×

联系我们

方式一(推荐):点击跳转至留言建议,您的留言将以短信方式发送至管理员,回复更快

方式二:发送邮件至 nktanglan@163.com

学生论文

论文查询结果

返回搜索

论文编号:14614 
作者编号:2120213482 
上传时间:2024/6/4 17:41:58 
中文题目:我国信息安全政策文本计量 
英文题目:Textual Measurement of Information Security Policies in China 
指导老师:徐曼 
中文关键字:信息安全;网络安全;PMC指数模型;LDA主题模型 
英文关键字:Information security;Network security;Policy Modeling Consistency;Latent Dirichlet Allocation 
中文摘要:信息化和数据化时代,信息安全通常与国家安全、企业安全、个人信息安全紧密相关。近年来,重大信息安全事件层出不穷,国家安全、个人信息保护、网络空间安全等领域面临严峻挑战,信息安全政策制定也上升到战略地位。但我国学术领域对我国信息安全政策文本研究却相对较少。此外,现有的政策分析视角多是单一维度或者二维、三维角度,针对这一现状,本文一是从整体视角明晰了信息安全政策文本演进路径。二是引入PMC指数方法,对我国信息安全政策文本研究进行了多维度政策一致性评估。 本文研究目的在于描绘信息安全政策文本演进路径、揭示我国信息安全政策文本领域的主题变迁,以及对政策效果进行一致性评估得出信息安全政策文本制定的优势与不足,并据此提出针对性建议。 本文的主要研究内容如下:基于1994年至2023年369条信息安全政策文本,使用社会网络分析法、LDA主题分析法、PMC指数分析法等研究方法,首先对文本形式特征进行了量化分析,划分了四个政策发展阶段、绘制了发文主体社会网络分析图;其次对文本内容进行量化分析,使用LDA主题模型将政策文本内容划分为6个主题,并深入研究了在四个时间阶段下的主题演变;最后使用PMC指数模型对10项代表性信息安全政策文本进行了政策一致性评估。 研究发现,我国信息安全政策经历了萌芽期、曲折上升期、平稳发展期和政策利好期四个阶段,政策主题涵盖信息安全、网络空间安全、产业信息安全等六个方面。政策一致性评估显示,我国政策制定在行业细节关注度上相对较低。基于此,本文提出了在政策主题、条例、发文主体和法规制定等方面的建议,政策主题方面,对较少关注到的跨境数据安全、在线知识产权保护等给予更多关注;政策条例方面,及时完善法律相关概念和具体细则;发文主体方面,需加深对边缘主体的合作。政策法规制定方面,坚持立法先行,注重立法激励,提高政策法规一致性建设等。以期为我国信息安全政策文本的进一步完善提供参考。 
英文摘要:In the era of information and data, information security is closely related to national security, enterprise security, and personal information security. In recent years, major information security incidents have emerged endlessly, posing severe challenges to areas such as national security, personal information protection, and cyberspace security, leading to the strategic positioning of information security policy formulation. However, there is relatively little research in China's academic field on the textual analysis of China's information security policies. Moreover, existing policy analysis perspectives are often single-dimensional or two- or three-dimensional. To address this, this paper aims to firstly clarify the evolution path of information security policy texts from an overall perspective and secondly introduce the PMC index method to conduct a multi-dimensional policy consistency evaluation of China's information security policy texts. The research purpose of this paper is to depict the evolution path of information security policy texts, reveal the thematic changes in China's information security policy text domain, conduct a consistency evaluation of policy effects to identify the strengths and weaknesses of the formulation of information security policy texts, and accordingly propose targeted suggestions. The main research contents of this paper are as follows: Based on 369 information security policy texts from 1994 to 2023, this paper uses research methods such as social network analysis, LDA topic analysis, and PMC index analysis. Firstly, a quantitative analysis is conducted on the textual form characteristics, dividing the policies into four development stages and creating a social network analysis diagram of the issuing entities. Secondly, a quantitative analysis is performed on the textual content, using the LDA topic model to classify the policy text content into six themes and conducting an in-depth study of the thematic evolution across the four time periods. Finally, the PMC index model is used to evaluate the policy consistency of 10 representative information security policy texts. The study found that China's information security policies have undergone four stages: the embryonic stage, the tortuous rising stage, the steady development stage, and the policy-favorable stage. The policy themes cover six aspects, including information security, cyberspace security, and industrial information security. The policy consistency evaluation revealed that China's policy formulation pays relatively low attention to industry details. Based on this, this paper proposes suggestions in terms of policy themes, regulations, issuing entities, and law and regulation formulation. For policy themes, more attention should be paid to less-noticed areas such as cross-border data security and online intellectual property protection. For policy regulations, legal concepts and specific rules should be promptly improved. For issuing entities, cooperation with marginal entities needs to be deepened. In terms of policy and regulation formulation, legislation should be prioritized, legislative incentives should be emphasized, and the consistency of policies and regulations should be enhanced. This aims to provide references for the further improvement of China's information security policy texts. 
查看全文:预览  下载(下载需要进行登录)