| The value of data lies in circulation and sharing.However,data assets cannot be freely traded like traditional assets,so in order to give full play to the value of data assets,it is necessary to separate the ownership and use rights of data assets,and protect the privacy and security of original data in the process of use.Aiming at the problem of S company’s data asset management,this paper explores the value embodiment and value circulation of data asset in its digital strategic transformation.First of all,this paper sorted out and analyzed the current literature on data assets,including the concept and development of data assets,value,management,transaction,confirmation of rights,privacy security,circulation and other aspects.Based on this,the paper summarizes data assets and their value,including the definition of data and assets,the difference between data assets and intangible assets,the relationship between value and value co-creation theory and value circulation,as well as the influencing factors of the value of data assets.The principles of privacy computing and block chain technology are studied and discussed.These two technologies will be the key technologies to solve the value circulation of data assets.Secondly,combined with the case of S Company,this paper analyzes the current situation of S Company and the problems in data asset management.Enterprise digitization has become the strategic core of most enterprises,and for enterprises implementing digital transformation,data is becoming its important strategic asset content.However,the recognition and management ability of data asset value,data security,data islands,and data value mining are becoming key problems that restrict the digital transformation of enterprises.Finally,this paper uses new technologies represented by blockchain and privacy computing to construct a solution for the value circulation of enterprise data assets,so as to solve the separation of the right to use and ownership of enterprise data assets,and make enterprise data value circulate on the premise of ensuring data privacy security. |