Casting the Ubiquitous Net of Information Control

Author(s):  
Zixue Tai

Alongside the rise of the Internet as a pivotal economic and cultural force in Chinese society, the Chinese government has implemented a two-tiered strategy in dealing with the great potential and underlying risks associated with the network era. This paper offers a critical, in-depth overview of China’s state-orchestrated Internet surveillance apparatus from the Great Firewall to the latest Green Dam project. The author examines the conceptual and historical evolution of the Golden Shield program and analyzes the legal framework through which official regulation is justified or rationalized. Next, the author examines the prevalent practice of industry self-regulation among both Chinese and foreign companies engaged in online business in China. The paper ends with a discussion of the aborted official effort of extending content control to individual computers with the Green Dam Youth Escort project.

Author(s):  
Zixue Tai

Alongside the quick rise of the Internet as a pivotal economic and cultural force in Chinese society, the Chinese government has implemented a two-tiered strategy in coming to grips with the great potentials and underlying risks associated with the network era. This chapter offers a critical, in-depth overview of China’s state-orchestrated Internet surveillance apparatus from the Great Firewall to the latest Green Dam project. It first examines the conceptual and historical evolution of the Golden Shield program, followed by an analysis of the legal framework through which official regulation is justified or rationalized. Next, the chapter looks at the prevalent practice of industry self-regulation among both Chinese and foreign companies engaged in online business in China, and it ends with the discussion of the aborted official effort of extending content control to individual computers with the Green Dam Youth Escort project.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lester Ross ◽  
Kenneth Zhou

Purpose To describe and analyze the implications of the new Measures (the “Measures”) for Cybersecurity Review jointly promulgated on April 27, 2020 by twelve Chinese government departments led by the Cyberspace Administration of China (CAC). Design/methodology/approach Defines the scope of the Measures, explains the functions and obligations of critical information infrastructure operators (each, a CIIO), outlines the self-assessment and cybersecurity review process and discusses the implications of the Measures for foreign companies doing business in China. Findings The Measures impose an obligation on CII operators to apply for a cybersecurity review when they intend to procure network products and services that present or may present a national security concern. Such review will focus not only on national security and data leakage concerns, but also on supply-chain security concerns. The cybersecurity review will likely further the decoupling between China and the US. Practical implications While the Measures are not formally intended to discriminate against foreign products and services, the promulgation of the Measures will have a significant impact on foreign companies that supply network products or services to CII operators in China. Originality/value Practical guidance from lawyers with extensive experience in advising Chinese, US, European and other companies on laws and regulations related to competition, cross-border investments, joint ventures, strategic alliances and international trade matters.


Subject China's efforts to control the flow of information on the internet. Significance Since the Cybersecurity Law took effect in June, China's two largest social media providers have been fined for violating the new law, and two high-profile foreign businesses -- Apple and Cambridge University Press (CUP) -- have been accused of helping the Chinese government censor the internet. Impacts Enforcement of Cybersecurity Law this year will focus more on information control than data security or localisation of data storage. The Cybersecurity Law will put even more pressure on Chinese tech firms to censor their content proactively. The success of Chinese technology firms makes Beijing confident that controlling the flow of information does not prevent innovation.


Upravlenie ◽  
2019 ◽  
Vol 7 (1) ◽  
pp. 72-76
Author(s):  
Wantao Lai ◽  
Ye Dongmei ◽  
Duanan Zheng

Not only the long history of Sino-Russian economic communication but also Good timing, geographical convenience and good human relations help build up a solid foundation for modern cooperation between China and Russia as well as provide entrepreneurs with good opportunities to process global operation in Russian market or Chinese market.. This paper explores some new trends in entrepreneurship, which are both in China and Russia and pinpoint the underlying reasons behind those new trends. The article studies the legal framework for the development of Chinese-Russian trade and economic relations. The bilateral trade of Russia and China with the introduction of innovative technologies has been considered. The work of Chinese entrepreneurs in Russia has been analyzed. The assessment of the Russian market and its potential by the Chinese has been given. The conclusion of bilateral Sino-Russian agreements, the establishment of joint ventures, as well as the difficulties that Chinese businessmen have to deal with in Russia have been described. The work of Russian entrepreneurs in China has been examined. The opportunities for Russians to do business in China have been shown. The interest of the Chinese government and business circles in Russian investments, bilateral economic and cultural cooperation has been noted. Сhinese regard such good relationships between China and Russia as “honeymoon”. Under “honeymoon”, it is believed that Chinese and Russian entrepreneurs should seize the opportunity, expanding cross-border e-commerce communication, promoting technical exchange, and creating a win-win situation for both Chinese and Russians.


2014 ◽  
Vol 10 (4) ◽  
pp. 39-51
Author(s):  
James G.S. Yang

The E-business market in China is growing at an exponential rate. In 2013, the business volume is expected to reach $285 billion which surpasses the level in the U.S. As a result, there is a gold rush to China to participate in the market. This article discusses the potential but also points out the perils. This paper also focuses on the competition in the Chinese E-business market, and reveals that the Chinese online business is almost completely monopolized by only one seller, Taobao, which accounts for 81.2% of the whole E-business market. This article further considers the tax burden of the Internet commerce transaction which found that the Chinese government imposes a value-added tax at a rate of 17%. This rate is much higher than the sales tax rate at 7% in the U.S. Additionally, this article investigates the problem of counterfeited products and infringement of intellectual property rights. It discovered that this problem is rampant in China. The losses in international trade amount to $360 billion a year. Eighty percent of the counterfeited products were originated in China. The problem is extremely serious. Moreover, this article offers many planning strategies for operating an E-business in China. Despite the perils, this article concludes that the benefits of running an E-business in China outweigh the risks.


2020 ◽  
Vol 2 (3) ◽  
pp. 297-309
Author(s):  
Mubarak A. R.

Self-regulation of the Internet industry has been a popular policy approach adopted by many countries. However, unlike self-regulation of more traditional industries, self-regulation of the Internet industry has been a challenging process due to the sheer volume of cyberspace and involvement of stakeholders located beyond any single country’s jurisdiction. The industry has achieved limited success in self-regulation, specifically in the area of child protection in cyberspace. China has actively adopted a policy of Internet industry self-regulation and public supervision of the Internet industry, in order to remove online material that is not suitable for children. This article critically reviews China’s pre-emptive government regulation and stern actions to regulate the Internet industry to monitor the material that the Internet industry allows through its network. Despite criticism of the Chinese government for its attempts to control freedom of expression through the Internet, this article argues that China has in its own unique ways managed to monitor the contents in cyberspace. There are many valuable lessons to be learnt from the Chinese experience. Studying the unique working relationship that has evolved between the Chinese government and the Internet industry may be beneficial in understanding the ways in which vulnerable population groups like children can be protected in cyberspace.


Author(s):  
Wei Hao ◽  
Shangli Cai

The Internet has penetrated all aspects of Chinese society and has become a crucial part of its social, economic, and cultural activities, as well as its personal life. Meanwhile, the rapid development of the Internet, along with a lag in the development of legislation and guidelines for use, has had an enormous impact on Chinese society and created unprecedented challenges. This chapter overviews the current status of Internet use in China, directing particular attention to problems that youth may encounter, and then reviews progress that the Chinese government has made in managing problems related to Internet use.


2014 ◽  
Vol 5 (1) ◽  
pp. 51-61 ◽  
Author(s):  
Sean Upton-McLaughlin

Purpose – The purpose of this paper was to explore the Chinese concept of suzhi and how it relates to behavioral standards within mainland Chinese society and the workplace. The article provides a general discussion of suzhi and its inherent elements to act as a foundation for the education of expatriate managers and executives and for future research by Chinese human resource management (HRM) scholars. Design/methodology/approach – This paper draws on the author's first-hand experience and observations from five years of living and working abroad in mainland China with Chinese companies and executives. Findings – The concept of suzhi in China is a reflection of multiple behavioral standards throughout China. And while suzhi's roots are in ancient Chinese culture and Confucianism, it is also subject to influence and change. Practical implications – The paper may serve as a foundation both for expatriate managers seeking to improve HRM practices in foreign companies in China and future scholars who wish to conduct further research on suzhi and Chinese behavioral standards as they can be applied to the workplace. Originality/value – This is an attempt to enlighten expatriate managers and executives in China on the concept of suzhi and its implication for HRM in China.


2021 ◽  
Vol 23 (2) ◽  
pp. 254-264
Author(s):  
Ekaterina A. Mikhalevich

The transformation of cyber sovereignty into an independent concept is a recent phenomenon, and thus its development and distribution is currently underway, which indicates the relevance of studying this topic. Being one of the most influential actors of contemporary international politics, China uses the concept of cyber sovereignty to promote its national interests and is able to shape the rules in the highly volatile field of international cyberspace. The study is based on quantitative and qualitative content analysis of legal acts and concept of Chinas cyber sovereignty. The author defines a concept of cyber sovereignty and identifies its place in the system of international law and in the architecture of international information security. Chinas concept of cyber sovereignty does not imply the division of a common cyberspace into separate segments but contributes to the creation of a cyber community of a common destiny, in which states can exercise their rights to govern the Internet on the principles of equality, justice, cooperation, peace and rule of law. It is concluded that this concept can be used as the basis for the formation of an international legal framework that regulates relations between states in the field of cyberspace.


Sign in / Sign up

Export Citation Format

Share Document