• 中国科学学与科技政策研究会
  • 中国科学院科技战略咨询研究院
  • 清华大学科学技术与社会研究中心
ISSN 1003-2053 CN 11-1805/G3

科学学研究 ›› 2025, Vol. 43 ›› Issue (5): 931-942.

• 热点议题 • 上一篇    下一篇

政府数据安全风险治理的机理逻辑与优化策略

王龙   

  1. 中国人民公安大学
  • 收稿日期:2024-03-29 修回日期:2024-06-18 出版日期:2025-05-15 发布日期:2025-05-15
  • 通讯作者: 王龙
  • 基金资助:
    由“三元悖论”走向“生态共生”的数据安全治理现代化研究

Mechanistic Logic and Optimization Strategies for Government Data Security Risk Governance

  • Received:2024-03-29 Revised:2024-06-18 Online:2025-05-15 Published:2025-05-15

摘要: 实现源头治理、系统治理、依法治理并有效服务经济社会高质量发展,是政府数据安全治理体系和治理能力现代化建设的重要课题。本研究运用数据生命周期和社会资本理论,提出以“制度-组织-社会”的信任机制弥合数据生命周期理论缝隙的数据安全治理分析框架,为解构政府数据治理风险、实现有效治理提供可有效循环的运行机制。研究结果显示:从横向来看,数据生命周期理论为政府数据安全风险治理提供系统性的逻辑进路,可以将内部治理过程和外部治理过程衔接起来,根据整个生命周期内不同阶段数据安全的侧重点进行风险解构。从机理逻辑来看,政府数据安全风险治理是一个系统管理“硬实力”和信任嵌入“软实力”两方面同时作用、双管齐下的过程,需要“软硬兼备”才能营造基于“善治”的政府数据安全治理体系。

Abstract: Achieving governance at source, systematic governance, governance in accordance with the law, and effectively serving the needs of high-quality economic and social development are important issues for the modernization of the government's data security governance system and governance capacity. Using data life cycle and social capital theories, this study creatively proposes a data security governance theoretical framework that bridges the gap between data life cycle theories with the trust mechanism of "system - organization - society", and then provides an operational mechanism for deconstructing the risks of governmental data governance and realizing effective governance, so as to realize an effective cycle. The research results show that from a horizontal perspective, data life cycle theory provides a systematic logical approach for government data security risk governance and its modernization, which can connect the internal and external governance processes and deconstruct the risks according to the focus of data security at different stages of the whole life cycle. From the perspective of mechanism logic, government data security risk governance is a process of system management "hard power" and trust embedded in "soft power" at the same time, two-pronged process, which requires "both soft and hard". "In order to create a government data security governance system based on "good governance".