These things must be done well before the most pop

2022-08-07
  • Detail

With the advent of the digital era, how can enterprises use new digital technologies to cope with the rapid changes in the market environment and achieve sustainable development? The author believes that in the face of the three major risks of digital transformation, enterprises must do several things first

enterprises usher in new opportunities for transformation and development in the digital era

the development of different technologies needs to go through the process of growth to maturity, follow different development paths and adopt different application modes. Digital technology is a typical fast-growing technology. Since 2012, the amount of invention and technology transfer related to digital technology has experienced unprecedented intensive growth. The average annual growth rate of invention and technology transfer registered in the world's top five intellectual property offices is as high as 19%. The explosive growth of digital technology has become an internal combustion engine for industrial transformation and development

lower cost of digital products and services. With the continuous progress of digital technology and the continuous expansion of network, function, application and content, the price of digital products and services available to enterprises has dropped rapidly. According to OECD statistics, from 2000 to 2018, the prices of communication technology related products in OECD countries decreased by 20% relative to the 45% increase in average consumer prices. In Europe and the United States, the price of telecommunications services has been reduced by 10 to 25 percent, and the price of ICT products has been reduced by 80 percent or more. Small and medium-sized enterprises can also bear the cost of using big data, cloud computing, IOT and other technologies, and the threshold of enterprise digital development is continuously reduced. Cloud computing services have increased by more than 50% in the past four years. On average, 56% of large enterprises and 27% of small enterprises are purchasing cloud services

the data enabling foundation is becoming stronger. From the perspective of data transmission capacity, cross-border data flow has a solid supporting foundation to ensure efficient collaboration of enterprises in the whole industrial chain of R & D, production, supply and after-sales from speed to scope. In 2018, 448 submarine cables with a length of 12million kilometers have been built to transmit data around the world. Meanwhile, the global Internet bandwidth reached 393tb in 2018

from the perspective of data scale, big data analysis is expanding from the ubiquitous network end-user equipment and IOT to the data center, bringing a steady stream of data analysis reserves for enterprises. Cisco judges that the global IP traffic in 2021 will double that in 2018, and reach 400eb per month in 2022. The traffic from the data center will also double that in 2018

the penetration rate of digital transformation tends to be higher. Digital transformation is reaching all sectors of the economy and society at different speeds and ranges, which has become a general trend, forcing enterprises to change from passive to active and seize the transformation opportunities. At present, the penetration of digital transformation is from the use of basic digital technology to the development of high-level digital technology functions. The penetration range is extended from the leading fields such as information communication, transportation and retail to food, light industry and equipment manufacturing. Robots and 3D printing are typical applications of digital transformation in the manufacturing industry. From 2007 to 2016, the use intensity of robots in BRICs countries increased by twice the average value of OECD. In 2018, according to the statistics of the international robotics Federation, more than 700 service robot manufacturers provided professional and private robots

enterprises face three major risks in digital transformation

enterprises that conform to the general trend of technology and industrial development are moving towards the road of digital transformation, making full use of digital technology to build their own digital capabilities, pursuing breakthroughs and innovations in production mode and operation mode, and achieving positive results. However, there are still some potential risks that restrict the digital transformation of enterprises

innovation risk for traditional enterprises, digital transformation will face low-cost competition from emerging enterprises such as PDF, MS Word and HTML, which are equal to advanced technologies. The choice of innovation path is very important. If the judgment of digital trend and market demand is incorrect, the understanding of their own advantages is inaccurate, and they choose the wrong fusion application scenario, and develop digital products and services in the wrong direction, Or lack of overall control over R & D capability, cost control and management level in the process of business model innovation may lead to the failure of enterprise transformation

for emerging enterprises, they are usually good at innovative digital products or services. The new knowledge products they created have enriched the object scope of intellectual property rights, and patentable objects such as genetic programming and artificial neural networks have emerged one after another. However, there is a gap in the protection of these innovative technologies in the existing laws, which leads to the technology spillover of enterprises' R & D investment, damages the interests of innovative enterprises, and also brings legal disputes over patent infringement, affecting the enthusiasm of enterprises' innovation

market risk enterprises with data resources occupy a dominant market position and often abuse their market position by requiring users or third parties to sign exclusive terms and other means to prevent other competitors from collecting data and create barriers for other enterprises to enter the same market. For example, as the largest Internet traffic app in China, it controls almost all the social resources of the Internet acquaintance circle, causing problems such as market competition disorder and unfair allocation of market resources. Although data monopoly was first mentioned in the provisions on the prohibition of abuse of market dominant position (Draft for comments) in 2019, there are no detailed rules to be implemented

in some digital frontier fields, such as artificial intelligence and driverless, transformed enterprises will face great market operation uncertainty due to the lag of relevant specifications after entering the market. For example, the accident of driverless cars should be attributed to the development of production. 1. Sealing experiment: there is no legal provision on the enterprise, product owner or artificial intelligence product itself that can obtain sealing strength products by using the sealing experiment. For another example, artificial intelligence products may be suspected of privacy infringement, discrimination and manipulation of political systems due to model behavior deviation, human-computer interaction and other problems. In the future, artificial intelligence enterprises may face the ethics and legitimacy assessment initiated by the artificial intelligence ethics committee composed of government and industry experts

security risks on the one hand, digital transformation is blurring the boundary between information technology and operation technology. The hyperlinks involved in general digital technology (such as (1) calibration and zeroing of extensometer: measuring the length of scale as a system) and shared service providers (such as cloud service providers) have enhanced the digital dependence across departments and borders, Data interruption to stakeholders in specific sectors (such as finance and energy) may be transmitted to stakeholders in other sectors, resulting in cross sectoral and cascading systemic security risks

on the other hand, the creative damage brought about by the development of new business forms such as financial technology and automatic driving will also magnify the safety risk of the Department itself. For example, the use of cryptocurrency to disintermediate may lead to malicious attacks on cryptocurrency exchange while strengthening security. For example, the collection of personally identifiable data will help our technicians to answer the risk of data theft or abuse caused by financial institutions one by one

make policy reserves to prevent and resolve risks

in the face of the potential risks faced by enterprises' digital transformation, the government should have the initiative to prevent risks, and also have good strategies to deal with risks. It needs to accurately study and properly deal with them

strengthen policy support to accelerate innovation. First, support the commercialization of digital transformation ideas and the early commercialization of integrated services. For example, public-private partnerships are used to expand joint investment in target areas such as artificial intelligence and big data, and Government R & D subsidies are used as leverage to leverage private venture capital, such as supporting the testing of new digital technology application scenarios. The second is to build a digital transformation industrial cluster linked by large and medium-sized enterprises, and set up digital transformation projects and one-stop service institutions specifically for small and medium-sized enterprises to provide full service for project development. Third, improve the intellectual property protection mechanism and study the possibility of intellectual property protection of emerging technologies

innovate regulatory means to escort the market to meet challenges. First, improve the laws and regulations related to digitalization, and expand and supplement the legal framework for digitalization to meet the development needs of emerging business fields. Second, it is considered to establish a regulatory pilot area for new technologies and new business models, promote the desired innovation under effective prevention, and provide sufficient regulatory freedom on the premise of adequate consideration of risks. Third, consider establishing a cross departmental institution similar to the digital Bureau, conduct a comprehensive analysis of the overall development of digital transformation, discuss typical problems in digital transformation, and make neutral, effective and sustainable suggestions for the government

optimize risk management and build a new safety barrier. First, implement flexible and agile rather than rigid management of digital security, including government regulators, basic information service operators, digital products and service providers and other stakeholders into the subject scope of risk management, and clarify their own risk management scope. Second, promote trust among different subjects and establish relevant mechanisms so that effective risk information such as threats and loopholes can be shared across the boundaries of public and private sectors and large, medium and small enterprises. Third, enhance the enterprise's risk awareness of digital security, organize relevant training to guide the enterprise management to take into account the stability of the business model to resist attacks, and improve the skill level of enterprise risk management technicians

Copyright © 2011 JIN SHI