Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Methods and tools for industrial big data software development
    • WANG Jianmin
    • Information and Communications Technology and Policy. 2020, 46(10): 1-5.
    • Abstract ( 782 )   
    • Industrial big data is the general term for industrial-related data sets, and is the core element of intelligent manufacturing and Industrial Internet. Industrial big data software includes system software, domain platforms, and enterprise applications, which can collect, manage, process, analyze, and apply Industrial Internet data. This article analyzes the challenges of industrial big data software development in the intelligent Industrial Internet application scenario, focusing on how to effectively collect, store and analyze industrial IoT time series data, how to reduce the technical threshold of big data processing and analysis, and how to build industrial big data applications quickly and at low cost. Finally, it introduces a big data software tool set, and looks forward to the future application and development.
    • Related Articles | Related Articles | Metrics
    • The Industrial Internet has achieved remarkable results while accelerating development
    • LI Haihua
    • Information and Communications Technology and Policy. 2020, 46(10): 6-9.
    • Abstract ( 561 )   
    • The Industrial Internet innovation and development project implemented for three years has strongly promoted the research of key core technologies, the construction of public service platforms and the cultivation of system solution providers, and promoted the construction of key projects such as the “5G+Industrial Internet” 512 project, Industrial Internet identification analysis of the national top node, and Industrial Internet security situation awareness platform.This paper summarizes the main achievements of China􀆳s industrial Internet, analyzes the difficulties and pain points in the development, and prospects the future development.
    • Related Articles | Related Articles | Metrics
    • Architecture and deployment progress of identifier resolution system for Industrial Internet
    • XIE Jiagui, QI Chao, ZHU Jiajia
    • Information and Communications Technology and Policy. 2020, 46(10): 10-17.
    • Abstract ( 778 )   
    • The Industrial Internet is the deep integration of the new generation of network information technology and the manufacturing industry. It is an important infrastructure to realize industrial digitization, networking, and intelligent development. Through the comprehensive interconnection of people, machines and things, as well as the comprehensive link of all elements, entire industry chain and the entire value chain, Industrial Internet promotes the formation of a new industrial manufacturing and service system. The article introduces the background, system design, deployment architecture of identifier resolution, and briefly explains the current operation.
    • Related Articles | Related Articles | Metrics
    • Research on 5G+ Industrial Internet security
    • YUAN Jie, ZHANG Feng, YU Le
    • Information and Communications Technology and Policy. 2020, 46(10): 18-22.
    • Abstract ( 522 )   
    • There are security issues in the progress of 5G+ Industrial Internet cross-border integration. The development of 5G+ industrial Internet requires all industries to jointly create a “5G+” security ecosystem. This article introduces the development of 5G+ industrial Internet in China, analyzes the security situation and risks, finally puts forward ideas for advancement and suggestions.
    • Related Articles | Related Articles | Metrics
    • Security risk analysis model for identifier resolution system of Industrial Internet
    • CHI Cheng, MA Baoluo, TIAN Juan
    • Information and Communications Technology and Policy. 2020, 46(10): 23-27.
    • Abstract ( 358 )   
    • Identifier and resolution system of the Industrial Internet is the “neural hub” for coordination. Catastrophic damage to the whole Industrial Internet industry ecology may be caused if the identifier resolution system is attacked. Moreover, it may become a threat to national security. Therefore, security plays an important role in identifier resolution system. This paper analyses an innovative security risk model, which can help control risks from the root at the initial stage of Industrial Internet construction, provide guidance for related enterprises in the early design stage of identifier resolution system, and promote the sustainable development of the industrial identifier resolution system.
    • Related Articles | Related Articles | Metrics
    • Research on Industrial Internet networking architecture and key technologies in oil and gas field production
    • DU Qiang, LIU Xiaotian, WANG Liang, ZHANG Liang
    • Information and Communications Technology and Policy. 2020, 46(10): 28-34.
    • Abstract ( 416 )   
    • As the starting link of the petrochemical industry chain, the application of the Industrial Internet in oil and gas field production is of great significance for improving the production efficiency and safety level, driving the continuous improvement of the product and service quality of the entire industrial chain. Based on the current status and needs of network construction in the field of oil and gas production, this paper proposes an Industrial Internet networking architecture, studies the key technologies involved in its construction, and prospects the future development trend of the architecture.
    • Related Articles | Metrics
    • Research of data security in Industrial Internet
    • DONG Yue, LI Yi, QIN Guoying, LI Shan
    • Information and Communications Technology and Policy. 2020, 46(10): 38-41.
    • Abstract ( 379 )   
    • With the development of industrial technology, the data security is becoming a critical part in the development of Industrial Internet system. This paper introduces the characteristics of Industrial Internet, and the data security risks through different development phases. Then, it presents the current researches and future development about data security protection technology in Industrial Internet system.
    • Related Articles | Related Articles | Metrics
    • Discussion on efficient operation of digital government
    • CHEN Dequan, WANG Li, ZHENG Yumei
    • Information and Communications Technology and Policy. 2020, 46(10): 42-46.
    • Abstract ( 380 )   
    • The construction of digital government in China has experienced three stages: germination, growth and consolidation. At present, it has entered a comprehensive upgrading period. The theoretical system of digital government in China has gradually formed, the infrastructure has been continuously consolidated, and the development mode has been continuously innovated. However, there are still some problems in the development of digital government, such as isolated data island, imperfect operation guarantee mechanism and failure of operational systems interconnection. In view of these problems, it is suggested to improve the government governance mode driven by the middle platform, promote data sharing and opening, and improve the operation guarantee system of digital government, so as to promote the efficient operation of digital government and realize the digital transformation of government management and service.
    • Related Articles | Related Articles | Metrics
    • The use and protection of personal information in public interest
    • FAN Yuji, XU Lihang
    • Information and Communications Technology and Policy. 2020, 46(10): 47-54.
    • Abstract ( 332 )   
    • Since the outbreak of COVID-19, citizens􀆳 personal information has been widely collected and applied to achieve joint prevention. Due to the special needs of epidemic prevention in China, it is necessary to implement consent exemption for the collection and use of personal information, and clearly define the scope of the necessity of public interest. However, taking public interest as the legal basis does not represent the legality of the whole behaviour of using personal information, and the specific provisions of personal information protection law must be followed.Finally, this paper proposes specific measures for personal information security protection.
    • Related Articles | Related Articles | Metrics
    • Challenges and considerations for 5G application development
    • LU Yang
    • Information and Communications Technology and Policy. 2020, 46(10): 55-58.
    • Abstract ( 332 )   
    • As a key infrastructure for the digital transformation of the economy and society, 5G has a strong spillover effect, and promotes high-quality economic and social development by stabilizing investment, promoting consumption, increasing employment, and adjusting structure. Currently, 5G industrial applications in China are demonstrated by leading enterprises, and the transformation from policy guidance to large-scale applications has not yet been achieved.This paper analyzes in detail the challenges for 5G applications at this stage, and the root causes of the problems from the perspective of economics, thus proposes policy suggestions in three aspects: creating model benchmarks, exerting platform efficiency, and improving public policy.
    • Related Articles | Related Articles | Metrics
    • Problems and countermeasures of sustainable development of digital transformation in China in the post-epidemic era
    • WANG Chaoxian, ZHANG Weidong
    • Information and Communications Technology and Policy. 2020, 46(10): 59-62.
    • Abstract ( 625 )   
    • The COVID-19 epidemic highlights the value of digital transformation, creates a large number of new digital needs and application scenarios, and pushes digital transformation into an accelerated development track. However, whether short-term opportunities can be consolidated and upgraded into a long-term sustainable development advantage faces many challenges. In the post-epidemic era, we should make great efforts and take multiple measures on strengthening construction, consolidating and upgrading, adjusting and improving, so as to promote the long-term sustainable development of digital transformation in China.
    • Related Articles | Related Articles | Metrics
    • Opportunities, challenges and countermeasures for accelerating the digital transformation of SMEs in the post COVID-19 era
    • GUO Liangtao
    • Information and Communications Technology and Policy. 2020, 46(10): 63-66.
    • Abstract ( 939 )   
    • The COVID-19 has had a significant impact on the survival and development of small and medium-sized enterprises (SMEs). Digital transformation will help SMEs better cope with the epidemic, help them resume work and production, and enhance their future competitiveness. Before the epidemic, the digital transformation of SMEs was a hot and difficult issue for the government and the industry. Under the impact of the epidemic, SMEs are facing new opportunities in their digital transformation, including increased awareness and a more solid foundation for transformation. They are also facing new challenges, including reduced investment capacity and unsustainable growth momentum. This paper analyzes the opportunities and challenges in accelerating the digital  transformation of SMEs in the post-epidemic era, and gives countermeasures and suggestions.
    • Related Articles | Related Articles | Metrics
    • Assessing the effectiveness of telecom universal service in China from the perspective of index evaluation
    • WANG Zejue, DANG Meimei, LI Shaohui, SU Juan
    • Information and Communications Technology and Policy. 2020, 46(10): 73-77.
    • Abstract ( 314 )   
    • The telecom universal service pilot is an important task for the implementation of the Party Central Committee and the State Council. It is a project for benefiting the people and people􀆳s livelihood to narrow the digital divide between urban and rural areas. Based on the method of data analysis, constructing the evaluation index for assessing the effectiveness of telecom universal service can provide a reference for achieving comprehensive evaluation of the service, which helps to promote the development of rural and remote areas. Based on the real-time data of telecom universal service management, this paper constructs an evaluation model to evaluate the effectiveness of implementation.
    • Related Articles | Related Articles | Metrics
    • Research on end-to-end network slicing technology based on AI in mobile networks
    • LI Jing, DONG Qiuli, YE Yukai
    • Information and Communications Technology and Policy. 2020, 46(10): 78-83.
    • Abstract ( 336 )   
    • In order to cope with the challenges of vertical industry application and massive data distribution of mobile network differentiation in the future, the use of network slicing technology to transform the existing network architecture is widely recognized. Focused on the problems of air interface in mobile network, this paper proposes an end-to-end network slicing architecture including the virtualization of wireless access network, and a mapping method of service level protocol parameters based on network big data. A feasible method of slicing resource management provides practical reference for the realization of AI-based end-to-end network slicing in mobile networks.
    • Related Articles | Related Articles | Metrics
    • Research on small bandwidth service transport technology for 5G+vertical industries
    • ZHANG Meng
    • Information and Communications Technology and Policy. 2020, 46(10): 88-92.
    • Abstract ( 320 )   
    • With the advent of the 5G era, new changes appears in the business model of the telecommunications industry, and 5G + vertical industry application models have become an inevitable trend. As an important type of business in vertical industry applications, massive small bandwidth service has attracted the attention of industry users, operators and equipment manufacturers. This article analyzes the needs of small-bandwidth applications in 5G bearer networks based on the current situation and future trends, introduces standardized small particle technology, and proposes urgent problems and development directions in the future.
    • Related Articles | Related Articles | Metrics
    • Research on Internet of Things terminals security capabilities
    • LIN Meiyu, WANG Yazhong
    • Information and Communications Technology and Policy. 2020, 46(10): 93-96.
    • Abstract ( 268 )   
    • With the official commercialization of 5G, the Internet of Things has entered a period of rapid development, and the number of Internet of Things terminals has also shown an exponential growth. The following security issues of the Internet of Things have also attracted more and more attention. Internet of Things terminals have become the main target of Internet of Things attacks due to their simple structure, large number, and unattended problems. This article introduces the basic architecture of IoT terminals according to the characteristics of IoT terminals, points out the security risks faced by IoT terminals, and puts forward the security capabilities that different modules of IoT terminals should have for different risks.
    • Related Articles | Related Articles | Metrics