Workflow
海量数据处于“原矿”状态,数据价值释放如何破局?

Core Insights - Data is the core productivity of the digital economy, and its circulation is transitioning from "internal circulation" to "external circulation" [1][4] - The lack of trust presents three major challenges in releasing data value: insufficient processing, integration, and verification [1][4] Group 1: Data Challenges and Solutions - A significant amount of data remains in its "raw" state, lacking primary processing and handling [5] - The existence of "data silos" makes it difficult to integrate multi-source data, hindering the formation of high-value data products [5] - The establishment of a "trusted data space" is crucial for promoting credible data circulation and utilization across different entities, industries, and regions [1][5] Group 2: Trusted Data Space Development - The concept of a "trusted data space" involves connecting multiple parties based on consensus rules to achieve data resource sharing and utilization [2][3] - By 2028, China aims to establish over 100 trusted data spaces, creating a series of solutions and best practices [3][4] - The trusted data space can enhance trust in data processing, integration, and verification, addressing the industry's strong expectations for data security [4][5] Group 3: Agricultural Data Utilization - In Jiamusi, Heilongjiang, public data is being utilized to support modern agricultural inclusive finance, allowing farmers to access loans more easily [2][3] - The integration of over 50,000 agricultural data points into a standardized system is underway, leveraging blockchain and other technologies for data-driven financial services [2][3] Group 4: Future Directions and Challenges - Current applications of trusted data spaces are mostly exploratory and need to develop replicable and scalable models [6] - High-level security guarantees are essential for unlocking data value, especially in high-value and sensitive industries [5][6] - Continuous technological advancements and policy support are necessary to optimize data value release and address security threats in data circulation [5][6]