scholarly journals Public perception of the practices of digital profiling and social score: the situation in Russia and China

2021 ◽  
pp. 56-76
Author(s):  
Roman Z. Rouvinsky ◽  
Ekaterina Rouvinskaya ◽  
Tatiana Komarova

This comparative research is dedicated to the attitude of the residents of PRC and Russia towards the practices of digital profiling and social score (ranking / grading) that are currently being implemented worldwide. Analysis is conducted on the results of interviewing the Chinese citizens, as well as sociological survey carried out among the Russian residents. The interviewing of the Chinese citizens was conducted in two stages: September 2020 via questionnaire in a written form; and March 2021, through the web platform CrowdSignal. The survey of the Russian residents was carried out from September 8, 2021 to October 26, 2021 in the form of filling out a printed questionnaire, as well as through the web platform. The conducted interviews demonstrate a high level of confidence of Chinese youth in the practices of collecting and processing personal information that were adopted in China, as well as the government initiatives on implementation of the score mechanisms in public administration. Unlike the Chinese citizens, the Russian residents including youth, to a considerable extent are inclined towards distrust in the government and namely private commercial companies with regards to their method of collecting and use personal information. A significant part of the Russian residents have not yet made up their mind on digital profiling and social credit system, or are cautious of such innovations.

Author(s):  
Ariane Ollier-Malaterre

This study attempts to delineate $2 when they use social media, shop online, and make electronic payments using WeChat Pay and Alipay. It is part of a book I am writing on perceptions of privacy and surveillance in China and is grounded in an inductive content analysis of 58 semi-structured in-depth interviews I conducted late 2019 in Beijing, Shanghai, and Chengdu. Privacy is written with two different words in Mandarin: $2 (a personal thing you do not wish to disclose in public akin to Western definitions) and $2 (hiding a shameful secret). Most of my interviewees used the latter meaning: $2 . Privacy, thus, was $2 , understood as $2 (moral face - e.g., purchases of personal medicine, underwear and sex-related products, or weapons) and $2 (social face - eg., financial information). Moreover, they perceived the need to hide shameful information $2 : parents and supervisors, or hackers who would disclose personal information, but less so an abstract entity such as the government. For instance, several interviewees felt they could “hide on Weibo” using a pseudonym, despite the real-name registration policy. These findings on privacy may shed slight on how Chinese citizens view the digitalization of surveillance through facial recognition monitoring and the building of the social credit system, and contribute to culture-sensitive surveillance research.


MaRBLe ◽  
2019 ◽  
Vol 2 ◽  
Author(s):  
Nadja Aldendorff

In 2014, the State Council of the People’s Republic of China released a document that called for the construction of a nationwide Social Credit System (SCS) with the goal to encourage sincerity and punish insincerity. The system uses blacklists that citizens land on for various cases of misbehavior, ranging from failing to pay a fine to being caught Jaywalking. This research explains the design process behind the SCS and in particular why many Chinese citizens are embracing this form of surveillance. It focuses on three topics to answer this question: the historical roots underlying the system, the perceived lack of trust in Chinese society and the comparison with concepts from surveillance theories developed in the West. From the analysis, following conclusions could be drawn: Historically, the state has often acted as a promoter and enforcer of moral virtue. The SCS fits perfectly into this tradition. The most prominent reason for the positive Chinese reaction is the lack of institutions in China that promote trust between citizens and businesses. There is a severe trust deficit which the government had to find a solution for. Regarding surveillance theory, Foucault’s concept of ‘panopticism’ shows similarities with the SCS and underlines its effectiveness in changing and steering people’s behavior while Lyon’s notion of ‘social sorting’ is used to demonstrate the potential dangers of the Chinese system.


Subject Social mobility in China. Significance So far, the Communist Party leadership has only addressed the most extreme manifestations of inequality -- high-level corruption and rural poverty. It has not tackled a wide range of social, economic and institutional barriers to social mobility that affect hundreds of millions of people across the country. Impacts Members of China’s middle class are already approaching the limits of their upward mobility. The social credit system could evolve in a way that exacerbates the divide between the economically advantaged and disadvantaged. The campaign to eliminate absolute poverty will do little to address the problem of relative poverty in urban areas.


2020 ◽  
Vol 2020 (4) ◽  
pp. 89-110
Author(s):  
Mo Chen ◽  
Jens Grossklags

AbstractThe Chinese Social Credit System (SCS), known as the first national digitally-implemented credit rating system, consists of two parallel arms: a government-run and a commercial one. The government-run arm of the SCS, especially efforts to blacklist and redlist individuals and organizations, has attracted significant attention worldwide. In contrast, the commercial part has been less often in the public spotlight except for discussions about Zhima Credit.The commercial arm of the SCS, also referred to as the Consumer Credit Reporting System (CCRS), has been under development for about two decades and took a major step forward in 2015 when 8 companies were granted permission to implement pilot consumer credit reporting programs. This development fundamentally increased the reach and impact of the SCS due to these companies’ sizable customer base and access to vast troves of consumer-related information.In this paper, we first map the Chinese CCRS to understand the actors in the credit reporting ecosystem. Then, we study 13 consumer credit reporting companies to examine how they collect and use personal information. Based on the findings, we discuss the relationship between the CCRS and the SCS including the changes in the power relationships between the government, consumer credit reporting companies and Chinese citizens.


Author(s):  
Igor L. Sazonets ◽  
Igor G. Hanin ◽  
Мichael V. Ryabokon ◽  
Yuriy V. Pikalov

The goal of this study is to identify the most efficient practices in exercising the digital public administration in the context of implementing the innovative potential of national economy. This goal was achieved through highlighting the distinctions and peculiarities of Social Credit System as China’s administration model. The study determines the impact of Social Credit System on economic and social indicators of China’s economy. The authors assessed the efficiency of Social Credit System based on the indicators of the countries, which had the alternative approaches to digital public administration and were characterized by a high level of application of digital technology to monitor the economic processes. This paper provides evidence that the Chinese system of digital administration has its own advantages in implementing the innovative potential of national economy as it highly impedes the increase in corruption. However, this system is inefficient in ensuring market transparency.


Author(s):  
Messalina L Salampessy ◽  
Aisyah ◽  
Indra G Febryano

Presepsi masyarakat  terhadap konservasi Daerah aliran sungai (DAS) sangat menentukan kelestarian fungsi DAS tersebut. Interaksi masyarakat dalam pemanfaatan potensi lahan disekitar Das, tentunya akan memberikan pengaruh terhadp berbagai persepsi masyarakat setempat bahkan berimplikasi bagi kelestarian fungsi Kawasan Das. Penelitian dilakukan dengan tujuan untuk menguraikan tingkat persepsi  masyarakat terhadap aktivitas pengelolaan sumber daya alam di sekitar Das. Analisis penelitian ini dilakukan dengan metode deskriptif kualitatif. Data dikumpulkan melalui kuisioner, wawancara mendalam dan observasi. Hasil penelitian menunjukkan bahwa tingkat persepsi masyarakat  terhadap pengelolaan sumberdaya alam di sekitar DAS termasuk dalam tingkat sedang yaitu 40%, tingkat rendah 20 dan tingkat tinggi 40%. Pemerintah dan berbagai pihak sangat dibutuhkan untuk peningkatan pemahaman dan peran serta masyarakat bagi pengelolaan sumberdaya Das untuk kelestarian fungsi DAS.   The community perception of conservation of watershed greatly determines the sustainability of the watershed function. Community interaction in utilizing of the land will have an influence on various perceptions of the local community and even have implications for the sustainability of the functions of the Das Area. The study was conducted with the aim of describing the level of public perception of watershed natural resource management activities. The analysis of this study was carried out by qualitative descriptive method. Data was collected through questionnaires, in-depth interviews, and observations. The results showed that the level of community perception of watershed natural resource management was at a moderate level of 40%, a low level of 20 and a high level of 40%. The government and various parties are urgently needed to increase understanding and participation of the community in watersheds managing resources for the sustainability of watershed functions.


Author(s):  
Roman Z. Rouvinsky

The subject of this article is the problem of correspondence of the practices of digital profiling and social score, which imply collection and analysis of biographical (reputational) information, to the worldwide-accepted standards of protection of personal data and privacy. Analysis is conducted on the legislation of the People's Republic of China – the country that in recent years has implemented the “Social Credit System” in the sphere of public administration. This project consists of management practices, which are viewed through the prism of the legal model of personal data protection formed by the Law in Protection of Personal Information adopted in 2021. The peculiarity of this research is its comparative legal nature: the provisions of China’s legislation are juxtaposed to the provisions of the General Data Protection Regulation adopted in the European Union and Russia’s Federal Law “On Personal Data”. Assessment is given to the European and Russian models of regulation of operations with personal data in the context of possible implementation of digital profiling practices, social score (ranking, grading), and automated law enforcement decision-making. Having determined the gaps in the current Russian and EU legislation on personal data, and indicating the risk caused by the presence of blanket rules, the conclusion is made according to which the modern legislation on personal data can be an obstacle for arbitrary use of such data; however, it cannot stop the implementation of innovative technologies, mechanisms and practices that suggest using registry and biographical information of individuals for the purpose of social control into the public administration.


2019 ◽  
Vol 4 (2) ◽  
pp. 220-232 ◽  
Author(s):  
Karen Li Xan Wong ◽  
Amy Shields Dobson

Social media platforms and apps have become increasingly important tools for governance and the centralisation of information in many nation states around the globe. In China, the government is currently piloting a social credit system in several cities in an ambitious attempt to merge a financial credit score system with a broader quantification of social and civic integrity for all citizens and corporations. China has already begun to experiment with metrics and quantification of the value and virtue of its citizens, going beyond the function of measuring workplace performance and health-related self-tracking to measuring one’s purchasing and consumption history, interpersonal relationships, political activities, as well as the tracking of one’s location history. China has also already begun to apply a reward and punishment system that rewards those who comply with the Chinese government’s ideals and punishes those who deviate from them. Although there are no such ambitiously unified systems currently proposed in Western liberal democratic countries, some aligned structures and cultures of social media use are already well in place. This article seeks to offer a comparative examination of the structures and cultures of China’s social credit system with those which are already present and in place in Western liberal democratic countries. While it may be convenient to digitise everyday social, political and economic life, China’s social credit system brings about a vision of what may be to come, should democratic countries continue to do so without stricter data use policies in place.


MaRBLe ◽  
2019 ◽  
Vol 2 ◽  
Author(s):  
Nadja Aldendorff

In 2014, the State Council of the People’s Republic of China released a document that called for the construction of a nationwide Social Credit System (SCS) with the goal to encourage sincerity and punish insincerity. The system uses blacklists that citizens land on for various cases of misbehavior, ranging from failing to pay a fine to being caught Jaywalking. This research explains the design process behind the SCS and in particular why many Chinese citizens are embracing this form of surveillance. It focuses on three topics to answer this question: the historical roots underlying the system, the perceived lack of trust in Chinese society and the comparison with concepts from surveillance theories developed in the West. From the analysis, following conclusions could be drawn: Historically, the state has often acted as a promoter and enforcer of moral virtue. The SCS fits perfectly into this tradition. The most prominent reason for the positive Chinese reaction is the lack of institutions in China that promote trust between citizens and businesses. There is a severe trust deficit which the government had to find a solution for. Regarding surveillance theory, Foucault’s concept of ‘panopticism’ shows similarities with the SCS and underlines its effectiveness in changing and steering people’s behavior while Lyon’s notion of ‘social sorting’ is used to demonstrate the potential dangers of the Chinese system.


2018 ◽  
Vol 7 (2) ◽  
pp. 92-101 ◽  
Author(s):  
Sultan Zavrak ◽  
Seyhmus Yilmaz ◽  
Huseyin Bodur ◽  
Sinan Toklu

AbstractThe security of the web is a very important issue, because every day we make a variety of operations in it, for different reasons, during the day. Apart from protecting the information, contacts, accounts and data on the web, such data should be inaccessible to third-party persons. This in turn depends on the success of the authentication process performed on the individual web. With authentication, it is possible for users to protect their information and make their transactions only for themselves. However, the authentication mechanism used at this point must have a high level of safety. With the purpose to damage a person's privacy and access account information and gain profit in this way, many malicious persons have developed various methods of attacks to bypass authentication mechanisms. These methods sometimes succeed on a variety of authentication mechanisms, and put users and relevant websites into a difficult situation, and may even damage them in a variety of aspects. In order to protect personal information on the web system and provide the security of transactions carried out at a high level, in this study, we propose a two-factor authentication mechanism based on facial recognition. Besides, we discuss some implementation details about the proposed method. The proposed method aims to bring a new approach to the authentication system to perform our online process with the highest security. In addition to the standard authentication systems, using face recognition as a secondary level of security will contribute to the emergence of a new authentication mechanism.


Sign in / Sign up

Export Citation Format

Share Document