Author: Rongbin Han
Publisher: Columbia University Press
ISBN: 0231545657
Category : Political Science
Languages : en
Pages : 255
Book Description
The Internet was supposed to be an antidote to authoritarianism. It can enable citizens to express themselves freely and organize outside state control. Yet while online activity has helped challenge authoritarian rule in some cases, other regimes have endured: no movement comparable to the Arab Spring has arisen in China. In Contesting Cyberspace in China, Rongbin Han offers a powerful counterintuitive explanation for the survival of the world’s largest authoritarian regime in the digital age. Han reveals the complex internal dynamics of online expression in China, showing how the state, service providers, and netizens negotiate the limits of discourse. He finds that state censorship has conditioned online expression, yet has failed to bring it under control. However, Han also finds that freer expression may work to the advantage of the regime because its critics are not the only ones empowered: the Internet has proved less threatening than expected due to the multiplicity of beliefs, identities, and values online. State-sponsored and spontaneous pro-government commenters have turned out to be a major presence on the Chinese internet, denigrating dissenters and barraging oppositional voices. Han explores the recruitment, training, and behavior of hired commenters, the “fifty-cent army,” as well as group identity formation among nationalistic Internet posters who see themselves as patriots defending China against online saboteurs. Drawing on a rich set of data collected through interviews, participant observation, and long-term online ethnography, as well as official reports and state directives, Contesting Cyberspace in China interrogates our assumptions about authoritarian resilience and the democratizing power of the Internet.
Contesting Cyberspace in China
Author: Rongbin Han
Publisher: Columbia University Press
ISBN: 0231545657
Category : Political Science
Languages : en
Pages : 255
Book Description
The Internet was supposed to be an antidote to authoritarianism. It can enable citizens to express themselves freely and organize outside state control. Yet while online activity has helped challenge authoritarian rule in some cases, other regimes have endured: no movement comparable to the Arab Spring has arisen in China. In Contesting Cyberspace in China, Rongbin Han offers a powerful counterintuitive explanation for the survival of the world’s largest authoritarian regime in the digital age. Han reveals the complex internal dynamics of online expression in China, showing how the state, service providers, and netizens negotiate the limits of discourse. He finds that state censorship has conditioned online expression, yet has failed to bring it under control. However, Han also finds that freer expression may work to the advantage of the regime because its critics are not the only ones empowered: the Internet has proved less threatening than expected due to the multiplicity of beliefs, identities, and values online. State-sponsored and spontaneous pro-government commenters have turned out to be a major presence on the Chinese internet, denigrating dissenters and barraging oppositional voices. Han explores the recruitment, training, and behavior of hired commenters, the “fifty-cent army,” as well as group identity formation among nationalistic Internet posters who see themselves as patriots defending China against online saboteurs. Drawing on a rich set of data collected through interviews, participant observation, and long-term online ethnography, as well as official reports and state directives, Contesting Cyberspace in China interrogates our assumptions about authoritarian resilience and the democratizing power of the Internet.
Publisher: Columbia University Press
ISBN: 0231545657
Category : Political Science
Languages : en
Pages : 255
Book Description
The Internet was supposed to be an antidote to authoritarianism. It can enable citizens to express themselves freely and organize outside state control. Yet while online activity has helped challenge authoritarian rule in some cases, other regimes have endured: no movement comparable to the Arab Spring has arisen in China. In Contesting Cyberspace in China, Rongbin Han offers a powerful counterintuitive explanation for the survival of the world’s largest authoritarian regime in the digital age. Han reveals the complex internal dynamics of online expression in China, showing how the state, service providers, and netizens negotiate the limits of discourse. He finds that state censorship has conditioned online expression, yet has failed to bring it under control. However, Han also finds that freer expression may work to the advantage of the regime because its critics are not the only ones empowered: the Internet has proved less threatening than expected due to the multiplicity of beliefs, identities, and values online. State-sponsored and spontaneous pro-government commenters have turned out to be a major presence on the Chinese internet, denigrating dissenters and barraging oppositional voices. Han explores the recruitment, training, and behavior of hired commenters, the “fifty-cent army,” as well as group identity formation among nationalistic Internet posters who see themselves as patriots defending China against online saboteurs. Drawing on a rich set of data collected through interviews, participant observation, and long-term online ethnography, as well as official reports and state directives, Contesting Cyberspace in China interrogates our assumptions about authoritarian resilience and the democratizing power of the Internet.
Access Contested
Author: Ronald Deibert
Publisher: MIT Press
ISBN: 026229804X
Category : Computers
Languages : en
Pages : 373
Book Description
Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines. A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China—home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.
Publisher: MIT Press
ISBN: 026229804X
Category : Computers
Languages : en
Pages : 373
Book Description
Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines. A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China—home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.
Cyberspaces and Global Affairs
Author: Sean S. Costigan
Publisher: Routledge
ISBN: 1317155203
Category : Political Science
Languages : en
Pages : 404
Book Description
From the "Facebook" revolutions in the Arab world to the use of social networking in the aftermath of disasters in Japan and Haiti, to the spread of mobile telephony throughout the developing world: all of these developments are part of how information and communication technologies are altering global affairs. With the rise of the social web and applications like Facebook, YouTube and Twitter, scholars and practitioners of international affairs are adapting to this new information space across a wide scale of issue areas. In conflict resolution, dialogues and communication are taking the form of open social networks, while in the legal realm, where cyberspace is largely lawless space, states are stepping up policing efforts to combat online criminality and hackers are finding new ways around increasingly sophisticated censorship. Militaries are moving to deeply incorporate information technologies into their doctrines, and protesters are developing innovative uses of technology to keep one step ahead of the authorities. The essays and topical cases in this book explore such issues as networks and networked thinking, information ownership, censorship, neutrality, cyberwars, humanitarian needs, terrorism, privacy and rebellion, giving a comprehensive overview of the core issues in the field, complemented by real world examples.
Publisher: Routledge
ISBN: 1317155203
Category : Political Science
Languages : en
Pages : 404
Book Description
From the "Facebook" revolutions in the Arab world to the use of social networking in the aftermath of disasters in Japan and Haiti, to the spread of mobile telephony throughout the developing world: all of these developments are part of how information and communication technologies are altering global affairs. With the rise of the social web and applications like Facebook, YouTube and Twitter, scholars and practitioners of international affairs are adapting to this new information space across a wide scale of issue areas. In conflict resolution, dialogues and communication are taking the form of open social networks, while in the legal realm, where cyberspace is largely lawless space, states are stepping up policing efforts to combat online criminality and hackers are finding new ways around increasingly sophisticated censorship. Militaries are moving to deeply incorporate information technologies into their doctrines, and protesters are developing innovative uses of technology to keep one step ahead of the authorities. The essays and topical cases in this book explore such issues as networks and networked thinking, information ownership, censorship, neutrality, cyberwars, humanitarian needs, terrorism, privacy and rebellion, giving a comprehensive overview of the core issues in the field, complemented by real world examples.
Cyberspace Sovereignty
Author: Binxing Fang
Publisher: Springer
ISBN: 9811303207
Category : Business & Economics
Languages : en
Pages : 511
Book Description
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Publisher: Springer
ISBN: 9811303207
Category : Business & Economics
Languages : en
Pages : 511
Book Description
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Infidelity on the Internet
Author: Marlene M. Maheu
Publisher: Sourcebooks, Inc.
ISBN: 9781570717222
Category : Computers
Languages : en
Pages : 284
Book Description
Discusses the social effects of virtual infidelity on those in committedelationships, analyzing how such affairs develop, different types of sexualctivity on the Internet, and how to recover from cyber-infidelity.
Publisher: Sourcebooks, Inc.
ISBN: 9781570717222
Category : Computers
Languages : en
Pages : 284
Book Description
Discusses the social effects of virtual infidelity on those in committedelationships, analyzing how such affairs develop, different types of sexualctivity on the Internet, and how to recover from cyber-infidelity.
Getting to Yes with China in Cyberspace
Author: Scott Warren Harold
Publisher: Rand Corporation
ISBN: 0833092502
Category : Computers
Languages : en
Pages : 121
Book Description
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
Publisher: Rand Corporation
ISBN: 0833092502
Category : Computers
Languages : en
Pages : 121
Book Description
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
China and Cybersecurity
Author: Jon R. Lindsay
Publisher: Oxford University Press, USA
ISBN: 0190201274
Category : Business & Economics
Languages : en
Pages : 401
Book Description
"Examines cyberspace threats and policies from the vantage points of China and the U.S"--
Publisher: Oxford University Press, USA
ISBN: 0190201274
Category : Business & Economics
Languages : en
Pages : 401
Book Description
"Examines cyberspace threats and policies from the vantage points of China and the U.S"--
The Cybersecurity Dilemma
Author: Ben Buchanan
Publisher: Oxford University Press
ISBN: 0190694807
Category : Political Science
Languages : en
Pages : 300
Book Description
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Publisher: Oxford University Press
ISBN: 0190694807
Category : Political Science
Languages : en
Pages : 300
Book Description
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Cyberpower and National Security
Author: Franklin D. Kramer
Publisher: Potomac Books, Inc.
ISBN: 1597979333
Category : Computers
Languages : en
Pages : 666
Book Description
This book creates a framework for understanding and using cyberpower in support of national security. Cyberspace and cyberpower are now critical elements of international security. United States needs a national policy which employs cyberpower to support its national security interests.
Publisher: Potomac Books, Inc.
ISBN: 1597979333
Category : Computers
Languages : en
Pages : 666
Book Description
This book creates a framework for understanding and using cyberpower in support of national security. Cyberspace and cyberpower are now critical elements of international security. United States needs a national policy which employs cyberpower to support its national security interests.
Cyber Dragon
Author: Dean Cheng
Publisher: Bloomsbury Publishing USA
ISBN:
Category : Computers
Languages : en
Pages : 268
Book Description
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepowercurrently the world's second largest economywith a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically.
Publisher: Bloomsbury Publishing USA
ISBN:
Category : Computers
Languages : en
Pages : 268
Book Description
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepowercurrently the world's second largest economywith a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically.