Cyber Insecurity of Chinese Citizens

Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

The chapter restates the well known fact that China’s government demands a near absolute right to monitor online activity of its citizens. It is introduced by results of a 2017 report on citizen security in cyberspace by major cities in China. It is then organized around four themes: defenses against cyber crime; the cybersecurity confidence of the citizens; protection of political privacy, including in connection with advanced artificial intelligence; and other personal privacy, especially in the light of the emerging social credit system.

Keywords

Dictatorship Tibet Xinjiang Social credit system Privacy Ransomware Fraud Data leaks Cyber crime Artificial intelligence 

References

  1. Antiy (2017) Review and prospects for cybersecurity threats in 2016. In Chinese. http://www.antiy.cn/report/2016_Antiy_Annual_Security_Report.html#2
  2. Austin G (2014) Cyber policy in China. Polity, CambridgeGoogle Scholar
  3. Backer LC (2017) Measurement, assessment and reward: the challenges of building institutionalized social credit and rating systems in China and in the West. In: Proceedings of the Chinese social credit system, Shanghai Jiaotong University, 23 Sept 2017. https://ssrn.com/abstract=3040624
  4. Barmé G, Ye S (1997) The great firewall of China. Wired. 1 June 1997. https://www.wired.com/1997/06/china-3/
  5. Broadhurst R, Liu J (2004) Introduction: crime, law and criminology in China. In: Aust NZ J Criminol 37(1_suppl):1–12CrossRefGoogle Scholar
  6. Cao S (2017a) China to mobilize net users for cyber security. Global Times. 13 Sept 2017. http://www.globaltimes.cn/content/1066130.shtml
  7. Cao S (2017b) Telecom fraudsters plead guilty in student death case. China Daily. 28 June 2017. http://www.chinadaily.com.cn/china/2017-06/28/content_29911556.htm
  8. Chen Y, Zahedi FM (2016) Individuals’ internet security perceptions and behaviors: polycontextual contrasts between the United States and China. MIS Q 40(1):205–225CrossRefGoogle Scholar
  9. China Daily (2016) Online infringements cost $13.8b a year. 24 June 2016. http://www.chinadaily.com.cn/business/2016-06/24/content_25841504.htm
  10. Clark C, Zhang L (2017) Grass-mud horse: Luhmannian systems theory and internet censorship in China. Kybernetes 36(5):768–801Google Scholar
  11. CNNIC (2017) Statistical report on internet development in China 2017. https://cnnic.com.cn/IDR/ReportDownloads/201706/P020170608523740585924.pdf
  12. Gan N (2017) China’s security chief calls for greater use of AI to predict terrorism, social unrest. South China Morning Post. 21 Sept 2017. http://www.scmp.com/news/china/policies-politics/article/2112203/china-security-chief-calls-greater-use-ai-predict
  13. Hebenton B, Jou S (2018) Criminology in China. In: The handbook of the history and philosophy of criminology. (ed) Triplett RA. Wiley, 377–391CrossRefGoogle Scholar
  14. Hoffman S (2017) Managing the state: social credit, surveillance and the CCP’s plan for China. Jamestown Foundation. 17 Dec 2017. https://jamestown.org/program/managing-the-state-social-credit-surveillance-and-the-ccps-plan-for-china/
  15. Hui Z, Tan Q (2016) Cyberspace security in the era of data economy: global and Chinese contexts. In: Hui Z, Tan Q (eds) Annual report on development of cyberspace security in China. Social Sciences Academy Press. Blue Book, Beijing, 1–16Google Scholar
  16. Lee A (2017) World dominance in three steps: China sets out road map to lead in artificial intelligence by 2030. South China Morning Post. 21 July 2017. http://www.scmp.com/tech/enterprises/article/2103568/world-dominance-three-steps-china-sets-out-road-map-lead-artificial
  17. Li T (2017) Chinese facial recognition start-up eyes global opportunities beyond public security. South China Morning Post. 22 Nov 2017. http://www.scmp.com/tech/start-ups/article/2121100/chinese-facial-recognition-start-eyes-global-opportunities-beyond
  18. Liu L, Li JCM (2017) Crime and justice research in China remains underdeveloped by Western standards. J Res Crime Delinquency 54(4):447–453CrossRefGoogle Scholar
  19. Olmstead K, Smith A (2017) Americans and cybersecurity. http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/
  20. Qihoo 360 (2017a) Research on Internet fraud trends for 2016. In Chinese. 13 Jan 2017. http://zt.360.cn/1101061855.php?dtid=1101062366&did=210142130
  21. Qihoo 360 (2017b) 2016 China Internet security report. In Chinese. 12 Feb 2017. http://zt.360.cn/1101061855.php?dtid=1101062514&did=490278985
  22. Rao L, Li L (2016) Terror! Nandu reporter 700 yuan to buy the whereabouts of colleagues and other 11 records. Southern Metropolis Daily. In Chinese. 12 Dec 2016. http://epaper.oeeee.com/epaper/A/html/2016-12/12/content_103959.htm?from=timeline&isappinstalled=0&winzoom=1
  23. State Council (2014) State council notice concerning issuance of the planning outline for the construction of a social credit system (2014–2020). GF No. (2014)21. For english version see Planning outline for the construction of a social credit system (2014–2020). China Copyright and Media.https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2014-2020/
  24. Wang H (2017) 1116 cyber-security police units have been set up nationwide. Guangming Online, Beijing. In Chinese. http://epaper.gmw.cn/gmrb/html/2017-02/14/nw.D110000gmrb_20170214_2-04.htm
  25. Xinhuanet (2017) China to punish illegal publicity on internet forums. 25 Aug 2017. http://news.xinhuanet.com/english/2017-08/25/c_136554917.htm
  26. Xu J (2017) Legitimization Imperative: the production of crime statistics in Guangzhou, China. Br J Criminol 58(1):155–176CrossRefGoogle Scholar
  27. Zheng J (2016) China’s date with big data: will it strengthen or threaten authoritarian rule? Int Aff 92(6):1443–1462.  https://doi.org/10.1111/1468-2346.12750CrossRefGoogle Scholar
  28. Zheng S (2017) VPN crackdown an ‘unthinkable’ trial by firewall for China’s research world. South China Morning Post. 23 July 2017. http://www.scmp.com/news/china/policies-politics/article/2103793/vpn-crackdown-unthinkable-trial-firewall-chinas
  29. Zhu R (2015) An initial study of customer Internet banking security awareness and behavior in China. In: Pacific Asia conference on information systems. PACIS 2015 proceedings, vol 87. http://aisel.aisnet.org/pacis2015/87

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.Australian Centre for Cyber SecurityUniversity of New South WalesCanberraAustralia

Personalised recommendations