What We Can Learn About China from Research Into Sina Weibo

Total Page:16

File Type:pdf, Size:1020Kb

What We Can Learn About China from Research Into Sina Weibo CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO by Jason Q. Ng English Literature, A.B., Brown University, 2006 Submitted to the Graduate Faculty of the Dietrich School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts of East Asian Studies University of Pittsburgh 2013 fcomfort UNIVERSITY OF PITTSBURGH THE DIETRICH SCHOOL OF ARTS AND SCIENCES This thesis was presented by Jason Q. Ng It was defended on April 9, 2013 and approved by Pierre F. Landry, Associate Professor, Political Science Ronald J. Zboray, Professor, Communication Mary Saracino Zboray, Visiting Scholar, Communication Thesis Director: Katherine Carlitz, Assistant Director, Asian Studies Center ii Copyright © by Jason Q. Ng 2013 iii CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO Jason Q. Ng, M.A. University of Pittsburgh, 2013 Like all nations, China has been profoundly affected by the emergence of the Internet, particularly new forms of social media—that is, media that relies less on mainstream sources to broadcast news and instead relies directly on individuals themselves to share information. I use mixed methods to examine how three different but intertwined groups—companies, the government, and Chinese Internet users themselves (so-called “netizens”)—have confronted social media in China. In chapter one, I outline how and why China’s most important social media company, Sina Weibo, censors its website. In addition, I describe my research into blocked search terms on Sina Weibo, and explain why particular keywords are sensitive. In chapter two, I take a quantitative approach informed by political science methodology to examine how the names of Chinese politicians were handled by Sina Weibo during a major political event: the 18th National Congress of the Chinese Communist Party in November 2012. In response to research by Gary King which finds that online criticism of the government in China is allowed so long as it does not involve topics related to collective action, my study concludes that Sina Weibo actively filtered the search results of Communist Party delegates, particularly higher-ranked politicians and incumbents, during the observation period, often regardless of whether or not the individuals were controversial figures or linked to issues of collective action. In chapter three, I focus specifically on the end user, the microbloggers of Sina Weibo. Relying on communications and media studies research as well as content analysis, I iv report on the contentious comments netizens made in response to a post by the Japanese celebrity and porn star Sora Aoi—specifically ethnic slurs and nationalist rhetoric—during the Diaoyu Islands dispute between China and Japan in September 2012. These three components will allow readers to understand the power of social media in China—both contained within users and employed by authorities. v TABLE OF CONTENTS PREFACE .................................................................................................................................... XI 1.0 INTRODUCTION ........................................................................................................ 1 2.0 CHAPTER ONE—BLOCKED ON WEIBO: HOW AND WHY SINA CONTROLS THE SPREAD OF SENSITIVE TOPICS ........................................................... 7 2.1 SINA WEIBO: A RICH SOURCE OF INFORMATION ............................. 10 2.2 HOW WEIBO CENSORS ................................................................................ 14 2.3 WHY WEIBO IS CENSORED ........................................................................ 18 3.0 CHAPTER TWO—HOW SOCIAL MEDIA HANDLED THE 18TH NATIONAL CONGRESS OF THE CHINESE COMMUNIST PARTY: AN ANALYSIS OF INTERNET CENSORSHIP ON SINA WEIBO BEFORE AND AFTER THE 2012 ELECTION ................................................................................................................................. 24 3.1 BACKGROUND ................................................................................................ 25 3.2 COMMUNIST PARTY HIERARCHY ........................................................... 26 3.3 PATHWAYS TO POWER ............................................................................... 29 3.4 EXPERIMENT DESIGN AND DATA COLLECTION ................................ 30 3.5 SUMMARY STATISTICS ............................................................................... 33 3.6 IMPORTANCE OF TIME ............................................................................... 35 3.7 IMPORTANCE OF RANK .............................................................................. 39 vi 3.8 IMPORTANCE OF MINORITY STATUS AND GENDER ........................ 42 3.9 CONCLUSION .................................................................................................. 43 4.0 CHAPTER THREE—SLOGANS AND SLURS, SEXISM AND NATIONALISM: A CASE STUDY OF ANTI-JAPANESE SENTIMENT BY CHINESE NETIZENS IN A CONTENTIOUS SOCIAL MEDIA CONVERSATION .......................... 46 4.1 A SEMI-PUBLIC DISCUSSION SPACE: CENSORSHIP AND ANTI- JAPANESE SENTIMENT IN THE COMMENTS SECTION...................................... 48 4.2 SORA AOI AND THE TWO INITIAL POSTS ............................................. 53 4.3 TYPOLOGIES OF RESPONSES .................................................................... 55 4.4 SLURS ................................................................................................................ 59 4.5 CONCLUSION .................................................................................................. 63 5.0 CONCLUSION—MAKING SENSE OF BIG DATA ............................................ 65 APPENDIX A .............................................................................................................................. 70 APPENDIX B .............................................................................................................................. 80 APPENDIX C .............................................................................................................................. 93 APPENDIX D .............................................................................................................................. 97 BIBLIOGRAPHY ..................................................................................................................... 102 vii LIST OF TABLES Table 1. Number of delegates holding specified rank within Communist Party before and after 18th National Congress ................................................................................................................. 29 Table 2. Logistic regression table of whether or not a name is blocked on individual characteristics by phase................................................................................................................. 89 Table 3. Multivariable logistic regression table of what blck status a name will be on individual characteristics by phase................................................................................................................. 90 Table 4. Logistic regression table of whether or not a name exhibited signs of having search results being manipulated on individual characteristics by phase ................................................ 92 Table 5. Number of comments in corpus containing certain phrases ........................................... 94 Table 6. Correlation matrix between different phrases and slurs with repeated texts by same user removed (N in parentheses) .......................................................................................................... 96 viii LIST OF FIGURES Figure 1. Search result activity coming from Xinjiang Province as reported by Google Trends from Dec 2008 to October 2010 ..................................................................................................... 7 Figure 2. Screenshot of message returned by Sina Weibo when searching for blocked keyword like 温家宝 (Wen Jiabao) ............................................................................................................. 11 Figure 3. Search status of 宪法法院 on Sina Weibo as reported by GreatFire.org ...................... 74 Figure 4. Hierarchy of Chinese Communist Party (Sheng 2005) ................................................. 80 Figure 5. Number of times each name was blocked during the observation period ..................... 81 Figure 6. Number of individuals blocked over time (gray = no observations recorded; red = start and end of National Congress) ...................................................................................................... 81 Figure 7. Number of names explicitly blocked ............................................................................. 82 Figure 8. Number of names reporting “no results” returned ........................................................ 82 Figure 9. Number of names partially blocked over time .............................................................. 83 Figure 10. 11 of the 14 retiring Politburo members blocked at least once during observation period ............................................................................................................................................ 83 Figure 11. 10 of the 15 incoming Politburo members blocked at least once during observation period ...........................................................................................................................................
Recommended publications
  • Reporters Without Borders TV5 Monde Prize 2015 Nominees
    Reporters Without Borders ­ TV5 Monde Prize 2015 Nominees Journalist Category Mahmoud Abou Zeid, aka Shawkan (Egypt) “I am a photojournalist, not a criminal,” Shawkan wrote from Tora prison in February. “My ​ ​ ​ indefinite detention is psychologically unbearable. Not even animals would survive in these conditions." ​ Shawkan is an Egyptian freelance photojournalist who has been in pre­trial detention for more than 760 days. He was arrested on 14 August 2013 while providing the US photojournalism agency Demotix and the US digital media company Corbis with coverage of ​ ​ ​ ​ the violence used to disperse demonstrations by deposed President Mohamed Morsi’s supporters in Rabiaa Al­Awadiya Square. Three journalists were killed that day in connection with their work Aged 28, Shawkan covered developments in Egypt closely from Mubarak’s fall to Morsi’s overthrow and on several occasions obtained striking shots of the popular unrest. His detention became illegal in August of this year because, under Egyptian law, pre­trial detention may surpass two years only in exceptional cases. Few people in Egypt have ever been held pending trial as long as him. A date has finally been set for the start of his trial, 12 December 2015, when he will be prosecuted before a Cairo criminal court along with more than 700 other defendants including members of the Muslim Brotherhood, which was declared a terrorist organization in December 2013. Many charges have been brought against him without any evidence, according to his lawyer, Karim Abdelrady. The most serious include joining a banned organization [the Muslim Brotherhood], murder, attacking the security forces and possession of weapons.
    [Show full text]
  • Assessing the Training and Operational Proficiency of China's
    C O R P O R A T I O N Assessing the Training and Operational Proficiency of China’s Aerospace Forces Selections from the Inaugural Conference of the China Aerospace Studies Institute (CASI) Edmund J. Burke, Astrid Stuth Cevallos, Mark R. Cozad, Timothy R. Heath For more information on this publication, visit www.rand.org/t/CF340 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9549-7 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface On June 22, 2015, the China Aerospace Studies Institute (CASI), in conjunction with Headquarters, Air Force, held a day-long conference in Arlington, Virginia, titled “Assessing Chinese Aerospace Training and Operational Competence.” The purpose of the conference was to share the results of nine months of research and analysis by RAND researchers and to expose their work to critical review by experts and operators knowledgeable about U.S.
    [Show full text]
  • Xi Jinping's War on Corruption
    University of Mississippi eGrove Honors College (Sally McDonnell Barksdale Honors Theses Honors College) 2015 The Chinese Inquisition: Xi Jinping's War on Corruption Harriet E. Fisher University of Mississippi. Sally McDonnell Barksdale Honors College Follow this and additional works at: https://egrove.olemiss.edu/hon_thesis Part of the Political Science Commons Recommended Citation Fisher, Harriet E., "The Chinese Inquisition: Xi Jinping's War on Corruption" (2015). Honors Theses. 375. https://egrove.olemiss.edu/hon_thesis/375 This Undergraduate Thesis is brought to you for free and open access by the Honors College (Sally McDonnell Barksdale Honors College) at eGrove. It has been accepted for inclusion in Honors Theses by an authorized administrator of eGrove. For more information, please contact [email protected]. The Chinese Inquisition: Xi Jinping’s War on Corruption By Harriet E. Fisher A thesis presented in partial fulfillment of the requirements for completion Of the Bachelor of Arts degree in International Studies at the Croft Institute for International Studies and the Sally McDonnell Barksdale Honors College The University of Mississippi University, Mississippi May 2015 Approved by: ______________________________ Advisor: Dr. Gang Guo ______________________________ Reader: Dr. Kees Gispen ______________________________ Reader: Dr. Peter K. Frost i © 2015 Harriet E. Fisher ALL RIGHTS RESERVED ii For Mom and Pop, who taught me to learn, and Helen, who taught me to teach. iii Acknowledgements I am indebted to a great many people for the completion of this thesis. First, I would like to thank my advisor, Dr. Gang Guo, for all his guidance during the thesis- writing process. His expertise in China and its endemic political corruption were invaluable, and without him, I would not have had a topic, much less been able to complete a thesis.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • Fantamag.Com & Storemags.Com
    A plan for Haiti Massachusetts stuns Obama New rules for banks Dark days for lawyers and consultants JANUARY 23RD–29TH 2010 Economist.com The psychology of power Stop! The backlash against big government www.storemags.com & www.fantamag.com Njetj{fcvtjofttftbsfuif fohjoftpgbtnbsufsqmbofu/ Xfbsfmjwjohpobwfszejggfsfouqmbofugspnuifpofxf JCNboepvsCvtjofttQbsuofstbsfxpsljohxjui mjwfepofwfobgfxzfbstbhp/Upebz-bmnptubozuijohjo uipvtboetpgnjetj{fdpnqbojftbspvoeuifxpsme uifxpsmedbocfjotusvnfoufe-joufsdpoofdufeboenbef upcvjmebtnbsufsqmbofu/XfÖsfqspwjejohuifjotjhiut joufmmjhfouÒuiftztufnt-qspdfttftboeefwjdftuibu boeuppmtuifzoffeupxpslnpsfqspevdujwfmzboe fobcmfqiztjdbmhppetupcfefwfmpqfe-nbovgbduvsfe- qspßubcmzÒqpxfsgvm-bggpsebcmftpmvujpotuibudbo cpvhiuboetpme<tfswjdftupcfefmjwfsfe<boecjmmjpot ifmqdpnqbojftjnqspwffgßdjfodz-epnpsfxjuimftt- pgqfpqmfupcpuixpslboemjwf/Jotipsu-pvsqmbofujt bddfmfsbufSPJboetfj{fofxpqqpsuvojujftgbtufs/ cfdpnjohtnbsufs/ XfÖsfbqqmzjohpvsdpmmfdujwfefquiboecsfbeuipg fyqfsjfodfxpsljohxjuijoopwbupstpgbmmtj{ft-bdsptt Uijtjtqpttjcmf-jombshfqbsu-cfdbvtfuifjoopwbujpo fwfszjoevtusz-upbeesfttkvtubcpvuboztj{fqspcmfn- esjwjohbtnbsufsqmbofujtpsjhjobujohboeqspmjgfsbujoh ubtlpsxpslmpbe/ gspnnpsfwbsjfetpvsdftuibofwfscfgpsf/Jogbdu-xifo zpvmpplbubmmuifofxpqqpsuvojujftfnfshjoh-zpvnjhiu Btpvsqmbofucfdpnfttnbsufs-njetj{fcvtjofttft uijoluibuuifzpomzbqqmzupmbshfsfoufsqsjtft/Cvu xjmmxjfmenpsfpguifjoàvfodfuibupodfcfmpohfeup josfbmjuz-njetj{fdpnqbojftibwfcffouiffohjoft pomzuifmbshftufoufsqsjtftÒ boeJCNboepvsCvtjoftt esjwjohfdpopnjdhspxuiboebtnbsufsqmbofugpstpnf
    [Show full text]
  • Introduction This Statement Is Submitted to the U.S.-China
    USCC Hearing China’s Military Transition February 7, 2013 Roy Kamphausen Senior Advisor, The National Bureau of Asian Research Introduction This statement is submitted to the U.S.-China Economic and Security Review Commission to address issues related to the transition to the new top military leadership in China. The statement addresses the composition of the new Central Military Commission, important factors in the selection of the leaders, and highlights salient elements in the backgrounds of specific leaders. The statement also addresses important factors of civil-military relations, including the relationship of the People’s Liberation Army (PLA) to China’s top political leadership, potential reform of the military-region structure of the PLA, and the likely competition for budget resources. Composition of the China’s New Central Military Commission As expected, new Chinese Communist Party general secretary Xi Jinping was appointed in November 2012 as the Central Military Commission (CMC) chairman. Additionally, army general Fan Changlong and air force general Xu Qiliang were promoted to positions as vice chairmen of the CMC—Fan from Jinan Military Region commander and Xu from PLA Air Force commander. Other members of the new CMC include General Chang Wanquan, who will become the next Minister of National Defense when that position is confirmed in early spring 2013; General Fang Fenghui, chief of the General Staff Department (GSD), who previously had been Beijing Military Region commander since 2007; General Zhang Yang, director of
    [Show full text]
  • Shedding Light on Mobile App Store Censorship
    Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China.
    [Show full text]
  • Boys' Love, Byte-Sized
    School of Sociology and Social Policy Boys’ Love, Byte-sized: A Qualitative Exploration of Queer- themed Microfiction in Chinese Cyberspace Gareth Shaw B.A. (Hons), M.A. Thesis submitted to the University of Nottingham for the degree of Doctor of Philosophy January 2017 Acknowledgements I owe an enormous debt of gratitude to my supervisors, Dr Xiaoling Zhang, Professor Andrew Kam-Tuck Yip, and Dr Jeremy Taylor, for their constant support and faith in my research. This project would not have been possible without them. I also wish to convey my sincerest thanks to my examiners, Professor Sally Munt and Dr Sarah Dauncey, for their very insightful comments and suggestions, which have been invaluable to this project’s completion. I am grateful to the Economic and Social Research Council for funding this research (Award number: 1228555). I wish to express my heartfelt gratitude to everyone who has participated in this project, particularly to the interview respondents, who gave so freely of their time. I am especially thankful to Huang Guan, Zhai Shunyi and Wei Ye for assisting me with some of the (often quite esoteric) Chinese to English translations. To my family, friends and colleagues, I thank you for being a constant source of comfort and advice when the light at the end of the tunnel seemed to have vanished. Special thanks go to Laura and Céline, for their support and encouragement during the long writing hours. Finally, to Juan and Mani, whose love and support means the world to me, I am eternally grateful to have had you both by my side on this journey.
    [Show full text]
  • RISKS Volume 18
    The Risks Digest Volume 18: Issue 1 Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Volume 18: Issue 1 Friday 5 April 1996 Contents Sixth Computers, Freedom and Privacy Shabbir J. Safdar A Wiretap Incident in New Orleans Shabbir J. Safdar Computer Error Costs MCI $Millions Scott Lucero Teen Accused of Hacking David M Kennedy Only Americans can contact the AT&T operator Tom Gardner Re: Wrong approach to Java security Frank Stuart Re: Risks of rewritable BIOSes Jeremy J Epstein Re: "This is not a bug" messages: MacsBug David A. Lyons Re: The Queen's Speech Allan Engelhardt Re: Notes on e-mail: Use of diaeresis Dan Hicks http://catless.ncl.ac.uk/Risks/18.01.html (1 of 21)2005-04-14 18:22:01 The Risks Digest Volume 18: Issue 1 Daan Sandee On the meaning of "email" Clive Feather Browser return e-mail addresses Walter Roberson Info on RISKS (comp.risks) Sixth Computers, Freedom and Privacy Shabbir J. Safdar <[email protected]> Thu, 04 Apr 1996 16:05:34 -0500 I attended last week's Sixth Computers, Freedom, and Privacy conference in Cambridge MA, where policy-makers, technical experts, and activists came together to hash out the intersection of the three elements of its title. CFP is an unusual place; the closest thing our community can get to "neutral ground" on many issues. This is best expressed by the fact that in the hallways of the hotel, it's not unusual to see those that supported and those that fought the Communications Decency Act hob-nobbing it up, trading friendly swipes about their take on the bill.
    [Show full text]
  • Information to Users
    INFORMATION TO USERS This manuscript Pas been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissenation copies are in typewriter face, while others may be from anytype of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely. event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material bad to beremoved, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with smalloverlaps. Each original is also photographed in one exposure and is included in reduced form at the back ofthe book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A Bell &Howell Information Company 300North Zeeb Road. Ann Arbor. MI48106-1346 USA 313!761-47oo 800:521·0600 THE LIN BIAO INCIDENT: A STUDY OF EXTRA-INSTITUTIONAL FACTORS IN THE CULTURAL REVOLUTION A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAII IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN HISTORY AUGUST 1995 By Qiu Jin Dissertation Committee: Stephen Uhalley, Jr., Chairperson Harry Lamley Sharon Minichiello John Stephan Roger Ames UMI Number: 9604163 OMI Microform 9604163 Copyright 1995, by OMI Company.
    [Show full text]
  • The Lions's Share, Act 2. What's Behind China's Anti-Corruption Campaign?
    The Lions’s Share, Act 2. What’s Behind China’s Anti-Corruption Campaign? Guilhem Fabre To cite this version: Guilhem Fabre. The Lions’s Share, Act 2. What’s Behind China’s Anti-Corruption Campaign?. 2015. halshs-01143800 HAL Id: halshs-01143800 https://halshs.archives-ouvertes.fr/halshs-01143800 Preprint submitted on 20 Apr 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Séminaire BRICs FMSH - CRBC The Lions’s Share, Act 2. What’s Behind China’s Anti-Corruption Campaign? Guilhem Fabre N°92 | april 2015 As we have seen in a previous working paper ( « The lion’s share : What’s behind China’s economic slowdown ? »), China’s elite have largely benefited from control of state assets and manipulation of the factors market (land, labor and capital) during the first decade of this cen- tury. Along with strong growth and social mobility, the accumulation of wealth has created some of the most flagrant social polarization worldwide, much higher than the official statistics. Instead of taking concrete measures to correct these inequalities, according to the new blueprint of reforms launched by the 3rd Plenum in November 2013, the new direction has focused on a gigantic campaign against corruption.
    [Show full text]
  • Rearranging the Deck Chairs on the Liaoning? the PLA Once Again Considers Reorganization
    Rearranging the Deck Chairs on the Liaoning? The PLA Once Again Considers Reorganization James Mulvenon Since the first sweeping structural reform of the Chinese People’s Liberation Army in 1985, the military media have periodically floated trial balloons about deeper restructuring but the political realities of the situation have consistently stymied the proposed changes. In early 2014, the Japanese newspaper Yomiuri Shimbun reported that the PLA was planning to make the most significant modifications to its command and control structure in almost 30 years, replacing its administrative, geographically oriented military region system with a mission-oriented configuration designed to match the increasing “joint” orientation of its deployed forces. To the surprise of many, official Chinese media organs did not reject the report out of hand, but instead expressed dismay that the information had been disseminated prematurely, and grudgingly acknowledged plans to carry out the changes. This article describes the historical rationale for the current command and control structure of the PLA, analyzes the factors motivating its alteration, and assesses the implications of these latest indications of reform. Introduction Since the first sweeping structural reform of the Chinese People’s Liberation Army in 1985, the military media have periodically floated trial balloons about deeper restructuring but the political realities of the situation have consistently stymied the proposed changes. In early 2014, the Japanese newspaper Yomiuri Shimbun reported that the PLA was planning to make the most significant modifications to its command and control structure in almost 30 years, replacing its administrative, geographically oriented military region system with a mission-oriented configuration designed to match the increasing “joint” orientation of its deployed forces.
    [Show full text]