Eurasia’s Future
Digital Environment and Social Security

The digital era is shaping a digital environment in which the digital economy, digital government, digital society, digital business, digital life and digital identity coexist. The widespread application of digital technologies such as cloud computing, big data, artificial intelligence, the Internet of Things, blockchain and 5G has greatly increased data processing capacity, optimised the efficiency of resource allocation and generated many new forms of business, but has also presented new challenges to public security.

Different countries should adapt their approaches to the specific social risks which have arisen in the digital environment. The problem of digital security is a broad concept, including data security in the virtual space, cybersecurity, the manipulation of public opinion, as well as risks to critical information infrastructure, supply chains and systemic risk in the physical world. In general, the risk characteristics include the following:

The risk in the enterprise supply chain

The data security requirement covers the entire economic system through the supply chains. Digital technology has already completely penetrated every link of production, exchange, distribution and consumption, exerting a huge impact on the production and operation of agriculture, industry and services. The strong permeability of digital technology allows digital security to spread through the supply chain throughout the economic system. The widespread application of the industrial Internet makes the entire production and management process digitalised; enterprises use digital technology to fully control all processes in R&D, design, production, management, marketing, after-sales service and others. Due to this, when the enterprise is subject to a cyber-attack, it may bring significant risks to the physical process of production and enterprise management.

Personal data security risks

As one’s personal life is completely digitalised and networked, the amount of personal data collection is growing rapidly. The super-positioning of artificial intelligence on big data may cause some traditional data anonymisation methods to become ineffective, and any anonymous data can be re-identified. With the use of artificial intelligence technologies, this data can be used to accurately predict, manipulate and even interfere with the behaviour of individuals, which can intrude on our personal lives as well as national security. For example, many modern telephone scams involve the use of personal data to accurately deceive, making it very difficult for potential victims to prevent the deception.

Business data security risks

Cloud technologies, openness, the use of open source software and greater connectivity increase the complexity of data protection. The Industrial Internet combines data related to R&D, production, marketing and management, making the importance of data in the production and management process increasingly significant. With the digitalisation and intellectualisation of the supply chains, data security issues arising within the supply chain are becoming particularly pressing. In terms of corporate data leaks, many companies collect large amounts of personal data, supply chain data, economic analysis data, etc. Leaks of these data not only lead to significant economic costs, but also pose a risk to national security.

Risks of disruption of data flows in the virtual space

In cyberspace, each participant can become a producer of information content, which leads to an excess of information in the virtual space. Large platforms or other organisations that monopolise consumer attention have an advantage in disseminating information and can practically decide which content can be quickly distributed in the virtual space, thereby manipulating information. In the virtual space, information is manipulated, and content distribution entities can control its distribution, which affects public opinion and reinforces biases. In the social governance system, the virtual space becomes a double sword: on the one hand, it can provide more effective and widespread public control, while on the other hand, the content and its distribution in this space are easily penetrated, which can lead to ideological attacks or the misdirection of thoughts among the public, negatively affecting national security.

Ethical risks of technology application

The development and application of digital technologies have left a deep imprint on the material and spiritual life of mankind. Although they transmit positive signals to the outside world, some negative effects are also gradually becoming apparent. For example, the characteristics of big data and cloud computing, which demonstrate the ability to overcome and surpass the weaknesses of human nature in the process of analysis and decision-making, can lead an individual to lose the ability to make independent decisions when presented with a huge amount of data. People, enjoying the convenience that technology brings, gradually become "slaves" under the control of technology. In addition, with the deepening implementation of digital technologies in everyday life, personal life trajectories and emotional preferences are completely under the control and vision of digital technologies, which can pose significant risks.

Digital security risks are a complex set of hazards related to national security, public safety and personal safety. In order to prevent the further escalation and spread of these risks, it is necessary to include the entire cycle of digital security risks in the legal system, and ensure the unity and closed cycle of governance mechanisms in planning, creation, management and assessment. Today, the digital sphere has become a new arena for powers, international conflicts, geopolitical confrontation and terrorist activities, which makes digital security risks more transnational, extreme and destructive. In this regard, in contrast to the traditional reactive model of the legal system that focuses on post-factum regulation, a preventive legal system that focuses on regular prevention and penetrating control should become the main choice for digital security governance in the future.

Views expressed are of individual Members and Contributors, rather than the Club's, unless explicitly stated otherwise.