Home » How does security technology “escort” the economy in the digital economy era?Four experts say so_sina news

How does security technology “escort” the economy in the digital economy era?Four experts say so_sina news

by admin

Original title: How does security technology “escort” the economy in the era of digital economy?Four experts say this

In today’s era, big data and AI algorithms have facilitated our lives and improved production efficiency. Data has become the “oil” of the digital age. But the existence of big data also means that massive amounts of user information are used to discover value, and problems such as information leakage and black and gray product attacks are emerging one after another. Security seems to have become the “short board” on the barrel of digital economic development.

What are the difficulties in the balance between enterprise technology development and user information protection? In the face of the ever-developing science and technology, the complex and changeable international situation, and the people’s new lifestyle, what challenges does the existing legal framework face? How to make safety “escort” digital development?

On August 6, 2021 Beijing News Shell Finance Summer Summit-Online Forum on Risk Prevention and Control in the Digital Economy Era was held. Zhu Wei, deputy director of the Communication Law Research Center of China University of Political Science and Law, and Wu Shenkuo, executive director of the International Center for the Rule of Law of Beijing Normal University Wei Kai, deputy director of the Cloud Computing and Big Data Research Institute of China Academy of Information and Communications Technology, and Zhao Wenbiao, president of Ant Group’s security business group, expounded their views on the above issues.

  When a person becomes a “battery person”, where is it difficult to protect information security?

In the AI ​​era, many apps need to collect enough user data to support their operations. For example, short video platform video push, e-commerce platform product recommendation, etc., all need to collect user data before the algorithm can function normally. In this process, users often face potential risks of exposing their privacy.

“In the Internet era, people have slowly become’battery people’.” Zhu Wei said, “In the Internet era, everyone has become a means, not an end, through algorithms, artificial intelligence, and data collection. Consumers and users In many platforms, they use their own data to “accumulate energy” for these platforms. Whether this kind of ecology is desirable, and where the pros and cons are related, I think it needs to be resolved.”

In Zhu Wei’s view, to solve the problem of the balance between technological development and user information protection, it is necessary to clarify the problem of big data property rights. The concept of personal information has been described in detail in the draft and other relevant laws, but it has not made specific provisions on the nature of big data. After the final review of the “Civil Code”, the data information was included in the “Civil Code”. We have objected to the issue of intellectual property in the Civil Code because data information includes both big data and personal information. Personal information is the right to privacy and cannot be transformed into big data, at least to a certain extent. Yes, because there was a huge controversy, the “Civil Code” later deleted this article.”

See also  Mayors' procession and April 25th, debate between De Luca and Piantedosi - News

The Shell Finance reporter noted that Article 127 of the Civil Code stipulates that if the law has provisions on the protection of data and network virtual property, follow those provisions.

“So we can find that personal information and big data are inextricably linked. In the field of industry application, the property rights of big data have not been clarified. Now, the country is issuing guidance on the digital economy, and some have not yet When it is announced to the public, I believe that the concept of data information will become clear at least in the field of property rights.” Zhu Wei said.

In addition, Zhu Wei believes that when personal information is intertwined with other laws, the problem becomes more complicated. “At present, the Criminal Law, the Personal Information Protection Law, etc. all have relevant regulations on the scope of sensitive information, and the connotation and extension are completely different. This raises a very interesting question: when we researched the sensitive information For information, we must first ask which law is in. So should there be a commander, at least conceptually, but it seems that there is not yet. Now when we study some legal issues, it’s not just individuals The issue of information protection is the intersection of personal information protection and other legal relationships, which complicates the issue itself. For example, we talk about financial advertisements every day. Your behavior produces financial advertisements after data adoption. On the surface, it is related to the advertising law, but in fact it is a complete legal relationship between basic big data and personal information.”

  What is the risk of digital transformation from an enterprise to an international society?

In fact, the data contributed by each user will eventually converge into a data torrent, where individuals, industries, countries, and the international community are intertwined. In addition to users, what risks do companies face in the process of digital transformation?

“What is the risk behind’digitalization’? It refers to the risks that users face and attendant while enjoying the convenience and inclusiveness brought by digitalization in life in the digital economy. For example, for industry merchants It is said that the’marketing capital risk’ caused by the Wool Party is enough to destroy the marketing activities elaborated by merchants. For individual users, problems such as online fraud and account embezzlement have become high-risk and harmful in the digital economy. A huge security issue. Today’s black production crimes are increasingly multi-platform, multi-link, team-based and intelligent. This makes fighting against black production and preventing intelligent risks has been transformed into a brand-new proposition.” Zhao Wen Biao said.

Zhao Wenbiao revealed that as early as six or seven years ago, the ant team had found traces of AI in its usual response to black production attacks. “It cannot be ignored that with the rapid development and blessing of artificial intelligence technology, this risk will continue to intensify and evolve into the risk behind’intelligence’.”

So, when we expand our horizons from individual users and enterprises to the international community, how will the risks of digitalization change?

See also  Benetton wins the derby with "No racism" written on the shirt

In Wu Shenkuo’s view, with the acceleration of digital transformation, the economic structure, people’s lifestyle, social governance and even the national and global governance levels have undergone very big changes.

Wu Shenkuo believes that in the process of this change, we need to pay attention to three complexities. “The first is the complexity of the subjects involved in data activities, from individual users to industries, countries and even the international community. In this process, subjects The complexity of the structure is the existence of cross-department, cross-industry, and cross-country, and this makes the scenes faced in the process of data processing and data activities more complicated, and in the rapid iterative update, this is the complexity of the second scene Therefore, we have summarized and summarized the rules in some traditional scenes. When facing new scenes, we may face very big difficulties in application. Therefore, in this context, a third complexity is formed, which is the appeal. Complexity.”

“For example, even in the case of a single subject, the subject’s appeals at different stages are different. At a certain stage, it may pay more attention to its own privacy, and the protection of its own personal information may be possible in certain scenarios. Will be more inclined to pursue certain economic interests or other types of interests, so in this situation we are facing a very complicated situation or in a new stage, we need to have a very broad perspective to look at this phenomenon .” Wu Shenkuo said.

  How to protect the development of the digital economy? Use AI against AI

What should we do in response to so many complex problems? Experts gave different suggestions.

First, there is a sufficient incentive mechanism.

In Wu Shenkuo’s view, in the process of data business and data transfer and utilization, the asymmetry of knowledge and capabilities has led to insufficient transparency in many cases, which in turn led to insufficient trust. Degree is the basis for us to give effective trust in digital life. After we have sufficient credit, we need a necessary incentive degree. At present, all kinds of data-driven innovations are continuously promoted (economic development). In this process, how to ensure and how to maximize the value of the subjects who have made contributions in various data activities such as data circulation and utilization, and give it the necessary promotion, are the points that we need to pay special attention to.”

“We are pleased to see that the “Data Security Law” and the “Personal Information Protection Law” to be promulgated in the future are formulating some rules for the development of the digital economy. This is urgently needed by the market, but it is not trivial. It may only be possible. Principle. As for how to implement it, detailed rules and transparency are needed, and companies need to be motivated to implement this mechanism, such as explicit incentives for their reputation. This requires supporting measures, not just punishment.” Wei Kai Express.

See also  The Municipal Center for Disease Control and Prevention issued a health reminder for the Spring Festival to protect the health of the festival by doing a good job in epidemic prevention

In addition, the use of technology to help solve security problems is also a common point of view among experts.

In Wei Kai’s view, in the past few years, the application of big data focused on making reports, making large screens, and giving decision makers intuitive and relevant data. But now the application of big data technology is often not the case, but has gone deep into the closed loop of decision-making. “Previous reports, after reading the reports, still rely on people to make decisions after reading them, but now many big data risk control, big data accurate advertising, in fact, people are not in the closed loop, as long as people set the rules, data-driven can be closed loop automatically. implement.”

“Now, a new model is emerging. For example, blockchain technology allows us to no longer centralize data and enjoy the benefits of data fusion. At present, this type of technology is rapidly heating up, which may create a new The application model of big data.” Wei Kai said.

Zhao Wenbiao said that traditional risk control is subject to technical cost, data scale and algorithm efficiency, and many scenarios are driven by expert experience rather than data intelligence. “Alipay has hundreds of millions of transactions every day. Faced with such a huge amount of calculations, once the decision-making is delayed, it will give the black industry an opportunity. Therefore, the development of the next generation of risk control technology systems for trusted artificial intelligence technology has become Our only way.”

For example, he said that through the deep integration of artificial intelligence and financial risk control, Alipay’s AI brain AlphaRisk can respond to risks in milliseconds in a fully automatic mode with zero manual intervention. For example, in the network fraud risk identification scenario, when the system recognizes that the user is at risk of fraud, the AI ​​robot will call the user a “wake-up call” at a speed of less than 0.1 seconds. In addition, while quickly responding to current risks, AlphaRisk also has the ability to self-learn and adapt, thereby transforming security from static passive defense to dynamic active confrontation.

The Shell Finance reporter also found that while discussing the development of the digital economy, many experts regarded security as a potential “shortcoming” of the economic development barrel, and believed that full attention should be paid to risk prevention and control in the digital economy era.

“In the past, when we developed any industry, we were inclusive and prudent, but now we are more prudent and inclusive. In the past, efficiency was the first priority, and safety was the second. We will talk about development first. Now it seems that safety may be the shortcoming of the barrel. The Internet industry, scale, and technology have developed very quickly. If you pursue security issues, you will definitely sacrifice the market and efficiency. But from a long-term perspective, I think this approach is no problem.” Zhu Wei said .

Luo Yidan, Shell Financial Reporter, Beijing News

Editor in charge: Liu Debin

.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy