11
SepSome time ago, the flight attendant Ms. Li was tempted to sneak in the case of Zhengzhou’s murder by DiDi Drip. On August 24th, Ms. Zhao, a passenger from Yueqing, Wenzhou, Zhejiang Province, was raped and killed by the driver Zhong while riding a drip. On the 26th, DiDi announced that since the 27th, Free Ride Service will be suspended nationwide and removed Huang Jieli, the general manager of the DiDi Free Ride Division and Huang Jinhong, Vice President of Customer Service Department. Didi said that after the Free Ride Service is rolled out, the company will internally reassess its business model and product logic.
Many apologies and rectifications made by Didi have been very familiar and begin to numb. In fact, after consulting the relevant information, we found that Internet platform companies represented by DiDi have actually had similar incidents. For example, Uber has been sued because a lot of attacks by drivers on passengers in the United States.
Internet platform enterprises match the demand costs of the supply and demand sides through the platform, but from the perspective of its historical development process, they have experienced the process of non-standardization to standardization and escalation of customer demand. In this process, the influence of various uncertain and unpredictable events still existing in the acquaintance society to the cyberspace is enormous.
In any case, giving customers a safe and secure service experience is fundamental to the existence of the company. In the Internet, when the supply and demand sides are related to the Internet platform and match the two customer service needs that are only known in the cyberspace, strictly grasping the security review of the users or platform partners is the basis for obtaining customer trust. The platform needs to adopt a very high standard of security review mechanism ensures that each transaction is successfully implemented.
From the prospective of current review requirements of the DiDi for drivers, the review mainly includes the audit and screening according to the national standard. When registering the owner account, it must provide “ID card”, “driving license” and “vehicle driving permit”. That all three certificates and face recognition are valid can be successfully registered through face recognition. In the meantime, Didi Company has worked closely with the national public security organs to review the driver's background, mainly to verify whether the driver has a criminal record. In addition, the DiDi will also deal with some violators through the customer evaluation function.
However, there are still various unexpected events. From the current point of view, the procedural formal review of these audits for online drivers is clearly insufficient. Through follow-up reports, we know that most of the drivers who make accidents have a history or some bad records. For these people to pass the certification reviews, we have a lot of speculations, either the platform partners themselves made forged documents or the platform did not cooperate with the public security organs to effectively review the record of every partner.
In China, although the Internet platform commercial organizations currently have massive user data, there is no information sharing platform with government departments such as public security organs, and public security agencies and other government departments will not easily cooperate with other companies because of the limitations of service and authority. Therefore, in the event of an emergency, information barriers naturally lead to delays in action.
In view of this, Internet platform companies must have more rigorous process control and critical safety information review when selecting partners. In some developed countries, there is a very strict security clearance procedure when hiring employees in key positions. This procedure is more stringent than the background checks and political trials we usually know, including citizenship and criminal offences records, civil case disputes, educational background information, employment history, social relationships (family, classmates and friends, etc.), financial credit status, illegal drugs (including drugs), alcohol history, psychological counseling history and status, military service, social networks information, computer system related events (illegal intrusions, etc.), disruptive events, and so on. At the same time, the information provided by the collaborators must meet the requirements of authenticity, completeness, comprehensiveness, consistency and accuracy, and be responsible for them. Counterfeiters are considered to be misconduct and documented.
In addition, employees are required to provide positive or negative comprehensive information for a specified number of years. For the information employees not sure of providing or not, it should have better provided before background investigation. If you have negative information, you can also attach a personal introduction sheet. Missing negative information may be judged by the auditor as a counterfeit behavior, which may result in the employee losing the opportunity to obtain a security review and being rejected by the agency. The reality of China's current situation is that the above-mentioned information is controlled by different government agencies. In fact, there are also information barriers between these institutions, so the “information island” phenomenon has always existed. How to build a public information security network that protects both personal privacy and upholds norms and principles and its rational and legitimate utilization of mechanism is a major practical problem we face.
In reality, for ordinary employers, there is a certain difficulty and resistance to obtaining the above-mentioned information. For Internet platform organizations, there are more difficulties and obstacles in obtaining the above-mentioned relevant information of partners or suppliers and customers. Although the cost is huge, in order to meet the most basic needs of customers - security, for the sustainable development of enterprises, it is necessary for these employers and platforms to pay the cost.
Moreover, for government agencies, they should also be committed to constructing these citizen information platforms, practicing the concept of openness and the rule of law, and cooperating with commercial organizations for some open information. For example, the enterprise credit information platform, such as QiChaCha, is very beneficial to the judgment of business activities, but there is no national platform for personal bad behavior records and credit information. At present, only some trusted platform organizations have this information. However, they are not shared by each other. In the era of rapid development of artificial intelligence and big data, big data thinking also needs the government, social organizations, research institutes and commercial institutions to emancipate the mind to follow the rule of law concept, cooperate with each other to promote and implement this idea and let big data information sharing and coordinating mechanism to better benefit the society.