The Influence of China’s Political System on Cybersecurity Governance and Strategy
Main Article Content
Keywords
cybersecurity, China, political system, authoritarian governance, cybersecurity governance, cybersecurity strategy
Abstract
This article delves into the intricate relationship between China’s autocratic system and its cybersecurity landscape, examining the extent to which the former influences the development of frameworks, strategies, and responses to cyber threats. Drawing upon a comprehensive analysis of China’s political structure, cybersecurity policies, and historical context, this study investigates how authoritarian governance shapes the nation’s approach to cybersecurity. Methodologically, the article adopts a qualitative approach, drawing on a systematic review of scholarly literature, official publications, and case studies of major cyber incidents to identify recurring patterns and insights. By exploring key factors such as government control, censorship mechanisms, and prioritisation of state interests, it sheds light on the unique challenges and opportunities presented by China’s autocratic system in safeguarding its digital infrastructure. Additionally, this research assesses the implications of these dynamics on international cybersecurity norms and global cyber governance. Through a nuanced exploration of these interconnections, this article offers valuable insights into the complex interplay between political systems and cybersecurity strategies in an increasingly digitised world.
Article Metrics Graph
References
Baldin, B., 2022. Beyond authoritarianism: AI-based surveillance systems for social and security management. The Chinese Social Credit System.
Cabestan, J.P., 2017. The Party runs the show: How the CCP controls the state and towers over the government, legislature and judiciary. In Routledge Handbook of the Chinese Communist Party (pp. 75-91). Routledge. https://doi.org/10.4324/9781315543918-5
Calcara, G., 2020. A transnational police network cooperating up to the limits of the law: examination of the origin of INTERPOL. Transnational Legal Theory, 11(4), pp.521-548. https://doi.org/10.1080/20414005.2020.1793282
Creemers, R. 2016. Disrupting the Chinese state: new actors and new factors. Asiascape: Digital Asia, 5, 169-197. https://doi.org/10.1163/22142312-12340094
CrowdStrike. 2023. CrowdStrike 2023 Global Threat Report: executive summary. Available: https://www.crowdstrike.com/resorurces/reports/global-threat-report-executive-summary-2023/ [Accessed: 13 May 2024].
Dilanian, K. 2023. Forget the spy balloon. China-linked hackers collect far more information, report says. NBC NEWS[ Online]. Available: https://www.nbcnews.com/news/forget-chinese-spy-balloon-china-linked-hackers-collect-far-information-rcna72583 [Accessed: 13 May 2024].
Erqi, G., 2023. The Legal Governance on Cybercrime through the Lens of Positive Criminal Law. Mod. L. Rsch., 4, p.14.
Farwell, J.P., & Rohozinski, R. 2011. Stuxnet & the future cyber war. Survival, 53(1), 23-40. https://doi.org/10.1080/00396338.2011.555586
Gilley, B., 2003. China’s Changing of the Guard: The Limits of Authoritarian Resilience. Journal of Democracy, 14(1), pp.18-26. https://doi.org/10.1353/jod.2003.0008
Glesby, N. and Lackenbauer, P.W., 2024. Balloons, NORAD, and the Defence of North America: Reflections on the February 2023 Incidents Concerning.
Hou, R. and Fu, D., 2024. Sorting citizens: Governing via China’s social credit system. Governance, 37(1), pp.59-78. https://doi.org/10.1111/gove.12751
Hulvey, R.A., 2022. Cyber sovereignty: How China is changing the rules of internet freedom.
Jinguah, L. 2019. What are China’s cyber capabilities and intentions? New York: IPI Global Observatory.
Kostka, G. and Antoine, L., 2020. Fostering model citizenship: Behavioural responses to China’s emerging social credit systems. Policy & Internet, 12(3), pp.256-289. https://doi.org/10.1002/poi3.213
Kshetri, N. 2023b. Cybercrimes in the Former Soviet Union and Central and Eastern Europe: current status and key drivers. Crime, Law and Social Change, 60(1), 39-65. https://doi.org/10.1007/s10611-013-9431-4
Lallie, H.S., Shepherd, L.A., Nurse, J.R., et al. 2021. Cybersecurity in the age of COVID-19: a timeline analysis of cybercrime and cyber-attacks during the pandemic. Computers & Security, 105. https://doi.org/10.1016/j.cose.2021.102248
Li, L. and Zhou, W., 2019. Governing the “Constitutional Vacuum”–Federalism, Rule of Law, and Politburo Politics in China. China Law and Society Review, 4(1), pp.1-40. https://doi.org/10.1163/25427466-00401001
Liang, F. and Chen, Y., 2022. The making of “good” citizens: China’s Social Credit Systems and infrastructures of social quantification. Policy & Internet, 14(1), pp.114-135. https://doi.org/10.1002/poi3.291
Liang, F., Das, V., Kostyuk, N. and Hussain, M.M., 2018. Constructing a data-driven society: China’s social credit system as a state surveillance infrastructure. Policy & Internet, 10(4), pp.415-453. https://doi.org/10.1002/poi3.183
Loo, J., 2021. Free Formosa: The Beginning. Xlibris Corporation.
Loo, J., 2021. Free Formosa: The Beginning. Xlibris Corporation.
Nantieh, P., 2020. How the Ccp Employs Ai Surveillance Tools to Track and Control Citizens and Their Inherent Cybersecurity Risks (Master›s thesis, Utica College).
Orgad, L., & Reijers, W. 2020. How to make the perfect citizen? Lessons from China’s model of social credit system. Fiesole: European University Institute. https://doi.org/10.2139/ssrn.3586503
Pei, M., 2024. The sentinel state: Surveillance and the survival of dictatorship in China. Harvard University Press-T. https://doi.org/10.2307/jj.10860939
Qi, A., Shao, G., & Zheng, W. 2018. Assessing China’s cybersecurity law. Computer Law & Security Review, 34(6), 1342- 1354. https://doi.org/10.1016/j.clsr.2018.08.007
Qi, G., Yating, Z., Youlin, Y et al. 2018. A direct current-voltage measurement method for smart photovoltaic modules with sub-module level power optimizers. Solar Energy, 167, 52-60. https://doi.org/10.1016/j.solener.2018.03.082
Tang, W., 2016. Populist authoritarianism: Chinese political culture and regime sustainability. Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190205782.001.0001
The Economic Intelligence Unit. 2020. Democracy Index 2020: in sickness and in health? Available: https://www.eiu.com/n/campaigns/democracy-index-2020/ [Accessed: 13 May 2024].
The State Council Information Office of the People’s Republic of China. 2015. PRC State Council China’s Military Strategy. USC US-China Institute [Online]. Available: https://china.usc.edu/prc-state-council-chinas-military-strategy-2015-may-26-2015 [Accessed: 14 May 2024].
The State Council of the People’s Republic of China. 2004. Vigorously promoting a comprehensive strategic partnership between China and the European Union. Mission of the People’s Republic of China to the European Union[Online]. Available: https:// www.eu.china-mission.gov.cn/eng/more/Topics/200405/t20040512_8303627.htm[Accessed: 14 May 2024].
The State Council of the People’s Republic of China. 2011. China’s peaceful development. English.Gov.CN[Online]. Available: https://english.www.gov.cn/archive/white_paper/2014/09/09/content_281474986284646.htm [Accessed: 14 May 2024].
The State Council of the Republic of China. 2016. Report on the work of the government. English. Gov. CN[Online]. Available: https://english.www.gov.cn/premier/news/2016/03/17/content_281475309417987.htm [Accessed: 14 May 2024].
Thomala, L.L. 2023 Internet penetration in China 2000-2022. Statista[Online]. Available: https://www.statista.com/statistics/255136/internet-penetration-in-china/ [Accessed: 13 May 2024].
UNODC.2022. Cybercrime. UNODC Romena [Online]. Available: https://unodc.org/romena/en/cybercrime.html [Accessed: 14 May 2024].
Van Wyk, B. 2022. China’s cybercrime problem is growing. The China Project [Online]. Available: https://thechinaproject.com/2022/08/23/chinas-cyber-crime-problem-is-growing/ [Accessed: 13 May 2024].
Wang, A., 2020. Cyber sovereignty at its boldest: A Chinese perspective. Ohio St. Tech. LJ, 16, p.395.
Wang, F.L., 2023. The China Record: An Assessment of the People’s Republic. State University of New York Press.
Wang, F.L., 2023. The China Record: An Assessment of the People’s Republic. State University of New York Press.
Wu, G. 2006. Conceptualizing and measuring the perceived interactivity of websites. Journal of Current Issues and Research in Advertising, 28(1), 87-104. https://doi.org/10.1080/10641734.2006.10505193
Xu, M. and Lu, C., 2021. China–US cyber-crisis management. China International Strategy Review, 3(1), pp.97-114. https://doi.org/10.1007/s42533-021-00079-7
Zeng, J., 2014. The Chinese Communist Party’s capacity to rule: legitimacy, ideology, and party cohesion (Doctoral dissertation, University of Warwick).
