|
|
Digital Belt and Road Initiative: Challenges and Countermeasures |
ZHANG Yao-jun, SONG Jia-yun |
Beijing Key Laboratory of B&R's Data Analysis and Decision Support, Beijing International Studies University, Beijing, 100024 |
|
|
Abstract The Digital Belt and Road Initiative (DBAR) conforms to China’s endogenous need of constructing a strong digital country, and provides opportunities for countries along Silk Road in digitalization development. Currently, countries along the “Belt and Road” have established some basis for digitalization development, but the overall level needs to be improved. The construction of DBAR is beneficial for countries along the Belt and Road to achieve economic and social development, better governance, accumulate advantage in international competition, and hence promote the reform of global governance system. Challenges facing the construction of DBAR cannot be ignored: countries along the Belt and Road have weak strategic consciousness of big data; the big data infrastructures vary from country to country; security threats to big data arise constantly; the abilities of setting standard for big data vary in those countries. To meet these challenges, we need to focus on several aspects as follows: help those countries raise awareness of big data and optimize top-level design of digitalization; increase investment in infrastructures and expand the application of big data technology; reinforce governance in cyber space, and improve the security of data flow; go all out to construct support systems to guarantee smooth development of DBAR.
|
Received: 22 June 2017
|
|
|
|
|
[1] 推进“一带一路”建设工作领导小组办公室.共建“一带一路”:理念、实践与中国的贡献.新华网http://news.xinhuanet.com/silkroad/2017-05/10/c_1120951928.htm. [2] 王振,赵付春,王滢波.发展数字经济点亮创新之路[N].人民日报,2017-05-22. [3] 陆钢.大数据时代下“一带一路”决策系统的构建[J].当代世界,2015,(7):26-29. [4] 中国国际经济交流中心网络空间治理课题组.网络空间治理需把牢数据主权[N].光明日报,2016-10-12. [5] 中国互联网络信息中心. 第三十九次《中国互联网络发展状况统计报告》[R].中国互联网信息中心网站.http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/201701/t2017012 2_66437.htm. [6] 王义桅,郑栋.加强“一带一路”网络空间国际合作[J].中国信息安全,2016,(3):48-49. |
|
|
|