學術產出-學位論文
Article View/Open
Publication Export
-
題名 消除反向凸顯: 在中國背景下各國對技術的認知
Removing the Reverse Salient: States` Perception towards Internet Technology in the context of China作者 盧藝璱
YILDIRIM, SEDA貢獻者 陳永福
Tan, Alexander C.
盧藝璱
YILDIRIM, SEDA關鍵詞 反向顯著性
信息通訊技術
國家權力
中國
reverse salient
information and communication technology
state power
China日期 2020 上傳時間 2-Mar-2020 11:33:29 (UTC+8) 摘要 Knowing that information and communication technology (ICT) has implications for many aspects of state power in general, and especially in the case of China, there was a need for a well-coordinated approach generating the dynamic of control and encouragement of ICT development in China. Through an examination of concerns that have been emerging about what ICT means for Chinese power, this research tended to unveil the unique way of ICT adoption and advancement in China. Of these concerns, the controllability dilemma, data security, and algorithmic-authoritarianism that all escalated with the introduction of the Internet are the piers to understand the dynamics of changes in perceptions and interests of the Chinese government in this regard. This research, thus, is filled with the urge to reveal technical knowledge that has been long lacking in IR literature, and specifically applying such knowledge to understand the Chinese use of ICT and innovation, majorly through observing the continuous process of threats and problems perceived along the way of adoption and innovation (formulated under the reverse saliency model in this research) and how those problems are solved through which aims to foresee the Chinese intentions and big targets in this regard, and finally expect to make a more general sense of how differently state power interacts with technology in the post-industrial model of ICTs. 參考文獻 BibliographyAMCHAM Shanghai (2018). VPN Regulations and Implications for Business, GPS Technology Quarterly, Available at: https://www.amcham-shanghai.org/sites/default/files/2018-04/GPS%20Technology%20Quarterly%20%28February%202018%29%20.pdfAronson, J. (2002). ‘Global Networks and their Impact in Information Technologies and Global Politics: The Changing Scope of Power and Governance, James N. Rosenau and J. P. Singh (eds.), Albany, NY: State University of New York Press.Bachrach, P. and Baratz, M.S. (1963). Decisions and Nondecisions: An Analytical Framework, American Political Science Review 57, pp.641-51.Bain (2015). Finding the Silver Lining in China`s Cloud Market, from https://www.bain.com/insights/finding-the-silver-lining-in-chinas-cloud-marketBBC (2017). ‘China`s quantum satellite in big leap’, BBC News, Science & Environment, from: https://www.bbc.com/news/science-environment-40294795Boerl, C, (2008). Technological Empowerment: The Internet, State, and Society in China, by Yongnian Zheng, 5:4, 413-414, DOI: 10.1080/19331680802555036Borgmann, A. (1984). Technology and the Character of Contemporary Life: A Philosophical Inquiry, Chicago: University of Chicago Press.Breyman, S. (1993). Knowledge as Power: Ecology Movements and Global Environmental Problems in: Ronnie D. Lipschutz and Ken Conca (eds.), The State and Social Power in Global Environmental Politics, Columbia University Press, p. 126.Business Wire, Inc. (2000). “2dobiz.com inside track to mainland China.”Carr, Madeline (2016). US Power and the Internet in International Relations: The Irony of the Information Age. Palgrave Macmillan, 1st edition, ISBN 978-1-349-71539-8, ISBN 978-1-137-55024-8 (eBook) DOI 10.1057/9781137550248Carr, N. (2006). The Weakest Link. [online] strategy+business. Available at: https://www.strategy-business.com/article/06403 [Accessed 18 Apr. 2019].Castells, Manuel (2000) ‘Toward a Sociology of the Network Society`. Contemporary Sociology, Vol. 29, No. 5 (September).Cerf, V.G. and Kahn, R.E. (1974). A Protocol for Packet Network Intercommunication, IEEE, Vol Com-22.Chase, M., Hachigian, N., and Mulvenin, J. (2006). Comrade to comrade networks: the social and political implications of peer-to-peer networks in China, Chinese Cyberspaces, Routledge.China Information Technology Report (2018). Fitch Solution, from https://store.fitchsolutions.com/china-information-technology-reportCleaver, Harry M. Jr. (1998). ‘The Zapatista Effect: The Internet and the Rise of an Alternative Political Fabric`. Journal of International Affairs, pp. 621–40, Vol. 51, No. 2 (Spring).CNN (2006). CNN.com - Google to censor itself in China - Jan 25, 2006. [online] Available at: http://edition.cnn.com/2006/BUSINESS/01/25/google.china/ [Accessed 27 Aug. 2019].Corrales, J., and Westhoff, F. (2006). Information Technology Adoption and Political Regimes. International Studies Quarterly, 50(4), pp.911-933.Damm, J. and Thomas, S. (2006). Chinese Cyberspaces, Routledge, First Edition, Taylor & Francis Group, ISBN 0-203-40032-1.Deibert, Ronald J., Palfrey, J., Rohozinski, R., and Zittrain, J., (2010). Access Controlled: The Shaping of Policy of Global Internet Filtering. Cambridge: MIT Press.Diamond, L. (2010). “Liberation Technology, Journal of Democracy Volume 21, Number 3, p. 82.Dodge, M. (1998). Accessibility to Information within the Internet: How can it be Measured and Mapped?. University College London. [online] Available at: http://www.casa.ucl.ac.uk/martin/varenius_accessibility.pdf [Accessed 19 Aug. 2019].Drezner, Daniel W., and Henry Farrell (2004). ‘Web of Influence’, Foreign Policy, pp. 32–40, No. 145 (November/December).EFF (2019). China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, from https://www.eff.org/deeplinks/2019/10/chinas-global-reach-surveillance-and-censorship-beyond-great-firewallEndeshaw, A. (2004) Internet Regulation in China: The Never-ending Cat and mouse game. Information and Communication Technology Law, Vol.13, No.1Foster, W. and Goodman, S.E. (2000). The Diffusion of the Internet in China, A Report of the Center for International Security and Cooperation, Stanford University.Foucault, M. (1977). Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, Pantheon Books.Franklin, M.I. (2004) Post Colonial Politics, the Internet and Everyday Life: Pacific Traversals Online, New York: Routledge.Gil, D. (2017) Quantum computing explained with a deck of cards, The MIT Venture Capital + Innovation Conference, IBM Research, Available at: https://www.youtube.com/watch?v=yy6TV9DntlwGlenn Research Center, Newton’s Laws of Motion, NASA, from https://www.grc.nasa.gov/www/k-12/airplane/newton2.htmlGuo, L., Huang. J., and Zhang, Y. (2019). Education Development in China: Education Return, Quality, and Equity, Sustainability 2019, 11, 3750; doi:10.3390/su11133750, www.mdpi.com/journal/sustainabilityGuterl, F. (2019). Are We Ready for a ‘Quantum Surprise’ from China? Newsweek, Tech & Science, Available at: https://www.newsweek.com/china-quantum-computing-1467835Hachigian, Nina (2002) ‘The Internet and Power in One-Party East Asian States’, History of Technology, Trevor E. Pinch and Wiebe E. Bijker (eds.), Cambridge.Harwit, E. and Clark D. (2001). Government policy and political control over China’s Internet, Chinese Cyberspaces, Routledge.Heilbroner, Robert (1961) ‘Do Machines Make History?’, Technology and Culture, pp. 335–345, Vol. 2 (Winter).Hoffman, C. (2017). How the “Great Firewall of China” Works to Censor China’s Internet, How-to-Geek, from https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/Hoffman, S. (1975). Notes on the Elusiveness of Modern Power, International Journal 30, p. 204.Hughes, T.P. (1989). ‘The Definition of Large Technological Systems’. in The Social Construction of Technological Systems: New Directions in the Sociology and History, MIT Press.Jefferson, G. (2018). State-owned enterprise: reform, performance and prospects. In W. Wu & M. W. Frazier, The sage handbook of contemporary china, (Vol. 2, pp. 121-142). 55 City Road, London: SAGE Publications Ltd doi: 10.4135/9781526436085.n7Jessop, B. (1990). State theory. Oxford: Polity Press.Keck, M.E., and Sikkink, K. (1998). Activists Beyond Borders – Advocacy Networks in International Politics, Cornell University Press/ Ithaca.Keohane, R.O. and Nye, J.S. (1998). Power and Interdependence in the Information Age, Foreign Affairs, vol. 77 (5), pp. 81-94.Kokas, A. (2019). Cloud Control: China’s 2017 Cybersecurity Law and its Role in US Data Standardization. Available at SSRN: https://ssrn.com/abstract=3427372 or http://dx.doi.org/10.2139/ssrn.3427372Krasner, S. (2009). Power, the state and sovereignty. New York, NY: Routledge.Langman, Lauren (2005). ‘From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements`. Sociological Theory, pp. 42–74, Vol. 23, No. 1.Latham, K. (2007). ‘SMS, Communication, and Citizenship in China`s Information Society`. Critical Asian Studies, pp. 295–314, Vol. 39, No. 2 (June).Lessig, L. (2006). Code. New York, Basic Books.Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor Press/Doubleday, 416–18.Lorentzen, P. (2013). China’s Strategic Censorship. American Journal of Political Science, Vol. 58, No. 2, April 2014, Pp. 402–414, Midwest Political Science Association DOI: 10.1111/ajps.12065Lukes, S. (1974). `Power: A Radical View`. Macmillan, p.13.Mackenzie, D. (1996). `Knowing Machines`. Cambridge: The MIT Press.MacKenzie, D., and Judy, W. (eds.) (1999). `The Social Shaping of Technology`. Philadelphia: Open University Press.MacKinnon, R. (2010). Networked Authoritarianism in China and Beyond Implications for global Internet freedom. Liberation Technology in Authoritarian Regimes. Hoover Institution & the Center of Democracy, Developmental Rule of Law (CDDRL), Stanford University.Marcuse, H. (2013). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. New York, NY: Routledge.Mayer-Schoenberger, V., and Brodnig, G. (2001). `Information Power: International Affairs in the Cyber Age`. SSRN Electronic Journal.Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics, London: W.W.Norton.Merics Papers on China (2016). Made in China 2025, The making of a high-tech superpower and consequences for industrial countries, Merics.Merics China Monitor (2017). China’s Social Credit System, A big-data enabled approach to market regulation with broad implications for doing business in China, Merics.MIIT (2017). Notice of the Ministry of Industry and Information Technology on Cleaning Up and Regulating the Internet Access Service Market [Effective]. No.32, People`s Republic of China, Available at: http://en.pkulaw.cn/display.aspx?cgid=992e987ace0e25e7bdfb&lib=lawMorgenthau, H. (1978). Politics Among Nations: The Struggle for Power and Peace, 5th Edition Revised, New York, NY: Alfred A. Knopf.Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom, New York, NY: PublicAffairs.Mumford, L. (1970). The Myth of the Machine: The Pentagon of Power, New York, NY: Harcourt Brace Jovanovich.National Science Report (2018). Science and Engineering Indicators, from https://nsf.gov/statistics/2018/nsb20181/Nye, J.S. (1990). `Bound To Lead: The Changing Nature of American Power`. Basic Books.Nye, Joseph S. (2002). `The Paradox of American Power: Why the World`s Only Superpower Can`t Go It Alone`. Oxford: Oxford University Press.Nye, Joseph S. (2004) Soft Power: The Means to Success in World Politics, New York, NY: PublicAffairs.Olson, M. (1993). Dictatorship, Democracy, and Development. American Political Science Review 87 (3): 567-576.Perlmutter, A., and William M. L. (1982). "The Party in Uniform: Toward a Theoryof Civil-Military Relations in Communist Political Systems." The American PoliticalScience Review 76 (4):778. doi: 10.2307/1962970. Project Zero (2019). Google Project Zero, Available at: https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.htmlQuartz in the Shadows (2017). Meet Shadowsocks, the underground tool that China’s coders use to blast through the Great Firewall, Available at: https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall/Reagle, J. (1999) “Why the Internet is good: community governance that works well,” Berkman Center Working Draft.Reuters Business News (2017). Apple says it is removing VPN services from China App Store. Retrieved 24 December 2019, Available at: https://www.reuters.com/article/us-china-apple-vpn/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQRothkopf, D.J. (1998). ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, pp. 325–59, Vol. 51, No. 2 (Spring).Rouse, M. (2007). What is reverse engineering? - Definition from WhatIs.com. [online] SearchSoftwareQuality. Available at: https://searchsoftwarequality.techtarget.com/definition/reverse-engineering [Accessed 26 Aug. 2019].Sassen, S. (1999). ‘The Impact of the Internet on Sovereignty: Unfounded and Real Worries’, Paper presented to the Internet and International Systems: Information Technology and American Foreign Policy Decision-Making Workshop, Nautilus Institute, San Francisco (10 December), http://www.nautilus.org/gps/ info-policy/workshop/papers/sassen.html.Schneider, F. (2018). China’s Digital Nationalism, Published to Oxford Scholarship, DOI:10.1093/oso/9780190876791.003.0001SCMP (2019). Artificial intelligence is watching China’s students but how well can it really see? South China Morning Post, China/ Politics, Available at: https://www.scmp.com/news/china/politics/article/3027349/artificial-intelligence-watching-chinas-students-how-well-canSinger, J.D. and Small, M. (1966). "The Composition and Status Ordering of the International System: 1815-1940," World Politics 18Smith, G. and Moises N. (2000). Altered States: Globalization, Sovereignty and Governance, Ottawa: International Development Research Centre.Smith, J.O. (2010). Physical Audio Signal Processing, online book, 2010 edition, from http://ccrma.stanford.edu/~jos/pasp/Strange, S. (1988). States and Markets, Blackwell.Symantec Acquires SafeWeb. (2003). Retrieved 27 December 2019, from https://www.nortonlifelock.com/about/newsroom/press-releases/2003/symantec_1020_01Tanji, M. (2007). ‘Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats’, Journal of Cyber Conflict Studies, pp. 4–11, Vol. 1, No. 1 (December). The MIT Press.TechCrunch (2019). Sources say China used iPhone hacks to target Uyghur Muslims, Available at: https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/Tett, Gillian. (2017). “Trump, Cambridge Analytica and How Big Data Is Reshaping Politics.” Financial Times, Available at: https://www.ft.com/content/e66232e4-a30e-11e7-9e4f-7f5e6a7c98a2Thaler, R.H., and Cass R.S. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Revised & Expanded edition. New York: Penguin Books.The Citizen Lab (2015). China’s Great Cannon, Munk School of Global Affairs, University of Toronto, Available at: https://citizenlab.ca/2015/04/chinas-great-cannon/Unver, H.A. (2018). Artificial Intelligence, Authoritarianism, and the Future of Political Systems, Cyber Governance and Digital Democracy 2018/9, EDAM.Vig, N. (1988). ‘Technology, Philosophy and the State’, in Technology and Politics, Michael E. Kraft and Norman J. Vig (eds.), Durham and London: Duke University Press.Wagner, P.R. (2005). “On Software Regulation,” Southern California Law Review 78: 457, 487.Waltz, K.N. (1979). Theory of International Politics, Boston: McGraw Hill.Wendt, A. (1999). Social Theory of International Politics, Cambridge: Cambridge University Press.Winner, L. (1985). ‘Do Artefacts have Politics?’ in The Social Shaping of Tech- nology: How the Refrigerator Got Its Hum, Donald MacKenzie and Judy Wacjman (eds.), Philadelphia: Open University Press.World Bank (2018). Literacy rate, youth total (% of people ages 15-24) - India, China, from https://data.worldbank.org/indicator/SE.ADT.1524.LT.ZS?locations=IN-CNWu, J. and Lam, O. (2017). The evolution of China`s Great Firewall: 21 years of censorship. (online) Hong Kong Free Press HKFP. Available at: https://www.hongkongfp.com/2017/09/03/evolution-chinas-great-firewall-21-years-censorship/ 描述 碩士
國立政治大學
亞太研究英語碩士學位學程(IMAS)
106926024資料來源 http://thesis.lib.nccu.edu.tw/record/#G0106926024 資料類型 thesis dc.contributor.advisor 陳永福 zh_TW dc.contributor.advisor Tan, Alexander C. en_US dc.contributor.author (Authors) 盧藝璱 zh_TW dc.contributor.author (Authors) YILDIRIM, SEDA en_US dc.creator (作者) 盧藝璱 zh_TW dc.creator (作者) YILDIRIM, SEDA en_US dc.date (日期) 2020 en_US dc.date.accessioned 2-Mar-2020 11:33:29 (UTC+8) - dc.date.available 2-Mar-2020 11:33:29 (UTC+8) - dc.date.issued (上傳時間) 2-Mar-2020 11:33:29 (UTC+8) - dc.identifier (Other Identifiers) G0106926024 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/128968 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 亞太研究英語碩士學位學程(IMAS) zh_TW dc.description (描述) 106926024 zh_TW dc.description.abstract (摘要) Knowing that information and communication technology (ICT) has implications for many aspects of state power in general, and especially in the case of China, there was a need for a well-coordinated approach generating the dynamic of control and encouragement of ICT development in China. Through an examination of concerns that have been emerging about what ICT means for Chinese power, this research tended to unveil the unique way of ICT adoption and advancement in China. Of these concerns, the controllability dilemma, data security, and algorithmic-authoritarianism that all escalated with the introduction of the Internet are the piers to understand the dynamics of changes in perceptions and interests of the Chinese government in this regard. This research, thus, is filled with the urge to reveal technical knowledge that has been long lacking in IR literature, and specifically applying such knowledge to understand the Chinese use of ICT and innovation, majorly through observing the continuous process of threats and problems perceived along the way of adoption and innovation (formulated under the reverse saliency model in this research) and how those problems are solved through which aims to foresee the Chinese intentions and big targets in this regard, and finally expect to make a more general sense of how differently state power interacts with technology in the post-industrial model of ICTs. en_US dc.description.tableofcontents CONTENTSAcknowledgment vAbstract viTable of Figures viiiChapter I 11. Introduction 11.1. Power 51.2. Information 61.3. Access to the Information: Use of Technology 71.4. The Net and the State 8Chapter II 101. Literature Review 101.1. Searching for the nature of technology 121.2. Existing Paradigms 131.3. The Missing Link 16Chapter III 201. Research Method 201.1. The Case Study of China 202. Theoretical Model 242.1. A Metaphor of Internet Technologies 24Reverse saliency Model 262.1.1. Force (Control) 312.1.2. Momentum (Preserve) 332.1.3. Accelerate (Spread) 36Hypotheses 38Chapter IV 401. China: People’s Tough Love 401.1. Controllability dilemma 421.2. Data Security and Governance 471.3. Algorithmic Authoritarianism 60Chapter V 681. Concluding Thoughts 682. Policy Implications 71Bibliography 74Appendix A 81Appendix B 82Appendix C 83 zh_TW dc.format.extent 2845176 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0106926024 en_US dc.subject (關鍵詞) 反向顯著性 zh_TW dc.subject (關鍵詞) 信息通訊技術 zh_TW dc.subject (關鍵詞) 國家權力 zh_TW dc.subject (關鍵詞) 中國 zh_TW dc.subject (關鍵詞) reverse salient en_US dc.subject (關鍵詞) information and communication technology en_US dc.subject (關鍵詞) state power en_US dc.subject (關鍵詞) China en_US dc.title (題名) 消除反向凸顯: 在中國背景下各國對技術的認知 zh_TW dc.title (題名) Removing the Reverse Salient: States` Perception towards Internet Technology in the context of China en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) BibliographyAMCHAM Shanghai (2018). VPN Regulations and Implications for Business, GPS Technology Quarterly, Available at: https://www.amcham-shanghai.org/sites/default/files/2018-04/GPS%20Technology%20Quarterly%20%28February%202018%29%20.pdfAronson, J. (2002). ‘Global Networks and their Impact in Information Technologies and Global Politics: The Changing Scope of Power and Governance, James N. Rosenau and J. P. Singh (eds.), Albany, NY: State University of New York Press.Bachrach, P. and Baratz, M.S. (1963). Decisions and Nondecisions: An Analytical Framework, American Political Science Review 57, pp.641-51.Bain (2015). Finding the Silver Lining in China`s Cloud Market, from https://www.bain.com/insights/finding-the-silver-lining-in-chinas-cloud-marketBBC (2017). ‘China`s quantum satellite in big leap’, BBC News, Science & Environment, from: https://www.bbc.com/news/science-environment-40294795Boerl, C, (2008). Technological Empowerment: The Internet, State, and Society in China, by Yongnian Zheng, 5:4, 413-414, DOI: 10.1080/19331680802555036Borgmann, A. (1984). Technology and the Character of Contemporary Life: A Philosophical Inquiry, Chicago: University of Chicago Press.Breyman, S. (1993). Knowledge as Power: Ecology Movements and Global Environmental Problems in: Ronnie D. Lipschutz and Ken Conca (eds.), The State and Social Power in Global Environmental Politics, Columbia University Press, p. 126.Business Wire, Inc. (2000). “2dobiz.com inside track to mainland China.”Carr, Madeline (2016). US Power and the Internet in International Relations: The Irony of the Information Age. Palgrave Macmillan, 1st edition, ISBN 978-1-349-71539-8, ISBN 978-1-137-55024-8 (eBook) DOI 10.1057/9781137550248Carr, N. (2006). The Weakest Link. [online] strategy+business. Available at: https://www.strategy-business.com/article/06403 [Accessed 18 Apr. 2019].Castells, Manuel (2000) ‘Toward a Sociology of the Network Society`. Contemporary Sociology, Vol. 29, No. 5 (September).Cerf, V.G. and Kahn, R.E. (1974). A Protocol for Packet Network Intercommunication, IEEE, Vol Com-22.Chase, M., Hachigian, N., and Mulvenin, J. (2006). Comrade to comrade networks: the social and political implications of peer-to-peer networks in China, Chinese Cyberspaces, Routledge.China Information Technology Report (2018). Fitch Solution, from https://store.fitchsolutions.com/china-information-technology-reportCleaver, Harry M. Jr. (1998). ‘The Zapatista Effect: The Internet and the Rise of an Alternative Political Fabric`. Journal of International Affairs, pp. 621–40, Vol. 51, No. 2 (Spring).CNN (2006). CNN.com - Google to censor itself in China - Jan 25, 2006. [online] Available at: http://edition.cnn.com/2006/BUSINESS/01/25/google.china/ [Accessed 27 Aug. 2019].Corrales, J., and Westhoff, F. (2006). Information Technology Adoption and Political Regimes. International Studies Quarterly, 50(4), pp.911-933.Damm, J. and Thomas, S. (2006). Chinese Cyberspaces, Routledge, First Edition, Taylor & Francis Group, ISBN 0-203-40032-1.Deibert, Ronald J., Palfrey, J., Rohozinski, R., and Zittrain, J., (2010). Access Controlled: The Shaping of Policy of Global Internet Filtering. Cambridge: MIT Press.Diamond, L. (2010). “Liberation Technology, Journal of Democracy Volume 21, Number 3, p. 82.Dodge, M. (1998). Accessibility to Information within the Internet: How can it be Measured and Mapped?. University College London. [online] Available at: http://www.casa.ucl.ac.uk/martin/varenius_accessibility.pdf [Accessed 19 Aug. 2019].Drezner, Daniel W., and Henry Farrell (2004). ‘Web of Influence’, Foreign Policy, pp. 32–40, No. 145 (November/December).EFF (2019). China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, from https://www.eff.org/deeplinks/2019/10/chinas-global-reach-surveillance-and-censorship-beyond-great-firewallEndeshaw, A. (2004) Internet Regulation in China: The Never-ending Cat and mouse game. Information and Communication Technology Law, Vol.13, No.1Foster, W. and Goodman, S.E. (2000). The Diffusion of the Internet in China, A Report of the Center for International Security and Cooperation, Stanford University.Foucault, M. (1977). Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, Pantheon Books.Franklin, M.I. (2004) Post Colonial Politics, the Internet and Everyday Life: Pacific Traversals Online, New York: Routledge.Gil, D. (2017) Quantum computing explained with a deck of cards, The MIT Venture Capital + Innovation Conference, IBM Research, Available at: https://www.youtube.com/watch?v=yy6TV9DntlwGlenn Research Center, Newton’s Laws of Motion, NASA, from https://www.grc.nasa.gov/www/k-12/airplane/newton2.htmlGuo, L., Huang. J., and Zhang, Y. (2019). Education Development in China: Education Return, Quality, and Equity, Sustainability 2019, 11, 3750; doi:10.3390/su11133750, www.mdpi.com/journal/sustainabilityGuterl, F. (2019). Are We Ready for a ‘Quantum Surprise’ from China? Newsweek, Tech & Science, Available at: https://www.newsweek.com/china-quantum-computing-1467835Hachigian, Nina (2002) ‘The Internet and Power in One-Party East Asian States’, History of Technology, Trevor E. Pinch and Wiebe E. Bijker (eds.), Cambridge.Harwit, E. and Clark D. (2001). Government policy and political control over China’s Internet, Chinese Cyberspaces, Routledge.Heilbroner, Robert (1961) ‘Do Machines Make History?’, Technology and Culture, pp. 335–345, Vol. 2 (Winter).Hoffman, C. (2017). How the “Great Firewall of China” Works to Censor China’s Internet, How-to-Geek, from https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/Hoffman, S. (1975). Notes on the Elusiveness of Modern Power, International Journal 30, p. 204.Hughes, T.P. (1989). ‘The Definition of Large Technological Systems’. in The Social Construction of Technological Systems: New Directions in the Sociology and History, MIT Press.Jefferson, G. (2018). State-owned enterprise: reform, performance and prospects. In W. Wu & M. W. Frazier, The sage handbook of contemporary china, (Vol. 2, pp. 121-142). 55 City Road, London: SAGE Publications Ltd doi: 10.4135/9781526436085.n7Jessop, B. (1990). State theory. Oxford: Polity Press.Keck, M.E., and Sikkink, K. (1998). Activists Beyond Borders – Advocacy Networks in International Politics, Cornell University Press/ Ithaca.Keohane, R.O. and Nye, J.S. (1998). Power and Interdependence in the Information Age, Foreign Affairs, vol. 77 (5), pp. 81-94.Kokas, A. (2019). Cloud Control: China’s 2017 Cybersecurity Law and its Role in US Data Standardization. Available at SSRN: https://ssrn.com/abstract=3427372 or http://dx.doi.org/10.2139/ssrn.3427372Krasner, S. (2009). Power, the state and sovereignty. New York, NY: Routledge.Langman, Lauren (2005). ‘From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements`. Sociological Theory, pp. 42–74, Vol. 23, No. 1.Latham, K. (2007). ‘SMS, Communication, and Citizenship in China`s Information Society`. Critical Asian Studies, pp. 295–314, Vol. 39, No. 2 (June).Lessig, L. (2006). Code. New York, Basic Books.Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor Press/Doubleday, 416–18.Lorentzen, P. (2013). China’s Strategic Censorship. American Journal of Political Science, Vol. 58, No. 2, April 2014, Pp. 402–414, Midwest Political Science Association DOI: 10.1111/ajps.12065Lukes, S. (1974). `Power: A Radical View`. Macmillan, p.13.Mackenzie, D. (1996). `Knowing Machines`. Cambridge: The MIT Press.MacKenzie, D., and Judy, W. (eds.) (1999). `The Social Shaping of Technology`. Philadelphia: Open University Press.MacKinnon, R. (2010). Networked Authoritarianism in China and Beyond Implications for global Internet freedom. Liberation Technology in Authoritarian Regimes. Hoover Institution & the Center of Democracy, Developmental Rule of Law (CDDRL), Stanford University.Marcuse, H. (2013). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. New York, NY: Routledge.Mayer-Schoenberger, V., and Brodnig, G. (2001). `Information Power: International Affairs in the Cyber Age`. SSRN Electronic Journal.Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics, London: W.W.Norton.Merics Papers on China (2016). Made in China 2025, The making of a high-tech superpower and consequences for industrial countries, Merics.Merics China Monitor (2017). China’s Social Credit System, A big-data enabled approach to market regulation with broad implications for doing business in China, Merics.MIIT (2017). Notice of the Ministry of Industry and Information Technology on Cleaning Up and Regulating the Internet Access Service Market [Effective]. No.32, People`s Republic of China, Available at: http://en.pkulaw.cn/display.aspx?cgid=992e987ace0e25e7bdfb&lib=lawMorgenthau, H. (1978). Politics Among Nations: The Struggle for Power and Peace, 5th Edition Revised, New York, NY: Alfred A. Knopf.Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom, New York, NY: PublicAffairs.Mumford, L. (1970). The Myth of the Machine: The Pentagon of Power, New York, NY: Harcourt Brace Jovanovich.National Science Report (2018). Science and Engineering Indicators, from https://nsf.gov/statistics/2018/nsb20181/Nye, J.S. (1990). `Bound To Lead: The Changing Nature of American Power`. Basic Books.Nye, Joseph S. (2002). `The Paradox of American Power: Why the World`s Only Superpower Can`t Go It Alone`. Oxford: Oxford University Press.Nye, Joseph S. (2004) Soft Power: The Means to Success in World Politics, New York, NY: PublicAffairs.Olson, M. (1993). Dictatorship, Democracy, and Development. American Political Science Review 87 (3): 567-576.Perlmutter, A., and William M. L. (1982). "The Party in Uniform: Toward a Theoryof Civil-Military Relations in Communist Political Systems." The American PoliticalScience Review 76 (4):778. doi: 10.2307/1962970. Project Zero (2019). Google Project Zero, Available at: https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.htmlQuartz in the Shadows (2017). Meet Shadowsocks, the underground tool that China’s coders use to blast through the Great Firewall, Available at: https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall/Reagle, J. (1999) “Why the Internet is good: community governance that works well,” Berkman Center Working Draft.Reuters Business News (2017). Apple says it is removing VPN services from China App Store. Retrieved 24 December 2019, Available at: https://www.reuters.com/article/us-china-apple-vpn/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQRothkopf, D.J. (1998). ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, pp. 325–59, Vol. 51, No. 2 (Spring).Rouse, M. (2007). What is reverse engineering? - Definition from WhatIs.com. [online] SearchSoftwareQuality. Available at: https://searchsoftwarequality.techtarget.com/definition/reverse-engineering [Accessed 26 Aug. 2019].Sassen, S. (1999). ‘The Impact of the Internet on Sovereignty: Unfounded and Real Worries’, Paper presented to the Internet and International Systems: Information Technology and American Foreign Policy Decision-Making Workshop, Nautilus Institute, San Francisco (10 December), http://www.nautilus.org/gps/ info-policy/workshop/papers/sassen.html.Schneider, F. (2018). China’s Digital Nationalism, Published to Oxford Scholarship, DOI:10.1093/oso/9780190876791.003.0001SCMP (2019). Artificial intelligence is watching China’s students but how well can it really see? South China Morning Post, China/ Politics, Available at: https://www.scmp.com/news/china/politics/article/3027349/artificial-intelligence-watching-chinas-students-how-well-canSinger, J.D. and Small, M. (1966). "The Composition and Status Ordering of the International System: 1815-1940," World Politics 18Smith, G. and Moises N. (2000). Altered States: Globalization, Sovereignty and Governance, Ottawa: International Development Research Centre.Smith, J.O. (2010). Physical Audio Signal Processing, online book, 2010 edition, from http://ccrma.stanford.edu/~jos/pasp/Strange, S. (1988). States and Markets, Blackwell.Symantec Acquires SafeWeb. (2003). Retrieved 27 December 2019, from https://www.nortonlifelock.com/about/newsroom/press-releases/2003/symantec_1020_01Tanji, M. (2007). ‘Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats’, Journal of Cyber Conflict Studies, pp. 4–11, Vol. 1, No. 1 (December). The MIT Press.TechCrunch (2019). Sources say China used iPhone hacks to target Uyghur Muslims, Available at: https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/Tett, Gillian. (2017). “Trump, Cambridge Analytica and How Big Data Is Reshaping Politics.” Financial Times, Available at: https://www.ft.com/content/e66232e4-a30e-11e7-9e4f-7f5e6a7c98a2Thaler, R.H., and Cass R.S. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Revised & Expanded edition. New York: Penguin Books.The Citizen Lab (2015). China’s Great Cannon, Munk School of Global Affairs, University of Toronto, Available at: https://citizenlab.ca/2015/04/chinas-great-cannon/Unver, H.A. (2018). Artificial Intelligence, Authoritarianism, and the Future of Political Systems, Cyber Governance and Digital Democracy 2018/9, EDAM.Vig, N. (1988). ‘Technology, Philosophy and the State’, in Technology and Politics, Michael E. Kraft and Norman J. Vig (eds.), Durham and London: Duke University Press.Wagner, P.R. (2005). “On Software Regulation,” Southern California Law Review 78: 457, 487.Waltz, K.N. (1979). Theory of International Politics, Boston: McGraw Hill.Wendt, A. (1999). Social Theory of International Politics, Cambridge: Cambridge University Press.Winner, L. (1985). ‘Do Artefacts have Politics?’ in The Social Shaping of Tech- nology: How the Refrigerator Got Its Hum, Donald MacKenzie and Judy Wacjman (eds.), Philadelphia: Open University Press.World Bank (2018). Literacy rate, youth total (% of people ages 15-24) - India, China, from https://data.worldbank.org/indicator/SE.ADT.1524.LT.ZS?locations=IN-CNWu, J. and Lam, O. (2017). The evolution of China`s Great Firewall: 21 years of censorship. (online) Hong Kong Free Press HKFP. Available at: https://www.hongkongfp.com/2017/09/03/evolution-chinas-great-firewall-21-years-censorship/ zh_TW dc.identifier.doi (DOI) 10.6814/NCCU202000351 en_US