参考文献
[1]新华社. 习近平主持中共中央政治局第二次集体学习并讲话[EBOL]. (20171209) [20211220]. http:www.gov.cnxinwen20171209content_5245520.htm[2]新华社. 中共中央 国务院关于构建更加完善的要素市场化配置体制机制的意见[EBOL]. (20200409) [20211220]. http:www.gov.cnzhengce20200409content_5500622.htm[3]第十三届全国人民代表大会常务委员会. 中华人民共和国数据安全法[EBOL]. (20210611) [20211220]. http:www.gov.cnxinwen20210611content_5616919.htm[4]Fritsch J, Wonham M. How to successfully design and implement a datacentric security architecture[EBOL]. (20190722)[20211220]. https:www.gartner.comendocuments3953491[5]Salado J, Voon P. A guide to data governance for privacy, confidentiality, and compliance[EBOL]. (20191025) [20211220]. https:www.microsoft.comdatagovernance[6]Salido J, Manager S P, Group T C, et al. A guide to data governance for privacy, confidentiality, and compliance. [EBOL]. (20101101) [20211220]. https:iapp.orgmediapdfknowledge_centerGuide_to_Data_Governance_Part3_Managing_Technological_Risk_whitepaper.pdf[7]于海澜, 唐凌遥. 企业架构的数字化转型[M].北京: 清华大学出版社, 2019[8]鲁传颖. 网络空间治理与多利益攸关方理论[M]. 北京: 时事出版社, 2016[9]Shostack A. SDL威胁建模工具入门[EBOL]. (20151014) [20211220]. https:docs.microsoft.comzhcnarchivemsdnmagazine2009januarysecuritybriefsgettingstartedwiththesdlthreatmodelingtool[10]Shostack A. Uncover security design flaws using the STRIDE approach [EBOL]. (20191007) [20211220]. https:docs.microsoft.comenusarchivemsdnmagazine2006novemberuncoversecuritydesignflawsusingthestrideapproach[11]全国信息安全标准化技术委员会. GBT 37988—2019 信息安全技术—数据安全能力成熟度模型[S]. 北京: 中国标准出版社, 2018[12]国务院. 促进大数据发展行动纲要[EBOL]. (20150905) [20211220]. http:www.gov.cnxinwen20150905content_2925284.htm