当前位置:网站首页>Talking about the algorithm security of network security
Talking about the algorithm security of network security
2022-07-31 21:10:00 【leaves fall with rain】
In the five years since the implementation of the Cybersecurity Law of the People's Republic of China, the cybersecurity system has been continuously strengthened, and citizens' cybersecurity awareness has been rapidly improved.At present, human society is accelerating into the era of intelligence. As the core productivity, algorithms play an increasingly important role, and the security of algorithms has gradually attracted attention from all walks of life.An algorithm is a finite, deterministic, efficient, and applicable method of solving a problem implemented by a computer program.With the rapid development of new information technologies such as artificial intelligence, algorithms have improved the operational efficiency of society and profoundly changed people's lifestyles. As the core of digital technology, algorithms not only add momentum to social development, but also bringRisks in civil rights, social ethics, market order, national security, etc.
At this stage, algorithm security management has become a hot topic at home and abroad.In response to problems such as algorithm failure, algorithm black box, algorithm discrimination, information cocoon room, and unfair competition, four departments including the Cyberspace Administration of China have issued the "Regulations on the Administration of Internet Information Service Algorithm Recommendations" (hereinafter referred to as the "Regulations").The "Regulations" are specialized departmental regulations issued by my country for the recommendation of Internet information service algorithms, which provide an important institutional guarantee for regulating Internet information service algorithm recommendation activities, promoting the healthy development of Internet information services, and promoting cyberspace governance.Since algorithm management is different from traditional industries in terms of purpose, content, rhythm, strength, thinking and rules, in terms of governance principles, abstract principles should be combined with flexible policy tools, from policy coordination, social innovation, citizen collaboration, etc.Jointly govern and maintain algorithm security.
Policy coordination should focus on the ecological governance of network information content.Prevent the risk of algorithm abuse of Internet information services, protect the legitimate rights and interests of users, adhere to the correct orientation, and promote the algorithm to be better; adhere to risk prevention and control, and promote algorithm regulation; adhere to standardized development to prevent algorithm abuse.Algorithms are inherently opaque due to their technical complexity. A system for algorithm disclosure, data security protection, and data discrimination should be built based on the application scenarios of algorithms.The "Regulations" give full play to the role of algorithm services in the transmission of positive energy, which is a timely move to further improve the comprehensive network governance capability, and is highly exploratory and forward-looking.
Social innovation should be coordinated from the perspective of theory and technology.Technological innovations tend to produce more innovations in the process of application, while technological innovations that get rid of theoretical constraints often cause harm.Therefore, it is necessary to make the speed of theoretical innovation keep up with the speed of technological innovation, and do a good job of regulating and constraining the theory on technology.The security of the algorithm must be continuously innovated in theory, in order to regulate the negative control and influence of the algorithm in the process of use, and solve the ethical and security risks of the algorithm.At the same time, it is necessary to build basic scientific research facilities for algorithm security, promote algorithm research and development, and support the in-depth integration of algorithms with social and economic fields.
Citizen collaboration is a straightforward way to solve algorithmic security.It is necessary to improve the technical literacy of every member of society, improve citizens' ability to acquire, understand, and integrate digital information, and improve their ability to analyze and observe problems under digital thinking.Citizens, as the convenient owners of reasonable algorithms, are also potential victims of unreasonable algorithms. In the face of infringement of their rights and interests, they can defend their legal rights and participate in algorithm security governance by reporting and filing lawsuits.At the same time, it is necessary to speed up the improvement of the digital information rights system and establish a convenient system for citizens to complain and protect their rights.While enjoying their rights, citizens should self-discipline to perform the obligations stipulated in the algorithm management platform in accordance with the law, promote the scientific popularization of algorithm security, and enhance the algorithm security risk awareness of enterprises and the public.
The security management of algorithms requires the participation of the government, technology enterprises, and citizens in collaborative governance. It is necessary to allow algorithms to play an active role in social service and governance. At the same time, individual rights and public safety should be fully considered, and algorithm risks should be identified and analyzed.To prevent, realize the governance of the algorithm, and build a people-oriented, safe and reliable algorithm management system.(Author: Xiao Da, Dean of Network Security Research Institute of Beijing Huayunan Information Technology Co., Ltd.)
Source: Guangming.com
边栏推荐
- Qualcomm cDSP simple programming example (to query Qualcomm cDSP usage, signature), RK3588 npu usage query
- matplotlib ax bar color 设置ax bar的颜色、 透明度、label legend
- 使用 Flutter 和 Firebase 制作!计数器应用程序
- MySQL---aggregate function
- 【Yugong Series】July 2022 Go Teaching Course 023-List of Go Containers
- Istio introduction
- API for JD.com to obtain historical price information of commodities
- "The core concept of" image classification and target detection in the positive and negative samples and understanding architecture
- A shortcut to search for specific character content in idea
- 高通cDSP简单编程例子(实现查询高通cDSP使用率、签名),RK3588 npu使用率查询
猜你喜欢
随机推荐
Write a database document management tool based on WPF repeating the wheel (1)
架构师04-应用服务间加密设计和实践
Count characters in UTF-8 string function
【AcWing】第 62 场周赛 【2022.07.30】
BM5 merge k sorted linked lists
Short-circuit characteristics and protection of SiC MOSFETs
深度学习中的batch(batch size,full batch,mini batch, online learning)、iterations与epoch
rj45 to the connector Gigabit (Fast Ethernet interface definition)
leetcode:6135. 图中的最长环【内向基环树 + 最长环板子 + 时间戳】
focus on!Haitai Fangyuan joins the "Personal Information Protection Self-discipline Convention"
Mobile web development 02
Qualcomm cDSP simple programming example (to query Qualcomm cDSP usage, signature), RK3588 npu usage query
财务盈利、偿债能力指标
The principle of ReentrantLock (to be continued)
Arduino框架下STM32全系列开发固件安装指南
高效并发:Synchornized的锁优化详解
【愚公系列】2022年07月 Go教学课程 023-Go容器之列表
PCB stackup design
老牌音乐播放器 WinAmp 发布 5.9 RC1 版:迁移到 VS 2019 完全重建,兼容 Win11
利用反射实现一个管理对象信息的简单框架









