Paper
13 January 2023 Revenue distribution mechanism of data services in power grid enterprises
Liyu Xia, Yundan Liang, Wan He, Haini Qu, Jingce Xu, Youzi Wang
Author Affiliations +
Proceedings Volume 12510, International Conference on Statistics, Data Science, and Computational Intelligence (CSDSCI 2022); 125100S (2023) https://doi.org/10.1117/12.2656933
Event: International Conference on Statistics, Data Science, and Computational Intelligence (CSDSCI 2022), 2022, Qingdao, China
Abstract
The digital transformation of power grid enterprises is a requirement and concrete implementation measure of China's "14th Five-Year Plan" for digital economy, which provides continuous impetus for the flourishing and healthy development of China's digital economy. Power grid enterprises use data elements to provide data services to different targets and obtain revenue. How to reasonably allocate the revenue is an important factor to motivate them to carry out data services and digital transformation. In this paper, we study the pricing strategy of data services of power grid enterprises under different scenarios and develop a revenue allocation mechanism according to different data subjects. This study can provide suggestions for the revenue allocation practice of data asset services in power grid enterprises and help them better implement the digital transformation strategy.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Liyu Xia, Yundan Liang, Wan He, Haini Qu, Jingce Xu, and Youzi Wang "Revenue distribution mechanism of data services in power grid enterprises", Proc. SPIE 12510, International Conference on Statistics, Data Science, and Computational Intelligence (CSDSCI 2022), 125100S (13 January 2023); https://doi.org/10.1117/12.2656933
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Legal

Data centers

Data analysis

Neodymium

Computer security

Data processing

Back to Top