1930 lines
119 KiB
JSON
1930 lines
119 KiB
JSON
|
|
{
|
|||
|
|
"query": "企业在数据安全技术体系建设方面,目前主要以什么理念为主?",
|
|||
|
|
"answer": "【检索结果汇总】\n\n查询问题:企业在数据安全技术体系建设方面,目前主要以什么理念为主?\n\n检索到 113 个相关段落:\n\n【事件信息】\n\n事件1:会议讨论了数据安全技术体系建设\n\n事件2:56.0%的受访企业计划在未来一年内引入新兴技术促进数据安全流通\n\n事件3:52.0%的受访企业将数据流通共享的新兴技术纳入数据安全技术体系\n\n事件4:部署数据安全防护类产品的受访企业占比达到96.0%\n\n事件5:部署数据安全防护类产品的受访企业占比96.0%\n\n事件6:目前需求侧以‘防’为主的数据安全防护理念\n\n事件7:52.0%的受访企业已将促进数据流通共享的新兴技术纳入了企业的数据安全技术体系\n\n事件8:新兴技术发展应用的‘助推器’\n\n事件9:56.0%的受访企业将‘引入新兴技术,促进数据的安全流通’列为未来一年的重点任务\n\n事件10:未来一年的重点任务\n\n事件11:定期组织会议交流最新政策、共享数据资源,沟通合作进展和协调解决合作中遇到的问题\n\n事件12:厂商分类\n\n事件13:企业面对数据安全建设的痛难点包括不清楚如何进行数据安全技术产品或服务的选型、老旧系统改造难、缺少资金支持、缺少数据安全建设方法论、缺少专业的数据安全人才等\n\n事件14:超过70%的受访企业在数据安全相关制度体系和技术体系建设方面开展相关数据安全工作\n\n事件15:数据安全行业面临人才短缺和监管要求与体系建设的间隔盲区问题\n\n事件16:企业通过部署相关数据安全技术产品、编制数据安全相关制度文件、设置数据安全管理责任部门与责任人等方式开展数据安全工作\n\n事件17:行业趋势分析\n\n事件18:需求侧企业共识以风险评估推进数据安全体系建设\n\n事件19:企业重视建立数据分类分级常态化运营机制与数据合作方管理机制\n\n事件20:企业注重吸纳数据安全人才并搭建复合化人才梯队\n\n事件21:安全厂商在数据安全领域激烈竞争\n\n事件22:传统网络安全头部厂商业务中心逐步移向数据安全领域\n\n事件23:数据安全作为新一代信息安全领域核心已获得市场认同\n\n事件24:厂商类型定义中综合型厂商占比最高\n\n事件25:综合型厂商依托业务沉淀大量安全技术及应用经验,业务重心逐渐移向数据安全领域\n\n事件26:专业型厂商在数据库安全领域具备丰富积累与沉淀\n\n事件27:数据安全业务已成为其机构的主营业务\n\n事件28:新兴型厂商基于特定新兴技术开展数据流通安全\n\n事件29:主要是近年的初创厂商,在此领域表现出活跃\n\n事件30:数据安全产品和服务需求在政务、金融等行业较高\n\n事件31:数据安全产业的持续发展\n\n事件32:数据安全服务行业分布\n\n事件33:服务能力提升成为厂商的竞争优势\n\n事件34:回收75份有效问卷样本\n\n事件35:回收37份有效问卷样本\n\n事件36:覆盖不同产品类型及从业人员规模的企业\n\n事件37:覆盖不同行业、人员规模及数据规模的企业\n\n事件38:数据安全进入高质量发展阶段\n\n事件39:超过70%的受访企业已开展相关数据安全工作\n\n事件40:数据安全相关制度体系和技术体系建设方面\n\n事件41:企业通过完善业务场景数据安全建设方案\n\n事件42:数据安全管理与技术的协同能力\n\n事件43:企业不清楚如何进行数据安全技术产品或服务的选型\n\n事件44:数据安全建设面临的痛难点\n\n事件45:企业面临数据安全建设的痛难点\n\n事件46:不清楚如何进行数据安全技术产品或服务的选型,老旧系统改造难,数据安全策略无法落地,缺少资金支持,技术工具缺失,数据与业务紧耦合,组织内部全流程协作拉通困难<EFBFBD><EFBFBD>
|
|||
|
|
"query_complexity": {
|
|||
|
|
"is_complex": true,
|
|||
|
|
"complexity_level": "complex",
|
|||
|
|
"confidence": 0.95,
|
|||
|
|
"reason": "这是一个复杂查询,需要生成多方面的个子查询来回答。用户询问的是关于企业在数据安全技术体系建设方面的核心理念,这可能涉及到多种不同的数据安全策略、技术趋势、行业实践等多个方面。为了全面回答这个问题,可能需要查询和整合关于数据安全领域的理论、实际案例、行业报告等多种来源的信息。"
|
|||
|
|
},
|
|||
|
|
"is_complex_query": true,
|
|||
|
|
"retrieval_path": "complex_hipporag",
|
|||
|
|
"iterations": 0,
|
|||
|
|
"total_passages": 113,
|
|||
|
|
"sub_queries": [
|
|||
|
|
"企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?"
|
|||
|
|
],
|
|||
|
|
"decomposed_sub_queries": [
|
|||
|
|
"企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?"
|
|||
|
|
],
|
|||
|
|
"initial_retrieval_details": {},
|
|||
|
|
"sufficiency_check": {
|
|||
|
|
"is_sufficient": true,
|
|||
|
|
"confidence": 0.9,
|
|||
|
|
"reason": "事件信息和段落信息包含了回答查询所需的关键内容...",
|
|||
|
|
"iteration": 0
|
|||
|
|
},
|
|||
|
|
"current_sub_queries": [],
|
|||
|
|
"is_sufficient": true,
|
|||
|
|
"all_documents": [
|
|||
|
|
{
|
|||
|
|
"page_content": "会议讨论了数据安全技术体系建设",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "743dea2ba399a8878d225879ffcf6e5a7119670cc5755f1019aad953a207949e",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.03662401405552836,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 1,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "56.0%的受访企业计划在未来一年内引入新兴技术促进数据安全流通",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "246456c447aced71c2e45e54833b0ee4dab94b449d11963b5a4396652c718d33",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.013318543985064034,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 2,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "52.0%的受访企业将数据流通共享的新兴技术纳入数据安全技术体系",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "4785688303faae399af98021ea978b97c41fd6d9cd58cca60d4b7fdf2f9b232b",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.01275859939363439,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 3,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "部署数据安全防护类产品的受访企业占比达到96.0%",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "eaba7758b75ebc1afdd56267964ad71d7e2a483642cffcd249f442791ed214d4",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.009891451116089398,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 4,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "部署数据安全防护类产品的受访企业占比96.0%",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b6ed399ddee51e7ddb0c54e51c07785d816a8ea800fdd6e8abe8948eca9e6c12",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.007173688066061335,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 5,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "目前需求侧以‘防’为主的数据安全防护理念",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "401a4f11823f2419974db7d63f24e150ade362efeafb1bff418e975288807cdd",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.007173688066061335,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 6,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "52.0%的受访企业已将促进数据流通共享的新兴技术纳入了企业的数据安全技术体系",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "4e0eb2ed6b31718c28305b91316af8d7c3dc86c0ecdbbc49b95f831ba015ad4e",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.007173688066061335,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 7,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "新兴技术发展应用的‘助推器’",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "43983cc46d29e4c19d7f84708c1bcbccea16c31061f62df37dfe6afb40f2f1a4",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.007173688066061335,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 8,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "56.0%的受访企业将‘引入新兴技术,促进数据的安全流通’列为未来一年的重点任务",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "2eb8b9c1d9b97ac7d5773bfab4fa1c267debd1bbe35c4b9cd1176fa933034573",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.007173688066061335,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 9,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "未来一年的重点任务",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "5e188d5241a493a8643971058be0e7a9ca49d1c54e243aaed42e50d59cc4474c",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.007173688066061335,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 10,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "定期组织会议交流最新政策、共享数据资源,沟通合作进展和协调解决合作中遇到的问题",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "98814bc859d7ee3e24e493479cb7d5ee2e75e659202de9d8947618213dde072f",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.004531783893447924,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 11,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "厂商分类",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "cc03f26f62077909b70c96e69ddfec9f75aed2e3445447ff80d01a71d9980cd0",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0024642420540123325,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 12,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业面对数据安全建设的痛难点包括不清楚如何进行数据安全技术产品或服务的选型、老旧系统改造难、缺少资金支持、缺少数据安全建设方法论、缺少专业的数据安全人才等",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "1b08af9f9ff5a99c6d75dc84cd40132c1322743d78188b5cef0e23af460649a5",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.002347431406781997,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 13,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "超过70%的受访企业在数据安全相关制度体系和技术体系建设方面开展相关数据安全工作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "2be76e39f396a043a122c754e7d23592636b7843b77a3d0886b1b65920be47b0",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0018442670635157908,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 14,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全行业面临人才短缺和监管要求与体系建设的间隔盲区问题",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "64720db225422ab4598f8f5c81c4db876d413ec40c76a11116b135bcdea3ddf7",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001756881057536047,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 15,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业通过部署相关数据安全技术产品、编制数据安全相关制度文件、设置数据安全管理责任部门与责任人等方式开展数据安全工作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b7143dedbcd3c33cd18affa501e0b52e8667a86df8432470611de5cdc586cc0d",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.00174866990121515,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 16,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "行业趋势分析",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "85e5a7d9d226bbab19fbec1a320fecb112559c7b3f9ecc62f973c5802866e694",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0014801485636183026,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 17,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "需求侧企业共识以风险评估推进数据安全体系建设",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "14477ff4f401ea8debd78c82a992bbb93db535c80489c98505435e16abdaaf68",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0014551867198630008,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 18,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业重视建立数据分类分级常态化运营机制与数据合作方管理机制",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "07cf8b771ad257ad4cb1806291d0782aecdf26eadc513cddd2bb3f85821ecfd2",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001391895198709355,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 19,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业注重吸纳数据安全人才并搭建复合化人才梯队",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b564633d3f42a4a4a7edb8e68549dc8ed661d4e5a6245bd05155872079292fee",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001391895198709355,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 20,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "安全厂商在数据安全领域激烈竞争",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "6c5fd6ad11d08b733f4137b26f4e51edccabb54d7a55fdbf16d3ed4cddcd5adf",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0013884918995488538,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 21,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "传统网络安全头部厂商业务中心逐步移向数据安全领域",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "c227df68ff0ccede779f18c41ad8323e268cf66bff15bb559efd7174792e370e",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 22,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全作为新一代信息安全领域核心已获得市场认同",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "c73948bdbb311741b92c73180cbb947a3344a8144abe774958ceaff9983d0261",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 23,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "厂商类型定义中综合型厂商占比最高",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "91f56f02a0eaf42dace4941f97a7435898ca4e4819cf475262e22396aa5d1dd9",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 24,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "综合型厂商依托业务沉淀大量安全技术及应用经验,业务重心逐渐移向数据安全领域",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "0c124b4b493e91843f5654d404224e3dfd155d7a19e19771df8de7ef04b9d6d2",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 25,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "专业型厂商在数据库安全领域具备丰富积累与沉淀",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "17ca6af033468e2e5894cc403501be469b48c0acca1261fd9fa23cc673e11bec",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 26,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全业务已成为其机构的主营业务",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "0e21e35aa621faedce25043538828f808ea7b9b074e5c30d6d27a1d7e845cda9",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 27,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "新兴型厂商基于特定新兴技术开展数据流通安全",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "27587c61497c82df4b97f5116904439ba4dd2e9de82b3158572a8ee7afe95776",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 28,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "主要是近年的初创厂商,在此领域表现出活跃",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "0453ec4fa00c3e1c1479a55bd4788bf87a5da38c3bb8bc8e7f854e35520a0593",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 29,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全产品和服务需求在政务、金融等行业较高",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "19d4ff9bcdc5e5a56b25fc1b156ceaf6ad6305d3b3af35baa3249a455872923e",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 30,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全产业的持续发展",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "088c912dc470c0e386e8742cc441129511cd945244b627d9ce33b6344e70b643",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001244663223752775,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 31,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全服务行业分布",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "d37cd9994986e340403499c49bde6be443409bba62639f03fe04b2f939462c87",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0011819173470047674,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 32,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "服务能力提升成为厂商的竞争优势",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f36e1050b0d1c448d1ee67796350b680fa47400069f419fc0be4331fe29c6a9c",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0011051772454172895,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 33,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "回收75份有效问卷样本",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "6acd49e1749f5b7d4c1225e788abfabfb5c15cb0bf6fc96b5101a4fcf0ef5bc5",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001099154619754046,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 34,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "回收37份有效问卷样本",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b794dca0995ad99c4f4361e8c655e4b995466d829fdda007789e4b0f16a7aa01",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001099154619754046,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 35,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "覆盖不同产品类型及从业人员规模的企业",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "7fa91a6726cee4774a5a2688cdf808e8df2d176873336f89d4d15cebced60c5b",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.001099154619754046,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 36,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "覆盖不同行业、人员规模及数据规模的企业",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "4e135dcafed1f88f403cc70621ffbfa1b6fee4646be4f9cabcd7c17d08c4f737",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010851820086749781,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 37,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全进入高质量发展阶段",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "64e797a1c820ac41b3d36f6f46e32afbfeaab16a37903a97eef5a220a700895b",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010687862144173413,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 38,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "超过70%的受访企业已开展相关数据安全工作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "9d25ac22ddbe80a8f29499568eab163cdc4f74ede50017c649b4d7bbbb5d9524",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 39,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全相关制度体系和技术体系建设方面",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "2059ce5999ceca1744b791e64baddfa2d1937b2dbfdb822dd48767377c0d4577",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 40,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业通过完善业务场景数据安全建设方案",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "1d0fe43623faea104320ae0df5cd869be60a53f341be9de26eba085c28d91ea2",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 41,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全管理与技术的协同能力",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "a1f9dc59b134ad20c480583134e11d0f24537dd223c624dd0bd42f8f0d1ea642",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 42,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业不清楚如何进行数据安全技术产品或服务的选型",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "53865716de623635a9bb43089c704afbf6bcfba3a7602dcfe0ca6b5d71eeee95",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 43,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全建设面临的痛难点",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f61a5992e2909ca1085d6740b97498c99fb6da6a974f8e920fb9bc05dccb9882",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 44,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业面临数据安全建设的痛难点",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "32f163b1de3a2699d094f65498d0ea900776b8cc7141c15bc76cc84e9e5fc9b2",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 45,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "不清楚如何进行数据安全技术产品或服务的选型,老旧系统改造难,数据安全策略无法落地,缺少资金支持,技术工具缺失,数据与业务紧耦合,组织内部全流程协作拉通困难大,缺少数据安全建设方法论,无从下手,缺少专业的数据安全人才,不清楚如何落地监管要求,不清楚当前面临哪些数据安全的问题和风险,内外部环境动态变化,安全状态持续保障难,数据安全防护观念停留在传统安全层面,数据安全体系建设不完善,管理和技术措施易脱节",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "cba3691d6c4d54bac3e6a198c60bace10c32a3c258e5899819bb856fc644fbda",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010667256215344842,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 46,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "中国·北京在12.20-12.21举办回归数据本质应用驱动治理的2023数据资产管理大会",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "17d23d29cebf76e8c7a9852e1fda7d2689c4942aa24fad725939d6453fad7a92",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010436642842240886,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 47,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "产品服务多样化",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "0336621181d3fb1f8f797c7ceffdfbaa5439719bd9d9b5453f1882e853e8201f",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010329466976014975,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 48,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业关注提升数据要素流通的安全保障能力",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b4135192f92aaf55e0dec6a171fb00d781b7d64b146681bf950508d7a67891b3",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010310649096344363,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 49,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "是当前长期发展有待解决的困境",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "68ff2f40a576b3770aaa5454a158267f05c0965ace4024b874aebe2799cccf14",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0009837032820792268,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 50,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "新兴技术的融合应用带来更加便捷、高效、安全的支付服务。",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "5b13aff7c72d2acb559b679cb7dfaf52081fd0779fa161fad123c5cdff7eda40",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0008302694938796166,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 51,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "会议举行",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "538ad631e921436a6575ea11e187ba6033dbe0a28e29b594dbb5bc0a36de3d33",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000828864557393827,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 52,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据作为新型生产要素,已成为我国数字经济发展的核心资源",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "02416518cb79aced696ff539b351a55dbe29d0b17a1413a33b8244cb6a5589ee",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 53,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全至关重要",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "cfae45f1d09a01aabb722ed4995c6da369e5d8f41defac17071ca5294ddc37bc",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 54,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "需求侧受政策要求与数据价值驱动",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "a0f3109ab7181067bd010ca585c7840a6b9757f2ed8a19fdc55fb8e333c68326",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 55,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "逐步开展以数据为中心的安全体系建设",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "fbe9cf25704af39ba7d982129812763a8e7f74413261395750c669435319d5aa",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 56,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "供应侧受市场需求引导",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f7dd0301f07768769d3dc1b4c3dd243f23e4120308a3c5f805dbca1f7cbe468e",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 57,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "进行产品服务的迭代升级",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "483c0691db9e6381cac4eeee38b76b3db7a8ff0bc58af3d9ae14fd71e11bb5fe",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 58,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全需求侧回收75份有效的问卷样本",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f02b6dfd2407923fd0eda2f2bd38eae6d4e43f98fd7494a636ea5a46b8beecf6",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 59,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "覆盖了不同行业、不同人员规模以及不同数据规模的不同企业",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "89233829b594389de1d44c200bcd6453fbedcb0fa71d36c33db873c81b2ebe82",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 60,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "安全供应侧回收37份有效的问卷样本",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "34517773fde1c673eb5a8443da6f83a81017d83d80a83959f4521928c8f1ed14",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 61,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "覆盖了不同产品类型、不同从业人员规模的不同企业",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "aaa10472166ab67096ebbd4b8ab7c6a902f198d756866764267f9f7fa9d174b1",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 62,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "国内外数据泄露事件频发",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "5639882266ff70e1451ad37d529bd439d90a7f1322853507122edc7826223c4d",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000802737192747929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 63,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "新兴技术的监管措施与规范的不完善可能导致数据安全风险",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "2186afc24f6927465c649c70558f7b115dda0771fd6a525652c367bef66d105b",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0008025402938071443,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 64,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "推进数据安全行业发展",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "4c2fbd18813f910e089546aceeefbae0409fbf31a8ffe0602bc6f093ead4bb38",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007582280030703657,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 65,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "新兴技术将更广泛地应用于支付领域,提升用户体验。",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "010a392ff9d1520e13e09af3e3c464fb17310e8029ae8906e7a7a0588ee64d17",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007510951425792064,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 66,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "讨论数据安全行业整体视图",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "158d621894aa3f9b5c00be0c89ea83b6d847d8e43cab993ccb76e2d39df79ff0",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007253369242315728,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 67,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "洞察数据安全需求侧建设现状与挑战",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "72ada3bcca76e80a147ed89ab635f10c0708fad6efd3d1d40fd03055434194b1",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007253369242315728,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 68,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "了解供应侧数据安全业务布局与产品服务技术形态",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "8d2900d1e2bfa1f67dfbdcec2f88f8907cf52f62affd24d76e0f950aceabd4d8",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007253369242315728,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 69,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "搭建供需双方交流平台",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "a622128441153b949b42ae00d74c897626594ab9f441954a6329d3d7c93cd0cb",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007253369242315728,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 70,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据研发全链路的监测、运维监控、运维告警、运维操作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "c8815f1989c2f8f02b081f30c246e90a8919ce654911518e781b6dbb41299d7c",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007038556773837911,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 71,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据要素市场化深入发展促进数字经济发展",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "77deaeb9928915ce9afa103fedb06b0b378fa3c2feddd231a12eedbbfb846111",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0006330842138763291,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 72,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "保证提前发现问题并处理问题",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "7356cdfec5225541771853718e8298de905664a149fb82c03e20908724c47d4c",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0005974659792998461,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 73,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据需求方主动通过自助分析平台进行数据探查",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "cdb84a3fa8076bee4776cf0f4055467733ffde54e63d02d3314cc68de48b6995",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0005973840150225433,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 74,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "加强数据研发全生命周期的风险识别和风险预测",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "559ab78f597f7b052dd53ee9a390c3ce01742f56f99379a2a27f54c9fab787c0",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0005435989647447501,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 75,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "# 数据安全技术体系建设:仍以“防”为主,数据流通促进新兴技术应用\\n\\n中国·北京 12.20-12.21\\n\\n回归数据本质 应用驱动治理\\n\\n## 2023数据资产管理大会\\n\\n### 数据安全需求侧数据安全工具部署类型\\n\\n| 类别 | 部署比例 |\\n\\n| :------------------ | :------- |\\n\\n| 数据资产识别类产品 | 82.7% |\\n\\n| 数据风险检测类产品 | 41.3% |\\n\\n| 数据安全防护类产品 | 96.0% |\\n\\n| 数据安全监测类产品 | 72.0% |\\n\\n| 数据流通共享类产品 | 52.0% |\\n\\n| 数据安全综合类产品 | 61.3% |\\n\\n分类来源:《数据安全产品与服务图谱(2.0)》\\n\\n### 01 数据安全技术体系建设仍以“防”为主\\n\\n> 部署数据安全防护类产品的受访企业占比 96.0%。这体现了目前需求侧以“防”为主的数据安全防护理念。\\n\\n\\n\\n### 02 共享流通需求是新兴技术发展应用的“助推器”\\n\\n> 52.0%的受访企业已将促进数据流通共享的新兴技术纳入了企业的数据安全技术体系。\\n\\n\\n\\n> 56.0%的受访企业将“引入新兴技术,促进数据的安全流通”列为未来一年的重点任务。\\n\\n",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "5e8d5dda1773e2ddfaf6ea2acd264dd0bb48f2027dbb6cf6de96087b8b4231cf",
|
|||
|
|
"node_type": "text",
|
|||
|
|
"ppr_score": 0.14426595515929289,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.4714137870399554,
|
|||
|
|
"rank": 76,
|
|||
|
|
"source": "hipporag2_langchain_text",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "# 数据安全治理体系建设:呈“上下贯通、技管结合”的发展趋势\\n\\n中国·北京 12.20-12.21 回归数据本质 应用驱动治理\\n\\n2023数据资产管理大会\\n\\n## 自上而下:在数据安全相关制度体系和技术体系建设方面,均有超过70%的受访企业已开展相关数据安全工作。\\n\\n\\n\\n### 数据安全需求侧数据安全工作开展情况\\n\\n| 项目 | 比例 |\\n\\n| :---------------------------------- | :--- |\\n\\n| 数据安全现状摸排 | 76.0% |\\n\\n| 数据分类分级 | 78.7% |\\n\\n| 定期数据安全评估 | 74.7% |\\n\\n| 开展数据安全人员能力培训 | 46.7% |\\n\\n| 数据出境安全管理 | 14.7% |\\n\\n| 企业合作第三方数据安全管理 | 33.3% |\\n\\n| 部署相关数据安全技术产品 | 77.3% |\\n\\n| 数据安全相关制度文件编制 | 73.3% |\\n\\n| 数据安全事件应急 | 65.3% |\\n\\n| 数据安全运营 | 70.7% |\\n\\n| 设置数据安全管理责任部门与责任人 | 49.3% |\\n\\n| 其他 | 1.3% |\\n\\n## 自下而上:企业有待通过完善业务场景数据安全建设方案以提升数据安全管理与技术的协同能力。\\n\\n\\n\\n### 数据安全需求侧数据安全建设面临的痛难点\\n\\n| 项目 | 比例 |\\n\\n| :---------------------------------- | :--- |\\n\\n| 不清楚如何进行数据安全技术产品或服务的选型 | 8.0% |\\n\\n| 老旧系统改造难,数据安全策略无法落地 | 40.0% |\\n\\n| 缺少资金支持 | 13.3% |\\n\\n| 技术工具缺失 | 13.3% |\\n\\n| 数据与业务紧耦合,组织内部全流程协作拉通困难大 | 45.3% |\\n\\n| 缺少数据安全建设方法论,无从下手 | 13.3% |\\n\\n| 缺少专业的数据安全人才 | 44.0% |\\n\\n| 不清楚如何落地监管要求 | 18.7% |\\n\\n| 不清楚当前面临哪些数据安全的问题和风险 | 18.7% |\\n\\n| 内外部环境动态变化,安全状态持续保障难 | 42.7% |\\n\\n| 数据安全防护观念停留在传统安全层面 | 36.0% |\\n\\n| 数据安全体系建设不完善,管理和技术措施易脱节 | 46.7% |",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "df08f77179b04b679ca52d385b5b88451084c645178acf4cde7dc08bc2d14350",
|
|||
|
|
"node_type": "text",
|
|||
|
|
"ppr_score": 0.02732401005161273,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.4697052895742694,
|
|||
|
|
"rank": 77,
|
|||
|
|
"source": "hipporag2_langchain_text",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "# 形成数据安全行业整体视图\\n\\n中国·北京 12.20-12.21 回归数据本质 应用驱动治理\\n\\n2023数据资产管理大会\\n\\n## 数据作为新型生产要素,已成为我国数字经济发展的核心资源,也是国家重要资产和基础战略资源。在依托数据价值释放,打造数字化、网络化、智能化的环境背景下,保障各行业领域的数据安全至关重要。\\n\\n一方面,需求侧受政策要求与数据价值驱动,逐步开展以数据为中心的安全体系建设;另一方面,供应侧受市场需求引导,进行产品服务的迭代升级。\\n\\n为了更好地洞察数据安全需求侧数据安全建设现状与面临的挑战,了解供应侧数据安全业务布局与产品服务技术形态,推进数据安全行业发展,搭建供需双方交流平台,数据安全推进计划发起数据安全行业调研,旨在梳理数据安全行业建设现状,形成数据安全行业整体视图。\\n\\n### 需求侧\\n\\n- 随着数据要素市场化的深入发展,我国数字经济发展迅速。与此同时,国内外数据泄露事件频繁发生,数据安全形势严峻。\\n\\n### 供应侧\\n\\n- 数据安全需求侧共回收75份有效的问卷样本,覆盖了不同行业、不同人员规模以及不同数据规模的不同企业。\\n\\n- 据安全供应侧共回收37份有效的问卷样本,覆盖了不同产品类型、不同从业人员规模的不同企业。",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "4fcfb998a852cee52268ea17051ba934ea30a3fc2d1b963a6894e5e935b97fda",
|
|||
|
|
"node_type": "text",
|
|||
|
|
"ppr_score": 0.026572426421910357,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.4559512960273567,
|
|||
|
|
"rank": 78,
|
|||
|
|
"source": "hipporag2_langchain_text",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面的理念主要是什么?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业在过去投入了大量的资源以完成数字化转型、数据管理体系等内容的基础建设工作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "935555e1f02897ea983d0bdf09977576f95e51e10619524c6dacda445d2e83ce",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.005783736770520117,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 5,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业会进一步激发、促进数据管理体系的建设意愿与进程",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "9b4121bbab45ac9f6d60763ad452472852c62f0a090bc7e65c2682a9a5778d66",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.004588695050688554,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 6,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全行业发展面临多个挑战,包括市场规模不足、市场竞争压力过大、监管要求不明确、技术开发困难、缺少资金支持、人才缺失和方法论缺失",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "94c43e8427e235422e4321de3ee0535f0bc9ca0b2baed4f250241496b818136e",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0011985823402320623,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 22,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "运营商积极参与跨区域地方政府、企业、组织等合作项目,围绕数据要素流通、数字政府、精准营销、金融风控、行业解决方案等展开。",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "4bd9c201e02bd75f15672f0065c4b6657cf902be491f95e2459877a616943d72",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0011459245010713545,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 23,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "目前企业已经从过去的高速发展期逐步迈入科学管理阶段",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "2beb44f3ce445637abb9e69ed39282d62d445d5d9789509976b766a60a074fc4",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010766726223574185,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 25,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业应首先识别并定义内部数据资源的形态类别,并建立起不同形态数据资源所关联的成本项",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "545a4731c754757f96d2475005dadc10d71e6e59f1f04b18814039241b5a58eb",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010151887709794166,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 26,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "推动数据要素流通和数据资产入表",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "a8479244a9433f1c5ea1717d5eec8503a926baf49b363fe2a26f63f58646ab8d",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0010029406490987649,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 27,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "建设汽车数据资产交易平台",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "790d1c96220da2634f3c66f400acae1fe4bf6269a0732a00bbc195b6d5cc7305",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0008672308633614764,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 31,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业在当前阶段可结合数据应用、数据成本管理等工作成果,优先围绕成本法、收益法开展数据价值评估工作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b9283ba58c98af0dcbb57b981312387a1710f109445267ca88879e14d103da1f",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0008431194327600929,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 32,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业应针对最终核算的数据成本结果,常态化开展数据成本运营分析、成本决策优化等管理运营活动",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "ac5b0a8c9c3eb583082ed2e01acf968fd8e36a7531d0cf8ec44470e505caf78f",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0008292728808859544,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 34,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业在未来开展数据投资建设工作时,应逐步从原来人员主观经验判断转向量化管理数据决策",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "fa598d1146cf3bc74518bd8edc93e4ca296a8ef5aed5b042467152e2b4240096",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0008292728808859544,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 35,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "在具体估值过程中,市场法指标的采集来源可能会因此受限",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "b8b29624c4e9177b25b60076d011f3edc5e3c29529b5afacd330d88559dfc2bb",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007131000490628458,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 38,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "《资产评估专家指引第9号一数据评估》、《数据评估指导意见》提出了数据价值评估方法",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "c39525c62a3c71aac1c7940b1f0922a9a1b5e4f9f1fa08a3dde4be50d0ccbb0a",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0007076200302466579,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 39,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "如果仅从数据规模的角度对总成本进行均摊处理",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "058fed34ed8bfd23ca62e125c8c9e60548d3e2cf1a6d53d9d1f0b39f2124233d",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 42,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "将无法客观反映企业过往对不同类型数据投入的事实现状",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "5381e0a9f4f0ecc03948a48aec45885aa49f2130a011c6eb3985b5d57bda5514",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 43,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业应首先识别并定义内部数据资源的形态类别",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "19801cd8a1391c22ccb43cf36473b93d7d05a1b602ee3e225aba7506d355e7eb",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 44,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "并建立起不同形态数据资源所关联的成本项",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "42353d6bb1dde5ce425042c41e9b00d0f70ad73f16b76e08614fce8e08bfd22a",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 45,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业在未来开展数据投资建设工作时",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "7d574d5c1ecfcb46aad87955e4048ea54a6cde422233458dc45904640b747897",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 46,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "应逐步从原来人员主观经验判断转向量化管理数据决策",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f39001d9690a3fe7e4b1566ca01c00253295821750d005cc918a78bde7ced7f3",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 47,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "《资产评估专家指引第9号一数据评估》、《数据评估指导意见》(中评协(2023)17号)",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "6cd6fc8e8ed3a8f5fdfa11edf7c4a441979e6b3288f3dec464432bfffca466d5",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 48,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "针对满足数据资产定义的数据,在传统三类资产评估方法(成本法、收益法和市场法)的基础上提出了数据价值评估方法",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "1915dbcd1d842ea494840d10287c10fb0ef97b0570c8c66eab71825d6714546d",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 49,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "在具体估值过程中",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "a1badc54e587b692b5fc22f80478338fc23eedd1ffd45cdd35bf482c39e2c3fe",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 50,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "市场法指标的采集来源可能会因此受限",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "147201f6085934980dab37929508374754fb950fbe3086735a7c243aa73291c0",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 51,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业在当前阶段",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "421e7d8c86a48fb46e338b6b87186645b76eea15f28dc038405c60d22be3f892",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 52,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "可结合数据应用、数据成本管理等工作成果,优先围绕成本法、收益法开展数据价值评估工作",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f3de857dabc67978d4bc8f500bd7308810a6e9f1de1e663878ade5ff00192da3",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.000521968076137114,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 53,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据成本难以合理分摊至某一数据场景下的数据集",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "985080fd7deeb0666aac44dc8cde8963d7fcd74a169b295f057938c131e3d4ad",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.00048436458445454155,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 60,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "企业应针对最终核算的数据成本结果",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "33f2f278e825b62f3ffa2e9489b78b131de322674308481d5ed8204809200f07",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.00048436458445454155,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 61,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "理清数据分布、提升数据质量、确保数据安全、数据共享交换、数据分析挖掘",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "95fef18f8978d96d2f7358fc0fbf0553666d74b9ad9416a025f6fe1e7637df06",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0004039204393897162,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 73,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "# 行业调研情况总结\\n\\n## 2023数据资产管理大会\\n\\n中国·北京 12.20-12.21 回归数据本质 应用驱动治理\\n\\n### 数据安全需求侧\\n\\n以风险评估为抓手推进数据安全体系建设是当前需求侧企业开展数据安全工作的共识方式。长期来看,从建立数据分类分级常态化运营机制与数据合作方管理机制入手,提升数据要素流通的安全保障能力,吸纳具备复核知识体系的数据安全人才,搭建复合化数据安全人才梯队是企业未来数据安全工作的重点。\\n\\n数据安全作为数字经济之“盾”,已迈入高质量发展的关键时期。\\n\\n数据安全领域作为众多安全厂商竞相布局、角逐的重点领域,产品服务百花齐放。服务能力提升将成为厂商破局争先的“杀手锏”。另外,人才短缺和监管要求与体系建设的间隔盲区是当前数据安全行业长期发展有待解决的困境。\\n\\n### 数据安全供应侧",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "60c792d17256768940c0b197aa0d6e2cac5538db8faa31204bdd154a8afa2529",
|
|||
|
|
"node_type": "text",
|
|||
|
|
"ppr_score": 0.01949311956341312,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.4773362221461557,
|
|||
|
|
"rank": 77,
|
|||
|
|
"source": "hipporag2_langchain_text",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "第二, 数据成本难以合理的分摊至某一数据场景下的数据集。在数据应用赋能过程中,数据 通常以数据集、数据表乃至字段粒度的形式参与到应用过程中,如果仅从数据规模的 角度对总成本进行均摊处理将无法客观反应企业过往对不同类型数据投入的事实现 状。因此,企业应首先识别并定义内部数据资源的形态类别,并建立起不同形态数据 资源所关联的成本项,再考虑成本分摊的处理动作,避免成本分摊结果与数据实际投 入的差异失真。 “管清”数据成本是指企业应针对最终核算的数据成本结果,常态化开展数据成本 运营分析、成本决策优化等管理运营活动。企业在过去投入了大量的资源以完成数字 化转型、数据管理体系等内容的基础建设工作,目前企业已经从过去的高速发展期逐 步迈入科学管理阶段。因此,企业在未来开展数据投资建设工作时,应逐步从原来人 员主观经验判断转向量化管理数据决策,利用客观、多维、清晰的数据管理数据指导 企业开展数据投资建设工作。 ## (六)数据价值评估 数据价值评估主要从数据成本投入、收益获取和市场供需的角度考虑,根据评 估目的选择合适的评估方法。《资产评估专家指引第9号一数据评估》、《数据评估 指导意见》(中评协(2023)17号)针对满足数据资产定义的数据,在传统三类资产评 估方法(成本法、收益法和市场法)的基础上提出了数据价值评估方法。目前,由于 数据要素市场正处于初期的快速发展阶段,在具体估值过程中,市场法指标的采集来 源可能会因此受限。因此,企业在当前阶段可结合数据应用、数据成本管理等工作成 果,优先围绕成本法、收益法开展数据价值评估工作,探索企业数据价值评估实践路 径。",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "00efb42c4594a17a1fbcbe82fea110a0639bc6c7a0f71bdb755afb95e517961b",
|
|||
|
|
"node_type": "text",
|
|||
|
|
"ppr_score": 0.0177629211945269,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.42610869111233496,
|
|||
|
|
"rank": 78,
|
|||
|
|
"source": "hipporag2_langchain_text",
|
|||
|
|
"query": "当前企业在数据安全技术体系建设方面主要关注哪些具体技术或方法?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "数据安全产品和服务分为三类:仅提供数据安全产品、仅提供数据安全服务和提供‘产品+服务’的一体化解决方案",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "6cc4234f3d14af6f9424332cd4ac8660e5ecc3ae3e80f1eaca567424acb0cb65",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0005278635239827646,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 40,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面,目前主要以什么理念为主?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "59.5%的受访厂商认为监管要求不明确,影响数据安全产品的合规性",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "dca72598df3a83e1e675dcf47fe05ae8e70a1dcb367675aee2bc574a9bd4adf4",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0003454432958092675,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 60,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面,目前主要以什么理念为主?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "83.8%的受访厂商通过提供‘产品+服务’的一体化解决方案进行数据安全管理",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "f2cbc9f328b8add88baa16bddce59e0932efbce5a344f39d3122056c23a43e8c",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.0003341505384467029,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 61,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面,目前主要以什么理念为主?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "未来企业聚焦于持续优化数据管理能力,形成数据供需闭环,丰富数据应用场景,赋能业务发展,管控成本,精细化管理数据价值",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "3e211bd02295452b5f73f576af43583f25343fcd40792e8ca38cce2555b2b5f2",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.00030377271377618253,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 63,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面,目前主要以什么理念为主?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"page_content": "金融业、通信业、电力等行业数据管理水平较高",
|
|||
|
|
"metadata": {
|
|||
|
|
"node_id": "94a3dfd4d0c4dd3ee11226fbcae89040d0054a5b303f894432414be34be056fc",
|
|||
|
|
"node_type": "event",
|
|||
|
|
"ppr_score": 0.00026743809281455,
|
|||
|
|
"edge_score": 0.0,
|
|||
|
|
"passage_score": 0.0,
|
|||
|
|
"rank": 75,
|
|||
|
|
"source": "hipporag2_langchain_event",
|
|||
|
|
"query": "企业在数据安全技术体系建设方面,目前主要以什么理念为主?",
|
|||
|
|
"pagerank_available": true
|
|||
|
|
}
|
|||
|
|
}
|
|||
|
|
],
|
|||
|
|
"all_passages": [
|
|||
|
|
"会议讨论了数据安全技术体系建设",
|
|||
|
|
"56.0%的受访企业计划在未来一年内引入新兴技术促进数据安全流通",
|
|||
|
|
"52.0%的受访企业将数据流通共享的新兴技术纳入数据安全技术体系",
|
|||
|
|
"部署数据安全防护类产品的受访企业占比达到96.0%",
|
|||
|
|
"部署数据安全防护类产品的受访企业占比96.0%",
|
|||
|
|
"目前需求侧以‘防’为主的数据安全防护理念",
|
|||
|
|
"52.0%的受访企业已将促进数据流通共享的新兴技术纳入了企业的数据安全技术体系",
|
|||
|
|
"新兴技术发展应用的‘助推器’",
|
|||
|
|
"56.0%的受访企业将‘引入新兴技术,促进数据的安全流通’列为未来一年的重点任务",
|
|||
|
|
"未来一年的重点任务",
|
|||
|
|
"定期组织会议交流最新政策、共享数据资源,沟通合作进展和协调解决合作中遇到的问题",
|
|||
|
|
"厂商分类",
|
|||
|
|
"企业面对数据安全建设的痛难点包括不清楚如何进行数据安全技术产品或服务的选型、老旧系统改造难、缺少资金支持、缺少数据安全建设方法论、缺少专业的数据安全人才等",
|
|||
|
|
"超过70%的受访企业在数据安全相关制度体系和技术体系建设方面开展相关数据安全工作",
|
|||
|
|
"数据安全行业面临人才短缺和监管要求与体系建设的间隔盲区问题",
|
|||
|
|
"企业通过部署相关数据安全技术产品、编制数据安全相关制度文件、设置数据安全管理责任部门与责任人等方式开展数据安全工作",
|
|||
|
|
"行业趋势分析",
|
|||
|
|
"需求侧企业共识以风险评估推进数据安全体系建设",
|
|||
|
|
"企业重视建立数据分类分级常态化运营机制与数据合作方管理机制",
|
|||
|
|
"企业注重吸纳数据安全人才并搭建复合化人才梯队",
|
|||
|
|
"安全厂商在数据安全领域激烈竞争",
|
|||
|
|
"传统网络安全头部厂商业务中心逐步移向数据安全领域",
|
|||
|
|
"数据安全作为新一代信息安全领域核心已获得市场认同",
|
|||
|
|
"厂商类型定义中综合型厂商占比最高",
|
|||
|
|
"综合型厂商依托业务沉淀大量安全技术及应用经验,业务重心逐渐移向数据安全领域",
|
|||
|
|
"专业型厂商在数据库安全领域具备丰富积累与沉淀",
|
|||
|
|
"数据安全业务已成为其机构的主营业务",
|
|||
|
|
"新兴型厂商基于特定新兴技术开展数据流通安全",
|
|||
|
|
"主要是近年的初创厂商,在此领域表现出活跃",
|
|||
|
|
"数据安全产品和服务需求在政务、金融等行业较高",
|
|||
|
|
"数据安全产业的持续发展",
|
|||
|
|
"数据安全服务行业分布",
|
|||
|
|
"服务能力提升成为厂商的竞争优势",
|
|||
|
|
"回收75份有效问卷样本",
|
|||
|
|
"回收37份有效问卷样本",
|
|||
|
|
"覆盖不同产品类型及从业人员规模的企业",
|
|||
|
|
"覆盖不同行业、人员规模及数据规模的企业",
|
|||
|
|
"数据安全进入高质量发展阶段",
|
|||
|
|
"超过70%的受访企业已开展相关数据安全工作",
|
|||
|
|
"数据安全相关制度体系和技术体系建设方面",
|
|||
|
|
"企业通过完善业务场景数据安全建设方案",
|
|||
|
|
"数据安全管理与技术的协同能力",
|
|||
|
|
"企业不清楚如何进行数据安全技术产品或服务的选型",
|
|||
|
|
"数据安全建设面临的痛难点",
|
|||
|
|
"企业面临数据安全建设的痛难点",
|
|||
|
|
"不清楚如何进行数据安全技术产品或服务的选型,老旧系统改造难,数据安全策略无法落地,缺少资金支持,技术工具缺失,数据与业务紧耦合,组织内部全流程协作拉通困难大,缺少数据安全建设方法论,无从下手,缺少专业的数据安全人才,不清楚如何落地监管要求,不清楚当前面临哪些数据安全的问题和风险,内外部环境动态变化,安全状态持续保障难,数据安全防护观念停留在传统安全层面,数据安全体系建设不完善,管理和技术措施易脱节",
|
|||
|
|
"中国·北京在12.20-12.21举办回归数据本质应用驱动治理的2023数据资产管理大会",
|
|||
|
|
"产品服务多样化",
|
|||
|
|
"企业关注提升数据要素流通的安全保障能力",
|
|||
|
|
"是当前长期发展有待解决的困境",
|
|||
|
|
"新兴技术的融合应用带来更加便捷、高效、安全的支付服务。",
|
|||
|
|
"会议举行",
|
|||
|
|
"数据作为新型生产要素,已成为我国数字经济发展的核心资源",
|
|||
|
|
"数据安全至关重要",
|
|||
|
|
"需求侧受政策要求与数据价值驱动",
|
|||
|
|
"逐步开展以数据为中心的安全体系建设",
|
|||
|
|
"供应侧受市场需求引导",
|
|||
|
|
"进行产品服务的迭代升级",
|
|||
|
|
"数据安全需求侧回收75份有效的问卷样本",
|
|||
|
|
"覆盖了不同行业、不同人员规模以及不同数据规模的不同企业",
|
|||
|
|
"安全供应侧回收37份有效的问卷样本",
|
|||
|
|
"覆盖了不同产品类型、不同从业人员规模的不同企业",
|
|||
|
|
"国内外数据泄露事件频发",
|
|||
|
|
"新兴技术的监管措施与规范的不完善可能导致数据安全风险",
|
|||
|
|
"推进数据安全行业发展",
|
|||
|
|
"新兴技术将更广泛地应用于支付领域,提升用户体验。",
|
|||
|
|
"讨论数据安全行业整体视图",
|
|||
|
|
"洞察数据安全需求侧建设现状与挑战",
|
|||
|
|
"了解供应侧数据安全业务布局与产品服务技术形态",
|
|||
|
|
"搭建供需双方交流平台",
|
|||
|
|
"数据研发全链路的监测、运维监控、运维告警、运维操作",
|
|||
|
|
"数据要素市场化深入发展促进数字经济发展",
|
|||
|
|
"保证提前发现问题并处理问题",
|
|||
|
|
"数据需求方主动通过自助分析平台进行数据探查",
|
|||
|
|
"加强数据研发全生命周期的风险识别和风险预测",
|
|||
|
|
"# 数据安全技术体系建设:仍以“防”为主,数据流通促进新兴技术应用\\n\\n中国·北京 12.20-12.21\\n\\n回归数据本质 应用驱动治理\\n\\n## 2023数据资产管理大会\\n\\n### 数据安全需求侧数据安全工具部署类型\\n\\n| 类别 | 部署比例 |\\n\\n| :------------------ | :------- |\\n\\n| 数据资产识别类产品 | 82.7% |\\n\\n| 数据风险检测类产品 | 41.3% |\\n\\n| 数据安全防护类产品 | 96.0% |\\n\\n| 数据安全监测类产品 | 72.0% |\\n\\n| 数据流通共享类产品 | 52.0% |\\n\\n| 数据安全综合类产品 | 61.3% |\\n\\n分类来源:《数据安全产品与服务图谱(2.0)》\\n\\n### 01 数据安全技术体系建设仍以“防”为主\\n\\n> 部署数据安全防护类产品的受访企业占比 96.0%。这体现了目前需求侧以“防”为主的数据安全防护理念。\\n\\n\\n\\n### 02 共享流通需求是新兴技术发展应用的“助推器”\\n\\n> 52.0%的受访企业已将促进数据流通共享的新兴技术纳入了企业的数据安全技术体系。\\n\\n\\n\\n> 56.0%的受访企业将“引入新兴技术,促进数据的安全流通”列为未来一年的重点任务。\\n\\n",
|
|||
|
|
"# 数据安全治理体系建设:呈“上下贯通、技管结合”的发展趋势\\n\\n中国·北京 12.20-12.21 回归数据本质 应用驱动治理\\n\\n2023数据资产管理大会\\n\\n## 自上而下:在数据安全相关制度体系和技术体系建设方面,均有超过70%的受访企业已开展相关数据安全工作。\\n\\n\\n\\n### 数据安全需求侧数据安全工作开展情况\\n\\n| 项目 | 比例 |\\n\\n| :---------------------------------- | :--- |\\n\\n| 数据安全现状摸排 | 76.0% |\\n\\n| 数据分类分级 | 78.7% |\\n\\n| 定期数据安全评估 | 74.7% |\\n\\n| 开展数据安全人员能力培训 | 46.7% |\\n\\n| 数据出境安全管理 | 14.7% |\\n\\n| 企业合作第三方数据安全管理 | 33.3% |\\n\\n| 部署相关数据安全技术产品 | 77.3% |\\n\\n| 数据安全相关制度文件编制 | 73.3% |\\n\\n| 数据安全事件应急 | 65.3% |\\n\\n| 数据安全运营 | 70.7% |\\n\\n| 设置数据安全管理责任部门与责任人 | 49.3% |\\n\\n| 其他 | 1.3% |\\n\\n## 自下而上:企业有待通过完善业务场景数据安全建设方案以提升数据安全管理与技术的协同能力。\\n\\n\\n\\n### 数据安全需求侧数据安全建设面临的痛难点\\n\\n| 项目 | 比例 |\\n\\n| :---------------------------------- | :--- |\\n\\n| 不清楚如何进行数据安全技术产品或服务的选型 | 8.0% |\\n\\n| 老旧系统改造难,数据安全策略无法落地 | 40.0% |\\n\\n| 缺少资金支持 | 13.3% |\\n\\n| 技术工具缺失 | 13.3% |\\n\\n| 数据与业务紧耦合,组织内部全流程协作拉通困难大 | 45.3% |\\n\\n| 缺少数据安全建设方法论,无从下手 | 13.3% |\\n\\n| 缺少专业的数据安全人才 | 44.0% |\\n\\n| 不清楚如何落地监管要求 | 18.7% |\\n\\n| 不清楚当前面临哪些数据安全的问题和风险 | 18.7% |\\n\\n| 内外部环境动态变化,安全状态持续保障难 | 42.7% |\\n\\n| 数据安全防护观念停留在传统安全层面 | 36.0% |\\n\\n| 数据安全体系建设不完善,管理和技术措施易脱节 | 46.7% |",
|
|||
|
|
"# 形成数据安全行业整体视图\\n\\n中国·北京 12.20-12.21 回归数据本质 应用驱动治理\\n\\n2023数据资产管理大会\\n\\n## 数据作为新型生产要素,已成为我国数字经济发展的核心资源,也是国家重要资产和基础战略资源。在依托数据价值释放,打造数字化、网络化、智能化的环境背景下,保障各行业领域的数据安全至关重要。\\n\\n一方面,需求侧受政策要求与数据价值驱动,逐步开展以数据为中心的安全体系建设;另一方面,供应侧受市场需求引导,进行产品服务的迭代升级。\\n\\n为了更好地洞察数据安全需求侧数据安全建设现状与面临的挑战,了解供应侧数据安全业务布局与产品服务技术形态,推进数据安全行业发展,搭建供需双方交流平台,数据安全推进计划发起数据安全行业调研,旨在梳理数据安全行业建设现状,形成数据安全行业整体视图。\\n\\n### 需求侧\\n\\n- 随着数据要素市场化的深入发展,我国数字经济发展迅速。与此同时,国内外数据泄露事件频繁发生,数据安全形势严峻。\\n\\n### 供应侧\\n\\n- 数据安全需求侧共回收75份有效的问卷样本,覆盖了不同行业、不同人员规模以及不同数据规模的不同企业。\\n\\n- 据安全供应侧共回收37份有效的问卷样本,覆盖了不同产品类型、不同从业人员规模的不同企业。",
|
|||
|
|
"企业在过去投入了大量的资源以完成数字化转型、数据管理体系等内容的基础建设工作",
|
|||
|
|
"企业会进一步激发、促进数据管理体系的建设意愿与进程",
|
|||
|
|
"数据安全行业发展面临多个挑战,包括市场规模不足、市场竞争压力过大、监管要求不明确、技术开发困难、缺少资金支持、人才缺失和方法论缺失",
|
|||
|
|
"运营商积极参与跨区域地方政府、企业、组织等合作项目,围绕数据要素流通、数字政府、精准营销、金融风控、行业解决方案等展开。",
|
|||
|
|
"目前企业已经从过去的高速发展期逐步迈入科学管理阶段",
|
|||
|
|
"企业应首先识别并定义内部数据资源的形态类别,并建立起不同形态数据资源所关联的成本项",
|
|||
|
|
"推动数据要素流通和数据资产入表",
|
|||
|
|
"建设汽车数据资产交易平台",
|
|||
|
|
"企业在当前阶段可结合数据应用、数据成本管理等工作成果,优先围绕成本法、收益法开展数据价值评估工作",
|
|||
|
|
"企业应针对最终核算的数据成本结果,常态化开展数据成本运营分析、成本决策优化等管理运营活动",
|
|||
|
|
"企业在未来开展数据投资建设工作时,应逐步从原来人员主观经验判断转向量化管理数据决策",
|
|||
|
|
"在具体估值过程中,市场法指标的采集来源可能会因此受限",
|
|||
|
|
"《资产评估专家指引第9号一数据评估》、《数据评估指导意见》提出了数据价值评估方法",
|
|||
|
|
"如果仅从数据规模的角度对总成本进行均摊处理",
|
|||
|
|
"将无法客观反映企业过往对不同类型数据投入的事实现状",
|
|||
|
|
"企业应首先识别并定义内部数据资源的形态类别",
|
|||
|
|
"并建立起不同形态数据资源所关联的成本项",
|
|||
|
|
"企业在未来开展数据投资建设工作时",
|
|||
|
|
"应逐步从原来人员主观经验判断转向量化管理数据决策",
|
|||
|
|
"《资产评估专家指引第9号一数据评估》、《数据评估指导意见》(中评协(2023)17号)",
|
|||
|
|
"针对满足数据资产定义的数据,在传统三类资产评估方法(成本法、收益法和市场法)的基础上提出了数据价值评估方法",
|
|||
|
|
"在具体估值过程中",
|
|||
|
|
"市场法指标的采集来源可能会因此受限",
|
|||
|
|
"企业在当前阶段",
|
|||
|
|
"可结合数据应用、数据成本管理等工作成果,优先围绕成本法、收益法开展数据价值评估工作",
|
|||
|
|
"数据成本难以合理分摊至某一数据场景下的数据集",
|
|||
|
|
"企业应针对最终核算的数据成本结果",
|
|||
|
|
"理清数据分布、提升数据质量、确保数据安全、数据共享交换、数据分析挖掘",
|
|||
|
|
"# 行业调研情况总结\\n\\n## 2023数据资产管理大会\\n\\n中国·北京 12.20-12.21 回归数据本质 应用驱动治理\\n\\n### 数据安全需求侧\\n\\n以风险评估为抓手推进数据安全体系建设是当前需求侧企业开展数据安全工作的共识方式。长期来看,从建立数据分类分级常态化运营机制与数据合作方管理机制入手,提升数据要素流通的安全保障能力,吸纳具备复核知识体系的数据安全人才,搭建复合化数据安全人才梯队是企业未来数据安全工作的重点。\\n\\n数据安全作为数字经济之“盾”,已迈入高质量发展的关键时期。\\n\\n数据安全领域作为众多安全厂商竞相布局、角逐的重点领域,产品服务百花齐放。服务能力提升将成为厂商破局争先的“杀手锏”。另外,人才短缺和监管要求与体系建设的间隔盲区是当前数据安全行业长期发展有待解决的困境。\\n\\n### 数据安全供应侧",
|
|||
|
|
"第二, 数据成本难以合理的分摊至某一数据场景下的数据集。在数据应用赋能过程中,数据 通常以数据集、数据表乃至字段粒度的形式参与到应用过程中,如果仅从数据规模的 角度对总成本进行均摊处理将无法客观反应企业过往对不同类型数据投入的事实现 状。因此,企业应首先识别并定义内部数据资源的形态类别,并建立起不同形态数据 资源所关联的成本项,再考虑成本分摊的处理动作,避免成本分摊结果与数据实际投 入的差异失真。 “管清”数据成本是指企业应针对最终核算的数据成本结果,常态化开展数据成本 运营分析、成本决策优化等管理运营活动。企业在过去投入了大量的资源以完成数字 化转型、数据管理体系等内容的基础建设工作,目前企业已经从过去的高速发展期逐 步迈入科学管理阶段。因此,企业在未来开展数据投资建设工作时,应逐步从原来人 员主观经验判断转向量化管理数据决策,利用客观、多维、清晰的数据管理数据指导 企业开展数据投资建设工作。 ## (六)数据价值评估 数据价值评估主要从数据成本投入、收益获取和市场供需的角度考虑,根据评 估目的选择合适的评估方法。《资产评估专家指引第9号一数据评估》、《数据评估 指导意见》(中评协(2023)17号)针对满足数据资产定义的数据,在传统三类资产评 估方法(成本法、收益法和市场法)的基础上提出了数据价值评估方法。目前,由于 数据要素市场正处于初期的快速发展阶段,在具体估值过程中,市场法指标的采集来 源可能会因此受限。因此,企业在当前阶段可结合数据应用、数据成本管理等工作成 果,优先围绕成本法、收益法开展数据价值评估工作,探索企业数据价值评估实践路 径。",
|
|||
|
|
"数据安全产品和服务分为三类:仅提供数据安全产品、仅提供数据安全服务和提供‘产品+服务’的一体化解决方案",
|
|||
|
|
"59.5%的受访厂商认为监管要求不明确,影响数据安全产品的合规性",
|
|||
|
|
"83.8%的受访厂商通过提供‘产品+服务’的一体化解决方案进行数据安全管理",
|
|||
|
|
"未来企业聚焦于持续优化数据管理能力,形成数据供需闭环,丰富数据应用场景,赋能业务发展,管控成本,精细化管理数据价值",
|
|||
|
|
"金融业、通信业、电力等行业数据管理水平较高"
|
|||
|
|
],
|
|||
|
|
"passage_sources": [
|
|||
|
|
"子查询1-event-743dea2ba399a8878d225879ffcf6e5a7119670cc5755f1019aad953a207949e",
|
|||
|
|
"子查询1-event-246456c447aced71c2e45e54833b0ee4dab94b449d11963b5a4396652c718d33",
|
|||
|
|
"子查询1-event-4785688303faae399af98021ea978b97c41fd6d9cd58cca60d4b7fdf2f9b232b",
|
|||
|
|
"子查询1-event-eaba7758b75ebc1afdd56267964ad71d7e2a483642cffcd249f442791ed214d4",
|
|||
|
|
"子查询1-event-b6ed399ddee51e7ddb0c54e51c07785d816a8ea800fdd6e8abe8948eca9e6c12",
|
|||
|
|
"子查询1-event-401a4f11823f2419974db7d63f24e150ade362efeafb1bff418e975288807cdd",
|
|||
|
|
"子查询1-event-4e0eb2ed6b31718c28305b91316af8d7c3dc86c0ecdbbc49b95f831ba015ad4e",
|
|||
|
|
"子查询1-event-43983cc46d29e4c19d7f84708c1bcbccea16c31061f62df37dfe6afb40f2f1a4",
|
|||
|
|
"子查询1-event-2eb8b9c1d9b97ac7d5773bfab4fa1c267debd1bbe35c4b9cd1176fa933034573",
|
|||
|
|
"子查询1-event-5e188d5241a493a8643971058be0e7a9ca49d1c54e243aaed42e50d59cc4474c",
|
|||
|
|
"子查询1-event-98814bc859d7ee3e24e493479cb7d5ee2e75e659202de9d8947618213dde072f",
|
|||
|
|
"子查询1-event-cc03f26f62077909b70c96e69ddfec9f75aed2e3445447ff80d01a71d9980cd0",
|
|||
|
|
"子查询1-event-1b08af9f9ff5a99c6d75dc84cd40132c1322743d78188b5cef0e23af460649a5",
|
|||
|
|
"子查询1-event-2be76e39f396a043a122c754e7d23592636b7843b77a3d0886b1b65920be47b0",
|
|||
|
|
"子查询1-event-64720db225422ab4598f8f5c81c4db876d413ec40c76a11116b135bcdea3ddf7",
|
|||
|
|
"子查询1-event-b7143dedbcd3c33cd18affa501e0b52e8667a86df8432470611de5cdc586cc0d",
|
|||
|
|
"子查询1-event-85e5a7d9d226bbab19fbec1a320fecb112559c7b3f9ecc62f973c5802866e694",
|
|||
|
|
"子查询1-event-14477ff4f401ea8debd78c82a992bbb93db535c80489c98505435e16abdaaf68",
|
|||
|
|
"子查询1-event-07cf8b771ad257ad4cb1806291d0782aecdf26eadc513cddd2bb3f85821ecfd2",
|
|||
|
|
"子查询1-event-b564633d3f42a4a4a7edb8e68549dc8ed661d4e5a6245bd05155872079292fee",
|
|||
|
|
"子查询1-event-6c5fd6ad11d08b733f4137b26f4e51edccabb54d7a55fdbf16d3ed4cddcd5adf",
|
|||
|
|
"子查询1-event-c227df68ff0ccede779f18c41ad8323e268cf66bff15bb559efd7174792e370e",
|
|||
|
|
"子查询1-event-c73948bdbb311741b92c73180cbb947a3344a8144abe774958ceaff9983d0261",
|
|||
|
|
"子查询1-event-91f56f02a0eaf42dace4941f97a7435898ca4e4819cf475262e22396aa5d1dd9",
|
|||
|
|
"子查询1-event-0c124b4b493e91843f5654d404224e3dfd155d7a19e19771df8de7ef04b9d6d2",
|
|||
|
|
"子查询1-event-17ca6af033468e2e5894cc403501be469b48c0acca1261fd9fa23cc673e11bec",
|
|||
|
|
"子查询1-event-0e21e35aa621faedce25043538828f808ea7b9b074e5c30d6d27a1d7e845cda9",
|
|||
|
|
"子查询1-event-27587c61497c82df4b97f5116904439ba4dd2e9de82b3158572a8ee7afe95776",
|
|||
|
|
"子查询1-event-0453ec4fa00c3e1c1479a55bd4788bf87a5da38c3bb8bc8e7f854e35520a0593",
|
|||
|
|
"子查询1-event-19d4ff9bcdc5e5a56b25fc1b156ceaf6ad6305d3b3af35baa3249a455872923e",
|
|||
|
|
"子查询1-event-088c912dc470c0e386e8742cc441129511cd945244b627d9ce33b6344e70b643",
|
|||
|
|
"子查询1-event-d37cd9994986e340403499c49bde6be443409bba62639f03fe04b2f939462c87",
|
|||
|
|
"子查询1-event-f36e1050b0d1c448d1ee67796350b680fa47400069f419fc0be4331fe29c6a9c",
|
|||
|
|
"子查询1-event-6acd49e1749f5b7d4c1225e788abfabfb5c15cb0bf6fc96b5101a4fcf0ef5bc5",
|
|||
|
|
"子查询1-event-b794dca0995ad99c4f4361e8c655e4b995466d829fdda007789e4b0f16a7aa01",
|
|||
|
|
"子查询1-event-7fa91a6726cee4774a5a2688cdf808e8df2d176873336f89d4d15cebced60c5b",
|
|||
|
|
"子查询1-event-4e135dcafed1f88f403cc70621ffbfa1b6fee4646be4f9cabcd7c17d08c4f737",
|
|||
|
|
"子查询1-event-64e797a1c820ac41b3d36f6f46e32afbfeaab16a37903a97eef5a220a700895b",
|
|||
|
|
"子查询1-event-9d25ac22ddbe80a8f29499568eab163cdc4f74ede50017c649b4d7bbbb5d9524",
|
|||
|
|
"子查询1-event-2059ce5999ceca1744b791e64baddfa2d1937b2dbfdb822dd48767377c0d4577",
|
|||
|
|
"子查询1-event-1d0fe43623faea104320ae0df5cd869be60a53f341be9de26eba085c28d91ea2",
|
|||
|
|
"子查询1-event-a1f9dc59b134ad20c480583134e11d0f24537dd223c624dd0bd42f8f0d1ea642",
|
|||
|
|
"子查询1-event-53865716de623635a9bb43089c704afbf6bcfba3a7602dcfe0ca6b5d71eeee95",
|
|||
|
|
"子查询1-event-f61a5992e2909ca1085d6740b97498c99fb6da6a974f8e920fb9bc05dccb9882",
|
|||
|
|
"子查询1-event-32f163b1de3a2699d094f65498d0ea900776b8cc7141c15bc76cc84e9e5fc9b2",
|
|||
|
|
"子查询1-event-cba3691d6c4d54bac3e6a198c60bace10c32a3c258e5899819bb856fc644fbda",
|
|||
|
|
"子查询1-event-17d23d29cebf76e8c7a9852e1fda7d2689c4942aa24fad725939d6453fad7a92",
|
|||
|
|
"子查询1-event-0336621181d3fb1f8f797c7ceffdfbaa5439719bd9d9b5453f1882e853e8201f",
|
|||
|
|
"子查询1-event-b4135192f92aaf55e0dec6a171fb00d781b7d64b146681bf950508d7a67891b3",
|
|||
|
|
"子查询1-event-68ff2f40a576b3770aaa5454a158267f05c0965ace4024b874aebe2799cccf14",
|
|||
|
|
"子查询1-event-5b13aff7c72d2acb559b679cb7dfaf52081fd0779fa161fad123c5cdff7eda40",
|
|||
|
|
"子查询1-event-538ad631e921436a6575ea11e187ba6033dbe0a28e29b594dbb5bc0a36de3d33",
|
|||
|
|
"子查询1-event-02416518cb79aced696ff539b351a55dbe29d0b17a1413a33b8244cb6a5589ee",
|
|||
|
|
"子查询1-event-cfae45f1d09a01aabb722ed4995c6da369e5d8f41defac17071ca5294ddc37bc",
|
|||
|
|
"子查询1-event-a0f3109ab7181067bd010ca585c7840a6b9757f2ed8a19fdc55fb8e333c68326",
|
|||
|
|
"子查询1-event-fbe9cf25704af39ba7d982129812763a8e7f74413261395750c669435319d5aa",
|
|||
|
|
"子查询1-event-f7dd0301f07768769d3dc1b4c3dd243f23e4120308a3c5f805dbca1f7cbe468e",
|
|||
|
|
"子查询1-event-483c0691db9e6381cac4eeee38b76b3db7a8ff0bc58af3d9ae14fd71e11bb5fe",
|
|||
|
|
"子查询1-event-f02b6dfd2407923fd0eda2f2bd38eae6d4e43f98fd7494a636ea5a46b8beecf6",
|
|||
|
|
"子查询1-event-89233829b594389de1d44c200bcd6453fbedcb0fa71d36c33db873c81b2ebe82",
|
|||
|
|
"子查询1-event-34517773fde1c673eb5a8443da6f83a81017d83d80a83959f4521928c8f1ed14",
|
|||
|
|
"子查询1-event-aaa10472166ab67096ebbd4b8ab7c6a902f198d756866764267f9f7fa9d174b1",
|
|||
|
|
"子查询1-event-5639882266ff70e1451ad37d529bd439d90a7f1322853507122edc7826223c4d",
|
|||
|
|
"子查询1-event-2186afc24f6927465c649c70558f7b115dda0771fd6a525652c367bef66d105b",
|
|||
|
|
"子查询1-event-4c2fbd18813f910e089546aceeefbae0409fbf31a8ffe0602bc6f093ead4bb38",
|
|||
|
|
"子查询1-event-010a392ff9d1520e13e09af3e3c464fb17310e8029ae8906e7a7a0588ee64d17",
|
|||
|
|
"子查询1-event-158d621894aa3f9b5c00be0c89ea83b6d847d8e43cab993ccb76e2d39df79ff0",
|
|||
|
|
"子查询1-event-72ada3bcca76e80a147ed89ab635f10c0708fad6efd3d1d40fd03055434194b1",
|
|||
|
|
"子查询1-event-8d2900d1e2bfa1f67dfbdcec2f88f8907cf52f62affd24d76e0f950aceabd4d8",
|
|||
|
|
"子查询1-event-a622128441153b949b42ae00d74c897626594ab9f441954a6329d3d7c93cd0cb",
|
|||
|
|
"子查询1-event-c8815f1989c2f8f02b081f30c246e90a8919ce654911518e781b6dbb41299d7c",
|
|||
|
|
"子查询1-event-77deaeb9928915ce9afa103fedb06b0b378fa3c2feddd231a12eedbbfb846111",
|
|||
|
|
"子查询1-event-7356cdfec5225541771853718e8298de905664a149fb82c03e20908724c47d4c",
|
|||
|
|
"子查询1-event-cdb84a3fa8076bee4776cf0f4055467733ffde54e63d02d3314cc68de48b6995",
|
|||
|
|
"子查询1-event-559ab78f597f7b052dd53ee9a390c3ce01742f56f99379a2a27f54c9fab787c0",
|
|||
|
|
"子查询1-text-5e8d5dda1773e2ddfaf6ea2acd264dd0bb48f2027dbb6cf6de96087b8b4231cf",
|
|||
|
|
"子查询1-text-df08f77179b04b679ca52d385b5b88451084c645178acf4cde7dc08bc2d14350",
|
|||
|
|
"子查询1-text-4fcfb998a852cee52268ea17051ba934ea30a3fc2d1b963a6894e5e935b97fda",
|
|||
|
|
"子查询2-event-935555e1f02897ea983d0bdf09977576f95e51e10619524c6dacda445d2e83ce",
|
|||
|
|
"子查询2-event-9b4121bbab45ac9f6d60763ad452472852c62f0a090bc7e65c2682a9a5778d66",
|
|||
|
|
"子查询2-event-94c43e8427e235422e4321de3ee0535f0bc9ca0b2baed4f250241496b818136e",
|
|||
|
|
"子查询2-event-4bd9c201e02bd75f15672f0065c4b6657cf902be491f95e2459877a616943d72",
|
|||
|
|
"子查询2-event-2beb44f3ce445637abb9e69ed39282d62d445d5d9789509976b766a60a074fc4",
|
|||
|
|
"子查询2-event-545a4731c754757f96d2475005dadc10d71e6e59f1f04b18814039241b5a58eb",
|
|||
|
|
"子查询2-event-a8479244a9433f1c5ea1717d5eec8503a926baf49b363fe2a26f63f58646ab8d",
|
|||
|
|
"子查询2-event-790d1c96220da2634f3c66f400acae1fe4bf6269a0732a00bbc195b6d5cc7305",
|
|||
|
|
"子查询2-event-b9283ba58c98af0dcbb57b981312387a1710f109445267ca88879e14d103da1f",
|
|||
|
|
"子查询2-event-ac5b0a8c9c3eb583082ed2e01acf968fd8e36a7531d0cf8ec44470e505caf78f",
|
|||
|
|
"子查询2-event-fa598d1146cf3bc74518bd8edc93e4ca296a8ef5aed5b042467152e2b4240096",
|
|||
|
|
"子查询2-event-b8b29624c4e9177b25b60076d011f3edc5e3c29529b5afacd330d88559dfc2bb",
|
|||
|
|
"子查询2-event-c39525c62a3c71aac1c7940b1f0922a9a1b5e4f9f1fa08a3dde4be50d0ccbb0a",
|
|||
|
|
"子查询2-event-058fed34ed8bfd23ca62e125c8c9e60548d3e2cf1a6d53d9d1f0b39f2124233d",
|
|||
|
|
"子查询2-event-5381e0a9f4f0ecc03948a48aec45885aa49f2130a011c6eb3985b5d57bda5514",
|
|||
|
|
"子查询2-event-19801cd8a1391c22ccb43cf36473b93d7d05a1b602ee3e225aba7506d355e7eb",
|
|||
|
|
"子查询2-event-42353d6bb1dde5ce425042c41e9b00d0f70ad73f16b76e08614fce8e08bfd22a",
|
|||
|
|
"子查询2-event-7d574d5c1ecfcb46aad87955e4048ea54a6cde422233458dc45904640b747897",
|
|||
|
|
"子查询2-event-f39001d9690a3fe7e4b1566ca01c00253295821750d005cc918a78bde7ced7f3",
|
|||
|
|
"子查询2-event-6cd6fc8e8ed3a8f5fdfa11edf7c4a441979e6b3288f3dec464432bfffca466d5",
|
|||
|
|
"子查询2-event-1915dbcd1d842ea494840d10287c10fb0ef97b0570c8c66eab71825d6714546d",
|
|||
|
|
"子查询2-event-a1badc54e587b692b5fc22f80478338fc23eedd1ffd45cdd35bf482c39e2c3fe",
|
|||
|
|
"子查询2-event-147201f6085934980dab37929508374754fb950fbe3086735a7c243aa73291c0",
|
|||
|
|
"子查询2-event-421e7d8c86a48fb46e338b6b87186645b76eea15f28dc038405c60d22be3f892",
|
|||
|
|
"子查询2-event-f3de857dabc67978d4bc8f500bd7308810a6e9f1de1e663878ade5ff00192da3",
|
|||
|
|
"子查询2-event-985080fd7deeb0666aac44dc8cde8963d7fcd74a169b295f057938c131e3d4ad",
|
|||
|
|
"子查询2-event-33f2f278e825b62f3ffa2e9489b78b131de322674308481d5ed8204809200f07",
|
|||
|
|
"子查询2-event-95fef18f8978d96d2f7358fc0fbf0553666d74b9ad9416a025f6fe1e7637df06",
|
|||
|
|
"子查询2-text-60c792d17256768940c0b197aa0d6e2cac5538db8faa31204bdd154a8afa2529",
|
|||
|
|
"子查询2-text-00efb42c4594a17a1fbcbe82fea110a0639bc6c7a0f71bdb755afb95e517961b",
|
|||
|
|
"原始查询-event-6cc4234f3d14af6f9424332cd4ac8660e5ecc3ae3e80f1eaca567424acb0cb65",
|
|||
|
|
"原始查询-event-dca72598df3a83e1e675dcf47fe05ae8e70a1dcb367675aee2bc574a9bd4adf4",
|
|||
|
|
"原始查询-event-f2cbc9f328b8add88baa16bddce59e0932efbce5a344f39d3122056c23a43e8c",
|
|||
|
|
"原始查询-event-3e211bd02295452b5f73f576af43583f25343fcd40792e8ca38cce2555b2b5f2",
|
|||
|
|
"原始查询-event-94a3dfd4d0c4dd3ee11226fbcae89040d0054a5b303f894432414be34be056fc"
|
|||
|
|
],
|
|||
|
|
"pagerank_data_available": true,
|
|||
|
|
"pagerank_summary": {},
|
|||
|
|
"concept_exploration_results": {},
|
|||
|
|
"exploration_round": 0,
|
|||
|
|
"debug_info": {
|
|||
|
|
"total_time": 94.36494755744934,
|
|||
|
|
"retrieval_calls": 1,
|
|||
|
|
"llm_calls": 4,
|
|||
|
|
"langsmith_project": "rag-api-service",
|
|||
|
|
"token_usage_summary": {
|
|||
|
|
"has_llm": true,
|
|||
|
|
"has_generator": true,
|
|||
|
|
"last_call": {
|
|||
|
|
"prompt_tokens": 4332,
|
|||
|
|
"completion_tokens": 37,
|
|||
|
|
"total_tokens": 4369
|
|||
|
|
},
|
|||
|
|
"total_usage": {
|
|||
|
|
"prompt_tokens": 5337,
|
|||
|
|
"completion_tokens": 180,
|
|||
|
|
"total_tokens": 5517,
|
|||
|
|
"call_count": 3
|
|||
|
|
},
|
|||
|
|
"model_name": "qwen2-7b-instruct",
|
|||
|
|
"has_last_usage": true,
|
|||
|
|
"has_total_usage": true
|
|||
|
|
},
|
|||
|
|
"complexity_analysis": {
|
|||
|
|
"is_complex": true,
|
|||
|
|
"complexity_level": "complex",
|
|||
|
|
"confidence": 0.95,
|
|||
|
|
"reason": "这是一个复杂查询,需要生成多方面的个子查询来回答。用户询问的是关于企业在数据安全技术体系建设方面的核心理念,这可能涉及到多种不同的数据安全策略、技术趋势、行业实践等多个方面。为了全面回答这个问题,可能需要查询和整合关于数据安全领域的理论、实际案例、行业报告等多种来源的信息。"
|
|||
|
|
},
|
|||
|
|
"debug_mode_analysis": {
|
|||
|
|
"debug_mode": "0",
|
|||
|
|
"debug_override": {},
|
|||
|
|
"path_override_applied": false
|
|||
|
|
},
|
|||
|
|
"sufficiency_analysis": {
|
|||
|
|
"final_sufficiency": true,
|
|||
|
|
"sufficiency_check_details": {
|
|||
|
|
"is_sufficient": true,
|
|||
|
|
"confidence": 0.9,
|
|||
|
|
"reason": "事件信息和段落信息包含了回答查询所需的关键内容...",
|
|||
|
|
"iteration": 0
|
|||
|
|
},
|
|||
|
|
"iteration_sufficiency_history": [],
|
|||
|
|
"sufficiency_progression": {
|
|||
|
|
"status": "no_sufficiency_checks"
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
"routing_analysis": {
|
|||
|
|
"total_routing_decisions": 1,
|
|||
|
|
"sub_query_generation_count": 0,
|
|||
|
|
"parallel_retrieval_count": 0,
|
|||
|
|
"pagerank_collection_count": 0
|
|||
|
|
},
|
|||
|
|
"concept_exploration_analysis": {
|
|||
|
|
"exploration_enabled": false,
|
|||
|
|
"exploration_rounds": 0,
|
|||
|
|
"pagerank_nodes_analyzed": 0,
|
|||
|
|
"successful_branches_total": 0,
|
|||
|
|
"total_branches_attempted": 0
|
|||
|
|
}
|
|||
|
|
},
|
|||
|
|
"iteration_history": [
|
|||
|
|
{
|
|||
|
|
"iteration": 0,
|
|||
|
|
"query": "并行检索: 原始查询 + 2 个子查询",
|
|||
|
|
"passages_count": 113,
|
|||
|
|
"action": "retrieval"
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"iteration": 0,
|
|||
|
|
"action": "sufficiency_check",
|
|||
|
|
"is_sufficient": true,
|
|||
|
|
"confidence": 0.9,
|
|||
|
|
"sub_queries_count": 0
|
|||
|
|
},
|
|||
|
|
{
|
|||
|
|
"iteration": 0,
|
|||
|
|
"action": "final_answer_generation",
|
|||
|
|
"answer_length": 7354
|
|||
|
|
}
|
|||
|
|
]
|
|||
|
|
}
|