Bulletin of Chinese Academy of Sciences (Chinese Version)
Keywords
cyber space governance; identity management; algorithm management; cyber security chip
Document Type
Consultation of Academic Divisions and Suggestion of Academicians: Digital Technology Enabling National Governance Modernization
Abstract
The rapid development of information technology has unprecedentedly created a prosperous cyber society and greatly enhanced productivity facilitated by social interaction. At the same time, many problems emerge in the cyber society, such as telecom fraud, privacy leakage, Internet pollution, and algorithmic discrimination. The problems bring new challenges to social order and security. In order to find the way of cyber society governance and promote the modernization of national governance, this paper first presents the analyses on the new problems encountered in the cyber society in three typical scenarios, i.e., identity governance, behavior governance, and algorithm governance, as well as their risk to the economy, society and security. Furthermore, this paper lists the key challenges for the problem governance, and presents technical countermeasures for modern governance of cyber society from three levels of chip, system, and algorithm.
First page
1686
Last Page
1694
Language
Chinese
Publisher
Bulletin of Chinese Academy of Sciences
References
1 房梁, 殷丽华, 郭云川, 等. 基于属性的访问控制关键技术研究综述. 计算机学报, 2017, 40(7):1680-1698. Fang L, Yin L H, Guo Y C, et al. A survey of key technologies in attribute-based access control scheme. Chinese Journal of Computers, 2017, 40(7):1680-1698. (in Chinese)
2 冯登国, 陈伟东. 基于口令的安全协议的模块化设计与分析. 中国科学(E辑:信息科学), 2007, 37(2):223-237. Feng D G, Chen W D. Modular design and analysis of secure protocol based on passwords. Science in China (Series E:Information Sciences), 2007, 37(2):223-237. (in Chinese)
3 Florencio D, Herley C. A large-scale study of web password habits//WWW'07:Proceedings of the 16th International Conference on World Wide Web. New York:Association for Computing Machinery, 2007:657-666.
4 Tang S Y, Shu X M, Shen S F, et al. Study of personnel positioning in large area based on pseudo base station. Procedia Engineering, 2014, 71:481-485.
5 Chen M Y, Lu J D, Wang Y, et al. DAIR:A query-efficient decision-based attack on image retrieval systems//SIGIR'21:Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval. New York:Association for Computing Machinery, 2021:1064-1073.
6 中国互联网络信息中心. 第50次中国互联网络发展状况统计报告. (2022-08-31). http://cnnic.cn/n4/2022/0916/c38-10594.html. China Internet Network Information Center. The 50th statistical report on China's internet development. (2022-08-31). http://cnnic.cn/n4/2022/0916/c38-10594.html. (in Chinese)
7 中国司法大数据服务网. 司法大数据专题报告之涉信息网络犯罪特点和趋势(2017.1-2021.12). (2022-08-01). http://data.court.gov.cn/pages/reportshow.html?filename=司法大数据专题报告之涉信息网络犯罪特点和趋势.pdf. China Justice Big Data Service Platform. Judicial big data on features and trends of Internet criminals (2017.1-2021.12). (2022-08-01). http://data.court.gov.cn/pages/reportshow.html?filename=司法大数据专题报告之涉信息网络犯罪特点和趋势.pdf. (in Chinese)
8 Lambrecht A, Tucker C. Algorithmic bias? An empirical study of apparent gender-based discrimination in the display of STEM career ads. Management Science, 2019, 65(7):2966-2981.
9 Kurakin A, Goodfellow I J, Bengio S. Adversarial examples in the physical world//Kurakin A, Goodfellow I J, Bengio S. Artificial Intelligence Safety and Security, 2018:99-112.
10 Liu A S, Liu X L, Fan J X, et al. Perceptual-sensitive GAN for generating adversarial patches//Proceedings of the AAAI Conference on Artificial Intelligence. Palo Alto:AAAI Press, 2019:1028-1035.
11 王平辉, 杨晨, 管晓宏. 一种用于网络安全芯片的内外网访问控制方法与该网络安全芯片:中国, CN202011616459. 2022-03-20. Wang P H, Yang C, Guan X H. Network secure chip based inner-outer access control method and network secure chip:China, CN202011616459. 2022-03-30. (in Chinese)
12 Tsimpoukelli M, Menick J L, Cabi S, et al. Multimodal fewshot learning with frozen language models//Proceedings of the Advances in Neural Information Processing Systems. New York:Curran Associates, Inc., 2021:200-212.
13 Lan L, Wang P, Du X, et al. Node classification on graphs with few-shot novel labels via meta transformed network embedding//Proceedings of the Advances in Neural Information Processing Systems. New York:Curran Associates, Inc., 2020:16520-16531.
14 Kairouz P, McMahan H B, Avent B, et al. Advances and open problems in federated learning. Foundations and Trends in Machine Learning, 2021, 14(1-2):1-210.
15 Hartvigsen T, Sen C S, Kong X N, et al. Recurrent halting chain for early multi-label classification//KDD'20:Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. New York:Machinery, 2020:1382-1392.
Recommended Citation
WANG, Pinghui; PEI, Hongbin; ZHAO, Junzhou; QIN, Tao; SHEN, Chao; LIU, Dongliang; and GUAN, Xiaohong
(2022)
"Challenges and Measurements for Governance of Modern Cyber Space Society,"
Bulletin of Chinese Academy of Sciences (Chinese Version): Vol. 37
:
Iss.
12
, Article 3.
DOI: https://doi.org/10.16418/j.issn.1000-3045.20221117002
Available at:
https://bulletinofcas.researchcommons.org/journal/vol37/iss12/3
Included in
Defense and Security Studies Commons, Information Security Commons, Other Public Affairs, Public Policy and Public Administration Commons