摘要:Today, the editor will interpret and share "Evaluation of digital maturity of supply chain in automotive manufacturing enterprises
分享兴趣,传播快乐,增长见闻,留下美好。
亲爱的您,这里是LearningYard新学苑!
今天小编为大家带来文献泛读。
欢迎您的访问!
Share interest, spread happiness, increase knowledge, and leave beautiful.
Dear, this is the LearingYard New Academy!
Today, the editor brings you the literature reading.
Welcome to visit!
1 内容摘要(Content summary)
今天小编将从“思维导图、精读内容、知识补充”三个板块,解读分享文献《考虑声誉的供应链企业间信息安全共享演化博弈研究》。
Today, the editor will interpret and share "Evaluation of digital maturity of supply chain in automotive manufacturing enterprises" from the three sections of "mind map, intensive reading content, and knowledge supplement".
2 思维导图(Mind mapping)
3 精读内容(Intensive reading content)
本次泛读的文献刊载于数学的实践与认识期刊,是一篇研究供应链企业间信息安全共享问题的文章。文章考虑了声誉、共享溢出效应、共享效率、信息安全风险等因素,基于演化博弈分析了供应链企业间的信息安全共享行为规律,研究共享成本和安全风险的变化对决策主体的影响。
The literature reviewed in this extensive reading is published in the Journal of Mathematics in Practice and Theory, which is an article researching the issue of information security sharing among supply chain enterprises. The article takes into account factors such as reputation, sharing spillover effects, sharing efficiency, and information security risks, and analyzes the behavioral patterns of information security sharing among supply chain enterprises based on evolutionary game theory, studying the impact of changes in sharing costs and security risks on decision-making entities.
数学的实践与认识期刊是由中国科学院主管,中国科学院数学与系统科学研究院主办,在国内外公开发行的一个优秀期刊,刊载文章涉及工业、农业、环保、军事、教育等领域,主要任务是沟通数学工作者与其他科技工作者之间的联系,推动应用数学在我国的发展。
The Journal of Mathematics in Practice and Theory is an excellent journal under the administration of the Chinese Academy of Sciences, sponsored by the Academy of Mathematics and Systems Science, and publicly distributed both domestically and internationally. The journal publishes articles covering fields such as industry, agriculture, environmental protection, military, and education, with the main mission of bridging the communication between mathematics workers and other science and technology workers, and promoting the development of applied mathematics in China.
作者介绍道企业间的信息安全共享模式可以提高安全技术效率并降低管理成本,但共享过程中某一企业的系统若是较为脆弱,被黑客入侵成功,则可能导致合作的企业遭到安全攻击。供应链是一个企业信息安全共享实践的典型场景,故供应链企业间如何实施信息安全共享决策已成为研究热点。
The author introduces that the information security sharing model among enterprises can improve the efficiency of security technologies and reduce management costs. However, if a company's system is relatively vulnerable and successfully hacked during the sharing process, it may lead to security attacks on cooperating enterprises. The supply chain is a typical scenario for the practice of enterprise information security sharing, hence how to implement information security sharing decisions among supply chain enterprises has become a research hotspot.
、
国内外学者有从经济学视角对信息安全共享问题开展研究的,也有使用博弈论对信息安全共享问题展开研究的,且博弈论的研究已逐渐趋于主流,很多学者都建立博弈模型对此类问题进行探究。但作者指出现有研究较少研究企业的声誉水平对企业是否实施共享行为有何影响,故作者对此方面进行了研究。
Scholars at home and abroad have conducted research on information security sharing issues from an economic perspective, and some have used game theory to explore information security sharing issues, with game theory research gradually becoming mainstream. Many scholars have established game models to investigate such issues. However, the author points out that existing research has rarely studied the impact of a company's reputation level on whether it implements sharing behavior, so the author has conducted research in this area.
模型构建部分,作者首先假设了模型中需要用到的参数,有企业的初始收益、共享成本、付出努力等,同时根据其他学者的研究,作者引入了共享的溢出效应这一参数。相较于以往的文献,作者根据前人的总结,引入了企业声誉这一因素,作为主要的研究对象。
In the model construction section, the author first assumes the parameters needed for the model, including the initial revenue of the enterprise, sharing costs, and efforts made. At the same time, based on the research of other scholars, the author introduces the parameter of sharing spillover effects. Compared to previous literature, the author introduces the factor of corporate reputation as the main research object based on previous summaries.
参数设置好后便可根据参与者的不同选择构建收益矩阵,计算复制动态方程,求出博弈的均衡点,为后续的模型分析和数值仿真做准备。
After setting the parameters, the payoff matrix can be constructed according to the different choices of participants, the replication dynamic equation can be calculated, and the equilibrium point of the game can be found to prepare for subsequent model analysis and numerical simulation.
4 知识补充(Knowledge supplement)
什么是信息共享?
What is information sharing?
信息共享指不同层次、不同部门信息系统间,信息和信息产品的交流与共用,就是把信息这一种在互联网时代中重要性越趋明显的资源与其他人共同分享,以便更加合理地达到资源配置,节约社会成本,创造更多财富的目的。是提高信息资源利用率,避免在信息采集、存贮和管理上重复浪费的一个重要手段。
Information sharing refers to the exchange and sharing of information and information products among information systems at different levels and departments. It is the sharing of information, a resource that is becoming increasingly important in the internet era, with others to achieve more rational resource allocation, save social costs, and create more wealth. It is an important means to improve the utilization rate of information resources and avoid redundant waste in information collection, storage, and management.
信息共享的基础是信息标准化和规范化,并用法律或法令形式予以保证。信息共享的效率依赖于信息系统的技术发展和传输技术的提高,必须严格在信息安全和保密的条件下实现。
The basis of information sharing is the standardization and normalization of information, guaranteed by laws or decrees. The efficiency of information sharing depends on the development of information system technology and the improvement of transmission technology, and must be strictly achieved under the conditions of information security and confidentiality.
今天的分享就到这里了。
如果您对今天的文章有独特的想法,
欢迎给我们留言,
让我们相约明天,
祝您今天过得开心快乐!
That's all for today's sharing.
If you have a unique idea about the article,
please leave us a message,
and let us meet tomorrow.
I wish you a nice day!
参考资料:
翻译:ChatGPT 4
文字:https://baike.baidu.com/item/信息共享/2411616
参考文献:赵柳榕, 杨广文, 邹文轩, 等. 考虑声誉的供应链企业间信息安全共享演化博弈研究 [J]. 数学的实践与认识, 2020, 50(16): 285-291.
本文由LearningYard新学苑整理并发出,如有侵权请后台留言沟通。
文案I姜疯雨火
排版I姜疯雨火
审核I小h
来源:LearningYard学苑