學術產出-學位論文

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

題名 消除反向凸顯: 在中國背景下各國對技術的認知
Removing the Reverse Salient: States` Perception towards Internet Technology in the context of China
作者 盧藝璱
YILDIRIM, SEDA
貢獻者 陳永福
Tan, Alexander C.
盧藝璱
YILDIRIM, SEDA
關鍵詞 反向顯著性
信息通訊技術
國家權力
中國
reverse salient
information and communication technology
state power
China
日期 2020
上傳時間 2-Mar-2020 11:33:29 (UTC+8)
摘要 Knowing that information and communication technology (ICT) has implications for many aspects of state power in general, and especially in the case of China, there was a need for a well-coordinated approach generating the dynamic of control and encouragement of ICT development in China. Through an examination of concerns that have been emerging about what ICT means for Chinese power, this research tended to unveil the unique way of ICT adoption and advancement in China. Of these concerns, the controllability dilemma, data security, and algorithmic-authoritarianism that all escalated with the introduction of the Internet are the piers to understand the dynamics of changes in perceptions and interests of the Chinese government in this regard. This research, thus, is filled with the urge to reveal technical knowledge that has been long lacking in IR literature, and specifically applying such knowledge to understand the Chinese use of ICT and innovation, majorly through observing the continuous process of threats and problems perceived along the way of adoption and innovation (formulated under the reverse saliency model in this research) and how those problems are solved through which aims to foresee the Chinese intentions and big targets in this regard, and finally expect to make a more general sense of how differently state power interacts with technology in the post-industrial model of ICTs.
參考文獻 Bibliography
AMCHAM Shanghai (2018). VPN Regulations and Implications for Business, GPS Technology Quarterly, Available at: https://www.amcham-shanghai.org/sites/default/files/2018-04/GPS%20Technology%20Quarterly%20%28February%202018%29%20.pdf
Aronson, J. (2002). ‘Global Networks and their Impact in Information Technologies and Global Politics: The Changing Scope of Power and Governance, James N. Rosenau and J. P. Singh (eds.), Albany, NY: State University of New York Press.
Bachrach, P. and Baratz, M.S. (1963). Decisions and Nondecisions: An Analytical Framework, American Political Science Review 57, pp.641-51.
Bain (2015). Finding the Silver Lining in China`s Cloud Market, from https://www.bain.com/insights/finding-the-silver-lining-in-chinas-cloud-market
BBC (2017). ‘China`s quantum satellite in big leap’, BBC News, Science & Environment, from: https://www.bbc.com/news/science-environment-40294795
Boerl, C, (2008). Technological Empowerment: The Internet, State, and Society in China, by Yongnian Zheng, 5:4, 413-414, DOI: 10.1080/19331680802555036
Borgmann, A. (1984). Technology and the Character of Contemporary Life: A Philosophical Inquiry, Chicago: University of Chicago Press.
Breyman, S. (1993). Knowledge as Power: Ecology Movements and Global Environmental Problems in: Ronnie D. Lipschutz and Ken Conca (eds.), The State and Social Power in Global Environmental Politics, Columbia University Press, p. 126.
Business Wire, Inc. (2000). “2dobiz.com inside track to mainland China.”
Carr, Madeline (2016). US Power and the Internet in International Relations: The Irony of the Information Age. Palgrave Macmillan, 1st edition, ISBN 978-1-349-71539-8, ISBN 978-1-137-55024-8 (eBook) DOI 10.1057/9781137550248
Carr, N. (2006). The Weakest Link. [online] strategy+business. Available at: https://www.strategy-business.com/article/06403 [Accessed 18 Apr. 2019].
Castells, Manuel (2000) ‘Toward a Sociology of the Network Society`. Contemporary Sociology, Vol. 29, No. 5 (September).
Cerf, V.G. and Kahn, R.E. (1974). A Protocol for Packet Network Intercommunication, IEEE, Vol Com-22.
Chase, M., Hachigian, N., and Mulvenin, J. (2006). Comrade to comrade networks: the social and political implications of peer-to-peer networks in China, Chinese Cyberspaces, Routledge.
China Information Technology Report (2018). Fitch Solution, from https://store.fitchsolutions.com/china-information-technology-report
Cleaver, Harry M. Jr. (1998). ‘The Zapatista Effect: The Internet and the Rise of an Alternative Political Fabric`. Journal of International Affairs, pp. 621–40, Vol. 51, No. 2 (Spring).
CNN (2006). CNN.com - Google to censor itself in China - Jan 25, 2006. [online] Available at: http://edition.cnn.com/2006/BUSINESS/01/25/google.china/ [Accessed 27 Aug. 2019].
Corrales, J., and Westhoff, F. (2006). Information Technology Adoption and Political Regimes. International Studies Quarterly, 50(4), pp.911-933.
Damm, J. and Thomas, S. (2006). Chinese Cyberspaces, Routledge, First Edition, Taylor & Francis Group, ISBN 0-203-40032-1.
Deibert, Ronald J., Palfrey, J., Rohozinski, R., and Zittrain, J., (2010). Access Controlled: The Shaping of Policy of Global Internet Filtering. Cambridge: MIT Press.
Diamond, L. (2010). “Liberation Technology, Journal of Democracy Volume 21, Number 3, p. 82.
Dodge, M. (1998). Accessibility to Information within the Internet: How can it be Measured and Mapped?. University College London. [online] Available at: http://www.casa.ucl.ac.uk/martin/varenius_accessibility.pdf [Accessed 19 Aug. 2019].
Drezner, Daniel W., and Henry Farrell (2004). ‘Web of Influence’, Foreign Policy, pp. 32–40, No. 145 (November/December).
EFF (2019). China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, from https://www.eff.org/deeplinks/2019/10/chinas-global-reach-surveillance-and-censorship-beyond-great-firewall
Endeshaw, A. (2004) Internet Regulation in China: The Never-ending Cat and mouse game. Information and Communication Technology Law, Vol.13, No.1
Foster, W. and Goodman, S.E. (2000). The Diffusion of the Internet in China, A Report of the Center for International Security and Cooperation, Stanford University.
Foucault, M. (1977). Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, Pantheon Books.
Franklin, M.I. (2004) Post Colonial Politics, the Internet and Everyday Life: Pacific Traversals Online, New York: Routledge.
Gil, D. (2017) Quantum computing explained with a deck of cards, The MIT Venture Capital + Innovation Conference, IBM Research, Available at: https://www.youtube.com/watch?v=yy6TV9Dntlw
Glenn Research Center, Newton’s Laws of Motion, NASA, from https://www.grc.nasa.gov/www/k-12/airplane/newton2.html
Guo, L., Huang. J., and Zhang, Y. (2019). Education Development in China: Education Return, Quality, and Equity, Sustainability 2019, 11, 3750; doi:10.3390/su11133750, www.mdpi.com/journal/sustainability
Guterl, F. (2019). Are We Ready for a ‘Quantum Surprise’ from China? Newsweek, Tech & Science, Available at: https://www.newsweek.com/china-quantum-computing-1467835
Hachigian, Nina (2002) ‘The Internet and Power in One-Party East Asian States’, History of Technology, Trevor E. Pinch and Wiebe E. Bijker (eds.), Cambridge.
Harwit, E. and Clark D. (2001). Government policy and political control over China’s Internet, Chinese Cyberspaces, Routledge.
Heilbroner, Robert (1961) ‘Do Machines Make History?’, Technology and Culture, pp. 335–345, Vol. 2 (Winter).
Hoffman, C. (2017). How the “Great Firewall of China” Works to Censor China’s Internet, How-to-Geek, from https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/
Hoffman, S. (1975). Notes on the Elusiveness of Modern Power, International Journal 30, p. 204.
Hughes, T.P. (1989). ‘The Definition of Large Technological Systems’. in The Social Construction of Technological Systems: New Directions in the Sociology and History, MIT Press.
Jefferson, G. (2018). State-owned enterprise: reform, performance and prospects. In W. Wu & M. W. Frazier, The sage handbook of contemporary china, (Vol. 2, pp. 121-142). 55 City Road, London: SAGE Publications Ltd doi: 10.4135/9781526436085.n7
Jessop, B. (1990). State theory. Oxford: Polity Press.
Keck, M.E., and Sikkink, K. (1998). Activists Beyond Borders – Advocacy Networks in International Politics, Cornell University Press/ Ithaca.
Keohane, R.O. and Nye, J.S. (1998). Power and Interdependence in the Information Age, Foreign Affairs, vol. 77 (5), pp. 81-94.
Kokas, A. (2019). Cloud Control: China’s 2017 Cybersecurity Law and its Role in US Data Standardization. Available at SSRN: https://ssrn.com/abstract=3427372 or http://dx.doi.org/10.2139/ssrn.3427372
Krasner, S. (2009). Power, the state and sovereignty. New York, NY: Routledge.
Langman, Lauren (2005). ‘From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements`. Sociological Theory, pp. 42–74, Vol. 23, No. 1.
Latham, K. (2007). ‘SMS, Communication, and Citizenship in China`s Information Society`. Critical Asian Studies, pp. 295–314, Vol. 39, No. 2 (June).
Lessig, L. (2006). Code. New York, Basic Books.
Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor Press/Doubleday, 416–18.
Lorentzen, P. (2013). China’s Strategic Censorship. American Journal of Political Science, Vol. 58, No. 2, April 2014, Pp. 402–414, Midwest Political Science Association DOI: 10.1111/ajps.12065
Lukes, S. (1974). `Power: A Radical View`. Macmillan, p.13.
Mackenzie, D. (1996). `Knowing Machines`. Cambridge: The MIT Press.
MacKenzie, D., and Judy, W. (eds.) (1999). `The Social Shaping of Technology`. Philadelphia: Open University Press.
MacKinnon, R. (2010). Networked Authoritarianism in China and Beyond Implications for global Internet freedom. Liberation Technology in Authoritarian Regimes. Hoover Institution & the Center of Democracy, Developmental Rule of Law (CDDRL), Stanford University.
Marcuse, H. (2013). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. New York, NY: Routledge.
Mayer-Schoenberger, V., and Brodnig, G. (2001). `Information Power: International Affairs in the Cyber Age`. SSRN Electronic Journal.
Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics, London: W.W.Norton.
Merics Papers on China (2016). Made in China 2025, The making of a high-tech superpower and consequences for industrial countries, Merics.
Merics China Monitor (2017). China’s Social Credit System, A big-data enabled approach to market regulation with broad implications for doing business in China, Merics.
MIIT (2017). Notice of the Ministry of Industry and Information Technology on Cleaning Up and Regulating the Internet Access Service Market [Effective]. No.32, People`s Republic of China, Available at: http://en.pkulaw.cn/display.aspx?cgid=992e987ace0e25e7bdfb&lib=law
Morgenthau, H. (1978). Politics Among Nations: The Struggle for Power and Peace, 5th Edition Revised, New York, NY: Alfred A. Knopf.
Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom, New York, NY: PublicAffairs.
Mumford, L. (1970). The Myth of the Machine: The Pentagon of Power, New York, NY: Harcourt Brace Jovanovich.
National Science Report (2018). Science and Engineering Indicators, from https://nsf.gov/statistics/2018/nsb20181/
Nye, J.S. (1990). `Bound To Lead: The Changing Nature of American Power`. Basic Books.
Nye, Joseph S. (2002). `The Paradox of American Power: Why the World`s Only Superpower Can`t Go It Alone`. Oxford: Oxford University Press.
Nye, Joseph S. (2004) Soft Power: The Means to Success in World Politics, New York, NY: PublicAffairs.
Olson, M. (1993). Dictatorship, Democracy, and Development. American Political Science Review 87 (3): 567-576.
Perlmutter, A., and William M. L. (1982). "The Party in Uniform: Toward a Theory
of Civil-Military Relations in Communist Political Systems." The American Political
Science Review 76 (4):778. doi: 10.2307/1962970.

Project Zero (2019). Google Project Zero, Available at: https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
Quartz in the Shadows (2017). Meet Shadowsocks, the underground tool that China’s coders use to blast through the Great Firewall, Available at: https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall/
Reagle, J. (1999) “Why the Internet is good: community governance that works well,” Berkman Center Working Draft.
Reuters Business News (2017). Apple says it is removing VPN services from China App Store. Retrieved 24 December 2019, Available at: https://www.reuters.com/article/us-china-apple-vpn/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQ
Rothkopf, D.J. (1998). ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, pp. 325–59, Vol. 51, No. 2 (Spring).
Rouse, M. (2007). What is reverse engineering? - Definition from WhatIs.com. [online] SearchSoftwareQuality. Available at: https://searchsoftwarequality.techtarget.com/definition/reverse-engineering [Accessed 26 Aug. 2019].
Sassen, S. (1999). ‘The Impact of the Internet on Sovereignty: Unfounded and Real Worries’, Paper presented to the Internet and International Systems: Information Technology and American Foreign Policy Decision-Making Workshop, Nautilus Institute, San Francisco (10 December), http://www.nautilus.org/gps/ info-policy/workshop/papers/sassen.html.
Schneider, F. (2018). China’s Digital Nationalism, Published to Oxford Scholarship, DOI:10.1093/oso/9780190876791.003.0001
SCMP (2019). Artificial intelligence is watching China’s students but how well can it really see? South China Morning Post, China/ Politics, Available at: https://www.scmp.com/news/china/politics/article/3027349/artificial-intelligence-watching-chinas-students-how-well-can
Singer, J.D. and Small, M. (1966). "The Composition and Status Ordering of the International System: 1815-1940," World Politics 18
Smith, G. and Moises N. (2000). Altered States: Globalization, Sovereignty and Governance, Ottawa: International Development Research Centre.
Smith, J.O. (2010). Physical Audio Signal Processing, online book, 2010 edition, from http://ccrma.stanford.edu/~jos/pasp/
Strange, S. (1988). States and Markets, Blackwell.
Symantec Acquires SafeWeb. (2003). Retrieved 27 December 2019, from https://www.nortonlifelock.com/about/newsroom/press-releases/2003/symantec_1020_01
Tanji, M. (2007). ‘Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats’, Journal of Cyber Conflict Studies, pp. 4–11, Vol. 1, No. 1 (December). The MIT Press.
TechCrunch (2019). Sources say China used iPhone hacks to target Uyghur Muslims, Available at: https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/
Tett, Gillian. (2017). “Trump, Cambridge Analytica and How Big Data Is Reshaping Politics.” Financial Times, Available at: https://www.ft.com/content/e66232e4-a30e-11e7-9e4f-7f5e6a7c98a2
Thaler, R.H., and Cass R.S. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Revised & Expanded edition. New York: Penguin Books.
The Citizen Lab (2015). China’s Great Cannon, Munk School of Global Affairs, University of Toronto, Available at: https://citizenlab.ca/2015/04/chinas-great-cannon/
Unver, H.A. (2018). Artificial Intelligence, Authoritarianism, and the Future of Political Systems, Cyber Governance and Digital Democracy 2018/9, EDAM.
Vig, N. (1988). ‘Technology, Philosophy and the State’, in Technology and Politics, Michael E. Kraft and Norman J. Vig (eds.), Durham and London: Duke University Press.
Wagner, P.R. (2005). “On Software Regulation,” Southern California Law Review 78: 457, 487.

Waltz, K.N. (1979). Theory of International Politics, Boston: McGraw Hill.
Wendt, A. (1999). Social Theory of International Politics, Cambridge: Cambridge University Press.
Winner, L. (1985). ‘Do Artefacts have Politics?’ in The Social Shaping of Tech- nology: How the Refrigerator Got Its Hum, Donald MacKenzie and Judy Wacjman (eds.), Philadelphia: Open University Press.
World Bank (2018). Literacy rate, youth total (% of people ages 15-24) - India, China, from https://data.worldbank.org/indicator/SE.ADT.1524.LT.ZS?locations=IN-CN
Wu, J. and Lam, O. (2017). The evolution of China`s Great Firewall: 21 years of censorship. (online) Hong Kong Free Press HKFP. Available at: https://www.hongkongfp.com/2017/09/03/evolution-chinas-great-firewall-21-years-censorship/
描述 碩士
國立政治大學
亞太研究英語碩士學位學程(IMAS)
106926024
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0106926024
資料類型 thesis
dc.contributor.advisor 陳永福zh_TW
dc.contributor.advisor Tan, Alexander C.en_US
dc.contributor.author (Authors) 盧藝璱zh_TW
dc.contributor.author (Authors) YILDIRIM, SEDAen_US
dc.creator (作者) 盧藝璱zh_TW
dc.creator (作者) YILDIRIM, SEDAen_US
dc.date (日期) 2020en_US
dc.date.accessioned 2-Mar-2020 11:33:29 (UTC+8)-
dc.date.available 2-Mar-2020 11:33:29 (UTC+8)-
dc.date.issued (上傳時間) 2-Mar-2020 11:33:29 (UTC+8)-
dc.identifier (Other Identifiers) G0106926024en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/128968-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 亞太研究英語碩士學位學程(IMAS)zh_TW
dc.description (描述) 106926024zh_TW
dc.description.abstract (摘要) Knowing that information and communication technology (ICT) has implications for many aspects of state power in general, and especially in the case of China, there was a need for a well-coordinated approach generating the dynamic of control and encouragement of ICT development in China. Through an examination of concerns that have been emerging about what ICT means for Chinese power, this research tended to unveil the unique way of ICT adoption and advancement in China. Of these concerns, the controllability dilemma, data security, and algorithmic-authoritarianism that all escalated with the introduction of the Internet are the piers to understand the dynamics of changes in perceptions and interests of the Chinese government in this regard. This research, thus, is filled with the urge to reveal technical knowledge that has been long lacking in IR literature, and specifically applying such knowledge to understand the Chinese use of ICT and innovation, majorly through observing the continuous process of threats and problems perceived along the way of adoption and innovation (formulated under the reverse saliency model in this research) and how those problems are solved through which aims to foresee the Chinese intentions and big targets in this regard, and finally expect to make a more general sense of how differently state power interacts with technology in the post-industrial model of ICTs.en_US
dc.description.tableofcontents CONTENTS
Acknowledgment v
Abstract vi
Table of Figures viii
Chapter I 1
1. Introduction 1
1.1. Power 5
1.2. Information 6
1.3. Access to the Information: Use of Technology 7
1.4. The Net and the State 8
Chapter II 10
1. Literature Review 10
1.1. Searching for the nature of technology 12
1.2. Existing Paradigms 13
1.3. The Missing Link 16
Chapter III 20
1. Research Method 20
1.1. The Case Study of China 20
2. Theoretical Model 24
2.1. A Metaphor of Internet Technologies 24
Reverse saliency Model 26
2.1.1. Force (Control) 31
2.1.2. Momentum (Preserve) 33
2.1.3. Accelerate (Spread) 36
Hypotheses 38
Chapter IV 40
1. China: People’s Tough Love 40
1.1. Controllability dilemma 42
1.2. Data Security and Governance 47
1.3. Algorithmic Authoritarianism 60
Chapter V 68
1. Concluding Thoughts 68
2. Policy Implications 71
Bibliography 74
Appendix A 81
Appendix B 82
Appendix C 83
zh_TW
dc.format.extent 2845176 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0106926024en_US
dc.subject (關鍵詞) 反向顯著性zh_TW
dc.subject (關鍵詞) 信息通訊技術zh_TW
dc.subject (關鍵詞) 國家權力zh_TW
dc.subject (關鍵詞) 中國zh_TW
dc.subject (關鍵詞) reverse salienten_US
dc.subject (關鍵詞) information and communication technologyen_US
dc.subject (關鍵詞) state poweren_US
dc.subject (關鍵詞) Chinaen_US
dc.title (題名) 消除反向凸顯: 在中國背景下各國對技術的認知zh_TW
dc.title (題名) Removing the Reverse Salient: States` Perception towards Internet Technology in the context of Chinaen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) Bibliography
AMCHAM Shanghai (2018). VPN Regulations and Implications for Business, GPS Technology Quarterly, Available at: https://www.amcham-shanghai.org/sites/default/files/2018-04/GPS%20Technology%20Quarterly%20%28February%202018%29%20.pdf
Aronson, J. (2002). ‘Global Networks and their Impact in Information Technologies and Global Politics: The Changing Scope of Power and Governance, James N. Rosenau and J. P. Singh (eds.), Albany, NY: State University of New York Press.
Bachrach, P. and Baratz, M.S. (1963). Decisions and Nondecisions: An Analytical Framework, American Political Science Review 57, pp.641-51.
Bain (2015). Finding the Silver Lining in China`s Cloud Market, from https://www.bain.com/insights/finding-the-silver-lining-in-chinas-cloud-market
BBC (2017). ‘China`s quantum satellite in big leap’, BBC News, Science & Environment, from: https://www.bbc.com/news/science-environment-40294795
Boerl, C, (2008). Technological Empowerment: The Internet, State, and Society in China, by Yongnian Zheng, 5:4, 413-414, DOI: 10.1080/19331680802555036
Borgmann, A. (1984). Technology and the Character of Contemporary Life: A Philosophical Inquiry, Chicago: University of Chicago Press.
Breyman, S. (1993). Knowledge as Power: Ecology Movements and Global Environmental Problems in: Ronnie D. Lipschutz and Ken Conca (eds.), The State and Social Power in Global Environmental Politics, Columbia University Press, p. 126.
Business Wire, Inc. (2000). “2dobiz.com inside track to mainland China.”
Carr, Madeline (2016). US Power and the Internet in International Relations: The Irony of the Information Age. Palgrave Macmillan, 1st edition, ISBN 978-1-349-71539-8, ISBN 978-1-137-55024-8 (eBook) DOI 10.1057/9781137550248
Carr, N. (2006). The Weakest Link. [online] strategy+business. Available at: https://www.strategy-business.com/article/06403 [Accessed 18 Apr. 2019].
Castells, Manuel (2000) ‘Toward a Sociology of the Network Society`. Contemporary Sociology, Vol. 29, No. 5 (September).
Cerf, V.G. and Kahn, R.E. (1974). A Protocol for Packet Network Intercommunication, IEEE, Vol Com-22.
Chase, M., Hachigian, N., and Mulvenin, J. (2006). Comrade to comrade networks: the social and political implications of peer-to-peer networks in China, Chinese Cyberspaces, Routledge.
China Information Technology Report (2018). Fitch Solution, from https://store.fitchsolutions.com/china-information-technology-report
Cleaver, Harry M. Jr. (1998). ‘The Zapatista Effect: The Internet and the Rise of an Alternative Political Fabric`. Journal of International Affairs, pp. 621–40, Vol. 51, No. 2 (Spring).
CNN (2006). CNN.com - Google to censor itself in China - Jan 25, 2006. [online] Available at: http://edition.cnn.com/2006/BUSINESS/01/25/google.china/ [Accessed 27 Aug. 2019].
Corrales, J., and Westhoff, F. (2006). Information Technology Adoption and Political Regimes. International Studies Quarterly, 50(4), pp.911-933.
Damm, J. and Thomas, S. (2006). Chinese Cyberspaces, Routledge, First Edition, Taylor & Francis Group, ISBN 0-203-40032-1.
Deibert, Ronald J., Palfrey, J., Rohozinski, R., and Zittrain, J., (2010). Access Controlled: The Shaping of Policy of Global Internet Filtering. Cambridge: MIT Press.
Diamond, L. (2010). “Liberation Technology, Journal of Democracy Volume 21, Number 3, p. 82.
Dodge, M. (1998). Accessibility to Information within the Internet: How can it be Measured and Mapped?. University College London. [online] Available at: http://www.casa.ucl.ac.uk/martin/varenius_accessibility.pdf [Accessed 19 Aug. 2019].
Drezner, Daniel W., and Henry Farrell (2004). ‘Web of Influence’, Foreign Policy, pp. 32–40, No. 145 (November/December).
EFF (2019). China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, from https://www.eff.org/deeplinks/2019/10/chinas-global-reach-surveillance-and-censorship-beyond-great-firewall
Endeshaw, A. (2004) Internet Regulation in China: The Never-ending Cat and mouse game. Information and Communication Technology Law, Vol.13, No.1
Foster, W. and Goodman, S.E. (2000). The Diffusion of the Internet in China, A Report of the Center for International Security and Cooperation, Stanford University.
Foucault, M. (1977). Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, Pantheon Books.
Franklin, M.I. (2004) Post Colonial Politics, the Internet and Everyday Life: Pacific Traversals Online, New York: Routledge.
Gil, D. (2017) Quantum computing explained with a deck of cards, The MIT Venture Capital + Innovation Conference, IBM Research, Available at: https://www.youtube.com/watch?v=yy6TV9Dntlw
Glenn Research Center, Newton’s Laws of Motion, NASA, from https://www.grc.nasa.gov/www/k-12/airplane/newton2.html
Guo, L., Huang. J., and Zhang, Y. (2019). Education Development in China: Education Return, Quality, and Equity, Sustainability 2019, 11, 3750; doi:10.3390/su11133750, www.mdpi.com/journal/sustainability
Guterl, F. (2019). Are We Ready for a ‘Quantum Surprise’ from China? Newsweek, Tech & Science, Available at: https://www.newsweek.com/china-quantum-computing-1467835
Hachigian, Nina (2002) ‘The Internet and Power in One-Party East Asian States’, History of Technology, Trevor E. Pinch and Wiebe E. Bijker (eds.), Cambridge.
Harwit, E. and Clark D. (2001). Government policy and political control over China’s Internet, Chinese Cyberspaces, Routledge.
Heilbroner, Robert (1961) ‘Do Machines Make History?’, Technology and Culture, pp. 335–345, Vol. 2 (Winter).
Hoffman, C. (2017). How the “Great Firewall of China” Works to Censor China’s Internet, How-to-Geek, from https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/
Hoffman, S. (1975). Notes on the Elusiveness of Modern Power, International Journal 30, p. 204.
Hughes, T.P. (1989). ‘The Definition of Large Technological Systems’. in The Social Construction of Technological Systems: New Directions in the Sociology and History, MIT Press.
Jefferson, G. (2018). State-owned enterprise: reform, performance and prospects. In W. Wu & M. W. Frazier, The sage handbook of contemporary china, (Vol. 2, pp. 121-142). 55 City Road, London: SAGE Publications Ltd doi: 10.4135/9781526436085.n7
Jessop, B. (1990). State theory. Oxford: Polity Press.
Keck, M.E., and Sikkink, K. (1998). Activists Beyond Borders – Advocacy Networks in International Politics, Cornell University Press/ Ithaca.
Keohane, R.O. and Nye, J.S. (1998). Power and Interdependence in the Information Age, Foreign Affairs, vol. 77 (5), pp. 81-94.
Kokas, A. (2019). Cloud Control: China’s 2017 Cybersecurity Law and its Role in US Data Standardization. Available at SSRN: https://ssrn.com/abstract=3427372 or http://dx.doi.org/10.2139/ssrn.3427372
Krasner, S. (2009). Power, the state and sovereignty. New York, NY: Routledge.
Langman, Lauren (2005). ‘From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements`. Sociological Theory, pp. 42–74, Vol. 23, No. 1.
Latham, K. (2007). ‘SMS, Communication, and Citizenship in China`s Information Society`. Critical Asian Studies, pp. 295–314, Vol. 39, No. 2 (June).
Lessig, L. (2006). Code. New York, Basic Books.
Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor Press/Doubleday, 416–18.
Lorentzen, P. (2013). China’s Strategic Censorship. American Journal of Political Science, Vol. 58, No. 2, April 2014, Pp. 402–414, Midwest Political Science Association DOI: 10.1111/ajps.12065
Lukes, S. (1974). `Power: A Radical View`. Macmillan, p.13.
Mackenzie, D. (1996). `Knowing Machines`. Cambridge: The MIT Press.
MacKenzie, D., and Judy, W. (eds.) (1999). `The Social Shaping of Technology`. Philadelphia: Open University Press.
MacKinnon, R. (2010). Networked Authoritarianism in China and Beyond Implications for global Internet freedom. Liberation Technology in Authoritarian Regimes. Hoover Institution & the Center of Democracy, Developmental Rule of Law (CDDRL), Stanford University.
Marcuse, H. (2013). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. New York, NY: Routledge.
Mayer-Schoenberger, V., and Brodnig, G. (2001). `Information Power: International Affairs in the Cyber Age`. SSRN Electronic Journal.
Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics, London: W.W.Norton.
Merics Papers on China (2016). Made in China 2025, The making of a high-tech superpower and consequences for industrial countries, Merics.
Merics China Monitor (2017). China’s Social Credit System, A big-data enabled approach to market regulation with broad implications for doing business in China, Merics.
MIIT (2017). Notice of the Ministry of Industry and Information Technology on Cleaning Up and Regulating the Internet Access Service Market [Effective]. No.32, People`s Republic of China, Available at: http://en.pkulaw.cn/display.aspx?cgid=992e987ace0e25e7bdfb&lib=law
Morgenthau, H. (1978). Politics Among Nations: The Struggle for Power and Peace, 5th Edition Revised, New York, NY: Alfred A. Knopf.
Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom, New York, NY: PublicAffairs.
Mumford, L. (1970). The Myth of the Machine: The Pentagon of Power, New York, NY: Harcourt Brace Jovanovich.
National Science Report (2018). Science and Engineering Indicators, from https://nsf.gov/statistics/2018/nsb20181/
Nye, J.S. (1990). `Bound To Lead: The Changing Nature of American Power`. Basic Books.
Nye, Joseph S. (2002). `The Paradox of American Power: Why the World`s Only Superpower Can`t Go It Alone`. Oxford: Oxford University Press.
Nye, Joseph S. (2004) Soft Power: The Means to Success in World Politics, New York, NY: PublicAffairs.
Olson, M. (1993). Dictatorship, Democracy, and Development. American Political Science Review 87 (3): 567-576.
Perlmutter, A., and William M. L. (1982). "The Party in Uniform: Toward a Theory
of Civil-Military Relations in Communist Political Systems." The American Political
Science Review 76 (4):778. doi: 10.2307/1962970.

Project Zero (2019). Google Project Zero, Available at: https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
Quartz in the Shadows (2017). Meet Shadowsocks, the underground tool that China’s coders use to blast through the Great Firewall, Available at: https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall/
Reagle, J. (1999) “Why the Internet is good: community governance that works well,” Berkman Center Working Draft.
Reuters Business News (2017). Apple says it is removing VPN services from China App Store. Retrieved 24 December 2019, Available at: https://www.reuters.com/article/us-china-apple-vpn/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQ
Rothkopf, D.J. (1998). ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, pp. 325–59, Vol. 51, No. 2 (Spring).
Rouse, M. (2007). What is reverse engineering? - Definition from WhatIs.com. [online] SearchSoftwareQuality. Available at: https://searchsoftwarequality.techtarget.com/definition/reverse-engineering [Accessed 26 Aug. 2019].
Sassen, S. (1999). ‘The Impact of the Internet on Sovereignty: Unfounded and Real Worries’, Paper presented to the Internet and International Systems: Information Technology and American Foreign Policy Decision-Making Workshop, Nautilus Institute, San Francisco (10 December), http://www.nautilus.org/gps/ info-policy/workshop/papers/sassen.html.
Schneider, F. (2018). China’s Digital Nationalism, Published to Oxford Scholarship, DOI:10.1093/oso/9780190876791.003.0001
SCMP (2019). Artificial intelligence is watching China’s students but how well can it really see? South China Morning Post, China/ Politics, Available at: https://www.scmp.com/news/china/politics/article/3027349/artificial-intelligence-watching-chinas-students-how-well-can
Singer, J.D. and Small, M. (1966). "The Composition and Status Ordering of the International System: 1815-1940," World Politics 18
Smith, G. and Moises N. (2000). Altered States: Globalization, Sovereignty and Governance, Ottawa: International Development Research Centre.
Smith, J.O. (2010). Physical Audio Signal Processing, online book, 2010 edition, from http://ccrma.stanford.edu/~jos/pasp/
Strange, S. (1988). States and Markets, Blackwell.
Symantec Acquires SafeWeb. (2003). Retrieved 27 December 2019, from https://www.nortonlifelock.com/about/newsroom/press-releases/2003/symantec_1020_01
Tanji, M. (2007). ‘Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats’, Journal of Cyber Conflict Studies, pp. 4–11, Vol. 1, No. 1 (December). The MIT Press.
TechCrunch (2019). Sources say China used iPhone hacks to target Uyghur Muslims, Available at: https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/
Tett, Gillian. (2017). “Trump, Cambridge Analytica and How Big Data Is Reshaping Politics.” Financial Times, Available at: https://www.ft.com/content/e66232e4-a30e-11e7-9e4f-7f5e6a7c98a2
Thaler, R.H., and Cass R.S. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Revised & Expanded edition. New York: Penguin Books.
The Citizen Lab (2015). China’s Great Cannon, Munk School of Global Affairs, University of Toronto, Available at: https://citizenlab.ca/2015/04/chinas-great-cannon/
Unver, H.A. (2018). Artificial Intelligence, Authoritarianism, and the Future of Political Systems, Cyber Governance and Digital Democracy 2018/9, EDAM.
Vig, N. (1988). ‘Technology, Philosophy and the State’, in Technology and Politics, Michael E. Kraft and Norman J. Vig (eds.), Durham and London: Duke University Press.
Wagner, P.R. (2005). “On Software Regulation,” Southern California Law Review 78: 457, 487.

Waltz, K.N. (1979). Theory of International Politics, Boston: McGraw Hill.
Wendt, A. (1999). Social Theory of International Politics, Cambridge: Cambridge University Press.
Winner, L. (1985). ‘Do Artefacts have Politics?’ in The Social Shaping of Tech- nology: How the Refrigerator Got Its Hum, Donald MacKenzie and Judy Wacjman (eds.), Philadelphia: Open University Press.
World Bank (2018). Literacy rate, youth total (% of people ages 15-24) - India, China, from https://data.worldbank.org/indicator/SE.ADT.1524.LT.ZS?locations=IN-CN
Wu, J. and Lam, O. (2017). The evolution of China`s Great Firewall: 21 years of censorship. (online) Hong Kong Free Press HKFP. Available at: https://www.hongkongfp.com/2017/09/03/evolution-chinas-great-firewall-21-years-censorship/
zh_TW
dc.identifier.doi (DOI) 10.6814/NCCU202000351en_US