Skip to main content
Top

2020 | OriginalPaper | Chapter

13. China’s Authoritarian Internet and Digital Orientalism

Author : Maximilian Mayer

Published in: Redesigning Organizations

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

China’s authoritarian digitalization poses a great challenge for data protection, privacy, the development of Industry 4.0 and the sovereignty of countries in other parts of the world. Seeking a deeper understanding of the Chinese Internet revolution is important in order to weigh the risks and benefits of new digital technologies and avoid the trap of moralization. The latter frames the Chinese case in terms of European techno-skepticism rather than gaining a comprehensive evaluation of digital realities. Taking a comparative perspective helps to situate China’s digitalization within general global digital trends. This approach indicates obstacles for Sino-German economic relations, especially with respect to the data economy, emerging AI and digitalized industrial production. A better-informed view that replaces digital orientalism also contributes to preventing Europe’s economy from falling further back in this crucial field.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Interviews and observations in Shanghai 2017 and 2018.
 
2
Results from author’s field work in Rongcheng.
 
Literature
go back to reference Autio, E., et al. (2018). Digital affordances, spatial affordances, and the genesis of entrepreneurial ecosystems. Strategic Entrepreneurship Journal, 12(1), 72–95.CrossRef Autio, E., et al. (2018). Digital affordances, spatial affordances, and the genesis of entrepreneurial ecosystems. Strategic Entrepreneurship Journal, 12(1), 72–95.CrossRef
go back to reference Chen, D. (2017). Local distrust and regime support: Sources and effects of political trust in China. Political Research Quarterly, 70(2), 314–326.CrossRef Chen, D. (2017). Local distrust and regime support: Sources and effects of political trust in China. Political Research Quarterly, 70(2), 314–326.CrossRef
go back to reference Creemers, R. (2017). Cyber China: Upgrading propaganda, public opinion work and social management for the twenty-first century. Journal of Contemporary China, 26(103), 85–100.CrossRef Creemers, R. (2017). Cyber China: Upgrading propaganda, public opinion work and social management for the twenty-first century. Journal of Contemporary China, 26(103), 85–100.CrossRef
go back to reference Dahlberg, L. (2011). Re-constructing digital democracy: An outline of four ‘positions’. New Media & Society, 13(6), 855–872.CrossRef Dahlberg, L. (2011). Re-constructing digital democracy: An outline of four ‘positions’. New Media & Society, 13(6), 855–872.CrossRef
go back to reference Danaher, J., et al. (2017). Algorithmic governance: Developing a research agenda through the power of collective intelligence. Big Data and Society, 4(2), 2053951717726554.CrossRef Danaher, J., et al. (2017). Algorithmic governance: Developing a research agenda through the power of collective intelligence. Big Data and Society, 4(2), 2053951717726554.CrossRef
go back to reference Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2010). Access controlled. Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2010). Access controlled.
go back to reference Deibert, R., & Rohozinski, R. (2010). Liberation versus control: The future of cyberspace. Journal of Democracy, 21, 43–57.CrossRef Deibert, R., & Rohozinski, R. (2010). Liberation versus control: The future of cyberspace. Journal of Democracy, 21, 43–57.CrossRef
go back to reference Dencik, L. (2018). Surveillance realism and the politics of imagination: Is there no alternative? Krisis: Journal for Contemporary Philosophy, 2018(1), 31–43. Dencik, L. (2018). Surveillance realism and the politics of imagination: Is there no alternative? Krisis: Journal for Contemporary Philosophy, 2018(1), 31–43.
go back to reference Leggett, W. (2014). The politics of behaviour change: Nudge, neoliberalism and the state. Policy & Politics, 42(1), 3–19.CrossRef Leggett, W. (2014). The politics of behaviour change: Nudge, neoliberalism and the state. Policy & Politics, 42(1), 3–19.CrossRef
go back to reference Liang, B., & Lu, H. (2010). Internet development, censorship, and cyber crimes in China. Journal of Contemporary Criminal Justice, 26(1), 103–120.CrossRef Liang, B., & Lu, H. (2010). Internet development, censorship, and cyber crimes in China. Journal of Contemporary Criminal Justice, 26(1), 103–120.CrossRef
go back to reference Mager, A. (2017). Search engine imaginary: Visions and values in the co-production of search technology and Europe. Social Studies of Science, 47(2), 240–262.CrossRef Mager, A. (2017). Search engine imaginary: Visions and values in the co-production of search technology and Europe. Social Studies of Science, 47(2), 240–262.CrossRef
go back to reference Meng, B. (2010). Moving beyond democratization: A thought piece on the China internet research agenda. International Journal of Communication, 4, 501–508. Meng, B. (2010). Moving beyond democratization: A thought piece on the China internet research agenda. International Journal of Communication, 4, 501–508.
go back to reference Michaelsen, M., & Glasius, M. (2018). Authoritarian practices in the digital age—Introduction. International Journal of Communication, 12, 3792. Michaelsen, M., & Glasius, M. (2018). Authoritarian practices in the digital age—Introduction. International Journal of Communication, 12, 3792.
go back to reference Palat, R. A. (2000). Beyond orientalism: Decolonizing Asian studies. Development and Society, 29(2), 105–135. Palat, R. A. (2000). Beyond orientalism: Decolonizing Asian studies. Development and Society, 29(2), 105–135.
go back to reference Qin, B., Strömberg, D., & Wu, Y. (2017). Why does China allow freer social media? Protests versus surveillance and propaganda. Journal of Economic Perspectives, 31(1), 117–140.CrossRef Qin, B., Strömberg, D., & Wu, Y. (2017). Why does China allow freer social media? Protests versus surveillance and propaganda. Journal of Economic Perspectives, 31(1), 117–140.CrossRef
go back to reference Repnikova, M., & Fang. K. (2018). Authoritarian participatory persuasion 2.0: Netizens as thought work collaborators in China. Journal of Contemporary China, 1–17. Repnikova, M., & Fang. K. (2018). Authoritarian participatory persuasion 2.0: Netizens as thought work collaborators in China. Journal of Contemporary China, 1–17.
go back to reference Shen, Y. (2016). Shehui zhili Chuangxin yu shehui xinyong tixi jianshe di. Hehai daxue xuebao, 18(3), 72–77. Shen, Y. (2016). Shehui zhili Chuangxin yu shehui xinyong tixi jianshe di. Hehai daxue xuebao, 18(3), 72–77.
go back to reference Stockmann, D., & Gallagher, M. E. (2011). Remote control: How the media sustain authoritarian rule in China. Comparative Political Studies, 44(4), 436–467.CrossRef Stockmann, D., & Gallagher, M. E. (2011). Remote control: How the media sustain authoritarian rule in China. Comparative Political Studies, 44(4), 436–467.CrossRef
go back to reference Yang, Z., et al. (2018). Switching to green lifestyles: Behavior change of ant forest users. International Journal of Environmental Research and Public Health, 15(9), 1819.CrossRef Yang, Z., et al. (2018). Switching to green lifestyles: Behavior change of ant forest users. International Journal of Environmental Research and Public Health, 15(9), 1819.CrossRef
go back to reference Yeung, K. (2017). ‘Hypernudge’: Big data as a mode of regulation by design. Information, Communication & Society 20(1), 118–136.CrossRef Yeung, K. (2017). ‘Hypernudge’: Big data as a mode of regulation by design. Information, Communication & Society 20(1), 118–136.CrossRef
go back to reference Zhao, D., & Hu, W. (2017). Determinants of public trust in government: Empirical evidence from urban China. International Review of Administrative Sciences, 83(2), 358–377.CrossRef Zhao, D., & Hu, W. (2017). Determinants of public trust in government: Empirical evidence from urban China. International Review of Administrative Sciences, 83(2), 358–377.CrossRef
go back to reference Zilgalvis, P. (2014). The need for an innovation principle in regulatory impact assessment: The case of finance and innovation in Europe. Policy & Internet, 6(4), 377–392.CrossRef Zilgalvis, P. (2014). The need for an innovation principle in regulatory impact assessment: The case of finance and innovation in Europe. Policy & Internet, 6(4), 377–392.CrossRef
go back to reference Amoore, L. (2013). The politics of possibility: Risk and security beyond probability. Durham, London: Duke University Press. Amoore, L. (2013). The politics of possibility: Risk and security beyond probability. Durham, London: Duke University Press.
go back to reference Beise, M., & Schäfer, U. (2016). Deutschland digital: Unsere Antwort auf das Silicon Valley. Frankfurt a.M.: Campus. Beise, M., & Schäfer, U. (2016). Deutschland digital: Unsere Antwort auf das Silicon Valley. Frankfurt a.M.: Campus.
go back to reference Borchardt, A. (2015). Das Internet zwischen Diktatur und Anarchie: zehn Thesen zur Demokratisierung der digitalen Welt. Süddeutsche Zeitung: Edition Streitschrift; Frank Schirrmacher, Technologischer Totalitarismus: Eine Debatte (edition suhrkamp). Borchardt, A. (2015). Das Internet zwischen Diktatur und Anarchie: zehn Thesen zur Demokratisierung der digitalen Welt. Süddeutsche Zeitung: Edition Streitschrift; Frank Schirrmacher, Technologischer Totalitarismus: Eine Debatte (edition suhrkamp).
go back to reference Castells, M. (1997). Power of identity: The information age: Economy, society, and culture. Cambridge, MA: Blackwell Publishers, Inc. Castells, M. (1997). Power of identity: The information age: Economy, society, and culture. Cambridge, MA: Blackwell Publishers, Inc.
go back to reference Conole, G., & Dyke, M. (2004). What are the affordances of information and communication technologies, 113–124. Conole, G., & Dyke, M. (2004). What are the affordances of information and communication technologies, 113–124.
go back to reference Delisle, J., Avery Goldstein, A., & Yang, G. (Eds.). (2016). The internet, social media, and a changing China. Philadelphia: University of Pennsylvania Press. Delisle, J., Avery Goldstein, A., & Yang, G. (Eds.). (2016). The internet, social media, and a changing China. Philadelphia: University of Pennsylvania Press.
go back to reference Han, B.-C. (2013). Im Schwarm. Ansichten des Digitalen. Berlin: Matthes & Seitz Verlag. Han, B.-C. (2013). Im Schwarm. Ansichten des Digitalen. Berlin: Matthes & Seitz Verlag.
go back to reference Jasanoff, S. (2011). Designs on nature: Science and democracy in Europe and the United States. Princeton: Princeton University Press. Jasanoff, S. (2011). Designs on nature: Science and democracy in Europe and the United States. Princeton: Princeton University Press.
go back to reference Keese, C. (2016). Silicon Germany: Wie wir die digitale Transformation schaffen. München: Albrecht Knaus Verlag. Keese, C. (2016). Silicon Germany: Wie wir die digitale Transformation schaffen. München: Albrecht Knaus Verlag.
go back to reference Lehr, P. (2019). Counter-terrorism technologies a critical assessment. Switzerland: Cham.CrossRef Lehr, P. (2019). Counter-terrorism technologies a critical assessment. Switzerland: Cham.CrossRef
go back to reference Lynch, M. P. (2016). The Internet of us: Knowing more and understanding less in the age of big data. New York: Liveright. Lynch, M. P. (2016). The Internet of us: Knowing more and understanding less in the age of big data. New York: Liveright.
go back to reference Morozov, E. (2011). The net delusion: How not to liberate the world. Penguin UK. Morozov, E. (2011). The net delusion: How not to liberate the world. Penguin UK.
go back to reference Negro, G. (2017). The Internet in China: From infrastructure to a nascent civil society. Cham: Springer. Negro, G. (2017). The Internet in China: From infrastructure to a nascent civil society. Cham: Springer.
go back to reference Wang, D., & Mark, G. (2015). Internet censorship in China: Examining user awareness and attitudes. ACM Transactions on Computer-Human Interaction (TOCHI), 22(6), 31. Wang, D., & Mark, G. (2015). Internet censorship in China: Examining user awareness and attitudes. ACM Transactions on Computer-Human Interaction (TOCHI), 22(6), 31.
go back to reference Welzer, H. (2015). Die smarte Diktatur. Der Angriff auf unsere Freiheit. S. Fischer, Frankfurt a. M. Welzer, H. (2015). Die smarte Diktatur. Der Angriff auf unsere Freiheit. S. Fischer, Frankfurt a. M.
go back to reference Yang, G. (2009). The power of the Internet in China: Citizen activism online. New York: Columbia University Press. Yang, G. (2009). The power of the Internet in China: Citizen activism online. New York: Columbia University Press.
go back to reference CBInsights. (2018). Research briefs, Feb. 27, 2018, The Race for AI: Google, Apple In a rush to grab artificial intelligence startups. CBInsights. (2018). Research briefs, Feb. 27, 2018, The Race for AI: Google, Apple In a rush to grab artificial intelligence startups.
go back to reference Vincenti, D. (2018). Return of the JEDI, European disruptive technology initiative ready to launch, 14. März 2018, EURACTIV. Vincenti, D. (2018). Return of the JEDI, European disruptive technology initiative ready to launch, 14. März 2018, EURACTIV.
go back to reference Wang, S. (2017). Zhima kaimen nide Xinyong you jifen? Shanghai Xinzi hua, 7(3), 76–78. (in Chinese). Wang, S. (2017). Zhima kaimen nide Xinyong you jifen? Shanghai Xinzi hua, 7(3), 76–78. (in Chinese).
go back to reference Creehan, S., & Borst, N. (2017). Asia’s Fintech Revolution, 2017, Asia Program, Federal Reserve Bank of San Francisco. Creehan, S., & Borst, N. (2017). Asia’s Fintech Revolution, 2017, Asia Program, Federal Reserve Bank of San Francisco.
go back to reference Evans, P. C., & Gawer, A. (2016). The rise of the platform enterprise: a global survey. The emerging platform economy series No. 1 (The center for global enterprise). Evans, P. C., & Gawer, A. (2016). The rise of the platform enterprise: a global survey. The emerging platform economy series No. 1 (The center for global enterprise).
go back to reference Knockel, J., et al. (2015). Every rose has its thorn: Censorship and surveillance on social video platforms in china. 5th USENIX workshop on free and open communications on the internet (FOCI 15). Knockel, J., et al. (2015). Every rose has its thorn: Censorship and surveillance on social video platforms in china. 5th USENIX workshop on free and open communications on the internet (FOCI 15).
go back to reference Meissner, M., & Wübekke, J. (2016). IT—Backed authoritarianism: Information technology enhances central authority and control capacity under Xi Jinping”. In H. Sebastian & S. Matthias (Eds.), China’s core executive, leadership styles, structures and processes under Xi Jinping. Mercator Institute for China Studies, 52. Meissner, M., & Wübekke, J. (2016). IT—Backed authoritarianism: Information technology enhances central authority and control capacity under Xi Jinping”. In H. Sebastian & S. Matthias (Eds.), China’s core executive, leadership styles, structures and processes under Xi Jinping. Mercator Institute for China Studies, 52.
go back to reference Meissner, M. (2017). China’s social credit system a big-data enabled approach to market regulation with broad implications for doing business in China,” Merics China Monitor, May 24, 2017. Meissner, M. (2017). China’s social credit system a big-data enabled approach to market regulation with broad implications for doing business in China,” Merics China Monitor, May 24, 2017.
go back to reference Richter, C., & Gebauer, S. (2010). Die China-Berichterstattung in deutschen Medien. Anhang-Band zur Studie (p. 48). Berlin: Heinrich Böll Stiftung. Richter, C., & Gebauer, S. (2010). Die China-Berichterstattung in deutschen Medien. Anhang-Band zur Studie (p. 48). Berlin: Heinrich Böll Stiftung.
Metadata
Title
China’s Authoritarian Internet and Digital Orientalism
Author
Maximilian Mayer
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-27957-8_13

Premium Partners