What should we do to protect information security in the digital economy era?

  In today's era, big data and AI algorithms have facilitated our lives and improved production efficiency, but the existence of big data also means that massive amounts of user information are used to discover and generate value, and problems such as information leakage and black and gray product attacks have emerged one after another. Security seems to have become the "short board" on the barrel of digital economic development.

  What are the difficulties in balancing enterprise technology development and user information protection?

In the face of the ever-developing science and technology, the complex and changeable international situation, and the people’s new lifestyle, what challenges does the existing legal framework face?

How to make safety "escort" digital development?

  2021 Beijing News Shell Finance and Economics Summer Summit-Online Forum on Risk Prevention and Control in the Era of Digital Economy Held, Zhu Wei, Deputy Director of Communication Law Research Center of China University of Political Science and Law, Wu Shenkuo, Executive Director of International Center for Internet Rule of Law, Beijing Normal University, China Academy of Information and Communications Technology Wei Kai, deputy director of the Institute of Computing and Big Data, and Zhao Wenbiao, president of Ant Group's security business group, expounded their views on the above issues.

  When a person becomes a "battery person", where is it difficult to protect information security?

  In the AI ​​era, many apps need to collect enough user data to support their operations.

For example, short video platform video push, e-commerce platform product recommendation, etc. all need to collect user data before the algorithm can function normally. In this process, users often face the potential risk of exposing privacy.

  "In the Internet era, people have slowly become'battery people'." Zhu Wei said, "In the Internet era, everyone has become a means, not an end, through algorithms, artificial intelligence, and data collection. Consumers and users In many platforms, they use their own data to "accumulate energy" for these platforms. Whether this kind of ecology is desirable, and where the pros and cons are related, I think it needs to be resolved."

  In Zhu Wei’s view, to solve the problem of the balance between technological development and user information protection, it is necessary to clarify the problem of big data property rights. The concept of personal information has been described in detail in the draft and other relevant laws, but it has not made specific provisions on the nature of big data. After the final review of the "Civil Code", the data information was included in the "Civil Code". We have objected to the issue of intellectual property in the Civil Code because data information includes both big data and personal information. Personal information is the right to privacy and cannot be transformed into big data, at least to a certain extent. Yes, because there was a huge controversy, the "Civil Code" later deleted this article."

  The Shell Finance reporter noted that Article 127 of the Civil Code stipulates that if the law has provisions on the protection of data and network virtual property, follow those provisions.

  "So we can find that personal information and big data are inextricably linked. In the field of industry application, the property rights of big data have not yet been clarified. At present, the state is issuing guidance on the digital economy, and some have not yet When it is announced to the public, I believe that the concept of data information will become clear at least in the field of property rights." Zhu Wei said.

  In addition, Zhu Wei believes that when personal information is intertwined with other laws, the problem becomes more complicated.

"At present, the Criminal Law, the Personal Information Protection Law, etc. all have relevant regulations on the scope of sensitive information, and the connotation and extension are completely different. This raises a very interesting question: when we researched the sensitive information Information, we must first ask which law it is. So should there be a commander, at least conceptually, but it seems not yet. Now when we study some legal issues, it’s not just personal information. The issue of protection is an issue where the protection of personal information and other legal relationships intersect each other, which complicates the issue itself."

  What is the risk of digital transformation from an enterprise to an international society?

  In fact, the data contributed by each user will eventually converge into a data torrent, where individuals, industries, countries, and the international community are intertwined.

In addition to users, what risks do companies face in the process of digital transformation?

  "What is the risk behind'digitalization'? It refers to the risks that users face and attendant while enjoying the convenience and inclusiveness brought by digitalization in life in the digital economy. For example, for industry merchants It is said that the “marketing capital risk” caused by the Wool Party is enough to destroy the marketing activities elaborated by merchants. For individual users, problems such as online fraud and account embezzlement have become high-incidence and harmful in the digital economy. A huge security problem. Today's black production crimes are increasingly multi-platform, multi-link, team-based and intelligent. This makes fighting against black production and preventing intelligent risks has been transformed into a new proposition." Zhao Wen Biao said.

  Zhao Wenbiao revealed that as early as six or seven years ago, the ant team had discovered traces of AI in its usual response to black production attacks.

"It cannot be ignored that with the rapid development and blessing of artificial intelligence technology, this risk will continue to increase and evolve into the risk behind'intelligence'."

  So, when we expand our horizons from individual users and enterprises to the international community, how will the risks of digitalization change?

  In Wu Shenkuo's view, with the acceleration of digital transformation, the economic structure, people's lifestyle, social governance and even the national and global governance levels have undergone very big changes.

  Wu Shenkuo believes that in the process of this change, we need to pay attention to three complexities. "The first is the complexity of the subjects involved in data activities, from individual users to industries, countries, and even the international community. In this process, subjects The complexity of the structure is the existence of cross-department, cross-industry, and cross-country, and this makes the scenes faced in the process of data processing and data activities more complicated, and in the rapid iterative update, this is the complexity of the second scene Therefore, we have summarized the rules in some traditional scenes. When facing new scenes, we may face very big application difficulties. Therefore, in this context, a third complexity is formed, which is the appeal. Complexity."

  "For example, even in the case of a single subject, the subject's appeals at different stages are different. At a certain stage, it may pay more attention to its own privacy, and the protection of its own personal information may be affected in certain scenarios. We are more inclined to pursue certain economic interests or other types of interests. Therefore, we are facing a very complicated situation or in a new stage in this situation. We need to have a very broad perspective to look at this phenomenon. "Wu Shenkuo said.

  How to protect the development of the digital economy?

Use AI against AI

  What should we do in response to so many complex problems?

Experts gave different suggestions.

  First, there is a sufficient incentive mechanism.

  In Wu Shenkuo's view, in the process of data business and data transfer and utilization, the asymmetry of knowledge and capabilities has led to insufficient transparency in many cases, which in turn led to insufficient trust. Degree is the basis for us to give effective trust in digital life. After we have sufficient credit, we need a necessary incentive degree. At present, all kinds of data-driven innovations are constantly promoting (economic development). In this process, how to ensure and how to maximize the value of the subjects who have made contributions in various data activities such as data circulation and utilization, and to give it the necessary promotion, is a point that we need to pay special attention to."

  "We are pleased to see that the "Data Security Law" and the "Personal Information Protection Law" that will be promulgated in the future are formulating some rules for the development of the digital economy. This is urgently needed by the market, but it is not trivial. It may only be possible. Principle. As for how to implement it, detailed rules and transparency are needed, and companies need to be motivated to implement this mechanism, such as explicit incentives for their reputation. This requires supporting measures, not just punishment." Wei Kai Express.

  In addition, the use of technology to help solve security problems is also a common point of view among experts.

  In Wei Kai's view, in the past few years, the application of big data focused on making reports, making large screens, and giving decision makers intuitive and relevant data.

But now the technical application of big data is often not the case, but has gone deep into the closed loop of decision-making.

"Previous reports, after reading the report, the decision-making still depends on people to make decisions, but now a lot of big data risk control, big data precision advertising, in fact, people are not in the closed loop, as long as people set the rules, data-driven can be closed loop automatically. implement."

  "Now, a new model is emerging. For example, blockchain technology allows us to no longer centralize data and enjoy the dividends of data fusion. At present, this type of technology is rapidly heating up, which may create a new The application model of big data." Wei Kai said.

  Zhao Wenbiao said that traditional risk control is subject to technology costs, data scale and algorithm efficiency, and many scenarios are driven by expert experience rather than data intelligence.

"Alipay has hundreds of millions of transactions every day. Faced with such a huge amount of calculations, once the decision is delayed, it gives the black industry an opportunity. Therefore, the development of a next-generation risk control technology system for trusted artificial intelligence technology has become Our only way."

  For example, he said that through the deep integration of artificial intelligence and financial risk control, Alipay's AI brain AlphaRisk can respond to risks in milliseconds in a fully automatic mode with zero manual intervention.

For example, in the network fraud risk identification scenario, when the system recognizes that the user is at risk of fraud, the AI ​​robot will call the user a "wake-up call" at a speed of less than 0.1 seconds.

In addition, while quickly responding to current risks, AlphaRisk also has the ability to self-learn and adapt, thereby transforming security from static passive defense to dynamic active confrontation.

  The Shell Finance reporter also found that while discussing the development of the digital economy, many experts regarded security as a potential "shortcoming" of the economic development barrel, and believed that full attention should be paid to risk prevention and control in the digital economy era.

  "In the past, when we developed any industry, we were inclusive and prudent, but now we are more prudent and inclusive. In the past, efficiency was the first priority, and safety was the second priority. We will talk about development first. Now it seems that safety may be the shortcoming of the barrel. The Internet industry, scale, and technology have developed very quickly. If you pursue security issues, you will definitely sacrifice the market and efficiency. But from a long-term perspective, I think this approach is no problem." Zhu Wei said .

  Luo Yidan, Shell Financial Reporter, Beijing News

  Special 32-Special 33 edition pictures/pictures courtesy of guests