and laws of public security governance activities from
various data, so as to optimize and improve the
corresponding management decisions. The main
characteristics of public security data are huge
amount of data, low application value density,
diversification and obvious big data characteristics.
At present, there is no unified classification standard
for public security data, because the amount of public
security data is relatively large, and there are public
security data in different industries, different
organizations and different data terminals.
When studying public security data, there will be
some differences in the definitions of different
researchers: (1) Researchers think that the public
security data of cities mainly include different
categories of urban public basic data, social situation
and public opinion data, physical environment and
disaster monitoring data, urban operation data,
departmental business data, human behavior data,
emergency handling data and public security
knowledge data. Different categories cover different
types of specific data. (2) Some researchers directly
divide urban big data into sensor system data, user-
generated data, government data, private sector data,
art and humanities data and other mixed data. (3)
Some researchers believe that public security data
simply refers to national security big data. These data
are distributed in the information space, physical
space and social space where people and things are
highly integrated in various complex correlation
forms(Sun 2019).
Because public security in a broad sense refers to
all external environments and orders related to social
life security, including environmental security, public
health security, economic security, information
security, food security, production security, workplace
security and so on. The data generated in these fields
are all public security data. In this research, it is
necessary to scientifically evaluate the maturity of
public security data management ability from the
commonality of data in different security fields.
Public security data is mainly a mixed
environment formed by the integration of Internet,
communication network and sensor network,
including physical space, social space and virtual
network coupling space. The data spaces stripped
from these spaces can all be called public security data
spaces. Physical objects in space are the main carriers
of public security data, including data of key
infrastructure, road traffic structure and semi-
structured infrastructure, as well as unstructured
multimodal data such as environmental physical
parameters and videos sensed by large-scale sensing
devices in human living space. In addition, individuals
and organizations in social space are also the main
producers of public security data, including basic
demographic data, individual or group personality
characteristics, emotional representation, cognitive
decision-making and other psychological data and
behavioral data. Virtual network coupling space refers
to the data generated in the overlapping coupling of
network space, physical space and social space. The
main carrier of these data is the Internet or mobile
terminal devices, including data and information risk
data processed by basic networks and different types
of application systems in information construction, as
well as some unstructured and semi-structured data
such as news reports, forum posts and blog posts.
In a word, the sources of public security data are
complex and the number is huge, and its obvious
feature is that the data of different industries have
strong connections. Because the public security
governance activity itself is continuous, it determines
that the generation and acquisition of public security
data have strong continuity. For example, the business
systems of government departments will constantly
update the corresponding data. In addition, public
security data are complex, diverse and interrelated.
The data of different fields, different sources and
different structural types are relatively large in scale
and growing at a relatively fast rate. There is a certain
connection between public security data of different
fields, and public security governance activities
involve different departments, industries and fields.
Therefore, the generated public security data also have
obvious correlation. Public security data involves a
wide range of subjects, and the production
management and use of public security data involve
different participants such as government
organizations, enterprises, the public and researchers.
These data characteristics determine that the
management of public security data is extremely
complex and difficult.
5 CONSTRUCTION OF PUBLIC
DATA MANAGEMENT
CAPABILITY MATURITY
MODEL
5.1 Model Design
When building the maturity model of public security
data management capability, we must clearly grasp
the public security data management practice and key
practice processes. Based on this, the key process area
can ensure the effectiveness of the maturity model of