Volume 3,Issue 9
Research on Trustworthy Data Asset Management
In the era of digital economy, data has become a key production factor and core asset. However, problems such as low data quality, unclear ownership, security and privacy risks, and lack of trust have seriously restricted the full release of data value. This paper aims to systematically study the emerging field of "trustworthy data asset management" and explore its connotation, value, and practical strategies. The research holds that trustworthy data asset management is a systematic project that integrates technology, processes, and governance to ensure that data possesses trustworthy attributes such as authenticity, accuracy, completeness, consistency, security, privacy, and reliability throughout its entire lifecycle of collection, storage, processing, sharing, and application. Combining the digital scenario of the physical industry in the power grid material supply chain and the virtual asset scenario of digital economy represented by the number of fans of celebrities and influencers, this paper analyzes the core challenges and practical value of trustworthy data asset management in different fields, and constructs a comprehensive management strategy system covering strategic planning, technical implementation, process optimization, and governance guarantee. It is expected to provide theoretical reference and practical guidance for organizations to improve the credibility of data assets, activate the potential of data factors, and build a digital trust ecosystem.
[1] Zhao LF, Wei ZL, 2025, Thoughts on the Practical Path of Data Assetization. China Finance, (18): 64-65.
[2] Wang JQ, 2025, Research on the Phenomenon of “Digital Labor” Among Celebrity Fans in the Mobile Internet Era. Hefei University.
[3] Zheng Q, Dong J C, 2024, Chen Liang, Ruan Yingqing, Li Jinsong, Xu Linbin. Research on Distributed Trustworthy Data Management and Privacy Protection Technologies . Computer Engineering, 50(07): 174-186.
[4] Lang XF, Tan M, Zhang YQ, et al., 2024, Research on the Architecture of Trustworthy Data Service Middle Platform for Enterprise Groups Based on Blockchain Technology. Telecommunications Science, 40(11): 148-159.
[5] Dong J C, 2023, Research and Application of Distributed Trustworthy Data Management Technology Supporting Privacy Protection [D]. Beijing University of Posts and Telecommunications.
[6] Liu YN, 2024, From Object Fonds to Object-Oriented Trustworthy Data Bodies: An Analysis of the Methodology of Data Archival Governance. Archives Science Bulletin, (04): 13-21.
[7] Li L, Ren FH, Cai HQ, et al., 2024, Conception of a New Type of “Trustworthy Data Space” System Based on Spatiotemporal Codes and Data Internet Technology. Information and Communications Technology and Policy, 50(06): 89-96.
[8] Guo ZH, 2024, Research on the Influencing Factors of Consumption Intention of Fans of Traffic Stars. Dalian University of Technology.
[9] Yang YL, Zhang L, Yang XL, 2024, Trustworthy Data Space Helps Efficient Circulation of Data Elements. Posts & Telecommunications Design Technology, (02): 57-61.
[10] Huang YQ, Huang XC, 2023, Temporal-Spatial Arbitrage and Alienation of “Data People” in Fan Charity Communication: A Perspective of Dataism Critique. Journalism & Communication, 30(07): 55-74+127.
[11] Xue F, Dong GS, Chen L, et al., 2023, Research on a Blockchain-Based Data Security Supervision Model. Information Security and Communications Privacy, (06): 51-65.
[12] Yan K, Du Y, Guo L, et al., 2022, Trustworthy Data Storage and Encryption Method for Measurement Assets Based on Blockchain. Electronic Design Engineering, 30(17): 41-44+49.
[13] Zhou QF, 2021, Design and Implementation of a Provably Trustworthy IoT Application Support Platform Based on Blockchain. Beijing University of Posts and Telecommunications.
[14] Peng L, 2020, Research on Collective Actions of Fans in “Super Talk” Communities from the Perspective of Interaction Ritual Chains. Shanghai International Studies University.
[15] Wei XJ, Chen F, Dong YY, 2015, Research on Data Asset Credibility Evaluation Model. Journal of Computer Applications, 35(S2): 170-173.