Withering Gongzhi: Cyber Criticism of Chinese Public Intellectuals
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Knowledge Control and Social Contestation in China's
Science in Movements This book analyzes and compares the origins, evolutionary patterns and consequences of different science and technology controversies in China, including hydropower resistance, disputes surrounding genetically modified organisms and the nuclear power debate. The examination combines social movement theories, communication studies, and science and technology studies. Taking a multidisciplinary approach, the book provides an insight into the interwoven relationship between social and political controls and knowledge monopoly, and looks into a central issue neglected by previous science communication studies: why have different con- troversies shown divergent patterns despite similar social and political contexts? It is revealed that the media environment, political opportunity structures, knowledge-control regimes and activists’ strategies have jointly triggered, nur- tured and sustained these controversies and led to the development of different patterns. Based on these observations, the author also discusses the significance of science communication studies in promoting China’ssocialtransformation and further explores the feasible approach to a more generic framework to understand science controversies across the world. The book will be of value to academics of science communication, science and technology studies, political science studies and sociology, as well as general readers interested in China’s science controversies and social movements. Hepeng Jia is a professor of communication at Soochow University, Suzhou, China. He has worked as a leading science journalist for 20 years and is also a pioneering researcher in the field of science journalism and communication in China. Chinese Perspectives on Journalism and Communication Series Editor: Wenshan Jia is a professor of communication at Shandong University and Chapman University. With the increasing impact of China on global affairs, Chinese perspectives on journalism and communication are on the growing global demand. -
Download (2.08
Mothering in a Polluted, Developing China: Class, Risk perception, and Environmentalist Motherhood BY JIALIN LI B.A., East China Normal University, Shanghai, China, 2003 M.A., East China Normal University, Shanghai, China, 2007 THESIS Submitted as partial fulfillment of the requirements for the degree of Doctor of Philosophy in Sociology in the Graduate College of the University of Illinois at Chicago, 2019 Chicago, Illinois Defense Committee: Claire L. Decoteau, Chair and Advisor Paul-Brian McInerney Anthony Orum Crystal Patil, College of Nursing Amy Hanser, University of British Columbia This thesis is dedicated to all the mothers whose stories are told here. ACKNOWLEDGEMENTS On a sunny spring afternoon, I was preparing for my lecture about Diane Bates’ book Superstorm Sandy: The Inevitable Destruction and Reconstruction of the Jersey Shore in the library of the College of New Jersey. It was my second time to lecture this book. But I was still mesmerized by the section where Diane detailed all the pop culture (e.g., songs, TV dramas) that people use to construct their symbolic identity of being a New Jerseyan. I am particularly interested in Bruce Springsteen’s song My Hometown, a song which was first recorded in 1983 when Bruce was only 35. The entire song beautifully describes Bruce’s attachment to New Jersey, as a child in the 1950s, as a teenage in the 1960s, and as an adult in the 1980s. In its third verse, Bruce detailed a deteriorating New Jersey where textile mills were being closed and jobs were disappearing. The lyrics immediately reminded me of my childhood as my parents were textile factory workers for decades before they retired. -
Introduction
Introduction seething debate over genetically modified (GM; genetically engi- neered, genetically altered, bioengineered, or transgenic [zhuan- A jiyin]) crops and foods has been unfolding in China. On March 1, 2014, Cui Yongyuan, a former anchor of China Central Television (CCTV, China’s predominant state television broadcaster) and then on the faculty of the Communication University of China, uploaded a documentary on his fact-finding mission on GM foods in the United States for free view- ing on China’s three main internet portals—Sina, Tencent, and Sohu. Using one million renminbi (RMB) ($163,000) of his own money,1 Cui shot the sixty-eight-minute film over a period of ten days, December 8–18, 2013, in Los Angeles, San Diego, Chicago, Springfield (Illinois), Seattle, and Davis (California). He visited supermarkets and farmers’ markets and interviewed some thirty government officials, academics, campaigners in nongovern- mental organizations (NGOs), and consumers to learn about the produc- tion of GM crops and consumption of GM foods in the United States. The documentary, which received millions of hits in a matter of days, was criticized as purportedly misleading by supporters of genetically modified organisms (GMOs), most notably Fang Zhouzi, a biochemist turned science writer who had been embroiled in a dispute with Cui over the issue since September 2013.2 The release of the documentary coincided with annual sessions (lianghui) of the National People’s Congress (NPC), China’s legislature, and the Chinese [ xv ] People’s Political Consultative Conference (CPPCC), a political advisory body, both of which convene in early March. As so often happens, Cui was a CPPCC member who later submitted several anti-GMO proposals at the meeting. -
Cyberbullying and Ohio Schools: a Social Justice Framework to Understand and Create Change Lorri A
Cyberbullying and Ohio Schools: A Social Justice Framework to Understand and Create Change Lorri A. Gerwig-Parker Donna Tromski-Klingshirn Rebecca Kolssak Joshua D. Miller Wright State University Abstract In 2019, 36.5% of students, age 12-17, reported that they were cyberbullied at some point in their life. Cyberbullying is a growing problem within Ohio. Self-mutilation, attempted suicide, and death have been linked to victims of cyberbullying. Within Ohio, there are also legal implications for schools to consider. Using Bronfenbrenner’s ecological systems framework, different types of cyberbullies, bullying practices, and proposed solutions for cyberbullying can be addressed in a more comprehensive manner within the schools. Ultimately, schools can be the vanguards for social justice, creating the cultural shift to end cyberbullying and its devastating effects on victims. Keywords: cyberbullying, school administration and faculty, adolescents, social justice, ecological model Cyberbullying, also known as e-bullying or digital harassment, has grown from a technological possibility to a universal problem among communities of young people within the past two decades. Adolescent populations have both high rates of victimization and potentially severe consequences to their mental and physical health. Hinduja and Patchin (2019) indicated that 36.5% of adolescents ages 12 to 17 in the United States reported being cyberbullied at least once. Further, according to Pacer’s National Bullying Prevention Center (2019) only 33% of adolescent victims -
Download Article
International Conference on Arts, Design and Contemporary Education (ICADCE 2016) Ancient Emaki "Genesis" Exploration and Practice of Emaki Art Expression Tong Zhang Digital Media and Design Arts College Beijing University of Posts and Telecommunications Beijing, China 100876 Abstract—The ancient myths and legends with distinctive generation creators such as A Gen, sheep and others, and a Chinese characteristics, refers to myths and legends from dedicated serial picture book magazine "Paint Heart", Chinese Xia Dynasty until ancient times, it carries the origin of "STORY" appears, the delicate picture and vivid story make Chinese culture and it is the foundation of the Chinese nation, it Chinese picture book also developing rapidly and has formed a influence the formation and its characteristics of the national national reading faction craze for outstanding picture books. spirit to a large extent. The study explore and practice the art expression which combines ancient culture with full visual 1) Picture book traced back to ancient Chinese Emaki: impact Emaki form, learn traditional Chinese painting China has experienced a few stages include ancient Emaki, techniques and design elements, and strive to make a perfect illustrated book in Republican period and modern picture performance for the magnificent majestic ancient myth with a books. "Picture book", although the term originated in Japan, long Emaki. It provides a fresh visual experience to the readers and promotes the Chinese traditional culture, with a certain but early traceable picture books is in China. In Heian research value. Kamakura Period Japanese brought Buddhist scriptures (Variable graph), Emaki (Lotus Sutra) and other religious Keywords—ancient myths; Emaki form; Chinese element Scriptures as picture books back to Japan, until the end of Middle Ages Emaki had developed into Nara picture books. -
Sociotechnical Security As an Analytic Framework
Entanglements and Exploits: Sociotechnical Security as an Analytic Framework Data & Society Research Institute Columbia University Matt Goerzen, Elizabeth Anne Watkins, Open Technology Fund Research Fellow Gabrielle Lim, Abstract Unfortunately, platform-linked violence like the incidents in The rise of social media platforms has produced novel Christchurch and San Diego are not uncommon and are security threats and vulnerabilities. Malicious actors can unlikely to subside in the near future. Other forms of now exploit entanglements of once disparate technical and problematic and potentially dangerous content also social systems to target exposed communities. These proliferate. False and misleading content distributed on exploits pose a challenge to legacy security frameworks Whatsapp in India led to the murders of over two dozen drawn from technical and state-based conceptions of people in 2018 (Goel et al., 2018). The genocide of the referent objects and bounded information systems. In this Rohyinga in Myanmar was partially incited by the military paper we propose a new framework of analysis to meet this through disinformation and false accounts on Facebook challenge, Sociotechnical Security (STsec), which (Mozur, 2018). Facebook usage may also correlate with acknowledges how the interplay between actors produces higher rates of anti-refugee attacks in Germany (Müller and emergent threats to participant communities. This Schwarz 2018). Meanwhile, targeted harassment has been exploratory paper offers an overview of sociotechnical linked to self-censorship and a chilling effect on systems, explains why these threats and vulnerabilities internet-based communications (UN Office of the High require us to expand our understanding of security with Commissioner, 2017). Amnesty International in 2018, for regards to participatory technology, and how sociotechnical example, declared Twitter trolling of women a human rights security can be operationalized as a framework for analysis. -
Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p. -
INTER-TIER CORRESPONDENCE THEORY by LIAN HEE WEE A
INTER-TIER CORRESPONDENCE THEORY by LIAN HEE WEE A dissertation submitted to the Graduate School – New Brunswick Rutgers, the State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Graduate Program in Linguistics written under the direction of Akinbiyi Akinlabi and approved by Akinbiyi Akinlabi Alan Prince Youngmee Yu-cho Matthew Y Chen New Brunswick, New Jersey May 2004 ABSTRACT OF THE DISSERTATION Inter-tier Correspondence Theory By LIAN-HEE WEE Dissertation Director: Akinbiyi Akinlabi Inter-tier Correspondence Theory (ICT) is a theory of candidate structure. It is a response to phenomena in which both opaque and transparent derivational effects are simultaneously attested. The response that ICT provides rests upon the recognition that structural configurations are crucial in triggering alternations in the first place. By appealing to percolation, ICT assumes that each phonological output candidate is in fact a structural representation where non-terminal nodes reconstruct the information content of the constituent nodes. However, reconstruction may be imperfect. That outputs are structural is hardly novel, since GEN generates structures to given strings. Instead, it is the carriage of information in non-terminal nodes that is noteworthy. Under ICT, terminal nodes would be identical to the input string. Alternations no longer apply to strings but to constituencies as elements of the input string percolate upwards in their constituent structures. This is an important improvement because it directly addresses the fact that mere adjacency does not trigger alternation (many marked collocations are tolerated if the offending sequence are not within the same constituent). To be precise, GEN takes an input string and maps it to candidate structures of various percolative possibilities with the terminal nodes identical to the input string and non-terminal nodes corresponding to their subordinates in a multitude of ways. -
How the Chinese Government Fabricates Social Media Posts
American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime. -
Deciphering L33tspeak
Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ............................................................................................................................... -
Can the West Learn from the Rest?' the Chinese Legal Order's Hybrid
University of Michigan Law School University of Michigan Law School Scholarship Repository Other Publications Faculty Scholarship 2009 Can the West Learn from the Rest?' The hineseC Legal Order's Hybrid Modernity Nicholas C. Howson University of Michigan Law School, [email protected] Available at: https://repository.law.umich.edu/other/4 Follow this and additional works at: https://repository.law.umich.edu/other Part of the Comparative and Foreign Law Commons, and the Rule of Law Commons Recommended Citation Howson, Nicholas C. "'Can the West Learn from the Rest?' The hineC se Legal Order's Hybrid Modernity." Hastings Int'l & Comp. L. Rev. 32, no. 2 (2009): 815-30. This Speech is brought to you for free and open access by the Faculty Scholarship at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Other Publications by an authorized administrator of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. Panel IV - "Can the West Learn from the Rest?" - The Chinese Legal Order's Hybrid Modernityt By NICHOLAS CALCINA HOWSON* I am asked to present on the "shortcomings of the Western model of legality based on a professionalized, individualistic and highly formalistic approach to justice" as a way to understanding if "the West can develop today a form of legality which is relational rather than based on litigation as a zero sum game, learning from face to face social organizations in which individuals understand the law" - presumably in the context of the imperial and modem Chinese legal systems which I know best as a scholar and have lived for many years as a resident of the modem identity of the center of the "Chinese world," the People's Republic of China ("PRC"). -
Chinese Legal Culture
Chinese Legal Culture Department: Fudan International Summer Session Course LAWS170003 Code Course Chinese Legal Culture Title 36+3 tutorial hours (one credit Credit 2 Credit Hours hour is 45 minutes) □Specific General Education Courses □Core Courses √General Education Elective Courses Course □Basic Courses in General Discipline □Professional Compulsory Courses □Professional Elective Nature Courses □Others To precisely grasp the basic concepts in Chinese legal culture, such as legalist, penal code, etc. Course To thoroughly understand the mainstreams of traditional legal thoughts in China. Objectives To critically look at contemporary legal phenomena in China. This course will examine the spirit of Chinese law from a historical perspective, with a particular emphasis on its political context. We will explore the early transition of Chinese Course politics and law by the 2rd century B.C.E. (including doctrines of Confucian and legalist Description schools), development and spirits of imperial codes, mechanism of judicial administration in criminal and civil justice, local mediation, and family law. Course Requirements: This course requires the students’ attendance at classes and participation in class discussion. Teaching Methods: Lecture, presentation, group discussion Instructor's Academic Background: Prof. SHI Daxiao obtained his undergraduate and master degrees from Peking University, PhD in Foreign Legal History from Peking University Law School. His research interests include the history of foreign legal systems, the history of Western legal thoughts, and jurisprudence. He has translated classic works of foreign legal history such as European Law: Past and Future: Unity and Diversity in Two Thousand Years, and Common Law Tradition. Email: [email protected] 1 Course Schedule Part I: Introduction to Chinese Law and Legal Culture (3 hours) Chronology, in 1 Sources of Chinese Tradition xxvii-xxxiii (Compiled by Wm.