Bulletin of Chinese Academy of Sciences (Chinese Version)
Keywords
overall national security concept;computing power;security governance
Document Type
Policy & Management Research
Abstract
Currently, with the rapid development of computing technology and the continuous expansion of computing applications, various types of computing security incidents occur frequently. As an emerging security issue, computing security has become a key fact affecting national security. Strengthening the governance of computing power security has become an important part of the modernization of the national security governance system and governance capacity in China. To clarify the theoretical connotation, risk manifestations, and governance strategies of computing power security governance, this study takes the overall national security concept as guidance and the logical guidance of “issue identification-risk deconstruction-governance response” to analyze the conceptual connotation and driving logic of computing power security governance. Based on the concept of big security, this study systematically analyzes the front-end, guarantee, and implementation processes of computing power formation, and analyzes the uncertainty risks from data input, algorithm embedding, base support, application implementation, and other aspects. In terms of governance response, the study suggests to clarify the strategic layout of computing power security governance under the concept of coordinating security and development, and seek governance strategies for computing power security through forward-looking governance, refined governance, and adaptive governance.
First page
511
Last Page
521
Language
Chinese
Publisher
Bulletin of Chinese Academy of Sciences
References
1 米加宁, 李大宇, 董昌其. 算力驱动的新质生产力:本质特征、基础逻辑与国家治理现代化. 公共管理学报, 2024, 21(2): 1-14.Mi J N, Li D Y, Dong C Q. New quality productive forces driven by computational power: Essential characteristics, foundational logic and modernization of national governance. Journal of Public Management, 2024, 21(2): 1-14. (in Chinese)
2 郑贤斌, 李自力. 安全的内涵和外延. 中国安全科学学报, 2003, 13(2): 1-3.Zheng X B, Li Z L. The connotation and extension of safety. China Safety Science Journal, 2003, 13(2): 1-3. (in Chinese)
3 肖贵平, 胡安洲. 关于安全科学基本概念及相互关系的研究. 中国安全科学学报, 1995, 5(1): 27-31. Xiao G P, Hu A Z. Research on basic concepts and their relationships of safety science. China Safety Science Journal, 1995, 5(1): 27-31. (in Chinese)
4 余娜. 算力突围背后:核心技术亟待攻关. 中国工业报, 2024-04-30(06). Yu N. Behind the breakthrough of computing power: the core technology needs to be tackled urgently. China Industry News, 2024-04-30(06). (in Chinese)
5 戚凯, 杨悦怡. 人工智能时代的美国对华算力竞争. 国际论坛, 2024, 26(3): 43-61. Qi K, Yang Y Y. US computing power competition against China in the age of artificial intelligence. International Forum, 2024, 26(3): 43-61. (in Chinese)
6 中国信息通信研究. 中国算力发展指数白皮书(2023年). (2023-09-14)[2024-09-13]. http://www.caict.ac.cn/kxyj/qwfb/bps/202309/t20230914_461823.htm. China Academy of Information and Communications Technology. China Arithmetic Development Index White Paper (2023). (2023-09-14)[2024-09-13]. http://www.caict.ac.cn/kxyj/qwfb/bps/202309/t20230914_461823.htm.(in Chinese)
7 习近平. 坚持系统思维构建大安全格局 为建设社会主义现代化国家提供坚强保障. 人民日报, 2020-12-13(01). Xi J P. Adhering to systemic thinking and building a large security pattern to provide a strong guarantee for the construction of a modern socialist country. People’s Daily, 2020-12-13(01). (in Chinese)
8 赵亮. 对“太阳风”网络攻击事件的深度剖析. 中国信息安全, 2021, (10): 51-54. Zhao L. An in-depth analysis of the “Sunwind” cyberattacks. China Information Security, 2021, (10): 51-54. (in Chinese)
9 多明戈斯. 终极算法:机器学习和人工智能如何重塑世界. 黄芳萍, 译. 北京: 中信出版社, 2017. DomingosPedro. The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World. Translated by Huang F P. Beijing: Citic Press Corporation, 2017. (in Chinese)
10 赵秀赞, 余丽. 总体国家安全观视域下网络社交平台的算法治理. 河南社会科学, 2024, 32(4): 33-41. Zhao X Z, Yu L. Algorithmic Governance of online social platforms from the perspective of a holistic approach to national security. Henan Social Sciences, 2024, 32(4): 33-41. (in Chinese)
11 张龙辉. 数字社会建设中的算法安全风险及其化解策略. 东北师大学报(哲学社会科学版), 2024, (2): 134-144. Zhang L H. Algorithm security risk and its solution in the construction of digital society. Journal of Northeast Normal University (Philosophy and Social Sciences), 2024, (2): 134-144. (in Chinese)
12 刘天语, 王硕. 算法资本主义:智能时代的资本主义新形态. (2024-03-09)[2024-05-13]. https://xueshu.baidu.com/usercenter/paper/show?paperid=1u1m0mg0wp2n0xe06m7q08u0pk068348 Liu T Y, Wang S. Algorithmic capitalism: A new form of capitalism in the age of intelligence. (2023-04-30)[2024-09-13]. https://xueshu.baidu.com/usercenter/paper/show?paperid=1u1m0mg0wp2n0xe06m7q08u0pk068348.(in Chinese)
13叶晓亮, 王丽颖, 李晓婷. 人工智能算法“黑盒”安全风险及治理探讨. 互联网天地, 2022(1): 32-35. Ye X L, Wang L Y, Li X T. Exploring the security risks and governance of artificial intelligence algorithm “black boxes”. China Internet, 2022, (1): 32-35. (in Chinese)
14肖晞, 王一民. 总体国家安全观视域下全球安全治理的理念、模式与路径. 国家安全论坛, 2023, (5): 3-16. Xiao X, Wang Y M. The vision, model and path of global security governance in the context of a holistic approach to national security. National Security Forum, 2023, (5): 3-16. (in Chinese)
15 杨硕, 王月, 张一星. 绿色算力定义及关键技术研究. 信息通信技术与政策, 2024, 50(2): 18-25. Yang S, Wang Y, Zhang Y X. Research on definition and key technologies of green computility. Information and Communications Technology and Policy, 2024, 50(2): 18-25. (in Chinese)
16 徐怀科. 技术价值分界及其决策的伦理指向研究——以保罗的后果不确定技术价值分界理论为例. 科技进步与对策, 2021, 38(19): 29-36. Xu H K. Study on ethical orientation of the demarcation of technological values and its decision-making: Take Paul’s demarcation theory of technological values with uncertain consequences as an example. Science&Technology Progress and Policy, 2021, 38(19): 29-36. (in Chinese)
17 Gerstein D M, Leidy E. Emerging Technology and Risk Analysis: Artificial Intelligence and Critical Infrastructure. Washington: Homeland Security Operational Analysis Center operated by the RAND Corporation, 2024.
18 习近平. 习近平谈治国理政(第三卷). 北京: 外文出版社,2020:19. Xi J P. Xi Jinping: The Governance of China Ⅲ. Beijing: Foreign Languages Press, 2020: 19. (in Chinese)
19 钟开斌. 统筹高质量发展和高水平安全:何以必要与何以可能. 中共中央党校(国家行政学院)学报, 2024, 28(1): 41-48. Zhong K B. Ensuring both high-quality development and high-level security:Why is it necessary and how is it possible?. Journal of the Party School of the Central Committee of the C.P.C. (Chinese Academy of Governance), 2024, 28(1): 41-48. (in Chinese)
Recommended Citation
LI, Hui; WANG, Na; and WANG, Long
(2024)
"Computing power security governance from perspective of overall national security concept,"
Bulletin of Chinese Academy of Sciences (Chinese Version): Vol. 40
:
Iss.
3
, Article 15.
DOI: https://doi.org/10.16418/j.issn.1000-3045.20241024003
Available at:
https://bulletinofcas.researchcommons.org/journal/vol40/iss3/15
Included in
Artificial Intelligence and Robotics Commons, Defense and Security Studies Commons, Information Security Commons, Science and Technology Policy Commons