English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 95906/126496 (76%)
Visitors : 31665123      Online Users : 433
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/128968


    Title: 消除反向凸顯: 在中國背景下各國對技術的認知
    Removing the Reverse Salient: States' Perception towards Internet Technology in the context of China
    Authors: 盧藝璱
    YILDIRIM, SEDA
    Contributors: 陳永福
    Tan, Alexander C.
    盧藝璱
    YILDIRIM, SEDA
    Keywords: 反向顯著性
    信息通訊技術
    國家權力
    中國
    reverse salient
    information and communication technology
    state power
    China
    Date: 2020
    Issue Date: 2020-03-02 11:33:29 (UTC+8)
    Abstract: Knowing that information and communication technology (ICT) has implications for many aspects of state power in general, and especially in the case of China, there was a need for a well-coordinated approach generating the dynamic of control and encouragement of ICT development in China. Through an examination of concerns that have been emerging about what ICT means for Chinese power, this research tended to unveil the unique way of ICT adoption and advancement in China. Of these concerns, the controllability dilemma, data security, and algorithmic-authoritarianism that all escalated with the introduction of the Internet are the piers to understand the dynamics of changes in perceptions and interests of the Chinese government in this regard. This research, thus, is filled with the urge to reveal technical knowledge that has been long lacking in IR literature, and specifically applying such knowledge to understand the Chinese use of ICT and innovation, majorly through observing the continuous process of threats and problems perceived along the way of adoption and innovation (formulated under the reverse saliency model in this research) and how those problems are solved through which aims to foresee the Chinese intentions and big targets in this regard, and finally expect to make a more general sense of how differently state power interacts with technology in the post-industrial model of ICTs.
    Reference: Bibliography
    AMCHAM Shanghai (2018). VPN Regulations and Implications for Business, GPS Technology Quarterly, Available at: https://www.amcham-shanghai.org/sites/default/files/2018-04/GPS%20Technology%20Quarterly%20%28February%202018%29%20.pdf
    Aronson, J. (2002). ‘Global Networks and their Impact in Information Technologies and Global Politics: The Changing Scope of Power and Governance, James N. Rosenau and J. P. Singh (eds.), Albany, NY: State University of New York Press.
    Bachrach, P. and Baratz, M.S. (1963). Decisions and Nondecisions: An Analytical Framework, American Political Science Review 57, pp.641-51.
    Bain (2015). Finding the Silver Lining in China's Cloud Market, from https://www.bain.com/insights/finding-the-silver-lining-in-chinas-cloud-market
    BBC (2017). ‘China's quantum satellite in big leap’, BBC News, Science & Environment, from: https://www.bbc.com/news/science-environment-40294795
    Boerl, C, (2008). Technological Empowerment: The Internet, State, and Society in China, by Yongnian Zheng, 5:4, 413-414, DOI: 10.1080/19331680802555036
    Borgmann, A. (1984). Technology and the Character of Contemporary Life: A Philosophical Inquiry, Chicago: University of Chicago Press.
    Breyman, S. (1993). Knowledge as Power: Ecology Movements and Global Environmental Problems in: Ronnie D. Lipschutz and Ken Conca (eds.), The State and Social Power in Global Environmental Politics, Columbia University Press, p. 126.
    Business Wire, Inc. (2000). “2dobiz.com inside track to mainland China.”
    Carr, Madeline (2016). US Power and the Internet in International Relations: The Irony of the Information Age. Palgrave Macmillan, 1st edition, ISBN 978-1-349-71539-8, ISBN 978-1-137-55024-8 (eBook) DOI 10.1057/9781137550248
    Carr, N. (2006). The Weakest Link. [online] strategy+business. Available at: https://www.strategy-business.com/article/06403 [Accessed 18 Apr. 2019].
    Castells, Manuel (2000) ‘Toward a Sociology of the Network Society'. Contemporary Sociology, Vol. 29, No. 5 (September).
    Cerf, V.G. and Kahn, R.E. (1974). A Protocol for Packet Network Intercommunication, IEEE, Vol Com-22.
    Chase, M., Hachigian, N., and Mulvenin, J. (2006). Comrade to comrade networks: the social and political implications of peer-to-peer networks in China, Chinese Cyberspaces, Routledge.
    China Information Technology Report (2018). Fitch Solution, from https://store.fitchsolutions.com/china-information-technology-report
    Cleaver, Harry M. Jr. (1998). ‘The Zapatista Effect: The Internet and the Rise of an Alternative Political Fabric'. Journal of International Affairs, pp. 621–40, Vol. 51, No. 2 (Spring).
    CNN (2006). CNN.com - Google to censor itself in China - Jan 25, 2006. [online] Available at: http://edition.cnn.com/2006/BUSINESS/01/25/google.china/ [Accessed 27 Aug. 2019].
    Corrales, J., and Westhoff, F. (2006). Information Technology Adoption and Political Regimes. International Studies Quarterly, 50(4), pp.911-933.
    Damm, J. and Thomas, S. (2006). Chinese Cyberspaces, Routledge, First Edition, Taylor & Francis Group, ISBN 0-203-40032-1.
    Deibert, Ronald J., Palfrey, J., Rohozinski, R., and Zittrain, J., (2010). Access Controlled: The Shaping of Policy of Global Internet Filtering. Cambridge: MIT Press.
    Diamond, L. (2010). “Liberation Technology, Journal of Democracy Volume 21, Number 3, p. 82.
    Dodge, M. (1998). Accessibility to Information within the Internet: How can it be Measured and Mapped?. University College London. [online] Available at: http://www.casa.ucl.ac.uk/martin/varenius_accessibility.pdf [Accessed 19 Aug. 2019].
    Drezner, Daniel W., and Henry Farrell (2004). ‘Web of Influence’, Foreign Policy, pp. 32–40, No. 145 (November/December).
    EFF (2019). China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, from https://www.eff.org/deeplinks/2019/10/chinas-global-reach-surveillance-and-censorship-beyond-great-firewall
    Endeshaw, A. (2004) Internet Regulation in China: The Never-ending Cat and mouse game. Information and Communication Technology Law, Vol.13, No.1
    Foster, W. and Goodman, S.E. (2000). The Diffusion of the Internet in China, A Report of the Center for International Security and Cooperation, Stanford University.
    Foucault, M. (1977). Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, Pantheon Books.
    Franklin, M.I. (2004) Post Colonial Politics, the Internet and Everyday Life: Pacific Traversals Online, New York: Routledge.
    Gil, D. (2017) Quantum computing explained with a deck of cards, The MIT Venture Capital + Innovation Conference, IBM Research, Available at: https://www.youtube.com/watch?v=yy6TV9Dntlw
    Glenn Research Center, Newton’s Laws of Motion, NASA, from https://www.grc.nasa.gov/www/k-12/airplane/newton2.html
    Guo, L., Huang. J., and Zhang, Y. (2019). Education Development in China: Education Return, Quality, and Equity, Sustainability 2019, 11, 3750; doi:10.3390/su11133750, www.mdpi.com/journal/sustainability
    Guterl, F. (2019). Are We Ready for a ‘Quantum Surprise’ from China? Newsweek, Tech & Science, Available at: https://www.newsweek.com/china-quantum-computing-1467835
    Hachigian, Nina (2002) ‘The Internet and Power in One-Party East Asian States’, History of Technology, Trevor E. Pinch and Wiebe E. Bijker (eds.), Cambridge.
    Harwit, E. and Clark D. (2001). Government policy and political control over China’s Internet, Chinese Cyberspaces, Routledge.
    Heilbroner, Robert (1961) ‘Do Machines Make History?’, Technology and Culture, pp. 335–345, Vol. 2 (Winter).
    Hoffman, C. (2017). How the “Great Firewall of China” Works to Censor China’s Internet, How-to-Geek, from https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/
    Hoffman, S. (1975). Notes on the Elusiveness of Modern Power, International Journal 30, p. 204.
    Hughes, T.P. (1989). ‘The Definition of Large Technological Systems’. in The Social Construction of Technological Systems: New Directions in the Sociology and History, MIT Press.
    Jefferson, G. (2018). State-owned enterprise: reform, performance and prospects. In W. Wu & M. W. Frazier, The sage handbook of contemporary china, (Vol. 2, pp. 121-142). 55 City Road, London: SAGE Publications Ltd doi: 10.4135/9781526436085.n7
    Jessop, B. (1990). State theory. Oxford: Polity Press.
    Keck, M.E., and Sikkink, K. (1998). Activists Beyond Borders – Advocacy Networks in International Politics, Cornell University Press/ Ithaca.
    Keohane, R.O. and Nye, J.S. (1998). Power and Interdependence in the Information Age, Foreign Affairs, vol. 77 (5), pp. 81-94.
    Kokas, A. (2019). Cloud Control: China’s 2017 Cybersecurity Law and its Role in US Data Standardization. Available at SSRN: https://ssrn.com/abstract=3427372 or http://dx.doi.org/10.2139/ssrn.3427372
    Krasner, S. (2009). Power, the state and sovereignty. New York, NY: Routledge.
    Langman, Lauren (2005). ‘From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements'. Sociological Theory, pp. 42–74, Vol. 23, No. 1.
    Latham, K. (2007). ‘SMS, Communication, and Citizenship in China's Information Society'. Critical Asian Studies, pp. 295–314, Vol. 39, No. 2 (June).
    Lessig, L. (2006). Code. New York, Basic Books.
    Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor Press/Doubleday, 416–18.
    Lorentzen, P. (2013). China’s Strategic Censorship. American Journal of Political Science, Vol. 58, No. 2, April 2014, Pp. 402–414, Midwest Political Science Association DOI: 10.1111/ajps.12065
    Lukes, S. (1974). 'Power: A Radical View'. Macmillan, p.13.
    Mackenzie, D. (1996). 'Knowing Machines'. Cambridge: The MIT Press.
    MacKenzie, D., and Judy, W. (eds.) (1999). 'The Social Shaping of Technology'. Philadelphia: Open University Press.
    MacKinnon, R. (2010). Networked Authoritarianism in China and Beyond Implications for global Internet freedom. Liberation Technology in Authoritarian Regimes. Hoover Institution & the Center of Democracy, Developmental Rule of Law (CDDRL), Stanford University.
    Marcuse, H. (2013). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. New York, NY: Routledge.
    Mayer-Schoenberger, V., and Brodnig, G. (2001). 'Information Power: International Affairs in the Cyber Age'. SSRN Electronic Journal.
    Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics, London: W.W.Norton.
    Merics Papers on China (2016). Made in China 2025, The making of a high-tech superpower and consequences for industrial countries, Merics.
    Merics China Monitor (2017). China’s Social Credit System, A big-data enabled approach to market regulation with broad implications for doing business in China, Merics.
    MIIT (2017). Notice of the Ministry of Industry and Information Technology on Cleaning Up and Regulating the Internet Access Service Market [Effective]. No.32, People's Republic of China, Available at: http://en.pkulaw.cn/display.aspx?cgid=992e987ace0e25e7bdfb&lib=law
    Morgenthau, H. (1978). Politics Among Nations: The Struggle for Power and Peace, 5th Edition Revised, New York, NY: Alfred A. Knopf.
    Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom, New York, NY: PublicAffairs.
    Mumford, L. (1970). The Myth of the Machine: The Pentagon of Power, New York, NY: Harcourt Brace Jovanovich.
    National Science Report (2018). Science and Engineering Indicators, from https://nsf.gov/statistics/2018/nsb20181/
    Nye, J.S. (1990). 'Bound To Lead: The Changing Nature of American Power'. Basic Books.
    Nye, Joseph S. (2002). 'The Paradox of American Power: Why the World's Only Superpower Can't Go It Alone'. Oxford: Oxford University Press.
    Nye, Joseph S. (2004) Soft Power: The Means to Success in World Politics, New York, NY: PublicAffairs.
    Olson, M. (1993). Dictatorship, Democracy, and Development. American Political Science Review 87 (3): 567-576.
    Perlmutter, A., and William M. L. (1982). "The Party in Uniform: Toward a Theory
    of Civil-Military Relations in Communist Political Systems." The American Political
    Science Review 76 (4):778. doi: 10.2307/1962970.

    Project Zero (2019). Google Project Zero, Available at: https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
    Quartz in the Shadows (2017). Meet Shadowsocks, the underground tool that China’s coders use to blast through the Great Firewall, Available at: https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall/
    Reagle, J. (1999) “Why the Internet is good: community governance that works well,” Berkman Center Working Draft.
    Reuters Business News (2017). Apple says it is removing VPN services from China App Store. Retrieved 24 December 2019, Available at: https://www.reuters.com/article/us-china-apple-vpn/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQ
    Rothkopf, D.J. (1998). ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, pp. 325–59, Vol. 51, No. 2 (Spring).
    Rouse, M. (2007). What is reverse engineering? - Definition from WhatIs.com. [online] SearchSoftwareQuality. Available at: https://searchsoftwarequality.techtarget.com/definition/reverse-engineering [Accessed 26 Aug. 2019].
    Sassen, S. (1999). ‘The Impact of the Internet on Sovereignty: Unfounded and Real Worries’, Paper presented to the Internet and International Systems: Information Technology and American Foreign Policy Decision-Making Workshop, Nautilus Institute, San Francisco (10 December), http://www.nautilus.org/gps/ info-policy/workshop/papers/sassen.html.
    Schneider, F. (2018). China’s Digital Nationalism, Published to Oxford Scholarship, DOI:10.1093/oso/9780190876791.003.0001
    SCMP (2019). Artificial intelligence is watching China’s students but how well can it really see? South China Morning Post, China/ Politics, Available at: https://www.scmp.com/news/china/politics/article/3027349/artificial-intelligence-watching-chinas-students-how-well-can
    Singer, J.D. and Small, M. (1966). "The Composition and Status Ordering of the International System: 1815-1940," World Politics 18
    Smith, G. and Moises N. (2000). Altered States: Globalization, Sovereignty and Governance, Ottawa: International Development Research Centre.
    Smith, J.O. (2010). Physical Audio Signal Processing, online book, 2010 edition, from http://ccrma.stanford.edu/~jos/pasp/
    Strange, S. (1988). States and Markets, Blackwell.
    Symantec Acquires SafeWeb. (2003). Retrieved 27 December 2019, from https://www.nortonlifelock.com/about/newsroom/press-releases/2003/symantec_1020_01
    Tanji, M. (2007). ‘Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats’, Journal of Cyber Conflict Studies, pp. 4–11, Vol. 1, No. 1 (December). The MIT Press.
    TechCrunch (2019). Sources say China used iPhone hacks to target Uyghur Muslims, Available at: https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/
    Tett, Gillian. (2017). “Trump, Cambridge Analytica and How Big Data Is Reshaping Politics.” Financial Times, Available at: https://www.ft.com/content/e66232e4-a30e-11e7-9e4f-7f5e6a7c98a2
    Thaler, R.H., and Cass R.S. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Revised & Expanded edition. New York: Penguin Books.
    The Citizen Lab (2015). China’s Great Cannon, Munk School of Global Affairs, University of Toronto, Available at: https://citizenlab.ca/2015/04/chinas-great-cannon/
    Unver, H.A. (2018). Artificial Intelligence, Authoritarianism, and the Future of Political Systems, Cyber Governance and Digital Democracy 2018/9, EDAM.
    Vig, N. (1988). ‘Technology, Philosophy and the State’, in Technology and Politics, Michael E. Kraft and Norman J. Vig (eds.), Durham and London: Duke University Press.
    Wagner, P.R. (2005). “On Software Regulation,” Southern California Law Review 78: 457, 487.

    Waltz, K.N. (1979). Theory of International Politics, Boston: McGraw Hill.
    Wendt, A. (1999). Social Theory of International Politics, Cambridge: Cambridge University Press.
    Winner, L. (1985). ‘Do Artefacts have Politics?’ in The Social Shaping of Tech- nology: How the Refrigerator Got Its Hum, Donald MacKenzie and Judy Wacjman (eds.), Philadelphia: Open University Press.
    World Bank (2018). Literacy rate, youth total (% of people ages 15-24) - India, China, from https://data.worldbank.org/indicator/SE.ADT.1524.LT.ZS?locations=IN-CN
    Wu, J. and Lam, O. (2017). The evolution of China's Great Firewall: 21 years of censorship. (online) Hong Kong Free Press HKFP. Available at: https://www.hongkongfp.com/2017/09/03/evolution-chinas-great-firewall-21-years-censorship/
    Description: 碩士
    國立政治大學
    亞太研究英語碩士學位學程(IMAS)
    106926024
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0106926024
    Data Type: thesis
    DOI: 10.6814/NCCU202000351
    Appears in Collections:[亞太研究英語博/碩士學位學程(IDAS/IMAS) ] 學位論文

    Files in This Item:

    File SizeFormat
    602401.pdf2778KbAdobe PDF10View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback