确权的法律供给研究”(项目编号:21CFX007)与深圳市科学技术创新委员会深圳市科技计划项目“面向网络主权的政务大数据语义关联、全局融合与深度学习关键技术研究”(项目编号:JCYJ20180302173459920)研究成果之一。

Research on the Maturity Evaluation of Data Sovereignty Security Capability in China Based on DSSCMM——Discussion on the Evaluation Process and Method of DSSCMM

  • Wen Yuheng Dai Wenyi
Expand

Received date: 2020-07-30

  Online published: 2022-05-18

摘要

文章基于DSSCMM提出数据主权安全能力成熟度的评估方法和过程,评估后针对我国数据主权安全能力成熟度薄弱环节提出改进建议。构建并运用边际取样法确定有效样本,运用专家调查法确定关键过程域的能力维度权重,构建并运用样本赋分法计算能力维度分,进而确定关键过程域分和数据主权安全能力分。数据本地存储、数据跨境流动、数据域外管辖的能力成熟度都达到充分级,但数据域外管辖的能力成熟度实际上靠近必要级,我国数据主权安全能力成熟度达到充分级。进一步提升我国数据主权安全能力成熟度,宜从数据域外管辖的“文化教育”和数据本地存储、数据跨境流动的“技术工具”展开,尤其要重视在域外司法活动之中及时运用《数据安全法》的长臂管辖,以及引导和推广在国内网络生态系统中应用自主技术产品。

本文引用格式

文禹衡 戴文怡 . 数据主权安全能力成熟度评估应用研究*——以DSSCMM模型应用于中国的评估为例[J]. 图书与情报, 2021 , 41(04) : 39 -51 . DOI: 10.11968/tsyqb.1003-6938.2021055

Abstract

Based on DSSCMM, this paper puts forward the method and process of evaluating the maturity of data sovereignty security capability , and puts forward some suggestions to improve the weakness of our country's data sovereignty security capability.Construct and use marginal sampling method to determine effective samples, apply expert investigation method to determine the weight of capability dimension, and use sample scoring method to calculate the scores of capability dimensions, then determine the key process area score and data sovereignty security capability score.The capacity maturity of data localization, cross-border data flow and data extraterritorial jurisdiction has reached a higher level, but the capacity maturity of data extraterritorial jurisdiction actually tends to be necessary level, and the data sovereignty security capacity maturity of our country has reached a sufficient level.In order to improve the maturity of our country's data sovereignty security capability, it is suggested that we should start from "culture and education" and "technical tools" of data local storage and data cross-border flow.Particular attention shall be paid to the timely application of the long-arm jurisdiction of the Data Security Law in extraterritorial judicial activities, and guide and promote the application of independent technology products in the domestic network ecosystem.
文章导航

/