Loading...
Serving the people : China's cybersecurity policy and its implications
Chen, Cheng-Yu ; Liu, Tony Tai-Ting ; Romaniuk, Scott
Chen, Cheng-Yu
Liu, Tony Tai-Ting
Romaniuk, Scott
Citations
Altmetric:
Abstract
This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.
The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist.
This chapter reviews the context that spurred the development of China's cybersecurity policy and observes the impact and meaning of such government policies, institutions, and legal norms. In addition, it also discusses the implications of China's cybersecurity policy for international relations. To understand China’s cybersecurity policy, it is important to first examine the history of internet usage in China. Beijing views the development of the internet as a process in the evolution from an industrial society to an information society, or a process of “informatization”. Over the years, Beijing has established laws, regulations, and institutions aimed at increasing the state’s ability to monitor internet speech and prevent threats to the CCP. At the same time, institutions were established to realize the rule by law while cybersecurity laws were established to serve as non-tariff barriers against trade opponents. The authors survey the development of China’s cybersecurity policies, including regulations, legal governance, and new cyber legislation.
Keywords
Politics, International Relations
Date
2021
Type
Book chapter
Journal
Book
Routledge Companion to Global Cyber-Security Strategy
Volume
Issue
Page Range
284-296
Article Number
ACU Department
Collections
Relation URI
DOI
Event URL
Open Access Status
License
All rights reserved
File Access
Controlled
Notes
© 2021 selection and editorial matter, Scott N. Romaniuk and Mary Manjikian; This chapter, Cheng-Yu Chen, Tony Tai-Ting Liu, and Scott N. Romaniuk.
