Westminsterresearch Exploring Digital Discourse with Chinese

Total Page:16

File Type:pdf, Size:1020Kb

Westminsterresearch Exploring Digital Discourse with Chinese WestminsterResearch http://www.westminster.ac.uk/westminsterresearch Exploring digital discourse with Chinese characteristics: contradictions and tensions Na, Y. This is an electronic version of a PhD thesis awarded by the University of Westminster. © Miss Yuqi Na, 2020. The WestminsterResearch online digital archive at the University of Westminster aims to make the research output of the University available to a wider audience. Copyright and Moral Rights remain with the authors and/or copyright owners. EXPLORING DIGITAL DISCOURSE WITH CHINESE CHARACTERISTICS: CONTRADICTIONS AND TENSIONS Yuqi Na A thesis submitted to the School of Media and Communication of the University of Westminster for the degree of Doctor of Philosophy London, June 2020 Abstract Capitalism in China is under transformations. This research aims to register and interpret China’s discourse on network technologies, reveal the underlying ideologies, and tie this discourse to the transformation of China’s capitalism of which it is a part. Digital discourse, as this thesis defines it, is about the contemporary discourse on network technology under Capitalism with Chinese Characteristics. China’s state-led capitalism has gone through all aspects of changes that are enabled by network technologies, ranging from production, consumption and the market, to the relations between international capital, the State, domestic capital, and individuals are experiencing changes. Along with the economic, political and technological changes are ideological transformations. Digital discourse is part of the social process that is related to other social changes. This thesis will focus on the particular forms of digital discourse as a channel to investigate both social and ideological transformations in China’s digital capitalism. In particular, this thesis looks at the digital discourse from three social and political actors. It analyses discourse from the current central government’s information society policies and President Xi Jinping’s speeches, from CEOs of the dominant Internet companies in China, and from young workers in China’s ‘Silicon Valley’ Shenzhen. Through the lens of ideology, this thesis provides a critique of how digital discourse from different actors legitimate social relations in the current capitalism in China. In particular, at the international level, the government and BAT have appropriated a nationalist discourse to legitimate the global expansion of China’s capital and enterprises. At the domestic level, these actors have produced different types of discourse to legitimate the concentration of the market and the commercialisation of Internet platforms. At the individual level, there is a tendency among all actors to construct a consumer identity to replace a more politically active citizen identity. Through analysing digital discourse from these three actors, this thesis also identifies several features of ideology and the mechanisms of how ideologies work in contemporary capitalism. While the study illustrates the discrepancy of ideological discourse between by the dominant groups and subaltern groups, it also identifies one crucial ideology that legitimates, internalises and naturalises the dominant socio-political arrangements surrounding the commercialised Internet – This is no alternative. This finding suggests a double-layer and multi-dimensional understandings of the ideologies about China’s digital capitalism. 1 Acknowledgements First of all, I would like to express my sincerest thanks to my supervisor, Christian Fuchs, who has always been supporting and encouraging me since the first day of my PhD study. His critical thinking and keen advice have directed my research and added invaluable insights to it. He is such an intelligent and diligent person whose works and personality have inspired and encouraged me a lot during my study. I am also grateful to my second supervisor, Xin Xin, for her valuable advice on structures, and topics of the dissertation. Her great PhD thesis furthermore sheds light on my writings. Special thanks should also go to Anthony McNicholas, whose support, patience and encouragements are vital for my precious time at CAMRI and MAD. I would also like to thank my colleagues at the University of Westminster. I had a lot of inspiring discussions here. I have been fortunate to be supported by great groups of friends and colleagues. I was lucky to have Duygu Karatas’ support for my difficult time. Great thanks to other PhD friends: Tiankai Tang, Xiang Fan, Yang Zhou: the sharing, connection, laughing in our little ‘gang’ have given me so much happiness and courage. They make my PhD journey less lonely. My special thanks to Aliaksandr Herasimenka, whose enthusiasm about work, research and life, whose intelligence and positive attitudes have encouraged me a lot during my most depressed and challenging time. Without my interviewees and friends, it would be impossible to finish this thesis. I would like to show my deepest thanks to their generous help for making it happen, special thanks to Wu Lunjing, Qinghu Xuetang, Jimmy, Wu Yipeng, Zhang Weixin and everyone who has shown their interests and supported to my research. I want to dedicate this thesis to my parents, I feel so lucky to have their unconditional love, support, respect and encouragement. Their attitudes toward life and work have given me great courage. “Whatever causes night in our souls may leave stars.” – Victor Hugo 2 Table of Contents EXPLORING DIGITAL DISCOURSE WITH CHINESE CHARACTERISTICS: CONTRADICTIONS AND TENSIONS ................................................................................................................................... 0 Abstract ...................................................................................................................................... 1 Acknowledgements .................................................................................................................... 2 Table of Contents ....................................................................................................................... 3 List of Tables ............................................................................................................................. 8 List of Figures ............................................................................................................................ 9 CHAPTER 1. INTRODUCTION ............................................................................................ 11 1.1. Key Concepts ............................................................................................................... 12 1.2. Ideology Critique in Media and Technology Studies .................................................. 14 1.3. Research Questions and the Overall Structure of this Thesis ...................................... 16 CHAPTER 2. DEFINING IDEOLOGY IN THIS THESIS .................................................... 21 2.1. Defining Ideology ........................................................................................................ 21 2.1.1. Ideology which emerges from economic contradictions ..................................... 22 2.1.2. Ideologies embedded in political conflicts .......................................................... 27 2.1.3. Tensions and Reconciliation: a summary ............................................................ 30 2.2. The Functions of Ideology ........................................................................................... 31 2.2.1. Ideology as distorted solutions and limiting revolutionary thoughts ................... 32 2.2.2. Ideology as a partial understanding of reality ...................................................... 34 2.2.3. Hegemony used to gain consent for the dominant power .................................... 36 2.2.4. Ideology used to reproduce the current system.................................................... 38 2.3. A Model of Ideology .................................................................................................... 40 CHAPTER 3. CAPITALISM WITH CHINESE CHARACTERISTICS................................ 44 3.1. The Capitalist Economy and Chinese model ............................................................... 44 3.2. The Land Issue ............................................................................................................. 50 3.3. Domestic Enterprise Ownership .................................................................................. 55 3.4. Foreign Relationships .................................................................................................. 58 3.5. Political Reforms and the Party-State .......................................................................... 63 3.6. Contradictions in Capitalism with Chinese Characteristics and the Decline of Socialist Welfare ..................................................................................................................................... 67 CHAPTER 4. DIGITAL DISCOURSE IN ADVANCED CAPITALIST SOCIETIES ......... 73 4.1. Technological Determinism ......................................................................................... 73 4.2. Digital Discourse and Capitalist Economy .................................................................. 76 4.2.1. Decentralised and de-hierarchised market ........................................................... 77 4.2.2. The Flexible production process and working process ........................................ 79 3 4.2.3. Consumerism,
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Diaspora Engagement Possibilities for Latvian Business Development
    DIASPORA ENGAGEMENT POSSIBILITIES FOR LATVIAN BUSINESS DEVELOPMENT BY DALIA PETKEVIČIENĖ CONTENTS CHAPTER I. Diaspora Engagement Possibilities for Business Development .................. 3 1. Foreword .................................................................................................................... 3 2. Introduction to Diaspora ............................................................................................ 5 2.1. What is Diaspora? ............................................................................................ 6 2.2. Types of Diaspora ............................................................................................. 8 3. Growing Trend of Governments Engaging Diaspora ............................................... 16 4. Research and Analysis of the Diaspora Potential .................................................... 18 4.1. Trade Promotion ............................................................................................ 19 4.2. Investment Promotion ................................................................................... 22 4.3. Entrepreneurship and Innovation .................................................................. 28 4.4. Knowledge and Skills Transfer ....................................................................... 35 4.5. Country Marketing & Tourism ....................................................................... 36 5. Case Study Analysis of Key Development Areas ...................................................... 44 CHAPTER II.
    [Show full text]
  • Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
    Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of
    [Show full text]
  • Real-Time News Certification System on Sina Weibo
    Real-Time News Certification System on Sina Weibo Xing Zhou1;2, Juan Cao1, Zhiwei Jin1;2,Fei Xie3,Yu Su3,Junqiang Zhang1;2,Dafeng Chu3, ,Xuehui Cao3 1Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology, Beijing, China 2University of Chinese Academy of Sciences, Beijing, China 3Xinhua News Agency, Beijing, China {zhouxing,caojuan,jinzhiwei,zhangjunqiang}@ict.ac.cn {xiefei,suyu,chudafeng,caoxuehui}@xinhua.org ABSTRACT There are many works has been done on rumor detec- In this paper, we propose a novel framework for real-time tion. Storyful[2] is the world's first social media news agency, news certification. Traditional methods detect rumors on which aims to discover breaking news and verify them at the message-level and analyze the credibility of one tweet. How- first time. Sina Weibo has an official service platform1 that ever, in most occasions, we only remember the keywords encourage users to report fake news and these news will be of an event and it's hard for us to completely describe an judged by official committee members. Undoubtedly, with- event in a tweet. Based on the keywords of an event, we out proper domain knowledge, people can hardly distinguish gather related microblogs through a distributed data acqui- between fake news and other messages. The huge amount sition system which solves the real-time processing need- of microblogs also make it impossible to identify rumors by s. Then, we build an ensemble model that combine user- humans. based, propagation-based and content-based model. The Recently, many researches has been devoted to automatic experiments show that our system can give a response at rumor detection on social media.
    [Show full text]
  • Exploring the Relationship Between Online Discourse and Commitment in Twitter Professional Learning Communities
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Bowling Green State University: ScholarWorks@BGSU Bowling Green State University ScholarWorks@BGSU Visual Communication and Technology Education Faculty Publications Visual Communication Technology 8-2018 Exploring the Relationship Between Online Discourse and Commitment in Twitter Professional Learning Communities Wanli Xing Fei Gao Bowling Green State University, [email protected] Follow this and additional works at: https://scholarworks.bgsu.edu/vcte_pub Part of the Communication Technology and New Media Commons, Educational Technology Commons, and the Engineering Commons Repository Citation Xing, Wanli and Gao, Fei, "Exploring the Relationship Between Online Discourse and Commitment in Twitter Professional Learning Communities" (2018). Visual Communication and Technology Education Faculty Publications. 47. https://scholarworks.bgsu.edu/vcte_pub/47 This Article is brought to you for free and open access by the Visual Communication Technology at ScholarWorks@BGSU. It has been accepted for inclusion in Visual Communication and Technology Education Faculty Publications by an authorized administrator of ScholarWorks@BGSU. Exploring the relationship between online discourse and commitment in Twitter professional learning communities Abstract Educators show great interest in participating in social-media communities, such as Twitter, to support their professional development and learning. The majority of the research into Twitter- based professional learning communities has investigated why educators choose to use Twitter for professional development and learning and what they actually do in these communities. However, few studies have examined why certain community members remain committed and others gradually drop out. To fill this gap in the research, this study investigated how some key features of online discourse influenced the continued participation of the members of a Twitter-based professional learning community.
    [Show full text]
  • Developments in China's Military Force Projection and Expeditionary Capabilities
    DEVELOPMENTS IN CHINA'S MILITARY FORCE PROJECTION AND EXPEDITIONARY CAPABILITIES HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION THURSDAY, JANUARY 21, 2016 Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON: 2016 ii U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION HON. DENNIS C. SHEA, Chairman CAROLYN BARTHOLOMEW, Vice Chairman Commissioners: PETER BROOKES HON. JAMES TALENT ROBIN CLEVELAND DR. KATHERINE C. TOB IN HON. BYRON L. DORGAN MICHAEL R. WESSEL JEFFREY L. FIEDLER DR. LARRY M. WORTZEL HON. CARTE P. GOODWIN MICHAEL R. DANIS, Executive Director The Commission was created on October 30, 2000 by the Floyd D. Spence National Defense Authorization Act for 2001 § 1238, Public Law No. 106-398, 114 STAT. 1654A-334 (2000) (codified at 22 U.S.C. § 7002 (2001), as amended by the Treasury and General Government Appropriations Act for 2002 § 645 (regarding employment status of staff) & § 648 (regarding changing annual report due date from March to June), Public Law No. 107-67, 115 STAT. 514 (Nov. 12, 2001); as amended by Division P of the “Consolidated Appropriations Resolution, 2003,” Pub L. No. 108-7 (Feb. 20, 2003) (regarding Commission name change, terms of Commissioners, and responsibilities of the Commission); as amended by Public Law No. 109- 108 (H.R. 2862) (Nov. 22, 2005) (regarding responsibilities of Commission and applicability of FACA); as amended by Division J of the “Consolidated Appropriations Act, 2008,” Public Law Nol.
    [Show full text]
  • Congressional-Executive Commission on China Annual Report 2019
    CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2019 ONE HUNDRED SIXTEENTH CONGRESS FIRST SESSION NOVEMBER 18, 2019 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: https://www.cecc.gov VerDate Nov 24 2008 13:38 Nov 18, 2019 Jkt 036743 PO 00000 Frm 00001 Fmt 6011 Sfmt 5011 G:\ANNUAL REPORT\ANNUAL REPORT 2019\2019 AR GPO FILES\FRONTMATTER.TXT CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2019 ONE HUNDRED SIXTEENTH CONGRESS FIRST SESSION NOVEMBER 18, 2019 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: https://www.cecc.gov U.S. GOVERNMENT PUBLISHING OFFICE 36–743 PDF WASHINGTON : 2019 VerDate Nov 24 2008 13:38 Nov 18, 2019 Jkt 036743 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 G:\ANNUAL REPORT\ANNUAL REPORT 2019\2019 AR GPO FILES\FRONTMATTER.TXT CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate JAMES P. MCGOVERN, Massachusetts, MARCO RUBIO, Florida, Co-chair Chair JAMES LANKFORD, Oklahoma MARCY KAPTUR, Ohio TOM COTTON, Arkansas THOMAS SUOZZI, New York STEVE DAINES, Montana TOM MALINOWSKI, New Jersey TODD YOUNG, Indiana BEN MCADAMS, Utah DIANNE FEINSTEIN, California CHRISTOPHER SMITH, New Jersey JEFF MERKLEY, Oregon BRIAN MAST, Florida GARY PETERS, Michigan VICKY HARTZLER, Missouri ANGUS KING, Maine EXECUTIVE BRANCH COMMISSIONERS Department of State, To Be Appointed Department of Labor, To Be Appointed Department of Commerce, To Be Appointed At-Large, To Be Appointed At-Large, To Be Appointed JONATHAN STIVERS, Staff Director PETER MATTIS, Deputy Staff Director (II) VerDate Nov 24 2008 13:38 Nov 18, 2019 Jkt 036743 PO 00000 Frm 00004 Fmt 0486 Sfmt 0486 G:\ANNUAL REPORT\ANNUAL REPORT 2019\2019 AR GPO FILES\FRONTMATTER.TXT C O N T E N T S Page I.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • Social Media Contracts in the US and China
    DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L.
    [Show full text]
  • Clickstream Analysis for Sybil Detection
    You Are How You Click Clickstream Analysis for Sybil Detection Gang Wang, Tristan Konolige, Christo Wilson†, Xiao Wang‡ Haitao Zheng and Ben Y. Zhao UC Santa Barbara †Northeastern University ‡Renren Inc. Sybils in Online Social Networks • Sybil (sɪbəl): fake identities controlled by attackers – Friendship is a pre-cursor to other malicious activities – Does not include benign fakes (secondary accounts) 20 Mutual Friends • Large Sybil populations* 14.3 Million Sybils (August, 2012) 20 Million Sybils (April, 2013) 2 *Numbers from CNN 2012, NYT 2013 Sybil Attack: a Serious Threat Malicious URL • Social spam – Advertisement, malware, phishing • Steal user information Taliban uses sexy Facebook profiles to lure troops into giving away military secrets" • Sybil-based political lobbying efforts 3 Sybil Defense: Cat-and-Mouse Game Social Networks A>ackers Stop automated account creation Crowdsourcing CAPTCHA solving •! CAPTCHA •! [USENIX’10] Detect suspicious profiles Realistic profile generation •! Spam features, URL blacklists •! Complete bio info, profile pic •! User report [WWW’12] Detect Sybil communities •! [SIGCOMM’06], [Oakland’08], [NDSS’09], [NSDI’12] 4 Graph-based Sybil Detectors •! A key assumption Sybil Real –! Sybils have difficulty “friending” normal users –! Sybils form tight-knit communities Is This True? •! Measuring Sybils in Renren social network [IMC’11] –! Ground-truth 560K Sybils collected over 3 years –! Most Sybils befriend real users, integrate into real-user communities –! Most Sybils don’t befriend other Sybils Sybils Don’t neeD to form communiGes! 5 Sybil Detection Without Graphs •! Sybil detection with static profiles analysis [NDSS’13] –! Leverage human intuition to detect fake profiles (crowdsourcing) –! Successful user-study shows it scales well with high accuracy •! Profile-based detection has limitations –! Some profiles are easy to mimic (e.g.
    [Show full text]
  • Download on Our Platform and We Have Obtained Licenses from Many Content Providers
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 20-F (Mark One) ¨ REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR 12(g) OF THE SECURITIES EXCHANGE ACT OF 1934 or x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2013. or ¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to or ¨ SHELL COMPANY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of event requiring this shell company report Commission file number: 000-51469 Baidu, Inc. (Exact name of Registrant as specified in its charter) N/A (Translation of Registrant’s name into English) Cayman Islands (Jurisdiction of incorporation or organization) Baidu Campus No. 10 Shangdi 10th Street Haidian District, Beijing 100085 The People’s Republic of China (Address of principal executive offices) Jennifer Xinzhe Li, Chief Financial Officer Telephone: +(86 10) 5992-8888 Email: [email protected] Facsimile: +(86 10) 5992-0000 Baidu Campus No. 10 Shangdi 10th Street, Haidian District, Beijing 100085 The People’s Republic of China (Name, Telephone, Email and/or Facsimile number and Address of Company Contact Person) Securities registered or to be registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered American depositary shares (ten American depositary shares representing one Class A ordinary share, The NASDAQ Stock Market LLC par value US$0.00005 per share) (The NASDAQ Global Select Market) Class A ordinary shares, par value US$0.00005 per share* The NASDAQ Stock Market LLC (The NASDAQ Global Select Market) * Not for trading, but only in connection with the listing on The NASDAQ Global Select Market of American depositary shares.
    [Show full text]
  • Sybil in Online Social Networks (Osns)
    Sybil In Online Social Networks (OSNs) 1 Sybil (sɪbəl): fake identities controlled by attackers Friendship is a pre-cursor to other malicious activities Does not include benign fakes (secondary accounts) Research has identified malicious Sybils on OSNs Twitter [CCS 2010] Facebook [IMC 2010] Renren [IMC 2011], Tuenti [NSDI 2012] Real-world Impact of Sybil (Twitter) 2 900K 4,000 new July 21st followers/day800K Followers Followers 700K 100,000 new Jul-4 Jul-8 Jul-12 Jul-16 Jul-20followers Jul-24 Jul-28 in 1Aug-1 day Russian political protests on Twitter (2011) 25,000 Sybils sent 440,000 tweets Drown out the genuine tweets from protesters Security Threats of Sybil (Facebook) 3 Large Sybil population on Facebook August 2012: 83 million (8.7%) Sybils are used to: Share or Send Spam Malicious URL Theft of user’s personal information Fake like and click fraud 50 likes per dollar Community-based Sybil Detectors 4 Prior work on Sybil detectors SybilGuard [SIGCOMM’06], SybilLimit [Oakland '08], SybilInfer [NDSS’09] Key assumption: Sybils form tight-knit communities Sybils have difficulty “friending” normal users? Do Sybils Form Sybil Communities? 5 Measurement study on Sybils in the wild [IMC’11] Study Sybils in Renren (Chinese Facebook) Ground-truth data on 560K Sybils collected over 3 years Sybil components: sub-graphs of connected Sybils 10000 1000 100 Edges To To Edges 10 Sybil Normal Users 1components are internally sparse Not amenable1 10 to community100 1000 detection 10000 New Sybil detectionEdges Between system Sybils is needed Detect Sybils without Graphs 6 Anecdotal evidence that people can spot Sybil profiles 75% of friend requests from Sybils are rejected Human intuition detects even slight inconsistencies in Sybil profiles Idea: build a crowdsourced Sybil detector Focus on user profiles Leverage human intelligence and intuition Open Questions How accurate are users? What factors affect detection accuracy? How can we make crowdsourced Sybil detection cost effective? 7 Outline .
    [Show full text]