期刊文献+
共找到903篇文章
< 1 2 46 >
每页显示 20 50 100
Data Flow&Transaction Mode Classification and An Explorative Estimation on Data Storage&Transaction Volume 被引量:4
1
作者 Cai Yuezhou Liu Yuexin 《China Economist》 2022年第6期78-112,共35页
The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete p... The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete picture of data flaw and transaction,this paper presents a systematic overview of the flow and transaction of personal,corporate and public data on the basis of data factor classification from various perspectives.By utilizing various sources of information,this paper estimates the volume of data generation&storage and the volume&trend of data market transactions for major economies in the world with the following findings:(i)Data classification is diverse due to a broad variety of applying scenarios,and data transaction and profit distribution are complex due to heterogenous entities,ownerships,information density and other attributes of different data types.(ii)Global data transaction has presented with the characteristics of productization,servitization and platform-based mode.(iii)For major economies,there is a commonly observed disequilibrium between data generation scale and storage scale,which is particularly striking for China.(i^v)The global data market is in a nascent stage of rapid development with a transaction volume of about 100 billion US dollars,and China s data market is even more underdeveloped and only accounts for some 10%of the world total.All sectors of the society should be flly aware of the diversity and complexity of data factor classification and data transactions,as well as the arduous and long-term nature of developing and improving relevant institutional systems.Adapting to such features,efforts should be made to improve data classification,enhance computing infrastructure development,foster professional data transaction and development institutions,and perfect the data governance system. 展开更多
关键词 data factor data classification data transaction mode data generation&storage volume data transaction volume
在线阅读 下载PDF
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage 被引量:1
2
作者 Liping Tao Yang Lu +2 位作者 Xu Ding Yuqi Fan Jung Yoon Kim 《Digital Communications and Networks》 SCIE CSCD 2022年第6期885-899,共15页
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so... Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions. 展开更多
关键词 IoT social data Blockchain Shar ding Associated transactions transaction assi gnment
在线阅读 下载PDF
A blockchain-based transaction system for private data sharing and trading 被引量:1
3
作者 Wei Cui Yu Pan Zhendong Ai 《Control Theory and Technology》 EI CSCD 2022年第3期291-302,共12页
To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The... To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The proposed system formulates multiple private data access control strategies,and realizes data trading and sharing through on-chain transactions,which makes transaction records transparent and immutable.In our system,the private data are encrypted,and the role-based account model ensures that access to the data requires owner’s authorization.Moreover,a new consensus protocol named Proof of Transactions(PoT)proposed by ourselves has been used to improve consensus efficiency.The value of Ecare is not only that it aggregates telemedicine,data transactions,and other features,but also that it translates these actions into transaction events stored in the blockchain,making them transparent and immutable to all participants.The proposed system can be extended to more general big data privacy protection and data transaction scenarios. 展开更多
关键词 Private data sharing Blockchain data access control Proof of transactions
原文传递
A Surfing Concurrence Transaction Model for Key-Value NoSQL Databases
4
作者 Changqing Li Jianhua Gu 《Journal of Software Engineering and Applications》 2018年第10期467-485,共19页
As more and more application systems related to big data were developed, NoSQL (Not Only SQL) database systems are becoming more and more popular. In order to add transaction features for some NoSQL database systems, ... As more and more application systems related to big data were developed, NoSQL (Not Only SQL) database systems are becoming more and more popular. In order to add transaction features for some NoSQL database systems, many scholars have tried different techniques. Unfortunately, there is a lack of research on Redis’s transaction in the existing literatures. This paper proposes a transaction model for key-value NoSQL databases including Redis to make possible allowing users to access data in the ACID (Atomicity, Consistency, Isolation and Durability) way, and this model is vividly called the surfing concurrence transaction model. The architecture, important features and implementation principle are described in detail. The key algorithms also were given in the form of pseudo program code, and the performance also was evaluated. With the proposed model, the transactions of Key-Value NoSQL databases can be performed in a lock free and MVCC (Multi-Version Concurrency Control) free manner. This is the result of further research on the related topic, which fills the gap ignored by relevant scholars in this field to make a little contribution to the further development of NoSQL technology. 展开更多
关键词 NOSQL Big data SURFING CONCURRENCE transaction Model KEY-VALUE NOSQL databases REDIS
暂未订购
Non-Euclidean Models for Fraud Detection in Irregular Temporal Data Environments
5
作者 Boram Kim Guebin Choi 《Computers, Materials & Continua》 2026年第4期1771-1787,共17页
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen... Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios. 展开更多
关键词 Anomaly detection credit card transactions fraud detection graph convolutional networks non-euclidean data
在线阅读 下载PDF
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview 被引量:3
6
作者 Yue Zhou Xin Luo MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1105-1121,共17页
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C... Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field. 展开更多
关键词 Big data analysis cryptocurrency transaction network embedding(CTNE) dynamic network network embedding network representation static network
在线阅读 下载PDF
MR-CLOPE: A Map Reduce based transactional clustering algorithm for DNS query log analysis 被引量:2
7
作者 李晔锋 乐嘉锦 +2 位作者 王梅 张滨 刘良旭 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第9期3485-3494,共10页
DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the alg... DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the algorithm is inefficient when processing large scale data. The MR-CLOPE algorithm is proposed, which is an extension and improvement on CLOPE based on Map Reduce. Different from the previous parallel clustering method, a two-stage Map Reduce implementation framework is proposed. Each of the stage is implemented by one kind Map Reduce task. In the first stage, the DNS query logs are divided into multiple splits and the CLOPE algorithm is executed on each split. The second stage usually tends to iterate many times to merge the small clusters into bigger satisfactory ones. In these two stages, a novel partition process is designed to randomly spread out original sub clusters, which will be moved and merged in the map phrase of the second phase according to the defined merge criteria. In such way, the advantage of the original CLOPE algorithm is kept and its disadvantages are dealt with in the proposed framework to achieve more excellent clustering performance. The experiment results show that MR-CLOPE is not only faster but also has better clustering quality on DNS query logs compared with CLOPE. 展开更多
关键词 DNS data mining MR-CLOPE algorithm transactional clustering algorithm Map Reduce framework
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
8
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication data Integrity transaction Confidentiality Trust Economy
在线阅读 下载PDF
The Role of Big Data Analysis in Digital Currency Systems
9
作者 Zhengkun Xiu 《Proceedings of Business and Economic Studies》 2025年第1期1-5,共5页
In the contemporary era,characterized by the Internet and digitalization as fundamental features,the operation and application of digital currency have gradually developed into a comprehensive structural system.This s... In the contemporary era,characterized by the Internet and digitalization as fundamental features,the operation and application of digital currency have gradually developed into a comprehensive structural system.This system restores the essential characteristics of currency while providing auxiliary services related to the formation,circulation,storage,application,and promotion of digital currency.Compared to traditional currency management technologies,big data analysis technology,which is primarily embedded in digital currency systems,enables the rapid acquisition of information.This facilitates the identification of standard associations within currency data and provides technical support for the operational framework of digital currency. 展开更多
关键词 Big data Digital currency Computational methods transaction speed
在线阅读 下载PDF
基于两种交易模式数据产品核算的比较
10
作者 贾小爱 韩振华 李云发 《统计与决策》 北大核心 2026年第3期35-40,共6页
根据交易过程是转移所有权还是仅转移使用权,可将数据产品分为货物型数据产品和服务型数据产品。文章基于国民经济核算理论,从生产、收入分配和使用三个层面探讨这两种数据产品的核算区别。研究发现:货物型数据产品的产出类似于货物,按... 根据交易过程是转移所有权还是仅转移使用权,可将数据产品分为货物型数据产品和服务型数据产品。文章基于国民经济核算理论,从生产、收入分配和使用三个层面探讨这两种数据产品的核算区别。研究发现:货物型数据产品的产出类似于货物,按销售数据库缴纳增值税,消费方式为消费者直接获得产品,它形成的数据资产不存在确切的使用年限,资产所有者有权对其进行处置或者买卖,转移资产所有权发生的费用是其固定资本形成的一部分。服务型数据产品的产出类似于服务,按销售服务缴纳增值税,进口缴纳的税收实质上是国内消费税或销售税。服务型数据产品也可以形成固定资产,这种资产是存在确切使用年限的使用许可,持有者无权对其进行处置或者买卖,数据内容发生重大改变或者更新是其固定资本形成的一种方式。两种数据产品的成本和数据内容价值不同,导致二者的价值形成也不同。 展开更多
关键词 数据产品 交易权属 交易模式 核算区别
原文传递
基于区块链的多权威属性基加密方案
11
作者 李杰 马海英 +1 位作者 孙国荣 杨及坤 《计算机应用与软件》 北大核心 2026年第2期356-362,370,共8页
针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间... 针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间的映射关系,实现属性私钥分布式分发和撤销,使得属性撤销无需属性私钥更新,减少用户计算开销。安全性证明和效率分析表明,该方案不仅提高属性私钥撤销的效率,且保障数据的前向和后向安全性。 展开更多
关键词 区块链 多权威属性基加密 细粒度授权 属性撤销 物联网数据交易
在线阅读 下载PDF
数据产品交易定价的现实障碍及因应
12
作者 邓社民 管涛 《中国流通经济》 北大核心 2026年第2期104-116,共13页
数据产品定价是数据作为新型生产要素实现高效能资源配置、提高数据产品流通质量与效率的关键环节。在数字经济浪潮下,构建科学、公平、高效的数据产品交易定价机制,不仅是激活数据要素潜能的内在要求,也是推进数据要素市场化配置改革... 数据产品定价是数据作为新型生产要素实现高效能资源配置、提高数据产品流通质量与效率的关键环节。在数字经济浪潮下,构建科学、公平、高效的数据产品交易定价机制,不仅是激活数据要素潜能的内在要求,也是推进数据要素市场化配置改革的重大战略课题。当前数据产品交易定价的体系性、科学性、协同性不足,集中表现为交易定价的主体不明,易产生权责不清、监管职责不明等问题;价值评估机制缺乏,导致评估范围模糊、标准不一、可信数据来源匮乏;交易定价的利益配置失衡,严重挫伤参与方的积极性,导致交易定价监管机制不完善,容易造成市场失序。究其根源,上述困境集中体现为交易定价机制所面临的深层规制张力。一方面,数据产品的特殊属性要求其定价活动必须置于政府的有效规制中,防止关键数据资源被滥用或不当逐利;另一方面,数据要素的价值释放又不能过度依赖自发议价和短期逐利,防止因交易定价失序引致的目的异化和风险衍生。因此,作为特殊的政策性市场,数据产品定价须从定价主体、评估机制、利益配置与监管机制方面明确规制内容。一是明晰三权分置下数据产品交易定价主体为数据交易所,避免数据产权误用引致的定价混乱;二是完善数据产品交易的价值评估机制,克服“一事一议”的局限性;三是构建按贡献分配的利益共享机制,推动数据定价从小作坊式向结构化、规范化模式转型;四是建立体系化的数据产品交易定价穿透式监管机制,促进数据要素市场的健康、规范与有序发展。 展开更多
关键词 数据产品 数据要素 交易定价 数据流通 数据价值释放
在线阅读 下载PDF
电力行业数据要素发展及数据交易关键支撑技术分析
13
作者 李彬 易宸乐 +3 位作者 胡俊豪 张文艳 任婕 康毅 《内蒙古电力技术》 2026年第1期35-44,共10页
以电力行业数据要素发展及数据交易关键支撑技术为研究对象,提出面向电力数据交易的四维核心支撑体系。该体系主要由跨行业多主体数据安全共享、数据撮合交易、数据价值评估及数据使用监督审计技术构成。数据安全共享技术通过多方安全... 以电力行业数据要素发展及数据交易关键支撑技术为研究对象,提出面向电力数据交易的四维核心支撑体系。该体系主要由跨行业多主体数据安全共享、数据撮合交易、数据价值评估及数据使用监督审计技术构成。数据安全共享技术通过多方安全计算与隐私增强机制打破跨行业电力数据壁垒;数据撮合交易技术融合数据经纪人服务与智能撮合交易技术,提升交易效率与匹配精度;数据价值评估技术持续深化电力数据“三化”(资源化、资产化、资本化)路径,同时推动建立电力行业级评估标准体系;数据使用监督审计技术依托数据使用监督审计架构,确保数据防泄露、防滥用和可审计。当前,电力行业面临数据安全与协同增效的深层矛盾,亟需通过联邦学习与可信计算等技术突破、跨域协同机制创新及全生命周期安全管理体系构建,实现安全与效能的动态平衡。 展开更多
关键词 数据要素 数据交易 跨行业安全共享 撮合交易 数据价值评估 监督审计
在线阅读 下载PDF
“数据流通安全治理”研讨会专家观点综述
14
作者 本刊编辑部 《中国流通经济》 北大核心 2026年第2期3-14,共12页
推动数据高质量发展和高水平安全良性互动,需要坚持系统思维、底线思维,将安全贯穿数据供给、流通、使用全过程,加强数据流通安全治理,防范数据滥用风险,充分释放数据价值。2025年9月14日,北京物资学院会计学院、兰州财经大学会计学院... 推动数据高质量发展和高水平安全良性互动,需要坚持系统思维、底线思维,将安全贯穿数据供给、流通、使用全过程,加强数据流通安全治理,防范数据滥用风险,充分释放数据价值。2025年9月14日,北京物资学院会计学院、兰州财经大学会计学院、中国流通经济杂志社联合举办首届“数据流通安全治理”学术研讨会,深入探讨构建规则明晰、产业繁荣、多方协同的数据流通安全治理体系。与会专家认为,数据资产的价值是由数据被使用而带来的价值决定的,很难以成本为基础进行定价。数据资产价值只有在流动和使用中才能实现,必须使数据成为生产力要素市场的交易对象,通过激活数据流动实现数据资产价值。数据资产的确认和计量存在较大困难,以致许多企业在会计信息中未披露数据资产,不仅影响企业会计信息的可靠性、相关性,而且影响数据流通规模和企业间数据交易。为此,要厘清数据、数据资源与数据资产的关系,加强数据资产治理。在实践中,新能源汽车产业出现的数据权属不明晰、使用不规范、跨境乱象等问题,已成为制约产业可持续发展的桎梏,必须防范各种潜在的安全风险,同时促进数据流通价值释放。只有改变数据流通效率低下、数据促进经济高质量发展的潜力尚未发挥的局面,才能使高效的数据流通体系建设真正成为推动经济高质量发展的重要引擎。本刊编辑部对专家阐述的主要观点进行了归纳整理,以飨读者。 展开更多
关键词 数据流通安全 数据资产 数据价值 数据交易 安全治理
在线阅读 下载PDF
可信数据空间赋能档案数据资产化:概念、作用与路径
15
作者 唐长乐 张志腾 《北京档案》 北大核心 2026年第2期33-40,共8页
在数据要素市场化配置改革的战略背景下,档案数据作为重要的信息资源,其资产化已成为激活档案资源价值,推动档案事业转型的重要路径。论文以可信数据空间为研究视角,结合档案数据资产化的核心需求,系统分析可信数据空间在档案数据确权... 在数据要素市场化配置改革的战略背景下,档案数据作为重要的信息资源,其资产化已成为激活档案资源价值,推动档案事业转型的重要路径。论文以可信数据空间为研究视角,结合档案数据资产化的核心需求,系统分析可信数据空间在档案数据确权、安全流通和市场交易中的作用机制,并提出可信数据空间视域下档案数据资产化的治理、技术和生态路径,即建立基于“三权分置”的档案数据可信确权机制、构建“安全可控”的档案数据可信流通体系和打造“多元协同”的档案数据可信交易生态。研究旨在为政府、企业及文化机构的档案数据资产化管理提供理论支撑,为档案数据融入数据要素市场提供方向参考,助力数字中国战略下档案事业的高质量发展。 展开更多
关键词 可信数据空间 档案数据资产化 数据确权 数据安全流通 数据市场交易
在线阅读 下载PDF
基于LBC模型的公共资源交易数据命名实体识别研究
16
作者 沈斐 李睿 杨剑凌 《计算机应用与软件》 北大核心 2026年第2期242-247,254,共7页
公共资源交易数字化推动了公共资源交易数据指数级的增长,提升交易主体、项目属性等实体识别的准确度与泛化能力成为关键挑战。提出一种基于LBC(LIFL-BERT-CRF)模型的公共资源交易数据命名实体识别研究方法,使用LIFL改善单个字符表达语... 公共资源交易数字化推动了公共资源交易数据指数级的增长,提升交易主体、项目属性等实体识别的准确度与泛化能力成为关键挑战。提出一种基于LBC(LIFL-BERT-CRF)模型的公共资源交易数据命名实体识别研究方法,使用LIFL改善单个字符表达语义不足的问题,基于BERT进行预训练,通过CRF考虑整个序列的上下文关系,实现公共资源交易命名实体识别全局优化的决策。实验结果表明该模型在准确性和有效性方面明显优于现有的基线方法。 展开更多
关键词 公共资源交易数据 命名实体识别 BERT 注意力机制
在线阅读 下载PDF
数据要素如何推动企业专业化分工——来自公共数据开放的经验证据
17
作者 赵燕 郭晨涛 季伟伟 《商业研究》 北大核心 2026年第1期66-74,共9页
在数字化时代,畅通数据要素资源流动,鼓励并引导企业利用公共数据深化企业分工,已成为激活经济新动能的关键路径。本文基于2017—2023年中国沪深A股上市公司数据,以政府实施公共数据开放为切入点,探讨公共数据开放与企业专业化分工的内... 在数字化时代,畅通数据要素资源流动,鼓励并引导企业利用公共数据深化企业分工,已成为激活经济新动能的关键路径。本文基于2017—2023年中国沪深A股上市公司数据,以政府实施公共数据开放为切入点,探讨公共数据开放与企业专业化分工的内在联系。研究发现:公共数据开放有助于提高企业的专业化分工水平。机制检验表明,要素市场化配置、企业劳动力配置效率和交易成本是公共数据开放提升企业专业化分工的作用渠道。进一步分析发现,当企业所处的供应链上下游供需偏离程度较高、实施“专精特新”式发展以及具备行业优势时,公共数据开放对专业化分工的促进作用更加明显;此外,公共数据开放也有效促进了企业专业化分工对自身核心竞争力的提升效果。 展开更多
关键词 公共数据开放 专业化分工 要素市场化 劳动力配置效率 交易成本
在线阅读 下载PDF
大数据综合试验区建设赋能中国上市企业数据要素市场化研究
18
作者 金爽 李立朋 《技术经济》 北大核心 2026年第2期44-61,共18页
数据要素市场化是新时代企业高质量发展的核心支撑资源和新型驱动引擎。将大数据综合试验区作为准自然实验,以2010—2023年中国A股上市企业为样本构建多期双重差分模型,实证检验大数据综合试验区建设对上市企业数据要素市场化的影响。... 数据要素市场化是新时代企业高质量发展的核心支撑资源和新型驱动引擎。将大数据综合试验区作为准自然实验,以2010—2023年中国A股上市企业为样本构建多期双重差分模型,实证检验大数据综合试验区建设对上市企业数据要素市场化的影响。研究发现,大数据综合试验区建设有利于促进上市企业数据要素市场化。异质性分析表明,大数据综合试验区建设在非国有企业、非高新技术行业、东部地区及金融环境开放程度较高的地区中对企业数据要素市场化的影响更显著。作用机制检验表明,大数据综合试验区建设通过提升资源配置效率和企业创新效率对企业数据要素市场化产生正向影响,而市场交易效率则呈现部分负向中介作用。空间溢出效应检验表明,大数据综合试验区建设对邻近地区企业数据要素市场化产生了显著的抑制效应。研究结论为评估企业数据要素市场化提供了新的视角,并为相关机构和企业提出政策建议。 展开更多
关键词 大数据综合试验区 企业数据要素市场化 市场交易效率 资源配置效率 企业创新效率
在线阅读 下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部