Publications-學位論文
Article View/Open
Publication Export
-
題名 比較分析中國社會信用體系與監控資本主義對自由世界實踐之威脅
China’s Social Credit System and Surveillance Capitalism: Comparing Their Threats toward the Practices of the Free World作者 徐恩碩
Shiflet, Michael貢獻者 魏玫娟
Wei, Michelle
徐恩碩
Shiflet, Michael關鍵詞 社會信用制度
監控資本主義
中國
網際網路
自由民主價值
Social credit system
Surveillance capitalism
China
Internet
Liberal democratic practices日期 2022 上傳時間 1-Aug-2022 18:46:30 (UTC+8) 摘要 相較於以往,科技與社會環境的快速變遷對全球各國公民產生日益漸增的影響,特別值得關注與探究的是這些環境改變對自由社會與自由民主實踐之影響,而中國所實行的社會信用制度與「自由世界」中出現的監控資本主義,是其中兩個影響至鉅的環境變化。本論文採取次級資料分析方法,針對「中國社會信用制度」與「監控資本主義」對自由世界之自由民主實踐所具有之潛在風險進行比較,聚焦於探討在監控資本主義已經對自由世界的個人權利產生影響之後,中國社會信用制度是否進一步影響西方資本主義國家的自由民主實踐。本文藉由探討中國社會信用制度與監控資本主義環境之本質與脈絡,檢視前述兩種制度及其環境影響下所出現的全球範圍之「侵犯隱私正常化」之後發現,相較於為商業利益而出現並普遍存在的監控資本主義在侵犯個人隱私上的影響,中國社會信用制度的影響相對有限。本文認為,儘管中國社會信用制度無疑是對中國公民個人權利之威脅,但該制度的「獨特性」特別是制度落實上所需的配套環境,高度限制其輸出至他國進而影響西方資本主義國家自由民主實踐與各項公民權利的可能性。
More than ever, the combination of technological and societal shifts plays an increas- ingly important role in affecting citizens around the world. The influence of these environ- ments should be considered on free societies and the practices of liberal democracy. Two such environments of concern are the much-hyped Social Credit System (SCS) in China and sur- veillance capitalism which has emerged more discreetly from the free world. This thesis uses a comparative analysis of secondary data to look at the potential risk toward the democratic practices the SCS uniquely poses to the free world after the threats of surveillance capitalism have first been considered. After exploring the nature and context of both environments, it moves to uncover how both have contributed to the global normalization of privacy intrusion worldwide and build off one another in ways that compound related threats. Overall, the SCS’s unique threats to practices in the free world are perhaps more limited than expected once considered alongside the threats from surveillance capitalism. Comparative analysis finds the exportability of the SCS beyond Chinese borders extremely unlikely while also un- covering some unique but limited threats beyond privacy that affect freedom of expression and various other practices of free world citizens.參考文獻 Adee, S. (2019, May 15). The Global Internet Is Disintegrating. What Comes Next? Retrieved from https://www.bbc.com/future/article/20190514-the-global-internet-is-disintegrating-what-comes-nextAho B., & Duffield R. (2020). Beyond Surveillance Capitalism: Privacy, regulation and big data in Europe and China. Economy and Society, 49:2, 187-212, DOI: 10.1080/03085147.2019.1690275Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives. doi:10.3386/w23089Auerbach, D. (2015, August 03). Windows 10 Shamelessly Wants Your Data. Here`s How to Protect Yourself. Retrieved November 17, 2020, from https://slate.com/technology/ 2015/08/windows-10-privacy-problems-heres-how-bad-they-are-and-how-to-plug- them.htmlBhargava, V. R., & Velasquez, M. (2021). Ethics of the attention economy: The problem of social media addiction. Business Ethics Quarterly, 31(3), 321-359.Behsudi, A. (2019). Senators Want Trump Probe of China`s New Corporate Social Credit System. Retrieved from https://www.politico.com/news/2019/12/02/senators-want-trump- probe-of-chinas-new-corporate-social-credit-system-074810Berg, B. L., & Lune, H. (2016). Qualitative Research Methods for the Social Sciences. Pear- son.Blum, S. (2018, October 11). Boston Dynamics` Atlas Can Now Chase You Up Some Stairs. Retrieved from https://www.popularmechanics.com/technology/robots/a23725726/ boston-dynamics-atlas-parkour/Business of Apps. (2021, May). Pokémon go revenue and usage Statistics. Retrieved September 06, 2021, from https://www.businessofapps.com/data/pokemon-go-statistics/Couldry, N. (2017). Surveillance-Democracy. Journal of Information Technology & Politics, 14(2), 182-188. doi:10.1080/19331681.2017.1309310Coy, P. (2006). The Secret To Google`s Success. Retrieved July 31, 2020, from https:// www.bloomberg.com/news/articles/2006-03-05/the-secret-to-googles-successChace, C. (2019, September). Surveillance Capitalism And Anti-Capitalism. Retrieved July 28, 2020, from https://www.forbes.com/sites/cognitiveworld/2019/09/17/surveillance- capitalism-and-anti-capitalism/#416a371b2984Chen, S., & Kang, S. (2018). A Tutorial on 5G and the Progress in China. Frontiers of Information Technology & Electronic Engineering, 19(3), 309-321. DOI:10.1631/fitee. 1800070Chen, Y., & Yang, D. (2017, November). The Impact of Media Censorship: Evidence from a field experiment in China. Retrieved February 19, 2020, from https://www.gsb.stan- ford.edu/sites/gsb/files/jmp_david-yang_0.pdfCreemers, R. (2015). China`s plans to use ratings to keep eye on citizens. CNN. Retrieved 2021, from https://www.cnn.com/2015/10/27/opinions/china-social-credit-score- creemers/index.html.Deb, S., & Stein, M. (2022). Daryl Morey Steps Down as G.M. of the Houston Rockets. New York Times. Retrieved February 2022, from https://www.nytimes.com/2020/10/15/ sports/basketball/nba-daryl-morey-rockets- china.html#:~:text=Morey`s%20tweet%20expressing%20support%20for,N.B.A.%20and%20the%20Chinese%20government.&text=Daryl%20Morey%2C%20the%20general%20manager,1%2C%20he%20announced%20Thursday.Drinhausen, K., & Brussee, V. (2021). China’s Social Credit System in 2021.Edelman, B. (2015). Does Google Leverage Market Power through Tying and Bundling? Journal of Competition Law and Economics, 11(2), 365–400. https://doi.org/10.1093/ joclec/nhv016Fair, L. (2018, July 19). What Vizio was doing behind the TV screen. Federal Trade Commis- sion. Retrieved January 10, 2020, from https://www.ftc.gov/news-events/blogs/busi- ness-blog/2017/02/what-vizio-was-doing-behind-tv-screenFederal Trade Commission. (2019, February 28). Facebook Settles FTC Charges That It De- ceived Consumers By Failing To Keep Privacy Promises. Retrieved October 22, 2020, from https://www.ftc.gov/news-events/press-releases/2011/11/facebook-settles-ftc- charges-it-deceived-consumers-failing-keepFleischer, P. (2007, September 24). Street View and Privacy. Googleblog. https://maps.- googleblog.com/2007/09/street-view-and-privacy.htmlFreedom House. (2021) Countries and Territories: Global freedom scores. Retrieved Sep- tember 22, 2021, from https://freedomhouse.org/countries/freedom-world/scores? sort=desc&order=Total+Score+and+StatusGan, N. (2019, February 19). The complex reality of China’s social credit system: hi-tech dystopian plot or low-key incentive scheme? South China Morning Post. Retrieved May 12, 2020, from https://www.scmp.com/news/china/politics/article/2185303/hi- tech-dystopia-or-low-key-incentive-scheme-complex-realityGurley, B. (2011, March 25). The Freight Train That Is Android. Retrieved September 24, 2020, from https://abovethecrowd.com/2011/03/24/freight-train-that-is-android/Harwit, E. (2019). WeChat and the growth of China`s indigenous internet.Helbing, D., Frey, & Gigerenzer. (2019). Will Democracy Survive Big Data and Artificial In- telligence? In Towards digital enlightenment: Essays on the dark and light sides of the digital revolution (pp. 73-98). Springer.Hintz, A., & Milan, S. (2017). Through a Glass, Darkly: Everyday Acts of Authoritarianism in the Liberal West. International Journal of Communication.Hoffman, S. (2017). Managing the State: Social Credit, Surveillance and the CCP`s Plan for China. Retrieved from https://globalgeopolitics.net/2017/09/07/managing-the-state- social-credit-surveillance-and-the-ccps-plan-for-china/Hoffman, S. (2017). Programming China: The Communist Party’s autonomic approach to managing state security.Hunter, R., Zaman, & Liu. (2017). Global Top 100 Companies by Market Capitalisation. IPO Center, Price Waterhouse Coopers. Retrieved 2020, from https://www.pwc.de/de/kapi- talmarktorientierte-unternehmen/global-top-100-march-2017.pdfHutcheon, S. (2009, January 30). We`re not stalking you or helping terrorists, says Google Earth boss. Retrieved October 08, 2020, from https://www.smh.com.au/technology/ were-not-stalking-you-or-helping-terrorists-says-google-earth-boss-20090130- gdtbpy.htmlJasanoff, S., Markle, G., Peterson, J., & Pinch, T. (2001). Handbook of Science and Technolo- gy Studies. Sage.Jiang, M., & Fu, K. (2018). Chinese Social Media and Big Data: Big Data, Big Brother, Big Profit? Policy & Internet, 10(4), 372-392. doi:10.1002/poi3.187Jooste, Y. (2021). Surveillance capitalism as white world-making. Acta Academica, 53(1), 44- 67. https://dx.doi.org/10.18820/24150479/aa53i1.3Kaska, K., Beckvard, & Minarik. (2019). Huawei, 5G and China as a Security Threat. Re- trieved from https://www.ccdcoe.org/uploads/2019/03/CCDCOE- Huawei-2019-03-28-FINAL.pdfKessel, J., & Mozur, P. (Directors). (2016, August 09). How China is Changing Your Internet [Video file]. Retrieved February 05, 2020, from https://www.nytimes.com/video/tech- nology/100000004574648/china-internet-wechat.html?action=click>ype=vhs&ver- sion=vhs-heading&module=vhs®ion=title-area&cview=true&t=201King, Pan, J., & Roberts, M. E. (2013). How Censorship in China Allows Government Criti- cism but Silences Collective Expression. American Political Science Review, 107(2), 326-343. doi:10.1017/s0003055413000014King, G., Pan, J., & Roberts, M. E. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument. American Political Science Review, 111(3), 484-501. doi:10.1017/s0003055417000144Kobie, N. (2019, June 07). The complicated truth about China`s social credit system. Wired. Retrieved May 12, 2020, from https://www.wired.co.uk/article/china-social-credit- system-explainedKostka, G. (2019). China’s Social Credit Systems and Public Opinion: Explaining high levels of approval. New Media & Society, 21(7), 1565-1593. doi: 10.1177/1461444819826402Kshetri, N. (2016). Big Data’s Role in Expanding Access to Financial Services in China. In- ternational Journal of Information Management, 36(3), 297-308. doi:10.1016/j.ijin- fomgt.2015.11.014Landwehr, M., Borning, A., & Wulf, V. (2019). The High Cost of Free Services. Proceedings of the Fifth Workshop on Computing within Limits - LIMITS `19. doi: 10.1145/3338103.3338106Lanese, N., & Vidyasagar, A. (2021). What is CRISPR? Livescience.Com. https://www.live- science.com/58790-crispr-explained.htmlLee, K. (2018). AI Superpowers: China, Silicon Valley, and the New World Order. Houghton Mifflin Harcourt.Liang, F., Das, V., Kostyuk, N., & Hussain, M. (2018, August 02). Constructing a Data‐Dri- ven Society: China`s Social Credit System as a State Surveillance Infrastructure. Re-trieved from https://onlinelibrary.wiley.com/doi/full/10.1002/poi3.183? casa_token=_A4PbrhY_okAAAAA%3AbDd_GZ01MB1q-45qFgCXKSrR394e- SWNiGwXBDUZBEkpsi8_81aS7MY340Ae1fsK2-qN2cW_CoAeB_dAUfgLiu, C. (2019). Multiple Social Credit Systems in China. Economic Sociology: The European Electronic Newsletter 21 (1): 22–32. doi:10.2139/ssrn.3423057Liu, G. (2018, August 6). The Rapid Growth of the Chinese Internet - and Where It`s Headed. Lecture presented at TED. Retrieved from https://youtu.be/WBqnzn77MEELyons J., Lewis, Z. H., Mayrsohn, B. G., & Rowland, J. L. (2014). Behavior Change Tech- niques Implemented in ElectronicLifestyle Activity Monitors: A Systematic Content Analysis. Journal of Medical Internet Research, 16(8). doi:10.2196/jmir.3469Ma, A., & Gilbert, B. (2019, August). Facebook understood how dangerous the trump-linked data firm Cambridge Analytica could be much earlier than it previously said. here`s everything that`s happened up until now. Business Insider. Retrieved September 30, 2021, from https://www.businessinsider.com/cambridge-analytica-a-guide-to-the- trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3Mattis, P. (2021, April). Yes, the atrocities in Xinjiang constitute a genocide. Foreign Policy. Retrieved October 24, 2021, from https://foreignpolicy.com/2021/04/15/xinjiang- uyghurs-intentional-genocide-china/Matsakis, L. (2019, October 25). How the West Got China`s Social Credit System Wrong. Wired. Retrieved from https://www.wired.com/story/china-social-credit-score-system/Mackinnon, R. (2011). China`s "Networked Authoritarianism". Journal of Democracy, 22(2), 32-46. doi:10.1353/jod.2011.0033Meyer, J. (2015). The Turn-Verizon Zombie Cookie. Retrieved November 19, 2020, from http://webpolicy.org/2015/01/14/turn-verizon-zombie-cookie/Mozur, P. (2016, August 09). Chinese Tech Firms forced to Choose market: Home or every- where else. Retrieved February 11, 2020, from https://www.nytimes.com/2016/08/10/ technology/china-homegrown-internet-companies-rest-of-the-world.html? action=click&module=RelatedCoverage&pgtype=Article®ion=FooterNegro, G. (2017). The Internet in China: From infrastructure to a nascent civil society. Cham, Switzerland: Palgrave Macmillan.People`s Daily. (2017). Jack Ma Calls on Canadian Prime Minister to "Simplify Visas" to En- courage Young Chinese to Look at The World. Retrieved from http://travel.people.- com.cn/n1/2017/0927/c41570-29561675.htmlPettit, H. (2018, September 19). Real-life Black Mirror: China`s moves to introduce score- cards that ranks the behaviour of citizens. Daily Mail. Retrieved from https://www.- dailymail.co.uk/sciencetech/article-6183893/Real-life-Black-Mirror-Chinas-moves- introduce-scorecards-ranks-behaviour-citizens.htmlPRC State Council. (2014). Notice of the State Council on Printing and Distributing the Out- line of the Construction of the Social Credit System (2014-2020). Retrieved from http://www.gov.cn/zhengce/content/2014-06/27/content_8913.htmRadin, M. J. (2017). Boilerplate: The fine print, vanishing rights, and the rule of law. Prince- ton: Princeton University Press.Rechtschaffen, D. (2022). China’s Corporate Social Credit System Demands Political Obedi- ence from Companies. The Diplomat. Retrieved February 2022, from https:// thediplomat.com/2019/10/chinas-corporate-social-credit-system-demands-political- obedience-from-companies/.Rona-Tas, Akos. (2017). “The Off-Label Use of Consumer Credit Ratings.” Historical Social Research/ Historische Sozialforschung 42 (1).Roosendaal, A. (2010, December 01). Facebook Tracks and Traces Everyone: Like This! Re- trieved October 22, 2020, from https://papers.ssrn.com/sol3/papers.cfm? abstract_id=1717563\\Sabin, D. (2017, March). The secret history Of `Pokemon Go`, as told by Creator John Hanke. Inverse. Retrieved September 06, 2021, from https://www.inverse.com/article/28485- pokemon-go-secret-history-google-maps-ingress-john-hanke-updatesShen, H. (2018). Building a digital silk road? Situating the Internet in China`s belt and road initiative. International Journal of Communication, 12, 19.Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2020). 5G In the internet of things era: An overview on security and privacy challenges. Computer Networks, 179, 107345.Soars, B. (2009). "Driving sales through shoppers` sense of sound, sight, smell and touch", International Journal of Retail & Distribution Management, 37(3), 286-298. https://doi.org/10.1108/09590550910941535.Staden, C. (2018, March 30). China in the Era of `Xi Jinping Thought`: Five Key Trends for Africa. Retrieved December 26, 2019, from https://www.africaportal.org/publications/ china-era-xi-jinping-thought-five-key-trends-africa/Statista. (2020, April). The 100 largest companies in the world by market value in 2019.In Statista - The Statistics Portal. Retrieved from https://www.statista.com/statistics/ 263264/top-companies-in-the-world-by-market-value/Sterrett, D., Malato, D., Benz, J., Kantor, L., Tompson, T., Rosenstiel, T., ... & Loker, K. (2019). Who shared it?: Deciding what news to trust on social media. Digital Journal- ism, 7(6), 783-801.Taigman, Y., Yang, M., Ranzato, M. A., & Wolf, L. (2014). Deepface: Closing the gap to hu- man-level performance in face verification. Facebook Research. April 14, 2018.Universal Declaration of Human Rights. (1948). Retrieved from https://www.un.org/en/uni- versal-declaration-human-rights/Varian, H. (2014, March). Beyond Big Data. Business Economist, 49, 27-31. https://doi.org/ 10.1057/be.2014.1Wang, N. (2019). Data story of Tiktok.Web Foundation. (2018). The invisible curation of content: Facebook`s News Feed and our information diets. Retrieved from https://webfoundation.org/research/the-invisible- curation-of-content-facebooks-news-feed-and-our-information-diets/What is STS? (n.d.). Retrieved fromhttp://sts.hks.harvard.edu/about/whatissts.htmlWhitehead, K. (2019, August 27). Did China see its gene-edited babies scandal coming? Re- trieved from https://www.scmp.com/lifestyle/health/article/3024462/chinese-rogue- scientists-gene-edited-twin-babies-experiment-stillWollerton, M. (2014, December). Voice control comes to the forefront of the smart home. Re- trieved 2020, from https://www.cnet.com/news/voice-control-roundup/Wong, K. L., & Dobson, A. S. (2019). We’re just data: Exploring China’s Social Credit Sys- tem in relation to digital platform ratings cultures in westernised democracies. Global Media and China, 4(2), 220-232. doi:10.1177/2059436419856090Xia, L. (2019). China to further improve social credit system. Retrieved from http://www.xin- huanet.com/english/2019-03/02/c_137863354.htmXinhua Net. (2019). China boasts world`s largest social credit system: Official. Retrieved May 11, 2020, from http://www.xinhuanet.com/english/2019-06/14/c_138143745.htmXinhua. (2016). China ‘One Belt and One Road’ Credit Forum Held in Yinchuan. Retrieved from http://www.xinhuanet.com/politics/2016-09/30/c_129306830.htmYeung, E. (2019). China Internet Report 2019 (Rep.). Retrieved February, 2020, from South China Morning Post, Abacus website: https://www.scmp.com/china-internet-report#0Yuan, L. (2018, August 06). A Generation Grows Up in China Without Google, Facebook or Twitter. Retrieved from https://www.nytimes.com/2018/08/06/technology/china-gen- eration-blocked-internet.htmlZuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology, 30(1), 75-89. doi:10.1057/jit.2015.5Zuboff, S. (2019). The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power. PublicAffairs. 描述 碩士
國立政治大學
亞太研究英語碩士學位學程(IMAS)
107926023資料來源 http://thesis.lib.nccu.edu.tw/record/#G0107926023 資料類型 thesis dc.contributor.advisor 魏玫娟 zh_TW dc.contributor.advisor Wei, Michelle en_US dc.contributor.author (Authors) 徐恩碩 zh_TW dc.contributor.author (Authors) Shiflet, Michael en_US dc.creator (作者) 徐恩碩 zh_TW dc.creator (作者) Shiflet, Michael en_US dc.date (日期) 2022 en_US dc.date.accessioned 1-Aug-2022 18:46:30 (UTC+8) - dc.date.available 1-Aug-2022 18:46:30 (UTC+8) - dc.date.issued (上傳時間) 1-Aug-2022 18:46:30 (UTC+8) - dc.identifier (Other Identifiers) G0107926023 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/141334 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 亞太研究英語碩士學位學程(IMAS) zh_TW dc.description (描述) 107926023 zh_TW dc.description.abstract (摘要) 相較於以往,科技與社會環境的快速變遷對全球各國公民產生日益漸增的影響,特別值得關注與探究的是這些環境改變對自由社會與自由民主實踐之影響,而中國所實行的社會信用制度與「自由世界」中出現的監控資本主義,是其中兩個影響至鉅的環境變化。本論文採取次級資料分析方法,針對「中國社會信用制度」與「監控資本主義」對自由世界之自由民主實踐所具有之潛在風險進行比較,聚焦於探討在監控資本主義已經對自由世界的個人權利產生影響之後,中國社會信用制度是否進一步影響西方資本主義國家的自由民主實踐。本文藉由探討中國社會信用制度與監控資本主義環境之本質與脈絡,檢視前述兩種制度及其環境影響下所出現的全球範圍之「侵犯隱私正常化」之後發現,相較於為商業利益而出現並普遍存在的監控資本主義在侵犯個人隱私上的影響,中國社會信用制度的影響相對有限。本文認為,儘管中國社會信用制度無疑是對中國公民個人權利之威脅,但該制度的「獨特性」特別是制度落實上所需的配套環境,高度限制其輸出至他國進而影響西方資本主義國家自由民主實踐與各項公民權利的可能性。 zh_TW dc.description.abstract (摘要) More than ever, the combination of technological and societal shifts plays an increas- ingly important role in affecting citizens around the world. The influence of these environ- ments should be considered on free societies and the practices of liberal democracy. Two such environments of concern are the much-hyped Social Credit System (SCS) in China and sur- veillance capitalism which has emerged more discreetly from the free world. This thesis uses a comparative analysis of secondary data to look at the potential risk toward the democratic practices the SCS uniquely poses to the free world after the threats of surveillance capitalism have first been considered. After exploring the nature and context of both environments, it moves to uncover how both have contributed to the global normalization of privacy intrusion worldwide and build off one another in ways that compound related threats. Overall, the SCS’s unique threats to practices in the free world are perhaps more limited than expected once considered alongside the threats from surveillance capitalism. Comparative analysis finds the exportability of the SCS beyond Chinese borders extremely unlikely while also un- covering some unique but limited threats beyond privacy that affect freedom of expression and various other practices of free world citizens. en_US dc.description.tableofcontents Chapter 1:Introduction - p.5Chapter 2:Literature Review - p.19Chapter 3:The Environment of The Social Credit System - p.32Chapter 4:The Environment of Surveillance Capitalism - p.55Chapter 5:Comparative and Collaborative Threats - p.80Chapter 6:Conclusion - p.103Works Cited - p.109 zh_TW dc.format.extent 1844737 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0107926023 en_US dc.subject (關鍵詞) 社會信用制度 zh_TW dc.subject (關鍵詞) 監控資本主義 zh_TW dc.subject (關鍵詞) 中國 zh_TW dc.subject (關鍵詞) 網際網路 zh_TW dc.subject (關鍵詞) 自由民主價值 zh_TW dc.subject (關鍵詞) Social credit system en_US dc.subject (關鍵詞) Surveillance capitalism en_US dc.subject (關鍵詞) China en_US dc.subject (關鍵詞) Internet en_US dc.subject (關鍵詞) Liberal democratic practices en_US dc.title (題名) 比較分析中國社會信用體系與監控資本主義對自由世界實踐之威脅 zh_TW dc.title (題名) China’s Social Credit System and Surveillance Capitalism: Comparing Their Threats toward the Practices of the Free World en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) Adee, S. (2019, May 15). The Global Internet Is Disintegrating. What Comes Next? Retrieved from https://www.bbc.com/future/article/20190514-the-global-internet-is-disintegrating-what-comes-nextAho B., & Duffield R. (2020). Beyond Surveillance Capitalism: Privacy, regulation and big data in Europe and China. Economy and Society, 49:2, 187-212, DOI: 10.1080/03085147.2019.1690275Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives. doi:10.3386/w23089Auerbach, D. (2015, August 03). Windows 10 Shamelessly Wants Your Data. Here`s How to Protect Yourself. Retrieved November 17, 2020, from https://slate.com/technology/ 2015/08/windows-10-privacy-problems-heres-how-bad-they-are-and-how-to-plug- them.htmlBhargava, V. R., & Velasquez, M. (2021). Ethics of the attention economy: The problem of social media addiction. Business Ethics Quarterly, 31(3), 321-359.Behsudi, A. (2019). Senators Want Trump Probe of China`s New Corporate Social Credit System. Retrieved from https://www.politico.com/news/2019/12/02/senators-want-trump- probe-of-chinas-new-corporate-social-credit-system-074810Berg, B. L., & Lune, H. (2016). Qualitative Research Methods for the Social Sciences. Pear- son.Blum, S. (2018, October 11). Boston Dynamics` Atlas Can Now Chase You Up Some Stairs. Retrieved from https://www.popularmechanics.com/technology/robots/a23725726/ boston-dynamics-atlas-parkour/Business of Apps. (2021, May). Pokémon go revenue and usage Statistics. Retrieved September 06, 2021, from https://www.businessofapps.com/data/pokemon-go-statistics/Couldry, N. (2017). Surveillance-Democracy. Journal of Information Technology & Politics, 14(2), 182-188. doi:10.1080/19331681.2017.1309310Coy, P. (2006). The Secret To Google`s Success. Retrieved July 31, 2020, from https:// www.bloomberg.com/news/articles/2006-03-05/the-secret-to-googles-successChace, C. (2019, September). Surveillance Capitalism And Anti-Capitalism. Retrieved July 28, 2020, from https://www.forbes.com/sites/cognitiveworld/2019/09/17/surveillance- capitalism-and-anti-capitalism/#416a371b2984Chen, S., & Kang, S. (2018). A Tutorial on 5G and the Progress in China. Frontiers of Information Technology & Electronic Engineering, 19(3), 309-321. DOI:10.1631/fitee. 1800070Chen, Y., & Yang, D. (2017, November). The Impact of Media Censorship: Evidence from a field experiment in China. Retrieved February 19, 2020, from https://www.gsb.stan- ford.edu/sites/gsb/files/jmp_david-yang_0.pdfCreemers, R. (2015). China`s plans to use ratings to keep eye on citizens. CNN. Retrieved 2021, from https://www.cnn.com/2015/10/27/opinions/china-social-credit-score- creemers/index.html.Deb, S., & Stein, M. (2022). Daryl Morey Steps Down as G.M. of the Houston Rockets. New York Times. Retrieved February 2022, from https://www.nytimes.com/2020/10/15/ sports/basketball/nba-daryl-morey-rockets- china.html#:~:text=Morey`s%20tweet%20expressing%20support%20for,N.B.A.%20and%20the%20Chinese%20government.&text=Daryl%20Morey%2C%20the%20general%20manager,1%2C%20he%20announced%20Thursday.Drinhausen, K., & Brussee, V. (2021). China’s Social Credit System in 2021.Edelman, B. (2015). Does Google Leverage Market Power through Tying and Bundling? Journal of Competition Law and Economics, 11(2), 365–400. https://doi.org/10.1093/ joclec/nhv016Fair, L. (2018, July 19). What Vizio was doing behind the TV screen. Federal Trade Commis- sion. Retrieved January 10, 2020, from https://www.ftc.gov/news-events/blogs/busi- ness-blog/2017/02/what-vizio-was-doing-behind-tv-screenFederal Trade Commission. (2019, February 28). Facebook Settles FTC Charges That It De- ceived Consumers By Failing To Keep Privacy Promises. Retrieved October 22, 2020, from https://www.ftc.gov/news-events/press-releases/2011/11/facebook-settles-ftc- charges-it-deceived-consumers-failing-keepFleischer, P. (2007, September 24). Street View and Privacy. Googleblog. https://maps.- googleblog.com/2007/09/street-view-and-privacy.htmlFreedom House. (2021) Countries and Territories: Global freedom scores. Retrieved Sep- tember 22, 2021, from https://freedomhouse.org/countries/freedom-world/scores? sort=desc&order=Total+Score+and+StatusGan, N. (2019, February 19). The complex reality of China’s social credit system: hi-tech dystopian plot or low-key incentive scheme? South China Morning Post. Retrieved May 12, 2020, from https://www.scmp.com/news/china/politics/article/2185303/hi- tech-dystopia-or-low-key-incentive-scheme-complex-realityGurley, B. (2011, March 25). The Freight Train That Is Android. Retrieved September 24, 2020, from https://abovethecrowd.com/2011/03/24/freight-train-that-is-android/Harwit, E. (2019). WeChat and the growth of China`s indigenous internet.Helbing, D., Frey, & Gigerenzer. (2019). Will Democracy Survive Big Data and Artificial In- telligence? In Towards digital enlightenment: Essays on the dark and light sides of the digital revolution (pp. 73-98). Springer.Hintz, A., & Milan, S. (2017). Through a Glass, Darkly: Everyday Acts of Authoritarianism in the Liberal West. International Journal of Communication.Hoffman, S. (2017). Managing the State: Social Credit, Surveillance and the CCP`s Plan for China. Retrieved from https://globalgeopolitics.net/2017/09/07/managing-the-state- social-credit-surveillance-and-the-ccps-plan-for-china/Hoffman, S. (2017). Programming China: The Communist Party’s autonomic approach to managing state security.Hunter, R., Zaman, & Liu. (2017). Global Top 100 Companies by Market Capitalisation. IPO Center, Price Waterhouse Coopers. Retrieved 2020, from https://www.pwc.de/de/kapi- talmarktorientierte-unternehmen/global-top-100-march-2017.pdfHutcheon, S. (2009, January 30). We`re not stalking you or helping terrorists, says Google Earth boss. Retrieved October 08, 2020, from https://www.smh.com.au/technology/ were-not-stalking-you-or-helping-terrorists-says-google-earth-boss-20090130- gdtbpy.htmlJasanoff, S., Markle, G., Peterson, J., & Pinch, T. (2001). Handbook of Science and Technolo- gy Studies. Sage.Jiang, M., & Fu, K. (2018). Chinese Social Media and Big Data: Big Data, Big Brother, Big Profit? Policy & Internet, 10(4), 372-392. doi:10.1002/poi3.187Jooste, Y. (2021). Surveillance capitalism as white world-making. Acta Academica, 53(1), 44- 67. https://dx.doi.org/10.18820/24150479/aa53i1.3Kaska, K., Beckvard, & Minarik. (2019). Huawei, 5G and China as a Security Threat. Re- trieved from https://www.ccdcoe.org/uploads/2019/03/CCDCOE- Huawei-2019-03-28-FINAL.pdfKessel, J., & Mozur, P. (Directors). (2016, August 09). How China is Changing Your Internet [Video file]. Retrieved February 05, 2020, from https://www.nytimes.com/video/tech- nology/100000004574648/china-internet-wechat.html?action=click>ype=vhs&ver- sion=vhs-heading&module=vhs®ion=title-area&cview=true&t=201King, Pan, J., & Roberts, M. E. (2013). How Censorship in China Allows Government Criti- cism but Silences Collective Expression. American Political Science Review, 107(2), 326-343. doi:10.1017/s0003055413000014King, G., Pan, J., & Roberts, M. E. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument. American Political Science Review, 111(3), 484-501. doi:10.1017/s0003055417000144Kobie, N. (2019, June 07). The complicated truth about China`s social credit system. Wired. Retrieved May 12, 2020, from https://www.wired.co.uk/article/china-social-credit- system-explainedKostka, G. (2019). China’s Social Credit Systems and Public Opinion: Explaining high levels of approval. New Media & Society, 21(7), 1565-1593. doi: 10.1177/1461444819826402Kshetri, N. (2016). Big Data’s Role in Expanding Access to Financial Services in China. In- ternational Journal of Information Management, 36(3), 297-308. doi:10.1016/j.ijin- fomgt.2015.11.014Landwehr, M., Borning, A., & Wulf, V. (2019). The High Cost of Free Services. Proceedings of the Fifth Workshop on Computing within Limits - LIMITS `19. doi: 10.1145/3338103.3338106Lanese, N., & Vidyasagar, A. (2021). What is CRISPR? Livescience.Com. https://www.live- science.com/58790-crispr-explained.htmlLee, K. (2018). AI Superpowers: China, Silicon Valley, and the New World Order. Houghton Mifflin Harcourt.Liang, F., Das, V., Kostyuk, N., & Hussain, M. (2018, August 02). Constructing a Data‐Dri- ven Society: China`s Social Credit System as a State Surveillance Infrastructure. Re-trieved from https://onlinelibrary.wiley.com/doi/full/10.1002/poi3.183? casa_token=_A4PbrhY_okAAAAA%3AbDd_GZ01MB1q-45qFgCXKSrR394e- SWNiGwXBDUZBEkpsi8_81aS7MY340Ae1fsK2-qN2cW_CoAeB_dAUfgLiu, C. (2019). Multiple Social Credit Systems in China. Economic Sociology: The European Electronic Newsletter 21 (1): 22–32. doi:10.2139/ssrn.3423057Liu, G. (2018, August 6). The Rapid Growth of the Chinese Internet - and Where It`s Headed. Lecture presented at TED. Retrieved from https://youtu.be/WBqnzn77MEELyons J., Lewis, Z. H., Mayrsohn, B. G., & Rowland, J. L. (2014). Behavior Change Tech- niques Implemented in ElectronicLifestyle Activity Monitors: A Systematic Content Analysis. Journal of Medical Internet Research, 16(8). doi:10.2196/jmir.3469Ma, A., & Gilbert, B. (2019, August). Facebook understood how dangerous the trump-linked data firm Cambridge Analytica could be much earlier than it previously said. here`s everything that`s happened up until now. Business Insider. Retrieved September 30, 2021, from https://www.businessinsider.com/cambridge-analytica-a-guide-to-the- trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3Mattis, P. (2021, April). Yes, the atrocities in Xinjiang constitute a genocide. Foreign Policy. Retrieved October 24, 2021, from https://foreignpolicy.com/2021/04/15/xinjiang- uyghurs-intentional-genocide-china/Matsakis, L. (2019, October 25). How the West Got China`s Social Credit System Wrong. Wired. Retrieved from https://www.wired.com/story/china-social-credit-score-system/Mackinnon, R. (2011). China`s "Networked Authoritarianism". Journal of Democracy, 22(2), 32-46. doi:10.1353/jod.2011.0033Meyer, J. (2015). The Turn-Verizon Zombie Cookie. Retrieved November 19, 2020, from http://webpolicy.org/2015/01/14/turn-verizon-zombie-cookie/Mozur, P. (2016, August 09). Chinese Tech Firms forced to Choose market: Home or every- where else. Retrieved February 11, 2020, from https://www.nytimes.com/2016/08/10/ technology/china-homegrown-internet-companies-rest-of-the-world.html? action=click&module=RelatedCoverage&pgtype=Article®ion=FooterNegro, G. (2017). The Internet in China: From infrastructure to a nascent civil society. Cham, Switzerland: Palgrave Macmillan.People`s Daily. (2017). Jack Ma Calls on Canadian Prime Minister to "Simplify Visas" to En- courage Young Chinese to Look at The World. Retrieved from http://travel.people.- com.cn/n1/2017/0927/c41570-29561675.htmlPettit, H. (2018, September 19). Real-life Black Mirror: China`s moves to introduce score- cards that ranks the behaviour of citizens. Daily Mail. Retrieved from https://www.- dailymail.co.uk/sciencetech/article-6183893/Real-life-Black-Mirror-Chinas-moves- introduce-scorecards-ranks-behaviour-citizens.htmlPRC State Council. (2014). Notice of the State Council on Printing and Distributing the Out- line of the Construction of the Social Credit System (2014-2020). Retrieved from http://www.gov.cn/zhengce/content/2014-06/27/content_8913.htmRadin, M. J. (2017). Boilerplate: The fine print, vanishing rights, and the rule of law. Prince- ton: Princeton University Press.Rechtschaffen, D. (2022). China’s Corporate Social Credit System Demands Political Obedi- ence from Companies. The Diplomat. Retrieved February 2022, from https:// thediplomat.com/2019/10/chinas-corporate-social-credit-system-demands-political- obedience-from-companies/.Rona-Tas, Akos. (2017). “The Off-Label Use of Consumer Credit Ratings.” Historical Social Research/ Historische Sozialforschung 42 (1).Roosendaal, A. (2010, December 01). Facebook Tracks and Traces Everyone: Like This! Re- trieved October 22, 2020, from https://papers.ssrn.com/sol3/papers.cfm? abstract_id=1717563\\Sabin, D. (2017, March). The secret history Of `Pokemon Go`, as told by Creator John Hanke. Inverse. Retrieved September 06, 2021, from https://www.inverse.com/article/28485- pokemon-go-secret-history-google-maps-ingress-john-hanke-updatesShen, H. (2018). Building a digital silk road? Situating the Internet in China`s belt and road initiative. International Journal of Communication, 12, 19.Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2020). 5G In the internet of things era: An overview on security and privacy challenges. Computer Networks, 179, 107345.Soars, B. (2009). "Driving sales through shoppers` sense of sound, sight, smell and touch", International Journal of Retail & Distribution Management, 37(3), 286-298. https://doi.org/10.1108/09590550910941535.Staden, C. (2018, March 30). China in the Era of `Xi Jinping Thought`: Five Key Trends for Africa. Retrieved December 26, 2019, from https://www.africaportal.org/publications/ china-era-xi-jinping-thought-five-key-trends-africa/Statista. (2020, April). The 100 largest companies in the world by market value in 2019.In Statista - The Statistics Portal. Retrieved from https://www.statista.com/statistics/ 263264/top-companies-in-the-world-by-market-value/Sterrett, D., Malato, D., Benz, J., Kantor, L., Tompson, T., Rosenstiel, T., ... & Loker, K. (2019). Who shared it?: Deciding what news to trust on social media. Digital Journal- ism, 7(6), 783-801.Taigman, Y., Yang, M., Ranzato, M. A., & Wolf, L. (2014). Deepface: Closing the gap to hu- man-level performance in face verification. Facebook Research. April 14, 2018.Universal Declaration of Human Rights. (1948). Retrieved from https://www.un.org/en/uni- versal-declaration-human-rights/Varian, H. (2014, March). Beyond Big Data. Business Economist, 49, 27-31. https://doi.org/ 10.1057/be.2014.1Wang, N. (2019). Data story of Tiktok.Web Foundation. (2018). The invisible curation of content: Facebook`s News Feed and our information diets. Retrieved from https://webfoundation.org/research/the-invisible- curation-of-content-facebooks-news-feed-and-our-information-diets/What is STS? (n.d.). Retrieved fromhttp://sts.hks.harvard.edu/about/whatissts.htmlWhitehead, K. (2019, August 27). Did China see its gene-edited babies scandal coming? Re- trieved from https://www.scmp.com/lifestyle/health/article/3024462/chinese-rogue- scientists-gene-edited-twin-babies-experiment-stillWollerton, M. (2014, December). Voice control comes to the forefront of the smart home. Re- trieved 2020, from https://www.cnet.com/news/voice-control-roundup/Wong, K. L., & Dobson, A. S. (2019). We’re just data: Exploring China’s Social Credit Sys- tem in relation to digital platform ratings cultures in westernised democracies. Global Media and China, 4(2), 220-232. doi:10.1177/2059436419856090Xia, L. (2019). China to further improve social credit system. Retrieved from http://www.xin- huanet.com/english/2019-03/02/c_137863354.htmXinhua Net. (2019). China boasts world`s largest social credit system: Official. Retrieved May 11, 2020, from http://www.xinhuanet.com/english/2019-06/14/c_138143745.htmXinhua. (2016). China ‘One Belt and One Road’ Credit Forum Held in Yinchuan. Retrieved from http://www.xinhuanet.com/politics/2016-09/30/c_129306830.htmYeung, E. (2019). China Internet Report 2019 (Rep.). Retrieved February, 2020, from South China Morning Post, Abacus website: https://www.scmp.com/china-internet-report#0Yuan, L. (2018, August 06). A Generation Grows Up in China Without Google, Facebook or Twitter. Retrieved from https://www.nytimes.com/2018/08/06/technology/china-gen- eration-blocked-internet.htmlZuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology, 30(1), 75-89. doi:10.1057/jit.2015.5Zuboff, S. (2019). The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power. PublicAffairs. zh_TW dc.identifier.doi (DOI) 10.6814/NCCU202200579 en_US