文章摘要
何明祥,杨旭,李冠.大合规背景下我国网络空间安全政策文本研究[J].情报工程,2022,8(3):052-067
大合规背景下我国网络空间安全政策文本研究
Research on the Text of China’s Cyberspace Security Policy in the Context of Big Compliance
  
DOI:10.3772/j.issn.2095-915X.2022.03.004
中文关键词: 网络空间安全政策;安全合规;政策文本量化分析;三维分析框架;政策工具
英文关键词: Cyberspace security policy; safety compliance; quantitative analysis of policy text; 3D analysis framework; policy tools
基金项目:2020 年度青岛市社会科学规划研究项目(DQSKL200143, DQSKL200142)。
作者单位
何明祥 山东科技大学 计算机科学与工程学院 青岛 266590 
杨旭 山东科技大学 计算机科学与工程学院 青岛 266590 
李冠 山东科技大学 计算机科学与工程学院 青岛 266590 
摘要点击次数: 820
全文下载次数: 585
中文摘要:
      [ 目的/ 意义] 我国网络空间安全战略的部署和实施推动了网络安全合规,本文结合大合规背景,对我国网络空间安全政策文本进行量化研究,为我国政府相关政策的制定、调整与完善提供建议与参考。[ 方法/ 过程] 本文收集并选取1994-2021 年的网络空间安全政策数据集,提出和构建基于政策工具、网络体系和时间三维分析框架,采用自下而上的编码方法进行政策工具编码,通过编码映射将政策工具编码结果与三维框架相关联,结合网络安全合规背景进行多维量化分析。[ 结果/ 结论] 分析结果表明,我国网络空间安全政策存在政策工具使用结构不合理、各类工具箱内部使用比例不平衡和网络体系聚焦失衡等问题,建议优化政策工具使用结构,注重工具箱内部的使用平衡,增加网络体系要素的组合运用。
英文摘要:
      [Objective/Significance] The deployment and implementation of China’s cyberspace security strategy has promoted cybersecurity compliance. In combination with the background of big compliance, this paper conducts a quantitative study on the text of China’s cyberspace security policy, providing suggestions and references for the formulation, adjustment and improvement of relevant policies by the Chinese government. [Method/Process] In this paper, collect and select the cyber security policy from 1994 to 2021 data sets, and put forward based on the policy tools, the network system and time 3 d analysis framework, bottomup coding method is adopted to improve the policy instrument encoding, through code mapping policy tools coding result is associated with the three-dimensional framework, combined with background of network security compliance multidimensional quantitative analysis. [Result/Conclusion] The results show that there are some problems in China’s cyberspace security policy,such as unreasonable use structure of policy tools, unbalanced internal use ratio of various types of toolbox and unbalanced focus of network system. It is suggested to optimize the use structure of policy tools, pay attention to the balance of internal use of toolbox, and increase the combined use of network system elements.
查看全文   查看/发表评论  下载PDF阅读器
关闭

分享按钮