•  
  •  
 

Bulletin of Chinese Academy of Sciences (Chinese Version)

Keywords

artificial intelligence; data security; data governance; global governance; international cooperation; rule-making

Document Type

Artificial Intelligence and Future Society

Abstract

This study explores the international cooperation framework for data security governance and its implementation pathways from a global governance perspective. First, the study defines the concepts of data security and governance, emphasizing that the core objective of data governance is to ensure the secure flow and effective utilization of data. Second, it analyzes the current fragmentation of the global data governance system, revealing its development trends and challenges under the influence of geopolitics, particularly the tensions and collaborations in key areas such as cross-border data flows. Based on this analysis, the study proposes the concept of the "Embedded Digital Community of Shared Future", a framework that integrates the domestic policy autonomy emphasized by the theory of "Embedded Liberalism" with the global collaborative vision advocated by the "Community of Shared Future for Mankind". This framework aims to address the challenges of global governance in the digital age and promote international cooperation in data security governance. Furthermore, the study elaborates on the core principles and practical pathways of this theoretical framework and provides specific policy recommendations for China's participation in global data governance.

First page

663

Last Page

671

Language

Chinese

Publisher

Bulletin of Chinese Academy of Sciences

References

1 方滨兴, 殷丽华. 关于信息安全定义的研究. 信息网络安 全, 2008, 8(1): 8-10. Fang B X, Yin L H. Research on the definition of information security. Information Network Security, 2008, 8 (1): 8-10. (in Chinese)

2 张平文, 邱泽奇. 数据要素五论:信息、权属、价值、安全、交 易. 北京: 北京大学出版社, 2022. Zhang P W, Qiu Z Q. Five Theories of Data Elements: Information, Ownership, Value, Security, and Transaction. Beijing: Peking University Press, 2022. (in Chinese)

3 陈明奇, 姜禾, 张娟, 等. 大数据时代的美国信息网络安全 新战略分析. 信息网络安全, 2012, 12(8): 32-35. Chen M Q, Jiang H, Zhang J, et al. Analysis of the U. S. information network security strategy in the era of big data. Netinfo Security, 2012, 12(8): 32-35. (in Chinese)

4 沈国麟. 大数据时代的数据主权和国家数据战略. 南京社 会科学, 2014, 28(6): 113-119. Shen G L. Data sovereignty and national data strategy in the big data era. Nanjing Social Sciences, 2014, 28(6): 113-119. (in Chinese)

5 杜雁芸. 大数据时代国家数据主权问题研究. 国际观察, 2016, 30(3): 1-14. Du Y Y. National data sovereignty in the big data era. International Review, 2016, 30(3): 1-14. (in Chinese)

6 Slaughter M J, McCormick D H. Data is power: Washington needs to craft new rules for the digital age. Foreign Affairs, 2021, 100(3): 54-62

7 Goldsmith J, Wu T. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press, 2006.

8 魏媛媛. 生成式人工智能与全球网络安全——战略竞争视 角下的风险与治理.信息安全与通信保密, 2024, 22(8): 2-10. Wei Y Y. Generative artificial intelligence and global cyber security—Risk and governance from the perspective of strategic competition. Information Security and Communications Privacy, 2024, 22(8): 2-10. (in Chinese)

9 蔡翠红. 全球数字治理的价值体系构建. 国家治理, 2025, 12(2): 33-40. Cai C H. The construction of value systems in global digital governance. National Governance, 2025, 12(2): 33-40. (in Chinese)

10 任鹏飞. 全球数据安全治理面临的挑战与中国的治理方 案. 社会主义研究, 2024, 46(5): 148-155. Ren P F. Challenges of global data security governance and China's governance solutions. Socialist Studies, 2024, 46(5): 148-155. (in Chinese)

11 刘国柱. 数字标准的地缘政治论析——基于大国竞争的视 角. 人民论坛·学术前沿, 2023, 12(4): 34-47. Liu G Z. Geopolitical analysis of digital standards—From the perspective of great power competition. Frontier, 2023, 12 (4): 34-47. (in Chinese)

12 刘国柱."数字威权主义"论与数字时代的大国竞争. 美国 研究, 2022, 36(2): 35-57. Liu G Z. "Digital authoritarianism" theory and great power competition in the digital age. American Studies, 2022, 36 (2): 35-57. (in Chinese)

13 米军, 陶欢, 兰迪. 相互依赖武器化、网络结构演化和网络 性权力——以半导体和国际金融网络的案例分析. 当代亚 太, 2023, 32(6): 30-60. Mi J, Tao H, Lan D. Weaponized of interdependence, the evolution of network structure and network power: A case study of semiconductors and international financial networks. Journal of Contemporary Asia-Pacific Studies, 2023, 32(6): 30-60. (in Chinese)

14 Mattli W, Büthe T. Setting international standards: Technological rationality or primacy of power? World Politics, 2003, 56(1): 1-42.

15 杨楠. 美国遏制中国应用程序的策略及其影响. 当代美国 评论, 2024, 8(3): 21-42. Yang N. US strategies to contain Chinese applications and their impact. Contemporary American Review, 2024, 8(3): 21-42. (in Chinese)

16 张倩雯, 张文艺. 欧美跨境数据流动合作的演进历程、分歧 溯源与未来展望.情报杂志, 2023, 42(1): 88-94. Zhang Q W, Zhang W Y. Evolution, divergence origins and future outlook of EU-U. S. cross-border data flows cooperation. Journal of Intelligence, 2023, 42(1): 88-94. (in Chinese)

17 贾开. 跨境数据流动的全球治理:权力冲突与政策合作 ——以欧美数据跨境流动监管制度的演进为例. 汕头大学 学报(人文社会科学版), 2017, 33(5): 57-64. Jia K. Conflict and cooperation: Evolvement of trans-border data flows between US and EU. Journal of Shantou University (Humanities & Social Sciences Edition), 2017, 33 (5): 57-64. (in Chinese)

18 Keohane R O, Nye J S. Power and Interdependence: World Politics in Transition. Little, Brown, 1977.

19 孙成昊, 王叶湑, 董一凡. 相互依赖武器化的机制探析—— 权力来源与政策实践. 欧洲研究, 2024, 42(2): 63-86. Sun C H, Wang Y Q, Dong Y F. An exploration of the mechanism of weaponized interdependence: Sources of power and policy practices. Chinese Journal of European Studies, 2024, 42(2): 63-86. (in Chinese)

20 Ruggie J G. International regimes, transactions, and change: Embedded liberalism in the postwar economic order. International organization, 1982, 36(2): 379-415.

21 马丙合, 马方. 中国式现代化进程中的数据风险与安全治 理. 重庆社会科学, 2024, 33(10): 103-114. Ma B H, Ma F. Data risks and security governance in the process of China's modernization. Chongqing Social Sciences, 2024, 33(10): 103-114. (in Chinese)

22 Keohane R O. International institutions: Can interdependence work?. Foreign Policy, 1998, (110): 82-96.

23 门洪华. 国际机制与中国的战略选择. 中国社会科学, 2001, 3(2): 178-187. Men H H. International mechanism and strategic choice for China. Social Sciences in China, 2001, 3(2): 178-187. (in Chinese)

24 鲁传颖. 从 DeepSeek 禁令看美国技术焦虑. 当代世界, 2025, (2): 76-77. Lu C Y. Examining US technological anxiety through the DeepSeek ban. Contemporary World, 2025, (2): 76-77. (in Chinese)

25 王文, 申宇婧, 金臻. 大跳跃:美国智库论 DeepSeek 中国人 工 智 能. 智 库 理 论 与 实 践, 2025, doi: 10.1413. n.20250306.1115.002. Wang W, Shen Y J, Jin Z. A major breakthrough: U.S. think tanks on DeepSeek and China's artificial intelligence. Think Tank: Theory & Practice, 2025, doi: 10.1413. n.20250306.1115.002. (in Chinese)

Share

COinS