How the Chinese Government Fabricates Social Media Posts

Total Page:16

File Type:pdf, Size:1020Kb

How the Chinese Government Fabricates Social Media Posts American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime. We discuss how these results fit with what is known about the Chinese censorship program and suggest how they may change our broader theoretical understanding of “common knowledge” and information control in authoritarian regimes. https://www.cambridge.org/core/terms INTRODUCTION they censor certain individual social media posts that have appeared on the web or filter them out before ocial media in China appears as vibrant and ex- appearing. In both cases, the censorship apparatus al- tensive as in any Western country, with more than lows a great deal of criticism of the regime, its officials, S 1,300 social media companies and websites, and and their policies (which can be useful information for millions of posts authored every day by people all over the central government in managing local leaders) but the country. At the same time, the Chinese regime im- stops discussions that can generate collective action on poses extensive and varied controls over of the entire the ground (King et al. 2013, 2014).1 system (Brady 2009; Cairns and Carlson 2016; Knockel According to numerous speculations by scholars, ac- et al. 2015; MacKinnon 2012;Ng2015; Shirk 2011; tivists, journalists, officials in other governments, and Stockmann 2013; Stockmann and Gallagher 2011; Yang participants in social media, the Chinese regime also 2009). Which social media companies are prevented conducts “astroturfing,” or what we might call reverse from operating in China is easy to see (the so-called censorship, surreptitiously posting large numbers of Great Firewall of China), and the scholarly literature , subject to the Cambridge Core terms of use, available at fabricated social media comments as if they were the now offers considerable evidence on how and why genuine opinions of ordinary Chinese people. The peo- ple hired for this purpose are known formally as Inter- Gary King is Albert J. Weatherhead III University Profes- net commentators (), although more widely sor, Institute for Quantitative Social Science, 1737 Cambridge as 50c party members (), so called because they St., Harvard University, Cambridge MA 02138; GaryKing.org are rumored to be paid 50 cents (5 jiao, , or about ([email protected]). $0.08) to write and post each comment (Tong and Lei 28 Aug 2017 at 14:16:56 Jennifer Pan is Assistant Professor, Department of Communica- tion, 450 Serra Mall, Building 120, Stanford University, Stanford CA 2013). We show that this rumor turns out to be in- , on 94304; jenpan.com ([email protected]). correct; however, we adopt this widely used term to Margaret E. Roberts is Assistant Professor, Department of Po- denote social media comments posted at the direction litical Science, University of California, San Diego, Social Sciences or behest of the regime, as if they were the opinions of Building 301, 9500 Gilman Dr., #0521, La Jolla, CA 92093-0521; 2 MargaretRoberts.net ([email protected]). ordinary people. Harvard University Our thanks to Neel Guha, Peter Dyrud, Yingjie Fan, and many oth- . ers for superb research assistance; Danielle Allen, Peter Bol, Becky Fair, Chase Harrison, Iain Johnston, Franziska Keller, Blake Miller, 1 Although we make general statements about Chinese censorship, it Jean Oi, Samantha Ravich, Brandon Stewart, Daniela Stockmann, is important to note that censorship in China is by no means mono- Andy Walder, Yuhua Wang, Chaodan Zheng, and Yun Zhu for help- lithic in its operations or outcomes. Censorship is largely carried ful comments; and DARPA (contract W31P4Q-13-C-0055/983-3) out by Internet content providers, and regulations over the flow of and the National Science Foundation (grant 1500086) for research information continues to evolve. As a result, there is variation in the support. Authors are listed alphabetically. Data and information precise details of censorship in China by platform, geography, and necessary to replicate the results in this article appear in King et al. over time. (2017). 2 Thus, 50c party members are distinct from “volunteer 50c mem- Received: August 26, 2016; revised: November 6, 2016; accepted: bers” (; known as “bring your own grainers”), who express https://www.cambridge.org/core April 11, 2017. proregime or anti-Western sentiment online without being paid by 484 Downloaded from How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument The nearly unanimous view of journalists (and hu- show that almost none of the Chinese government’s man rights activists) is that 50c party posts strongly 50c party posts engage in debate or argument of any argue with and debate against those who criticize the kind. They do not step up to defend the government, government, its leaders, and their policies. This is also its leaders, and their policies from criticism, no matter the view of many scholarly publications discussing this how vitriolic; indeed, they seem to avoid controversial activity (and was our view as well prior to the re- issues entirely. Instead, most 50c posts are about cheer- search reported here). We systematically summarize leading and positive discussions of valence issues. We these views, including a quantitative analysis of social also detect a high level of coordination in the timing and media posts openly accused of being written by 50c content in these posts. A theory consistent with these party members. Unfortunately, until now, no method patterns is that the strategic objective of the regime is to has existed for detecting 50c party members, which distract and redirect public attention from discussions posts they write, their content, the size of the opera- or events with collective action potential. tion, or why they write them, and so the best anyone The theoretical implications of our findings are pre- could do was base claims on intuition, logic, occasional sented later in the article. We give a unified parsimo- anecdotes, rumors, and leaked government directives. nious summary of Chinese government internal infor- https://doi.org/10.1017/S0003055417000144 . In this article, we offer the first systematic empirical mation control efforts and show how these findings evidence for the content of 50c party posts, their au- may cause scholars to rethink the notion of “common thors, and the government’s strategic objectives.3 We knowledge” in theories of authoritarian politics more begin by analyzing an archive of emails leaked from the generally. Finally, we conclude and then give a sum- Internet Propaganda Office of Zhanggong, a district of mary of what we might have missed and how scholars Ganzhou City in Jiangxi Province. These emails give can follow up on this work.4 explicit details of the work of numerous 50c accounts in this district. Although in the public domain and re- WHAT WE THINK WE KNOW ported in the press (e.g., Henochowicz 2014; Sonnad 2014), the structure of the archive is complicated, too We summarize here views about the 50c party of (1) https://www.cambridge.org/core/terms large to understand by traditional qualitative meth- journalists, (2) academics, and (3) social media par- ods, and in formats (and attachments) far too diverse ticipants accusing others of being 50c party members. to make standard methods of automation feasible. As The dominant view of most is that 50c party members such, it has never before been systematically analyzed, engage in “hand-to-hand” verbal combat, making spe- and little of it has been explored. We have developed cific, directed arguments that support the government, an approach to analyze this dataset and have extracted its leaders, and their policies, and opposing arguments more than 43,000 known 50c party posts and their au- to the contrary; they do this by engaging in debate with thors from it. and criticism of China’s enemies, including those who We first characterize the patterns in these data via oppose it inside the country and from abroad. For (1) their network and time series structures. Then we sys- and (2) we offer brief literature reviews; for (3) we find tematically analyze the content of the 50c posts in our and analyze posts accused by others of being 50c.
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
    Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of
    [Show full text]
  • China's Global Media Footprint
    February 2021 SHARP POWER AND DEMOCRATIC RESILIENCE SERIES China’s Global Media Footprint Democratic Responses to Expanding Authoritarian Influence by Sarah Cook ABOUT THE SHARP POWER AND DEMOCRATIC RESILIENCE SERIES As globalization deepens integration between democracies and autocracies, the compromising effects of sharp power—which impairs free expression, neutralizes independent institutions, and distorts the political environment—have grown apparent across crucial sectors of open societies. The Sharp Power and Democratic Resilience series is an effort to systematically analyze the ways in which leading authoritarian regimes seek to manipulate the political landscape and censor independent expression within democratic settings, and to highlight potential civil society responses. This initiative examines emerging issues in four crucial arenas relating to the integrity and vibrancy of democratic systems: • Challenges to free expression and the integrity of the media and information space • Threats to intellectual inquiry • Contestation over the principles that govern technology • Leverage of state-driven capital for political and often corrosive purposes The present era of authoritarian resurgence is taking place during a protracted global democratic downturn that has degraded the confidence of democracies. The leading authoritarians are ABOUT THE AUTHOR challenging democracy at the level of ideas, principles, and Sarah Cook is research director for China, Hong Kong, and standards, but only one side seems to be seriously competing Taiwan at Freedom House. She directs the China Media in the contest. Bulletin, a monthly digest in English and Chinese providing news and analysis on media freedom developments related Global interdependence has presented complications distinct to China. Cook is the author of several Asian country from those of the Cold War era, which did not afford authoritarian reports for Freedom House’s annual publications, as regimes so many opportunities for action within democracies.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
    Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.
    [Show full text]
  • Institutions of Democratic Governance Excerpted
    INSTITUTIONS OF DEMOCRATIC GOVERNANCE EXCERPTED FROM THE 2011 ANNUAL REPORT OF THE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ONE HUNDRED TWELFTH CONGRESS FIRST SESSION OCTOBER 10, 2011 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PRINTING OFFICE 70–939 PDF WASHINGTON : 2011 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 12:59 Nov 04, 2011 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 U:\DOCS\70939.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate CHRISTOPHER H. SMITH, New Jersey, SHERROD BROWN, Ohio, Cochairman Chairman MAX BAUCUS, Montana CARL LEVIN, Michigan DIANNE FEINSTEIN, California JEFF MERKLEY, Oregon SUSAN COLLINS, Maine JAMES RISCH, Idaho EXECUTIVE BRANCH COMMISSIONERS SETH D. HARRIS, Department of Labor MARIA OTERO, Department of State FRANCISCO J. SA´ NCHEZ, Department of Commerce KURT M. CAMPBELL, Department of State NISHA DESAI BISWAL, U.S. Agency for International Development PAUL B. PROTIC, Staff Director LAWRENCE T. LIU, Deputy Staff Director (II) VerDate Mar 15 2010 12:59 Nov 04, 2011 Jkt 000000 PO 00000 Frm 00002 Fmt 0486 Sfmt 0486 U:\DOCS\70939.TXT DEIDRE INSTITUTIONS OF DEMOCRATIC GOVERNANCE Findings • The Communist Party exercises control over political affairs, government, and society through networks of Party committees or branches that exist at all levels in government, legislative, and judicial agencies, as well as in businesses, major social groups (including unions), the military, and most residential communities.
    [Show full text]
  • Digital Neo-Colonialism: the Chinese Model of Internet Sovereignty in Africa
    AFRICAN HUMAN RIGHTS LAW JOURNAL To cite: W Gravett ‘Digital neo-colonialism: The Chinese model of internet sovereignty in Africa’ (2020) 20 African Human Rights Law Journal 125-146 http://dx.doi.org/10.17159/1996-2096/2020/v20n1a5 Digital neo-colonialism: The Chinese model of internet sovereignty in Africa Willem Gravett* Associate Professor, Faculty of Law, University of Pretoria, South Africa https://orcid.org/0000-0001-7400-0036 Summary: China is making a sustained effort to become a ‘cyber superpower’. An integral part of this effort is the propagation by Beijing of the notion of ‘internet sovereignty’ – China’s supreme right to govern the internet within its borders and keep it under rigid control. Chinese companies work closely with Chinese state authorities to export technology to Africa in order to extend China’s influence and promote its cyberspace governance model. This contribution argues that the rapid expansion across Africa of Chinese technology companies and their products warrants vigilance. If African governments fail to advance their own values and interests – including freedom of expression, free enterprise and the rule of law – with equal boldness, the ‘China model’ of digital governance by default might very well become the ‘Africa model’. Key words: Chinese internet censorship; data surveillance; digital authoritarianism; digital neo-colonialism; global cyber governance; internet sovereignty * BLC LLB (Pretoria) LLM (Notre Dame) LLD (Pretoria); [email protected]. I gratefully acknowledge the very able and
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Deciphering the Spatial Structures of City Networks in the Economic Zone of the West Side of the Taiwan Strait Through the Lens of Functional and Innovation Networks
    sustainability Article Deciphering the Spatial Structures of City Networks in the Economic Zone of the West Side of the Taiwan Strait through the Lens of Functional and Innovation Networks Yan Ma * and Feng Xue School of Architecture and Urban-Rural Planning, Fuzhou University, Fuzhou 350108, Fujian, China; [email protected] * Correspondence: [email protected] Received: 17 April 2019; Accepted: 21 May 2019; Published: 24 May 2019 Abstract: Globalization and the spread of information have made city networks more complex. The existing research on city network structures has usually focused on discussions of regional integration. With the development of interconnections among cities, however, the characterization of city network structures on a regional scale is limited in the ability to capture a network’s complexity. To improve this characterization, this study focused on network structures at both regional and local scales. Through the lens of function and innovation, we characterized the city network structure of the Economic Zone of the West Side of the Taiwan Strait through a social network analysis and a Fast Unfolding Community Detection algorithm. We found a significant imbalance in the innovation cooperation among cities in the region. When considering people flow, a multilevel spatial network structure had taken shape. Among cities with strong centrality, Xiamen, Fuzhou, and Whenzhou had a significant spillover effect, which meant the region was depolarizing. Quanzhou and Ganzhou had a significant siphon effect, which was unsustainable. Generally, urbanization in small and midsize cities was common. These findings provide support for government policy making. Keywords: city network; spatial organization; people flows; innovation network 1.
    [Show full text]
  • Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy
    Working Paper No. 2017.2 Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy Nicholas J. Monaco, Google Jigsaw Table of Contents Abstract ....................................................................................................................... 3 Introduction ................................................................................................................. 3 Case study ................................................................................................................... 5 Media and social media landscape in Taiwan ................................................................... 5 Overview of computational propaganda in Taiwan .......................................................... 9 Automation and propaganda .......................................................................................... 10 Fake news ........................................................................................................................ 13 Cross-Strait propaganda ................................................................................................. 15 The 2016 Diba Facebook expedition .............................................................................. 22 Conclusion ................................................................................................................. 25 About the Author ...................................................................................................... 27 References ................................................................................................................
    [Show full text]
  • Information Systems in Great Power Competition with China
    STRATEGIC STUDIES QUARTERLY - PERSPECTIVE Decide, Disrupt, Destroy: Information Systems in Great Power Competition with China AINIKKI RIIKONEN Abstract Technologies for creating and distributing knowledge have impacted international politics and conflict for centuries, and today the infrastructure for communicating knowledge has expanded. These technologies, along with attempts to exploit their vulnerabilities, will shape twenty-first- century great power competition between the US and China. Likewise, great power competition will shape the way China develops and uses these technologies across the whole spectrum of competition to make decisions, disrupt the operational environment, and destroy adversary capabilities. ***** he 2018 US National Defense Strategy (NDS) cites Russia and the People’s Republic of China (PRC) as “revisionist powers” that “want to shape a world consistent with their authoritarian model— gaining veto authority over other nations’ economic, diplomatic, and secu- T 1 rity decisions.” It describes these countries as competitors seeking to use “other areas of competition short of open warfare to achieve their [au- thoritarian] ends” and to “optimize their targeting of our battle networks and operational concepts.”2 The NDS assesses that competition will occur along the entire spectrum of statecraft from peace to open conflict and that Russia and the PRC will align their foreign policies with their models of governance. If this assessment is correct, and if technology plays a sig- nificant role in international politics, then technology will affect the whole spectrum of great power competition and conflict. Information architec- ture—the structures of technology that collect and relay information worldwide—is innately connected to power projection. The PRC has been innovating in this area, and its expanded information capabilities—and risks to US capabilities—will shape competition in the twenty- first cen- tury.
    [Show full text]
  • Research on the Relationship Between Green Development and Fdi in Jiangxi Province
    2019 International Seminar on Education, Teaching, Business and Management (ISETBM 2019) Research on the Relationship between Green Development and Fdi in Jiangxi Province Zejie Liu1, a, Xiaoxue Lei2, b, Wenhui Lai1, c, Zhenyue Lu1, d, Yuanyuan Yin1, e 1School of Business, Jiangxi Normal University, Nanchang 330022, China 2 School of Financial and Monetary, Jiangxi Normal University, Nanchang 330022, China Keywords: Jiangxi province, City, Green development, Fdi Abstract: Firstly, based on factor analysis method, this paper obtained the green development comprehensive index and its changing trend of 11 prefecture level cities in Jiangxi Province. Secondly, by calculating Moran's I index, it made an empirical analysis of the spatial correlation of FDI between 11 prefecture level cities in Jiangxi Province, both globally and locally. Finally, this paper further tested the relationship between FDI and green development index by establishing multiple linear regression equation. The results show that the overall green development level of Jiangxi Province shows a steady upward trend, but the development gap between 11 prefecture level cities in Jiangxi Province is large, and the important green development indicators have a significant positive impact on FDI. 1. Introduction As one of the important provinces rising in Central China, Jiangxi has made remarkable achievements in the protection of ecological environment and the promotion of economic benefits while vigorously promoting green development and actively introducing FDI. Data shows that since the first batch of FDI was introduced in 1984, Jiangxi Province has attracted 12.57 billion US dollars of FDI in 2018, with an average annual growth rate of 19.42%. By the first three quarters of 2019, Jiangxi's actual use of FDI amounted to 9.79 billion US dollars, an increase of 8.1%, ranking at the top of the country.
    [Show full text]