文章摘要
夏书敏,朱学芳.我国信息安全政策主题挖掘与时空演化特征分析[J].数字图书馆论坛,2025,21(3):39~50
我国信息安全政策主题挖掘与时空演化特征分析
Topic Mining and Temporal-Spatial Evolution Characteristics of Chinese Information Security Policies
投稿时间:2025-01-07  
DOI:10.3772/j.issn.1673-2286.2025.03.005
中文关键词: 信息安全;政策挖掘;主题挖掘;演化分析;BERTopic模型
英文关键词: Information Security; Policy Mining; Topic Mining; Evolution Analysis; BERTopic Model
基金项目:本研究得到国家社会科学基金项目“5G环境下中国智慧知识服务体系构建研究”(编号:22BTQ017)资助。
作者单位
夏书敏 南京大学信息管理学院;南京大学江苏省数据工程与知识服务重点实验室 
朱学芳 南京大学信息管理学院;南京大学江苏省数据工程与知识服务重点实验室 
摘要点击次数: 30
全文下载次数: 54
中文摘要:
      以1994—2024年的信息安全央地政策文本为研究数据,使用BERTopic模型挖掘政策主题,并构建“时间—空间—主题”的三维框架进行主题内容分析与演化分析。从时间维度挖掘,共得到信息系统监管、数据安全产业等59个主题,形成信息保密、信息安全事件应急处理2条显著演化路径;从空间维度挖掘,共得到公共信息平台安全等51个主题,形成3条显著演化路径。研究发现,我国信息安全政策主题演变与技术发展紧密相连;强调信息安全专门化、产业化;中央信息安全政策具有更强的全面性和前瞻性。根据研究结论,提出3点建议,为完善信息安全治理体系提供参考:制定专门性的生成式人工智能信息安全政策;推动提高区域信息安全产业化水平;加强区域政策、央地政策协同性。
英文摘要:
      Taking the central and local information security policy texts from 1994 to 2024 as the research data, the paper uses the BERTopic model to explore the topics. Then the paper uses the “time-space-topic” three-dimensional framework to analyze the topic and evolution characteristics. The temporal dimension reveals 59 topics, including information system supervision and data security industry. Two prominent evolutionary pathways are identified, namely information confidentiality and emergency response to information security incidents. The spatial dimension reveals 51 topics, such as public information platform security, and three prominent evolutionary pathways are formed. The research shows that the evolution of information security policy topics is tightly linked to the technological advancements. The policies emphasize specialization and industrialization of information security. Central policies show stronger comprehensiveness and foresight. Based on the conclusions, three recommendations are proposed to enhance China’s information security governance framework. First, we should develop specialized policies for generative artificial intelligence. Second, we should improve regional information security industrialization level. Third, we should strengthen coordination between central and regional policies.
查看全文   查看/发表评论  下载PDF阅读器
关闭

分享按钮