KENNETH TIN-KIN HUNG the Travelogue of Dr

Total Page:16

File Type:pdf, Size:1020Kb

KENNETH TIN-KIN HUNG the Travelogue of Dr May 26 – July 2, 2011 Gallery 1: KENNETH TIN-KIN HUNG The Travelogue of Dr. Brain Damages ARTIST STATEMENT: In response to increasingly pervasive and draconian online censorship in China, “The Travelogue of Dr. Brain Damages” examines the role of Kuso culture (惡搞文化/ détournement) and its impact on Chinese internet. The Chinese title 腦殘遊記 is a homophonic wordplay to 老殘遊記 (The Travels of Lao Can), a late Qing dynasty novel that fiercely attacks the injustices, corruptions and exposed the hypocrisy of government officials at the time. In an era that internet as a tool for both freedom and suppression, the project questions whether internet in China is an effective tool for social changes by adapting and remixing Chinese netizens meme languages with Western icons. BACKGROUND: According to The China Internet Network Information Center (CNNIC), as of December 2010, China has the highest numbers of internet users in the world totaling 457 millions, which account as only 34.3% of the country’s population. Since 2002, online independent media and tabloids have played an important role in political discourse within Chinese society. Many Chinese intellectuals have used the Internet to discuss the possible evolution of Chinese politics. With the soaring growth of internet users in recent years, Internet becomes the major platform for Chinese citizens in exposing corrupt officials scandals (most famously “我爸是李刚!” ((My Dad Is Li Gang!)) incident), discussing current events and commenting on government policies. In response to the rise of internet freedom, the Chinese government escalates its effort to neutralize critical online opinion. China’s Internet censorship is regarded by many as the most pervasive and sophisticated in the world. According to a Harvard study, at least 18,000 websites are blocked from within the country. The first major online censorship measurement is the “金盾工程” (Golden Shield Project) which started in 1998 and began operations in November 2003. Known in the Western world as “The Great Firewall of China”, the project aims to block content by preventing IP addresses from being routed through and consists of standard firewalls and proxy servers at the Internet gateways. In 2005, see the beginning of “五毛党” (50 Cents Party). Officially designated as Internet commentators, “50 Cents Party” are people hired by the Chinese Government to post comments favorable towards the government policies to skew the public opinion on various Internet message boards. They operate on domestic websites, bulletin board systems, and chatrooms. Their role is to steer the discussion away from anti-party articulations, politically sensitive or “unacceptable” content and advance the party line of the Communist Party. In 2009 comes another draconian censorship project- the “绿坝·花季护航” (Green Dam Youth Escort). Green Dam Youth Escort is content-control software for Microsoft Windows operating systems developed in the People’s Republic of China (PRC). Originally under a directive from the Ministry of Industry and Information Technology (MIIT) to take effect on 1 July 2009, it was to be mandatory to have either the software pre-installed, or have the setup files on an accompanying compact disc, for all new personal computers sold in mainland China, including those imported from abroad. However, because the proposed policy proved deeply unpopular, mandatory pre-installation has been delayed to an undetermined date. In response, Internet citizens have created a manga-style Moe anthropomorphism named “绿坝” (Green Dam Girl) to parody the pervasive policy. Also in early 2009, another project namely “整治互联网低俗之风专项行动” (Correct Internet Vulgar Content Special Operation) is implemented by the authorities. As the title of the campaign suggested, more than 1911 websites that included vulgar languages and pornographic materials are ordered to shut down and performed self-censorship. Among the websites being accused of “vulgar” are the four biggest Chinese websites- Sina, Sohu, Baidu and Tencent, as well as foreign websites including Google and MSN. Chinese profane languages including “操你媽” (Fuck your Mother) are ordered to be removed entirely from 1 the Chinese internet. In response to the campaign, Chinese netizens invented “百度十大神兽” (The Baidu 10 Mythical Creatures). The internet meme initially began as a series of vandalized contributions to Baidu Baike (Chinese version of Wikipedia), through the creation of humorous articles describing a series of fictional creatures, with each animal with names vaguely referring to Chinese profanities (utilizing homophones and characters using different tones). The most notable one is 草泥马 “Grass Mud Horse” which share a similar pronunciation of 操你媽 (Fuck Your Mother). Almost overnight, Chinese internet users started substituting the profanities with the mythical creatures and a widespread internet meme phenomenon was born. Grass Mud Horse has since become the icon of citizens’ resistance to censorship. In February 2011, inspired by and named after the Jasmine Revolution in Tunisia, anonymous call for a 中國茉莉花革命 (Chinese Jasmine Revolution) in China’s major cities was made online, first on the Boxun.com website, run by overseas dissidents, and then on Twitter. The initial call for protest began on 19 February 2011 when 12 to 13 cities were suggested. The Boxun.com appeal called for protests to take place each weekend, arguing that “sustained action will show the Chinese government that its people expect accountability and transparency that doesn’t exist under the current one-party system.” In response to the Jasmine Revolution, world’s largest mobile phone operator China Mobile and state-owned China Unicom blocked the word “jasmine”. Searches for “jasmine” were also blocked on China’s largest microblog, Sina Weibo, and status updates with the word on Chinese social networking site Renren were met with an error message and a warning to refrain from postings with “political, sensitive … or other inappropriate content.” Since the word “Jasmine” was forbidden in the Chinese blogosphere, millions of netizens used the term “兩會” (Two Conferences) instead, a widely used expression in the official news originally pointing to the two conferences “Fourth Session of the Eleventh National People’s Congress” and “Fourth Session of the Eleventh CPPCC” happening in March in Beijing. Since late February, about 35 human rights activists and lawyers were arrested or detained by authorities, five people were charged with inciting subversion of state power, and up to 200 people are subject to reinforced supervision or house arrest. Among them are leading Sichuan human rights activist 陈卫 (Chen Wei), Tiananmen Square protest student leader 丁矛 (Ding Mao), well-known blogger 冉云飞 (Ran Yunfei), and 滕彪 (Teng Biao) of 公盟 (Open Constitution Initiative OCI). The highest-profile arrest is Ai WeiWei, who was taken into police custody on 3 April in Beijing. In April, 2011, hackers attack online petition platform Change.org in the wake of a campaign calling for the release of Chinese artist and activist Ai WeiWei. The petition has attracted more than 130,000 signatures, including many from leading museums such as the Guggenheim, MoMA and Tate Modern. POPULAR CHINESE INTERNET TERMS: To understand the symbols used in this project please visit ChinaDigitalTime.org and ChinaSmack.com for a detailed list of common Chinese-language internet terms, expressions, acronyms, or slang. INSTALLATION: On the wall of the installation behind the framed works, the message “不翻长城非好汉” was written with bright red paint. The original Chinese quote is ” 不到” by Mao ZeDong meaning “If you fail to reach the Great Wall, you are not a true Real Man.” One character was changed and now it means “If you fail to leap over the Great FireWall of China, you are not a true Real Man.” The calligraphy style is a reminiscence of the “拆” (Demolish) and the utilitarian look of hand drawn “no parking” or “don’t spit” warning signs in the old neighborhoods within major Chinese cities. The installation consists of 10 framed digital prints, a 6 minutes long HD video and a ping-pong table sculpture. WORKS: The works in the series is divided into two different categories and serves different purposes: • Documentary and Social Commentary- The works in this category are meant to document and comment on the historical progress of Chinese internet censorship and its resistance. • Testing the Water- The works in this category are meant to be distributed virally in Chinese’s internet realm, thus includes more Tongue-in-cheek Chinese wordplays that aims to generate responses. 2 Chinese Contradicted Patriot Wine 2011 digital print on canvas 36 x 48 X 4 inches edition of 5 + AP A pun on the Chinese iconic national liquor 茅台酒 (MouTai), the revised content of the 矛盾酒 (MouDun) consisted of the following messages in Chinese (follow by English translation): • 纯茉莉花酿制- Fermented and brewed by Pure Jasmine • 爱国度: 120% Vol- Level of Patriotism: 120% Vol • 净含量: 5000 Yrs- Content: 5000 Years • Ma de in China- “Ma de” is the Romanization for 妈的 which literally means “mother’s” and is short for “f**k your mother.” The term is roughly equivalent to “damn,” or “f**k” in English. • 神州天朝马勒戈壁市某山寨酒厂- 神州 (China), (The Celestial Empire- an ancient name for China. Recently, netizens have used the term sarcastically to refer to China under the current government. Oftentimes the term is used to suggest that China’s leaders are self- important and have a China-centric view of the world.), (The Mahler Gobi is the fictional home of the Grass-Mud Horse. In Chinese, “mǎ lè gē bì” sounds the same as “your mother’s f**ing cunt” (妈了个屄), 某山寨 (some imitation/ knock-off distillery) • 敏感瓷加倍过滤- 敏感瓷 (sensitive porcelain) sounds the same in Chinese as “sensitive words” (敏词). “Sensitive words” in China are names of politicians, religious movements (like Falun Gong), events like (The thirty-fifth of May), and subversive online terms (like Grass- Mud Horse). 加倍 means extreme distilled (filtered). The phrase means the sensitive words are being extremely filtered.
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Nation-State Cyber Surveillance Options: the Role of Suppliers
    Nation-State Cyber Surveillance Options: The role of suppliers Eirik Bae Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2014 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Nation-State Cyber Surveillance Options: The role of suppliers Abstract When Edward Snowden in 2013 leaked documents about U.S. surveillance, the focus shifted to how nation-states perform surveillance of Internet and telecom communications, and it was then a need for educated information about the topic. In this master thesis we investigate how nation-states can perform their cyber surveillance, how suppliers of products or services can sup- port the nation-states’ cyber surveillance, and how we can protect ourselves against it. We found that the most prominent way consists of collecting data from central points of communication, e.g. Internet and telecom providers. In some cases, it is necessary for the nation-state to perform targeted surveillance by installing surveillance software onto their suspects’ devices. The infor- mation they collect from centralized and targeted surveillance can lead to big data issues that relate to collecting, storing, and processing the massive amounts of data. A supplier can decide to help nation-states in their cyber surveillance, and by exploiting the trust we lay in the supplier it would result in that we would face a completely different threat landscape, where we find it difficult to protect our privacy and security.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • China Human Rights Report 2009
    臺灣民主基金會 Taiwan Foundation for Democracy 本出版品係由財團法人臺灣民主基金會負責出版。臺灣民主基金會是 一個獨立、非營利的機構,其宗旨在促進臺灣以及全球民主、人權的 研究與發展。臺灣民主基金會成立於二○○三年,是亞洲第一個國家 級民主基金會,未來基金會志在與其他民主國家合作,促進全球新一 波的民主化。 This is a publication of the Taiwan Foundation for Democracy (TFD). The TFD is an independent, non-profit foundation dedicated to the study and promotion of democracy and human rights in Taiwan and abroad. Founded in 2003, the TFD is the first democracy assistance foundation established in Asia. The Foundation is committed to the vision of working together with other democracies, to advance a new wave of democratization worldwide. 本報告由臺灣民主基金會負責出版,報告內容不代表本會意見。 版權所有,非經本會事先書面同意,不得翻印、轉載及翻譯。 This report is published by the Taiwan Foundation for Democracy. Statements of fact or opinion appearing in this report do not imply endorsement by the publisher. All rights reserved. No portion of the contents may be reproduced in any form or by any means without prior written permission of the publisher. Taiwan Foundation for Democracy China Human Rights Report 2009 CONTENTS Foreword ....................................................................................................................i Chapter I: Preface ............................................................................................. 1 Chapter II: Social Rights .......................................................................... 25 Chapter III: Political Rights ................................................................... 39 Chapter IV: Judicial Rights ...................................................................
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Sinitic Language and Script in East Asia: Past and Present
    SINO-PLATONIC PAPERS Number 264 December, 2016 Sinitic Language and Script in East Asia: Past and Present edited by Victor H. Mair Victor H. Mair, Editor Sino-Platonic Papers Department of East Asian Languages and Civilizations University of Pennsylvania Philadelphia, PA 19104-6305 USA [email protected] www.sino-platonic.org SINO-PLATONIC PAPERS FOUNDED 1986 Editor-in-Chief VICTOR H. MAIR Associate Editors PAULA ROBERTS MARK SWOFFORD ISSN 2157-9679 (print) 2157-9687 (online) SINO-PLATONIC PAPERS is an occasional series dedicated to making available to specialists and the interested public the results of research that, because of its unconventional or controversial nature, might otherwise go unpublished. The editor-in-chief actively encourages younger, not yet well established, scholars and independent authors to submit manuscripts for consideration. Contributions in any of the major scholarly languages of the world, including romanized modern standard Mandarin (MSM) and Japanese, are acceptable. In special circumstances, papers written in one of the Sinitic topolects (fangyan) may be considered for publication. Although the chief focus of Sino-Platonic Papers is on the intercultural relations of China with other peoples, challenging and creative studies on a wide variety of philological subjects will be entertained. This series is not the place for safe, sober, and stodgy presentations. Sino- Platonic Papers prefers lively work that, while taking reasonable risks to advance the field, capitalizes on brilliant new insights into the development of civilization. Submissions are regularly sent out to be refereed, and extensive editorial suggestions for revision may be offered. Sino-Platonic Papers emphasizes substance over form.
    [Show full text]
  • The Internet Beyond Borderless Versus Balkanized
    POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.
    [Show full text]
  • Freedom on the Net 2016
    FREEDOM ON THE NET 2016 China 2015 2016 Population: 1.371 billion Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 50 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 18 18 Political/Social Content Blocked: Yes Limits on Content (0-35) 30 30 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 40 40 TOTAL* (0-100) 88 88 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • A draft cybersecurity law could step up requirements for internet companies to store data in China, censor information, and shut down services for security reasons, under the aus- pices of the Cyberspace Administration of China (see Legal Environment). • An antiterrorism law passed in December 2015 requires technology companies to cooperate with authorities to decrypt data, and introduced content restrictions that could suppress legitimate speech (see Content Removal and Surveillance, Privacy, and Anonymity). • A criminal law amendment effective since November 2015 introduced penalties of up to seven years in prison for posting misinformation on social media (see Legal Environment). • Real-name registration requirements were tightened for internet users, with unregistered mobile phone accounts closed in September 2015, and app providers instructed to regis- ter and store user data in 2016 (see Surveillance, Privacy, and Anonymity). • Websites operated by the South China Morning Post, The Economist and Time magazine were among those newly blocked for reporting perceived as critical of President Xi Jin- ping (see Blocking and Filtering). www.freedomonthenet.org FREEDOM CHINA ON THE NET 2016 Introduction China was the world’s worst abuser of internet freedom in the 2016 Freedom on the Net survey for the second consecutive year.
    [Show full text]
  • Redalyc.Characterizing E-Government in China
    Desafíos ISSN: 0124-4035 [email protected] Universidad del Rosario Colombia Baquero-Hernández, Ricardo Alberto Characterizing E-Government in China Desafíos, vol. 24, núm. 2, julio-diciembre, 2012, pp. 233-257 Universidad del Rosario Bogotá, Colombia Disponible en: http://www.redalyc.org/articulo.oa?id=359633172009 Cómo citar el artículo Número completo Sistema de Información Científica Más información del artículo Red de Revistas Científicas de América Latina, el Caribe, España y Portugal Página de la revista en redalyc.org Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Characterizing E-Government in China RICARDO ALBERTO BAQUERO-HERNÁNDEZ* Artículo recibido: 10 de noviembre de 2010 Artículo aprobado: 12 de febrero de 2011 Para citar este artículo: Baquero Hernández, R. A. (2012). Characterizing E-Government in China. Desafíos, 24 (2), pp. 233-257. Abstract Although E-Government (E-G) is one public policy in China, it still has a long way to go in terms of diffusion across the country and interactive participation from citizens. It constitutes a double sided sword since it enhances the features that China needs to show to the world in international competitiveness and status, but also poses challenges to the Communist rule inasmuch as it has to be controlled. Therefore, E-G is both a political and a managerial issue: it is sensitive to the Chinese Communist Party but also leads to economical and administrative pros- perity and efficiency. Some of the keys would be the development of the middle class, further penetration of the Internet, and more education about virtual tools in government issues and services.
    [Show full text]
  • Artificial Intelligence Standardization White Paper (2018 Edition) 2018
    Translation The following government-issued white paper describes China's approach to standards-setting for artificial intelligence. Appendices list all of China's current (as of January 2018) and planned AI standardization protocols, and provide examples of applications of AI by China's leading tech companies. Title Artificial Intelligence Standardization White Paper (2018 Edition) 2018 Author China Electronics Standardization Institute (CESI; ; ) is the "compiling unit" () for this white paper. The 2nd Industrial Department () of the Standardization Administration of China (SAC; ) is the "guidance unit" () for this white paper. Source CESI website, January 24, 2018. CESI is a think tank subordinate to the PRC Ministry of Industry and Information Technology (MIIT; ); CESI is also known as the 4th Electronics Research Institute (; ) of MIIT. SAC is a component of the PRC State Administration for Market Regulation (), a ministry-level agency under China's cabinet, the State Council. The Chinese source text is available online at: http://www.cesi.cn/images/editor/20180124/20180124135528742.pdf Translation Date Translator Editor May 12, 2020 Etcetera Language Group, Inc. Ben Murphy, CSET Translation Lead Contributing institutions (in no particular order) China Electronics Standardization Institute Shanghai Development Center of Computer (CESI) Software Technology Institute of Automation, Chinese Academy Shanghai Xiao-i Robot Technology Co., Ltd. of Sciences Beijing Institute of Technology Beijing iQIYI Technology Co., Ltd. Tsinghua University Beijing Yousheng Zhiguang Technology Co., Ltd. (mavsyin) Peking University Extreme Element (Beijing) Intelligent Technology Co., Ltd. Renmin University of China Beijing ByteDance Technology Co., Ltd. Beihang University Beijing Sensetime Technology Development Co., Ltd. iFLYTEK Co., Ltd. Zhejiang Ant Small and Micro Financial Services Group Co., Ltd.
    [Show full text]
  • What Do Chinese-Language Microblog Users Do with Baidu Baike And
    What do Chinese-language microblog users do with Baidu Baike and Chinese Wikipedia? A case study of information engagement Han-Teng Liao Oxford Internet Institute University of Oxford Oxford, United Kingdom [email protected] ABSTRACT than in the West [3]. By the first half year of 2010, the content This paper presents a case study of information engagement based produced by amateur Chinese Internet users surpassed that on microblog posts gathered from Sina Weibo and Twitter that produced by professional websites [25]. According to a survey mentioned the two major Chinese-language user-generated report based on 2012 data, around 66.1% of mainland Chinese encyclopaedias. The content analysis shows that microblog users Internet users used a blog/personal space, 54.7% used microblogs, not only engaged in public discussions by using and citing both and 48.8% used social networking websites [5]. One US market encyclopaedias, but also shared their perceptions and experiences report found that 47% of Chinese broadband users had more generally with various online platforms and China’s contributed to UGC in China, including online review sites, filtering/censorship regime to which user-generated content and forums, blogs, etc., and that this UGC content had influenced activities are subjected. This exploratory study thus raises several 58% of purchase decisions in China. Both numbers are much research and practice questions on the links between public higher than the corresponding statistics in the US [23]. discussions and information engagement on user-generated The growth of UGC in mainland China may have contributed to platforms. the creation of a so-called “public opinion monitoring sector” (舆 情监测服務市場), where managers (mostly from the public Categories and Subject Descriptors sector) buy up-to-date information about the latest online public [Human-centered computing]: Collaborative and social opinion in mainland China.
    [Show full text]
  • Cross-Border E-Commerce
    How to Enter the Chinese Market via Cross Border Ecommerce Speaker: John Piao & Winnie Xu We value your success www.digiantglobal.com www.ChemLinked.com SPEAKERS John Piao Winnie Xu Co-founder and Head of Digiant Global E-commerce ChemLinked Cosmetic Regulatory Editor & Analyst Department Winnie is the cosmetic regulatory editor and analyst from John has 13 years of E-commerce Operations and ChemLinked with considerable expertise in cosmetic Digital Marketing experience. He has led several cross- regulations of China, Japan, ASEAN and Australia. Having border transactions between Europe and Asia while at attended various industry conferences in China, she has BetterLife Group, Parkland Group and Lenovo. In the extensive experience in China cosmetic market entry, past 8 years, John has promoted consumers' F&B, especially in CBEC, cosmetic pre-market approval Personal Care, and Fashion brands from Germany and compliance requirements. Italy in the Chinese Market. Email: [email protected] Email: [email protected] How to Enter the Chinese Market via Cross Border Ecommerce Speaker: John Piao & Winnie Xu We value your success www.digiantglobal.com www.ChemLinked.com Agenda 1. Overview of Chinese Cosmetic/Personal Care Products in CBEC Market 1.1 Growing Trends of Cosmetic Products 1.2 China CBEC Market Size 2. Deeply Decoding China CBEC Channel 2.1 What is CBEC? 2.2 Two Major Modes 2.3 Interpretation of 2018 CBEC policy 2.4 Comparison 3. Winning Strategy for Chinese EC Market 3.1 E-commerce Law 3.2 Factors that Influence Chinese Users’ Online Shopping 4. Preparation of Starting EC Operation in China 4.1 Are You Ready to start EC Operation? 4.2 Consumer’s Journey and Preparation from Brand 4.3.
    [Show full text]