Skip to main content

2018 | OriginalPaper | Buchkapitel

5. Cyber Insecurity of Chinese Citizens

verfasst von : Greg Austin

Erschienen in: Cybersecurity in China

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The chapter restates the well known fact that China’s government demands a near absolute right to monitor online activity of its citizens. It is introduced by results of a 2017 report on citizen security in cyberspace by major cities in China. It is then organized around four themes: defenses against cyber crime; the cybersecurity confidence of the citizens; protection of political privacy, including in connection with advanced artificial intelligence; and other personal privacy, especially in the light of the emerging social credit system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
National Engineering Laboratory of Big Data Collaborative Security Technology, National Engineering Laboratory of Big Data Application Technology to Improve Governance, China Ceprei Laboratories, Key Laboratory of Big Data Strategy.
 
Literatur
Zurück zum Zitat Austin G (2014) Cyber policy in China. Polity, Cambridge Austin G (2014) Cyber policy in China. Polity, Cambridge
Zurück zum Zitat Backer LC (2017) Measurement, assessment and reward: the challenges of building institutionalized social credit and rating systems in China and in the West. In: Proceedings of the Chinese social credit system, Shanghai Jiaotong University, 23 Sept 2017. https://ssrn.com/abstract=3040624 Backer LC (2017) Measurement, assessment and reward: the challenges of building institutionalized social credit and rating systems in China and in the West. In: Proceedings of the Chinese social credit system, Shanghai Jiaotong University, 23 Sept 2017. https://​ssrn.​com/​abstract=​3040624
Zurück zum Zitat Broadhurst R, Liu J (2004) Introduction: crime, law and criminology in China. In: Aust NZ J Criminol 37(1_suppl):1–12CrossRef Broadhurst R, Liu J (2004) Introduction: crime, law and criminology in China. In: Aust NZ J Criminol 37(1_suppl):1–12CrossRef
Zurück zum Zitat Chen Y, Zahedi FM (2016) Individuals’ internet security perceptions and behaviors: polycontextual contrasts between the United States and China. MIS Q 40(1):205–225CrossRef Chen Y, Zahedi FM (2016) Individuals’ internet security perceptions and behaviors: polycontextual contrasts between the United States and China. MIS Q 40(1):205–225CrossRef
Zurück zum Zitat Clark C, Zhang L (2017) Grass-mud horse: Luhmannian systems theory and internet censorship in China. Kybernetes 36(5):768–801 Clark C, Zhang L (2017) Grass-mud horse: Luhmannian systems theory and internet censorship in China. Kybernetes 36(5):768–801
Zurück zum Zitat Hebenton B, Jou S (2018) Criminology in China. In: The handbook of the history and philosophy of criminology. (ed) Triplett RA. Wiley, 377–391CrossRef Hebenton B, Jou S (2018) Criminology in China. In: The handbook of the history and philosophy of criminology. (ed) Triplett RA. Wiley, 377–391CrossRef
Zurück zum Zitat Hui Z, Tan Q (2016) Cyberspace security in the era of data economy: global and Chinese contexts. In: Hui Z, Tan Q (eds) Annual report on development of cyberspace security in China. Social Sciences Academy Press. Blue Book, Beijing, 1–16 Hui Z, Tan Q (2016) Cyberspace security in the era of data economy: global and Chinese contexts. In: Hui Z, Tan Q (eds) Annual report on development of cyberspace security in China. Social Sciences Academy Press. Blue Book, Beijing, 1–16
Zurück zum Zitat Liu L, Li JCM (2017) Crime and justice research in China remains underdeveloped by Western standards. J Res Crime Delinquency 54(4):447–453CrossRef Liu L, Li JCM (2017) Crime and justice research in China remains underdeveloped by Western standards. J Res Crime Delinquency 54(4):447–453CrossRef
Zurück zum Zitat Xu J (2017) Legitimization Imperative: the production of crime statistics in Guangzhou, China. Br J Criminol 58(1):155–176CrossRef Xu J (2017) Legitimization Imperative: the production of crime statistics in Guangzhou, China. Br J Criminol 58(1):155–176CrossRef
Metadaten
Titel
Cyber Insecurity of Chinese Citizens
verfasst von
Greg Austin
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-68436-9_5

Premium Partner