政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/141334
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113311/144292 (79%)
Visitors : 50925059      Online Users : 972
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/141334


    Title: 比較分析中國社會信用體系與監控資本主義對自由世界實踐之威脅
    China’s Social Credit System and Surveillance Capitalism: Comparing Their Threats toward the Practices of the Free World
    Authors: 徐恩碩
    Shiflet, Michael
    Contributors: 魏玫娟
    Wei, Michelle
    徐恩碩
    Shiflet, Michael
    Keywords: 社會信用制度
    監控資本主義
    中國
    網際網路
    自由民主價值
    Social credit system
    Surveillance capitalism
    China
    Internet
    Liberal democratic practices
    Date: 2022
    Issue Date: 2022-08-01 18:46:30 (UTC+8)
    Abstract: 相較於以往,科技與社會環境的快速變遷對全球各國公民產生日益漸增的影響,特別值得關注與探究的是這些環境改變對自由社會與自由民主實踐之影響,而中國所實行的社會信用制度與「自由世界」中出現的監控資本主義,是其中兩個影響至鉅的環境變化。本論文採取次級資料分析方法,針對「中國社會信用制度」與「監控資本主義」對自由世界之自由民主實踐所具有之潛在風險進行比較,聚焦於探討在監控資本主義已經對自由世界的個人權利產生影響之後,中國社會信用制度是否進一步影響西方資本主義國家的自由民主實踐。本文藉由探討中國社會信用制度與監控資本主義環境之本質與脈絡,檢視前述兩種制度及其環境影響下所出現的全球範圍之「侵犯隱私正常化」之後發現,相較於為商業利益而出現並普遍存在的監控資本主義在侵犯個人隱私上的影響,中國社會信用制度的影響相對有限。本文認為,儘管中國社會信用制度無疑是對中國公民個人權利之威脅,但該制度的「獨特性」特別是制度落實上所需的配套環境,高度限制其輸出至他國進而影響西方資本主義國家自由民主實踐與各項公民權利的可能性。
    More than ever, the combination of technological and societal shifts plays an increas- ingly important role in affecting citizens around the world. The influence of these environ- ments should be considered on free societies and the practices of liberal democracy. Two such environments of concern are the much-hyped Social Credit System (SCS) in China and sur- veillance capitalism which has emerged more discreetly from the free world. This thesis uses a comparative analysis of secondary data to look at the potential risk toward the democratic practices the SCS uniquely poses to the free world after the threats of surveillance capitalism have first been considered. After exploring the nature and context of both environments, it moves to uncover how both have contributed to the global normalization of privacy intrusion worldwide and build off one another in ways that compound related threats. Overall, the SCS’s unique threats to practices in the free world are perhaps more limited than expected once considered alongside the threats from surveillance capitalism. Comparative analysis finds the exportability of the SCS beyond Chinese borders extremely unlikely while also un- covering some unique but limited threats beyond privacy that affect freedom of expression and various other practices of free world citizens.
    Reference: Adee, S. (2019, May 15). The Global Internet Is Disintegrating. What Comes Next? Retrieved from https://www.bbc.com/future/article/20190514-the-global-internet-is-disintegrating-what-comes-next

    Aho B., & Duffield R. (2020). Beyond Surveillance Capitalism: Privacy, regulation and big data in Europe and China. Economy and Society, 49:2, 187-212, DOI: 10.1080/03085147.2019.1690275

    Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives. doi:10.3386/w23089

    Auerbach, D. (2015, August 03). Windows 10 Shamelessly Wants Your Data. Here`s How to Protect Yourself. Retrieved November 17, 2020, from https://slate.com/technology/ 2015/08/windows-10-privacy-problems-heres-how-bad-they-are-and-how-to-plug- them.html

    Bhargava, V. R., & Velasquez, M. (2021). Ethics of the attention economy: The problem of social media addiction. Business Ethics Quarterly, 31(3), 321-359.

    Behsudi, A. (2019). Senators Want Trump Probe of China`s New Corporate Social Credit System. Retrieved from https://www.politico.com/news/2019/12/02/senators-want-trump- probe-of-chinas-new-corporate-social-credit-system-074810

    Berg, B. L., & Lune, H. (2016). Qualitative Research Methods for the Social Sciences. Pear- son.

    Blum, S. (2018, October 11). Boston Dynamics` Atlas Can Now Chase You Up Some Stairs. Retrieved from https://www.popularmechanics.com/technology/robots/a23725726/ boston-dynamics-atlas-parkour/

    Business of Apps. (2021, May). Pokémon go revenue and usage Statistics. Retrieved September 06, 2021, from https://www.businessofapps.com/data/pokemon-go-statistics/

    Couldry, N. (2017). Surveillance-Democracy. Journal of Information Technology & Politics, 14(2), 182-188. doi:10.1080/19331681.2017.1309310

    Coy, P. (2006). The Secret To Google`s Success. Retrieved July 31, 2020, from https:// www.bloomberg.com/news/articles/2006-03-05/the-secret-to-googles-success

    Chace, C. (2019, September). Surveillance Capitalism And Anti-Capitalism. Retrieved July 28, 2020, from https://www.forbes.com/sites/cognitiveworld/2019/09/17/surveillance- capitalism-and-anti-capitalism/#416a371b2984

    Chen, S., & Kang, S. (2018). A Tutorial on 5G and the Progress in China. Frontiers of Information Technology & Electronic Engineering, 19(3), 309-321. DOI:10.1631/fitee. 1800070

    Chen, Y., & Yang, D. (2017, November). The Impact of Media Censorship: Evidence from a field experiment in China. Retrieved February 19, 2020, from https://www.gsb.stan- ford.edu/sites/gsb/files/jmp_david-yang_0.pdf

    Creemers, R. (2015). China`s plans to use ratings to keep eye on citizens. CNN. Retrieved 2021, from https://www.cnn.com/2015/10/27/opinions/china-social-credit-score- creemers/index.html.

    Deb, S., & Stein, M. (2022). Daryl Morey Steps Down as G.M. of the Houston Rockets. New York Times. Retrieved February 2022, from https://www.nytimes.com/2020/10/15/ sports/basketball/nba-daryl-morey-rockets- china.html#:~:text=Morey`s%20tweet%20expressing%20support%20for,N.B.A.%20and%20the%20Chinese%20government.&text=Daryl%20Morey%2C%20the%20general%20manager,1%2C%20he%20announced%20Thursday.

    Drinhausen, K., & Brussee, V. (2021). China’s Social Credit System in 2021.

    Edelman, B. (2015). Does Google Leverage Market Power through Tying and Bundling? Journal of Competition Law and Economics, 11(2), 365–400. https://doi.org/10.1093/ joclec/nhv016

    Fair, L. (2018, July 19). What Vizio was doing behind the TV screen. Federal Trade Commis- sion. Retrieved January 10, 2020, from https://www.ftc.gov/news-events/blogs/busi- ness-blog/2017/02/what-vizio-was-doing-behind-tv-screen

    Federal Trade Commission. (2019, February 28). Facebook Settles FTC Charges That It De- ceived Consumers By Failing To Keep Privacy Promises. Retrieved October 22, 2020, from https://www.ftc.gov/news-events/press-releases/2011/11/facebook-settles-ftc- charges-it-deceived-consumers-failing-keep

    Fleischer, P. (2007, September 24). Street View and Privacy. Googleblog. https://maps.- googleblog.com/2007/09/street-view-and-privacy.html

    Freedom House. (2021) Countries and Territories: Global freedom scores. Retrieved Sep- tember 22, 2021, from https://freedomhouse.org/countries/freedom-world/scores? sort=desc&order=Total+Score+and+Status

    Gan, N. (2019, February 19). The complex reality of China’s social credit system: hi-tech dystopian plot or low-key incentive scheme? South China Morning Post. Retrieved May 12, 2020, from https://www.scmp.com/news/china/politics/article/2185303/hi- tech-dystopia-or-low-key-incentive-scheme-complex-reality

    Gurley, B. (2011, March 25). The Freight Train That Is Android. Retrieved September 24, 2020, from https://abovethecrowd.com/2011/03/24/freight-train-that-is-android/

    Harwit, E. (2019). WeChat and the growth of China`s indigenous internet.

    Helbing, D., Frey, & Gigerenzer. (2019). Will Democracy Survive Big Data and Artificial In- telligence? In Towards digital enlightenment: Essays on the dark and light sides of the digital revolution (pp. 73-98). Springer.

    Hintz, A., & Milan, S. (2017). Through a Glass, Darkly: Everyday Acts of Authoritarianism in the Liberal West. International Journal of Communication.

    Hoffman, S. (2017). Managing the State: Social Credit, Surveillance and the CCP`s Plan for China. Retrieved from https://globalgeopolitics.net/2017/09/07/managing-the-state- social-credit-surveillance-and-the-ccps-plan-for-china/

    Hoffman, S. (2017). Programming China: The Communist Party’s autonomic approach to managing state security.

    Hunter, R., Zaman, & Liu. (2017). Global Top 100 Companies by Market Capitalisation. IPO Center, Price Waterhouse Coopers. Retrieved 2020, from https://www.pwc.de/de/kapi- talmarktorientierte-unternehmen/global-top-100-march-2017.pdf

    Hutcheon, S. (2009, January 30). We`re not stalking you or helping terrorists, says Google Earth boss. Retrieved October 08, 2020, from https://www.smh.com.au/technology/ were-not-stalking-you-or-helping-terrorists-says-google-earth-boss-20090130- gdtbpy.html

    Jasanoff, S., Markle, G., Peterson, J., & Pinch, T. (2001). Handbook of Science and Technolo- gy Studies. Sage.

    Jiang, M., & Fu, K. (2018). Chinese Social Media and Big Data: Big Data, Big Brother, Big Profit? Policy & Internet, 10(4), 372-392. doi:10.1002/poi3.187

    Jooste, Y. (2021). Surveillance capitalism as white world-making. Acta Academica, 53(1), 44- 67. https://dx.doi.org/10.18820/24150479/aa53i1.3

    Kaska, K., Beckvard, & Minarik. (2019). Huawei, 5G and China as a Security Threat. Re- trieved from https://www.ccdcoe.org/uploads/2019/03/CCDCOE- Huawei-2019-03-28-FINAL.pdf

    Kessel, J., & Mozur, P. (Directors). (2016, August 09). How China is Changing Your Internet [Video file]. Retrieved February 05, 2020, from https://www.nytimes.com/video/tech- nology/100000004574648/china-internet-wechat.html?action=click>ype=vhs&ver- sion=vhs-heading&module=vhs®ion=title-area&cview=true&t=201

    King, Pan, J., & Roberts, M. E. (2013). How Censorship in China Allows Government Criti- cism but Silences Collective Expression. American Political Science Review, 107(2), 326-343. doi:10.1017/s0003055413000014

    King, G., Pan, J., & Roberts, M. E. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument. American Political Science Review, 111(3), 484-501. doi:10.1017/s0003055417000144

    Kobie, N. (2019, June 07). The complicated truth about China`s social credit system. Wired. Retrieved May 12, 2020, from https://www.wired.co.uk/article/china-social-credit- system-explained

    Kostka, G. (2019). China’s Social Credit Systems and Public Opinion: Explaining high levels of approval. New Media & Society, 21(7), 1565-1593. doi: 10.1177/1461444819826402

    Kshetri, N. (2016). Big Data’s Role in Expanding Access to Financial Services in China. In- ternational Journal of Information Management, 36(3), 297-308. doi:10.1016/j.ijin- fomgt.2015.11.014

    Landwehr, M., Borning, A., & Wulf, V. (2019). The High Cost of Free Services. Proceedings of the Fifth Workshop on Computing within Limits - LIMITS `19. doi: 10.1145/3338103.3338106

    Lanese, N., & Vidyasagar, A. (2021). What is CRISPR? Livescience.Com. https://www.live- science.com/58790-crispr-explained.html

    Lee, K. (2018). AI Superpowers: China, Silicon Valley, and the New World Order. Houghton Mifflin Harcourt.

    Liang, F., Das, V., Kostyuk, N., & Hussain, M. (2018, August 02). Constructing a Data‐Dri- ven Society: China`s Social Credit System as a State Surveillance Infrastructure. Re-
    trieved from https://onlinelibrary.wiley.com/doi/full/10.1002/poi3.183? casa_token=_A4PbrhY_okAAAAA%3AbDd_GZ01MB1q-45qFgCXKSrR394e- SWNiGwXBDUZBEkpsi8_81aS7MY340Ae1fsK2-qN2cW_CoAeB_dAUfg

    Liu, C. (2019). Multiple Social Credit Systems in China. Economic Sociology: The European Electronic Newsletter 21 (1): 22–32. doi:10.2139/ssrn.3423057

    Liu, G. (2018, August 6). The Rapid Growth of the Chinese Internet - and Where It`s Headed. Lecture presented at TED. Retrieved from https://youtu.be/WBqnzn77MEE

    Lyons J., Lewis, Z. H., Mayrsohn, B. G., & Rowland, J. L. (2014). Behavior Change Tech- niques Implemented in Electronic

    Lifestyle Activity Monitors: A Systematic Content Analysis. Journal of Medical Internet Research, 16(8). doi:10.2196/jmir.3469

    Ma, A., & Gilbert, B. (2019, August). Facebook understood how dangerous the trump-linked data firm Cambridge Analytica could be much earlier than it previously said. here`s everything that`s happened up until now. Business Insider. Retrieved September 30, 2021, from https://www.businessinsider.com/cambridge-analytica-a-guide-to-the- trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3

    Mattis, P. (2021, April). Yes, the atrocities in Xinjiang constitute a genocide. Foreign Policy. Retrieved October 24, 2021, from https://foreignpolicy.com/2021/04/15/xinjiang- uyghurs-intentional-genocide-china/

    Matsakis, L. (2019, October 25). How the West Got China`s Social Credit System Wrong. Wired. Retrieved from https://www.wired.com/story/china-social-credit-score-system/

    Mackinnon, R. (2011). China`s "Networked Authoritarianism". Journal of Democracy, 22(2), 32-46. doi:10.1353/jod.2011.0033

    Meyer, J. (2015). The Turn-Verizon Zombie Cookie. Retrieved November 19, 2020, from http://webpolicy.org/2015/01/14/turn-verizon-zombie-cookie/

    Mozur, P. (2016, August 09). Chinese Tech Firms forced to Choose market: Home or every- where else. Retrieved February 11, 2020, from https://www.nytimes.com/2016/08/10/ technology/china-homegrown-internet-companies-rest-of-the-world.html? action=click&module=RelatedCoverage&pgtype=Article®ion=Footer

    Negro, G. (2017). The Internet in China: From infrastructure to a nascent civil society. Cham, Switzerland: Palgrave Macmillan.

    People`s Daily. (2017). Jack Ma Calls on Canadian Prime Minister to "Simplify Visas" to En- courage Young Chinese to Look at The World. Retrieved from http://travel.people.- com.cn/n1/2017/0927/c41570-29561675.html

    Pettit, H. (2018, September 19). Real-life Black Mirror: China`s moves to introduce score- cards that ranks the behaviour of citizens. Daily Mail. Retrieved from https://www.- dailymail.co.uk/sciencetech/article-6183893/Real-life-Black-Mirror-Chinas-moves- introduce-scorecards-ranks-behaviour-citizens.html

    PRC State Council. (2014). Notice of the State Council on Printing and Distributing the Out- line of the Construction of the Social Credit System (2014-2020). Retrieved from http://www.gov.cn/zhengce/content/2014-06/27/content_8913.htm

    Radin, M. J. (2017). Boilerplate: The fine print, vanishing rights, and the rule of law. Prince- ton: Princeton University Press.

    Rechtschaffen, D. (2022). China’s Corporate Social Credit System Demands Political Obedi- ence from Companies. The Diplomat. Retrieved February 2022, from https:// thediplomat.com/2019/10/chinas-corporate-social-credit-system-demands-political- obedience-from-companies/.

    Rona-Tas, Akos. (2017). “The Off-Label Use of Consumer Credit Ratings.” Historical Social Research/ Historische Sozialforschung 42 (1).

    Roosendaal, A. (2010, December 01). Facebook Tracks and Traces Everyone: Like This! Re- trieved October 22, 2020, from https://papers.ssrn.com/sol3/papers.cfm? abstract_id=1717563\\

    Sabin, D. (2017, March). The secret history Of `Pokemon Go`, as told by Creator John Hanke. Inverse. Retrieved September 06, 2021, from https://www.inverse.com/article/28485- pokemon-go-secret-history-google-maps-ingress-john-hanke-updates

    Shen, H. (2018). Building a digital silk road? Situating the Internet in China`s belt and road initiative. International Journal of Communication, 12, 19.

    Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2020). 5G In the internet of things era: An overview on security and privacy challenges. Computer Networks, 179, 107345.

    Soars, B. (2009). "Driving sales through shoppers` sense of sound, sight, smell and touch", International Journal of Retail & Distribution Management, 37(3), 286-298. https://doi.org/10.1108/09590550910941535.

    Staden, C. (2018, March 30). China in the Era of `Xi Jinping Thought`: Five Key Trends for Africa. Retrieved December 26, 2019, from https://www.africaportal.org/publications/ china-era-xi-jinping-thought-five-key-trends-africa/

    Statista. (2020, April). The 100 largest companies in the world by market value in 2019.
    In Statista - The Statistics Portal. Retrieved from https://www.statista.com/statistics/ 263264/top-companies-in-the-world-by-market-value/

    Sterrett, D., Malato, D., Benz, J., Kantor, L., Tompson, T., Rosenstiel, T., ... & Loker, K. (2019). Who shared it?: Deciding what news to trust on social media. Digital Journal- ism, 7(6), 783-801.

    Taigman, Y., Yang, M., Ranzato, M. A., & Wolf, L. (2014). Deepface: Closing the gap to hu- man-level performance in face verification. Facebook Research. April 14, 2018.

    Universal Declaration of Human Rights. (1948). Retrieved from https://www.un.org/en/uni- versal-declaration-human-rights/

    Varian, H. (2014, March). Beyond Big Data. Business Economist, 49, 27-31. https://doi.org/ 10.1057/be.2014.1

    Wang, N. (2019). Data story of Tiktok.

    Web Foundation. (2018). The invisible curation of content: Facebook`s News Feed and our information diets. Retrieved from https://webfoundation.org/research/the-invisible- curation-of-content-facebooks-news-feed-and-our-information-diets/

    What is STS? (n.d.). Retrieved from
    http://sts.hks.harvard.edu/about/whatissts.html

    Whitehead, K. (2019, August 27). Did China see its gene-edited babies scandal coming? Re- trieved from https://www.scmp.com/lifestyle/health/article/3024462/chinese-rogue- scientists-gene-edited-twin-babies-experiment-still

    Wollerton, M. (2014, December). Voice control comes to the forefront of the smart home. Re- trieved 2020, from https://www.cnet.com/news/voice-control-roundup/

    Wong, K. L., & Dobson, A. S. (2019). We’re just data: Exploring China’s Social Credit Sys- tem in relation to digital platform ratings cultures in westernised democracies. Global Media and China, 4(2), 220-232. doi:10.1177/2059436419856090

    Xia, L. (2019). China to further improve social credit system. Retrieved from http://www.xin- huanet.com/english/2019-03/02/c_137863354.htm

    Xinhua Net. (2019). China boasts world`s largest social credit system: Official. Retrieved May 11, 2020, from http://www.xinhuanet.com/english/2019-06/14/c_138143745.htm

    Xinhua. (2016). China ‘One Belt and One Road’ Credit Forum Held in Yinchuan. Retrieved from http://www.xinhuanet.com/politics/2016-09/30/c_129306830.htm

    Yeung, E. (2019). China Internet Report 2019 (Rep.). Retrieved February, 2020, from South China Morning Post, Abacus website: https://www.scmp.com/china-internet-report#0

    Yuan, L. (2018, August 06). A Generation Grows Up in China Without Google, Facebook or Twitter. Retrieved from https://www.nytimes.com/2018/08/06/technology/china-gen- eration-blocked-internet.html

    Zuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology, 30(1), 75-89. doi:10.1057/jit.2015.5

    Zuboff, S. (2019). The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power. PublicAffairs.
    Description: 碩士
    國立政治大學
    亞太研究英語碩士學位學程(IMAS)
    107926023
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0107926023
    Data Type: thesis
    DOI: 10.6814/NCCU202200579
    Appears in Collections:[International Program in Asia-Pacific Studies\n(IMAS/IDAS)] 學位論文

    Files in This Item:

    File SizeFormat
    602301.pdf1801KbAdobe PDF2166View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback