The Ambivalent Power of the Internet in Chinese Democratisation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
China Engages Asia David Shambaugh Reshaping the Regional Order
China Engages Asia China Engages Asia David Shambaugh Reshaping the Regional Order The traditional under- pinnings of international relations in Asia are undergoing profound change, and the rise of China is a principal cause. Other causes include the relative de- cline of U.S. inºuence and authority in Asia, the expanding normative inºuence of the Association of Southeast Asian Nations (ASEAN) and the growth of regional multilateral institutions, increased technological and eco- nomic interdependence throughout the region, and the amelioration of several formerly antagonistic bilateral relationships. As a result of these processes, the structure of power and the nature of the regional system are being fundamen- tally altered. China’s growing economic and military power, expanding political in- ºuence, distinctive diplomatic voice, and increasing involvement in regional multilateral institutions are key developments in Asian affairs. China’s new proactive regional posture is reºected in virtually all policy spheres— economic, diplomatic, and military—and this parallels China’s increased activ- ism on the global stage.1 Bilaterally and multilaterally, Beijing’s diplomacy has been remarkably adept and nuanced, earning praise around the region. As a result, most nations in the region now see China as a good neighbor, a con- structive partner, a careful listener, and a nonthreatening regional power. This regional perspective is striking, given that just a few years ago, many of China’s neighbors voiced growing concerns about the possibility of China be- coming a domineering regional hegemon and powerful military threat. Today these views are muted. China’s new conªdence is also reºected in how it per- ceives itself, as it gradually sheds its dual identity of historical victim and ob- ject of great power manipulation. -
Cyberbullying and Ohio Schools: a Social Justice Framework to Understand and Create Change Lorri A
Cyberbullying and Ohio Schools: A Social Justice Framework to Understand and Create Change Lorri A. Gerwig-Parker Donna Tromski-Klingshirn Rebecca Kolssak Joshua D. Miller Wright State University Abstract In 2019, 36.5% of students, age 12-17, reported that they were cyberbullied at some point in their life. Cyberbullying is a growing problem within Ohio. Self-mutilation, attempted suicide, and death have been linked to victims of cyberbullying. Within Ohio, there are also legal implications for schools to consider. Using Bronfenbrenner’s ecological systems framework, different types of cyberbullies, bullying practices, and proposed solutions for cyberbullying can be addressed in a more comprehensive manner within the schools. Ultimately, schools can be the vanguards for social justice, creating the cultural shift to end cyberbullying and its devastating effects on victims. Keywords: cyberbullying, school administration and faculty, adolescents, social justice, ecological model Cyberbullying, also known as e-bullying or digital harassment, has grown from a technological possibility to a universal problem among communities of young people within the past two decades. Adolescent populations have both high rates of victimization and potentially severe consequences to their mental and physical health. Hinduja and Patchin (2019) indicated that 36.5% of adolescents ages 12 to 17 in the United States reported being cyberbullied at least once. Further, according to Pacer’s National Bullying Prevention Center (2019) only 33% of adolescent victims -
The Velocity of Censorship
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users. -
28. Rights Defense and New Citizen's Movement
JOBNAME: EE10 Biddulph PAGE: 1 SESS: 3 OUTPUT: Fri May 10 14:09:18 2019 28. Rights defense and new citizen’s movement Teng Biao 28.1 THE RISE OF THE RIGHTS DEFENSE MOVEMENT The ‘Rights Defense Movement’ (weiquan yundong) emerged in the early 2000s as a new focus of the Chinese democracy movement, succeeding the Xidan Democracy Wall movement of the late 1970s and the Tiananmen Democracy movement of 1989. It is a social movement ‘involving all social strata throughout the country and covering every aspect of human rights’ (Feng Chongyi 2009, p. 151), one in which Chinese citizens assert their constitutional and legal rights through lawful means and within the legal framework of the country. As Benney (2013, p. 12) notes, the term ‘weiquan’is used by different people to refer to different things in different contexts. Although Chinese rights defense lawyers have played a key role in defining and providing leadership to this emerging weiquan movement (Carnes 2006; Pils 2016), numerous non-lawyer activists and organizations are also involved in it. The discourse and activities of ‘rights defense’ (weiquan) originated in the 1990s, when some citizens began using the law to defend consumer rights. The 1990s also saw the early development of rural anti-tax movements, labor rights campaigns, women’s rights campaigns and an environmental movement. However, in a narrow sense as well as from a historical perspective, the term weiquan movement only refers to the rights campaigns that emerged after the Sun Zhigang incident in 2003 (Zhu Han 2016, pp. 55, 60). The Sun Zhigang incident not only marks the beginning of the rights defense movement; it also can be seen as one of its few successes. -
Sociotechnical Security As an Analytic Framework
Entanglements and Exploits: Sociotechnical Security as an Analytic Framework Data & Society Research Institute Columbia University Matt Goerzen, Elizabeth Anne Watkins, Open Technology Fund Research Fellow Gabrielle Lim, Abstract Unfortunately, platform-linked violence like the incidents in The rise of social media platforms has produced novel Christchurch and San Diego are not uncommon and are security threats and vulnerabilities. Malicious actors can unlikely to subside in the near future. Other forms of now exploit entanglements of once disparate technical and problematic and potentially dangerous content also social systems to target exposed communities. These proliferate. False and misleading content distributed on exploits pose a challenge to legacy security frameworks Whatsapp in India led to the murders of over two dozen drawn from technical and state-based conceptions of people in 2018 (Goel et al., 2018). The genocide of the referent objects and bounded information systems. In this Rohyinga in Myanmar was partially incited by the military paper we propose a new framework of analysis to meet this through disinformation and false accounts on Facebook challenge, Sociotechnical Security (STsec), which (Mozur, 2018). Facebook usage may also correlate with acknowledges how the interplay between actors produces higher rates of anti-refugee attacks in Germany (Müller and emergent threats to participant communities. This Schwarz 2018). Meanwhile, targeted harassment has been exploratory paper offers an overview of sociotechnical linked to self-censorship and a chilling effect on systems, explains why these threats and vulnerabilities internet-based communications (UN Office of the High require us to expand our understanding of security with Commissioner, 2017). Amnesty International in 2018, for regards to participatory technology, and how sociotechnical example, declared Twitter trolling of women a human rights security can be operationalized as a framework for analysis. -
The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F
July 2016, Volume 27, Number 3 $14.00 The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F. Inglehart The Struggle Over Term Limits in Africa Brett L. Carter Janette Yarwood Filip Reyntjens 25 Years After the USSR: What’s Gone Wrong? Henry E. Hale Suisheng Zhao on Xi Jinping’s Maoist Revival Bojan Bugari¡c & Tom Ginsburg on Postcommunist Courts Clive H. Church & Adrian Vatter on Switzerland Daniel O’Maley on the Internet of Things Delegative Democracy Revisited Santiago Anria Catherine Conaghan Frances Hagopian Lindsay Mayka Juan Pablo Luna Alberto Vergara and Aaron Watanabe Zhao.NEW saved by BK on 1/5/16; 6,145 words, including notes; TXT created from NEW by PJC, 3/18/16; MP edits to TXT by PJC, 4/5/16 (6,615 words). AAS saved by BK on 4/7/16; FIN created from AAS by PJC, 4/25/16 (6,608 words). PGS created by BK on 5/10/16. XI JINPING’S MAOIST REVIVAL Suisheng Zhao Suisheng Zhao is professor at the Josef Korbel School of International Studies, University of Denver. He is executive director of the univer- sity’s Center for China-U.S. Cooperation and editor of the Journal of Contemporary China. When Xi Jinping became paramount leader of the People’s Republic of China (PRC) in 2012, some Chinese intellectuals with liberal lean- ings allowed themselves to hope that he would promote the cause of political reform. The most optimistic among them even thought that he might seek to limit the monopoly on power long claimed by the ruling Chinese Communist Party (CCP). -
Deciphering L33tspeak
Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ............................................................................................................................... -
FSU ETD Template
Florida State University Libraries 2016 Molding a Model Minority: CCP Strategies of Social Control and Liberating the Zhuang from Economic Struggle Amanda Yeargin Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF SOCIAL SCIENCES AND PUBLIC POLICY MOLDING A MODEL MINORITY: CCP STRATEGIES OF SOCIAL CONTROL AND LIBERATING THE ZHUANG FROM ECONOMIC STRUGGLE By AMANDA YEARGIN A Thesis submitted to the Program in Asian Studies in partial fulfillment of the requirements for the degree of Master of Arts 2016 Amanda Yeargin defended this thesis on May 31, 2016. The members of the supervisory committee were: Annika Culver Professor Directing Thesis Andrew Frank Committee Member Jonathan Grant Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the thesis has been approved in accordance with university requirements. ii Dedicated to my fellow life travelers, stateside and abroad, who made this thesis possible. iii ACKNOWLEDGMENTS The development, research, and writing of this thesis has been a collective effort of many, to whom I am profoundly grateful: My Thesis Committee Chair, Dr. Annika Culver, for the immense amount of support and instruction she offered, as well as my committee members, Dr. Andrew Frank and Dr. Jonathan Grant. Dr. Minna Jia and graduate student Lilly Gao from Florida State University’s Survey Research Laboratory, for the many hours they contributed to my thesis as they conducted a content analysis. Amauri Serrano and her colleagues in Strozier Library, whose tireless and persistent efforts enabled Florida State University to acquire the Oriprobe database. -
Freedom on the Net 2016
FREEDOM ON THE NET 2016 China 2015 2016 Population: 1.371 billion Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 50 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 18 18 Political/Social Content Blocked: Yes Limits on Content (0-35) 30 30 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 40 40 TOTAL* (0-100) 88 88 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • A draft cybersecurity law could step up requirements for internet companies to store data in China, censor information, and shut down services for security reasons, under the aus- pices of the Cyberspace Administration of China (see Legal Environment). • An antiterrorism law passed in December 2015 requires technology companies to cooperate with authorities to decrypt data, and introduced content restrictions that could suppress legitimate speech (see Content Removal and Surveillance, Privacy, and Anonymity). • A criminal law amendment effective since November 2015 introduced penalties of up to seven years in prison for posting misinformation on social media (see Legal Environment). • Real-name registration requirements were tightened for internet users, with unregistered mobile phone accounts closed in September 2015, and app providers instructed to regis- ter and store user data in 2016 (see Surveillance, Privacy, and Anonymity). • Websites operated by the South China Morning Post, The Economist and Time magazine were among those newly blocked for reporting perceived as critical of President Xi Jin- ping (see Blocking and Filtering). www.freedomonthenet.org FREEDOM CHINA ON THE NET 2016 Introduction China was the world’s worst abuser of internet freedom in the 2016 Freedom on the Net survey for the second consecutive year. -
Netizens, Nationalism, and the New Media by Jackson S. Woods BA
Online Foreign Policy Discourse in Contemporary China: Netizens, Nationalism, and the New Media by Jackson S. Woods B.A. in Asian Studies and Political Science, May 2008, University of Michigan M.A. in Political Science, May 2013, The George Washington University A Dissertation submitted to The Faculty of The Columbian College of Arts and Sciences of The George Washington University in partial fulfillment of the requirements for the degree of Doctor of Philosophy January 31, 2017 Bruce J. Dickson Professor of Political Science and International Affairs The Columbian College of Arts and Sciences of The George Washington University certifies that Jackson S. Woods has passed the Final Examination for the degree of Doctor of Philosophy as of September 6, 2016. This is the final and approved form of the dissertation. Online Foreign Policy Discourse in Contemporary China: Netizens, Nationalism, and the New Media Jackson S. Woods Dissertation Research Committee: Bruce J. Dickson, Professor of Political Science and International Affairs, Dissertation Director Henry J. Farrell, Associate Professor of Political Science and International Affairs, Committee Member Charles L. Glaser, Professor of Political Science and International Affairs, Committee Member David L. Shambaugh, Professor of Political Science and International Affairs, Committee Member ii © Copyright 2017 by Jackson S. Woods All rights reserved iii Acknowledgments The author wishes to acknowledge the many individuals and organizations that have made this research possible. At George Washington University, I have been very fortunate to receive guidance from a committee of exceptional scholars and mentors. As committee chair, Bruce Dickson steered me through the multi-year process of designing, funding, researching, and writing a dissertation manuscript. -
Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing
Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing Peter Snyder Periwinkle Doerfler University of Illinois at Chicago New York University Chicago, IL Brooklyn, NY psnyde2@uic:edu pid207@nyu:edu Chris Kanich Damon McCoy University of Illinois at Chicago New York University Chicago, IL Brooklyn, NY ckanich@uic:edu mccoy@nyu:edu ABSTRACT KEYWORDS Doxing is online abuse where a malicious party harms another Doxing, Identity Theft, Online Abuse by releasing identifying or sensitive information. Motivations for ACM Reference Format: doxing include personal, competitive, and political reasons, and Peter Snyder, Periwinkle Doerfler, Chris Kanich, and Damon McCoy. 2017. web users of all ages, genders and internet experience have been Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing. targeted. Existing research on doxing is primarily qualitative. This In Proceedings of IMC ’17. ACM, New York, NY, USA, 13 pages. work improves our understanding of doxing by being the first to https://doi:org/10:1145/3131365:3131385 take a quantitative approach. We do so by designing and deploying a tool which can detect dox files and measure the frequency, content, targets, and effects of doxing on popular dox-posting sites. 1 INTRODUCTION This work analyzes over 1.7 million text files posted to paste- Doxing is an attack where a victim’s private information is released bin.com, 4chan.org and 8ch.net, sites frequently used to publicly online [33]. While unsophisticated at a technical level, share doxes online, over a combined period of approximately thir- this type of attack can cause substantial harm to its victims. These teen weeks. -
Resolving Constitutional Disputes in Contemporary China
Resolving Constitutional Disputes in Contemporary China Keith Hand* Beginning in 1999, a series of events generated speculation that the Chinese Party-state might be prepared to breathe new life into the country’s long dormant constitution. In recent years, as the Party-state has strictly limited constitutional adjudication and moved aggressively to contain some citizen constitutional activism, this early speculation has turned to pessimism about China’s constitutional trajectory. Such pessimism obscures recognition of alternative or hybrid pathways for resolving constitutional disputes in China. Despite recent developments, Chinese citizens have continued to constitutionalize a broad range of political-legal disputes and advance constitutional arguments in a variety of forums. This article argues that by shifting focus from the individual legal to the collective political dimension of constitutional law, a dimension dominant in China’s transitional one-party state, we can better understand the significance of the constitution in China and identify patterns of bargaining, consultation, and mediation across a range of both intrastate and citizen-state constitutional disputes. Administrative reconciliation and “grand mediation,” dispute resolution models at the core of recent political-legal shifts in China, emphasize such consultative practices. This zone of convergence reveals a potential transitional path * Associate Professor of Law, University of California, Hastings College of the Law. Former Beijing Director and Senior Fellow, The China Law Center, Yale Law School (2005–2008) and Senior Counsel, U.S. Congressional-Executive Commission on China (2002–2005). The author thanks Donald Clarke, Michael Dowdle, Bruce Hand, Nicholas Howson, Hilary Josephs, Chimène Keitner, Tom Kellogg, Evan Lee, Benjamin Liebman, Lin Xifen, Carl Minzner, Randall Peerenboom, Zhang Qianfan, colleagues at the UC Hastings Junior Faculty Workshop, and members of the Chinalaw List for their thoughtful comments and feedback on drafts of the article.