(Observation of the NPC and CPPCC) Three major challenges must be faced to build a "digital China"

  China News Service, Beijing, March 7th, title: Three major challenges must be faced to build a "digital China"

  China News Agency reporter Li Jinlei

  The digital economy has become the commanding heights of competition among major powers.

In the "14th Five-Year Plan" and the draft of the 2035 long-term goal outline, a separate chapter is set up for "Accelerating Digital Development and Building a Digital China", and an indicator of "The Value Added of the Core Industries of the Digital Economy as a Percentage of GDP" has been added: To 10%.

  China has produced the "construction drawings" for ushering in the digital age, showing the outside world its ambition to build a network power.

"I am delighted to see a future-oriented China." Jin Li, a member of the National Committee of the Chinese People's Political Consultative Conference and deputy director of the Department of Economics and Management of Peking University, told a reporter from China News Agency.

  In the opinion of the representatives and committee members participating in the National People's Congress and the People's Republic of China, the following challenges still need to be overcome to build a digital China.

  One is the "data island".

  The draft planning outline proposes to create new advantages of the digital economy, strengthen the innovative application of key digital technologies, and accelerate the promotion of digital industrialization. It also lists cloud computing, big data, Internet of Things, industrial Internet, blockchain, artificial intelligence, and virtual reality ( Seven key industries of digital economy including VR) and augmented reality (AR).

  In Jin Li's view, China has a population of 1.4 billion, with nearly 1 billion Internet users, generating massive amounts of data every day, and rich application scenarios. This is China's advantage in developing a data economy.

However, as companies on different platforms have formed relatively closed ecosystems, various "data islands" and "data chimneys" have emerged, breeding chaos such as big data killing and "choosing one between two", and the potential of data as a production factor cannot be fully released. .

  Yang Song, deputy to the National People's Congress and vice president of Liaoning University, said that a series of issues such as the nature, boundaries, and operation of data rights require responses to the anti-monopoly law and related supporting regulations.

  In accordance with the requirements of the draft plan, enterprises are encouraged to open up search, e-commerce, social and other data.

Strengthen the economic supervision of Internet platforms in accordance with laws and regulations, clarify the positioning of platform enterprises and regulatory rules, improve the legal norms for determining monopoly, and crack down on monopoly and unfair competition.

  The second is the "data gap."

  The draft plan outlines a new picture of a beautiful digital life, and calls for accelerating the pace of building a digital society and building a digital life that all people can enjoy.

However, the elderly cannot enjoy the digital life like the young, and the problem of "data gap" has become prominent.

  Lei Jun, deputy to the National People’s Congress and Chairman and CEO of Xiaomi Group, suggested that complete information equipment fitness standards and standards should be issued as soon as possible, and public digital platforms and service systems at all levels should be promoted to complete the "aging reform", and give priority to solving online appointments, transportation, and transportation for the elderly. High-frequency service matters such as smart code scanning.

  Zhong Ying, a member of the National Committee of the Chinese People's Political Consultative Conference and a member of the Standing Committee of the Beijing Municipal Committee of the China Democratic National Construction Association, told a reporter from China News Agency that as the digital economy has entered a deepening stage, the government should also shift from "overflow irrigation" to "precise drip irrigation" in terms of policy formulation and services. .

  How can the elderly not be left behind or become "outsiders" in the digital age?

The draft plan proposes to strengthen the education and training of digital skills for all citizens, and popularize and enhance citizens' digital literacy.

Speed ​​up the construction of information barriers and help the elderly and the disabled to share their digital lives.

  Third, data security and network security.

  Digital technology is a "double-edged sword". While bringing a better intelligent life, it also brings new security challenges, involving data security and network security.

  Zhou Hongyi, a member of the National Committee of the Chinese People's Political Consultative Conference and founder of 360 Group, pointed out that in the digital age, everything is programmable, everything must be connected, big data drives business, and software is redefining the world.

If it is software, loopholes are inevitable, and loopholes may be exploited for network attacks.

Network security is the "base" of digital strategy. With the guarantee of network security, digital strategy can develop better.

  Yuan Yafei, member of the National Committee of the Chinese People’s Political Consultative Conference and chairman of Sanpower Group, told a reporter from China News Agency that artificial intelligence has promoted the rapid development of the industry, and enterprises themselves are also facing the problem of “digital transformation”. How to realize the collection and application of consumer data in accordance with the law, and ensure the safety and security of data elements. Reliability and controllability are very important issues.

  The draft planning outline has a key layout for this: speed up the advancement of basic legislation in the fields of data security and personal information protection, and strengthen the security protection of data resources throughout the life cycle.

Improve network security threat discovery, monitoring and early warning, emergency command, and attack source tracing capabilities.