政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/128968
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113648/144635 (79%)
造访人次 : 51682056      在线人数 : 615
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/128968


    题名: 消除反向凸顯: 在中國背景下各國對技術的認知
    Removing the Reverse Salient: States` Perception towards Internet Technology in the context of China
    作者: 盧藝璱
    YILDIRIM, SEDA
    贡献者: 陳永福
    Tan, Alexander C.
    盧藝璱
    YILDIRIM, SEDA
    关键词: 反向顯著性
    信息通訊技術
    國家權力
    中國
    reverse salient
    information and communication technology
    state power
    China
    日期: 2020
    上传时间: 2020-03-02 11:33:29 (UTC+8)
    摘要: Knowing that information and communication technology (ICT) has implications for many aspects of state power in general, and especially in the case of China, there was a need for a well-coordinated approach generating the dynamic of control and encouragement of ICT development in China. Through an examination of concerns that have been emerging about what ICT means for Chinese power, this research tended to unveil the unique way of ICT adoption and advancement in China. Of these concerns, the controllability dilemma, data security, and algorithmic-authoritarianism that all escalated with the introduction of the Internet are the piers to understand the dynamics of changes in perceptions and interests of the Chinese government in this regard. This research, thus, is filled with the urge to reveal technical knowledge that has been long lacking in IR literature, and specifically applying such knowledge to understand the Chinese use of ICT and innovation, majorly through observing the continuous process of threats and problems perceived along the way of adoption and innovation (formulated under the reverse saliency model in this research) and how those problems are solved through which aims to foresee the Chinese intentions and big targets in this regard, and finally expect to make a more general sense of how differently state power interacts with technology in the post-industrial model of ICTs.
    參考文獻: Bibliography
    AMCHAM Shanghai (2018). VPN Regulations and Implications for Business, GPS Technology Quarterly, Available at: https://www.amcham-shanghai.org/sites/default/files/2018-04/GPS%20Technology%20Quarterly%20%28February%202018%29%20.pdf
    Aronson, J. (2002). ‘Global Networks and their Impact in Information Technologies and Global Politics: The Changing Scope of Power and Governance, James N. Rosenau and J. P. Singh (eds.), Albany, NY: State University of New York Press.
    Bachrach, P. and Baratz, M.S. (1963). Decisions and Nondecisions: An Analytical Framework, American Political Science Review 57, pp.641-51.
    Bain (2015). Finding the Silver Lining in China`s Cloud Market, from https://www.bain.com/insights/finding-the-silver-lining-in-chinas-cloud-market
    BBC (2017). ‘China`s quantum satellite in big leap’, BBC News, Science & Environment, from: https://www.bbc.com/news/science-environment-40294795
    Boerl, C, (2008). Technological Empowerment: The Internet, State, and Society in China, by Yongnian Zheng, 5:4, 413-414, DOI: 10.1080/19331680802555036
    Borgmann, A. (1984). Technology and the Character of Contemporary Life: A Philosophical Inquiry, Chicago: University of Chicago Press.
    Breyman, S. (1993). Knowledge as Power: Ecology Movements and Global Environmental Problems in: Ronnie D. Lipschutz and Ken Conca (eds.), The State and Social Power in Global Environmental Politics, Columbia University Press, p. 126.
    Business Wire, Inc. (2000). “2dobiz.com inside track to mainland China.”
    Carr, Madeline (2016). US Power and the Internet in International Relations: The Irony of the Information Age. Palgrave Macmillan, 1st edition, ISBN 978-1-349-71539-8, ISBN 978-1-137-55024-8 (eBook) DOI 10.1057/9781137550248
    Carr, N. (2006). The Weakest Link. [online] strategy+business. Available at: https://www.strategy-business.com/article/06403 [Accessed 18 Apr. 2019].
    Castells, Manuel (2000) ‘Toward a Sociology of the Network Society`. Contemporary Sociology, Vol. 29, No. 5 (September).
    Cerf, V.G. and Kahn, R.E. (1974). A Protocol for Packet Network Intercommunication, IEEE, Vol Com-22.
    Chase, M., Hachigian, N., and Mulvenin, J. (2006). Comrade to comrade networks: the social and political implications of peer-to-peer networks in China, Chinese Cyberspaces, Routledge.
    China Information Technology Report (2018). Fitch Solution, from https://store.fitchsolutions.com/china-information-technology-report
    Cleaver, Harry M. Jr. (1998). ‘The Zapatista Effect: The Internet and the Rise of an Alternative Political Fabric`. Journal of International Affairs, pp. 621–40, Vol. 51, No. 2 (Spring).
    CNN (2006). CNN.com - Google to censor itself in China - Jan 25, 2006. [online] Available at: http://edition.cnn.com/2006/BUSINESS/01/25/google.china/ [Accessed 27 Aug. 2019].
    Corrales, J., and Westhoff, F. (2006). Information Technology Adoption and Political Regimes. International Studies Quarterly, 50(4), pp.911-933.
    Damm, J. and Thomas, S. (2006). Chinese Cyberspaces, Routledge, First Edition, Taylor & Francis Group, ISBN 0-203-40032-1.
    Deibert, Ronald J., Palfrey, J., Rohozinski, R., and Zittrain, J., (2010). Access Controlled: The Shaping of Policy of Global Internet Filtering. Cambridge: MIT Press.
    Diamond, L. (2010). “Liberation Technology, Journal of Democracy Volume 21, Number 3, p. 82.
    Dodge, M. (1998). Accessibility to Information within the Internet: How can it be Measured and Mapped?. University College London. [online] Available at: http://www.casa.ucl.ac.uk/martin/varenius_accessibility.pdf [Accessed 19 Aug. 2019].
    Drezner, Daniel W., and Henry Farrell (2004). ‘Web of Influence’, Foreign Policy, pp. 32–40, No. 145 (November/December).
    EFF (2019). China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall, from https://www.eff.org/deeplinks/2019/10/chinas-global-reach-surveillance-and-censorship-beyond-great-firewall
    Endeshaw, A. (2004) Internet Regulation in China: The Never-ending Cat and mouse game. Information and Communication Technology Law, Vol.13, No.1
    Foster, W. and Goodman, S.E. (2000). The Diffusion of the Internet in China, A Report of the Center for International Security and Cooperation, Stanford University.
    Foucault, M. (1977). Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, Pantheon Books.
    Franklin, M.I. (2004) Post Colonial Politics, the Internet and Everyday Life: Pacific Traversals Online, New York: Routledge.
    Gil, D. (2017) Quantum computing explained with a deck of cards, The MIT Venture Capital + Innovation Conference, IBM Research, Available at: https://www.youtube.com/watch?v=yy6TV9Dntlw
    Glenn Research Center, Newton’s Laws of Motion, NASA, from https://www.grc.nasa.gov/www/k-12/airplane/newton2.html
    Guo, L., Huang. J., and Zhang, Y. (2019). Education Development in China: Education Return, Quality, and Equity, Sustainability 2019, 11, 3750; doi:10.3390/su11133750, www.mdpi.com/journal/sustainability
    Guterl, F. (2019). Are We Ready for a ‘Quantum Surprise’ from China? Newsweek, Tech & Science, Available at: https://www.newsweek.com/china-quantum-computing-1467835
    Hachigian, Nina (2002) ‘The Internet and Power in One-Party East Asian States’, History of Technology, Trevor E. Pinch and Wiebe E. Bijker (eds.), Cambridge.
    Harwit, E. and Clark D. (2001). Government policy and political control over China’s Internet, Chinese Cyberspaces, Routledge.
    Heilbroner, Robert (1961) ‘Do Machines Make History?’, Technology and Culture, pp. 335–345, Vol. 2 (Winter).
    Hoffman, C. (2017). How the “Great Firewall of China” Works to Censor China’s Internet, How-to-Geek, from https://www.howtogeek.com/162092/htg-explains-how-the-great-firewall-of-china-works/
    Hoffman, S. (1975). Notes on the Elusiveness of Modern Power, International Journal 30, p. 204.
    Hughes, T.P. (1989). ‘The Definition of Large Technological Systems’. in The Social Construction of Technological Systems: New Directions in the Sociology and History, MIT Press.
    Jefferson, G. (2018). State-owned enterprise: reform, performance and prospects. In W. Wu & M. W. Frazier, The sage handbook of contemporary china, (Vol. 2, pp. 121-142). 55 City Road, London: SAGE Publications Ltd doi: 10.4135/9781526436085.n7
    Jessop, B. (1990). State theory. Oxford: Polity Press.
    Keck, M.E., and Sikkink, K. (1998). Activists Beyond Borders – Advocacy Networks in International Politics, Cornell University Press/ Ithaca.
    Keohane, R.O. and Nye, J.S. (1998). Power and Interdependence in the Information Age, Foreign Affairs, vol. 77 (5), pp. 81-94.
    Kokas, A. (2019). Cloud Control: China’s 2017 Cybersecurity Law and its Role in US Data Standardization. Available at SSRN: https://ssrn.com/abstract=3427372 or http://dx.doi.org/10.2139/ssrn.3427372
    Krasner, S. (2009). Power, the state and sovereignty. New York, NY: Routledge.
    Langman, Lauren (2005). ‘From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements`. Sociological Theory, pp. 42–74, Vol. 23, No. 1.
    Latham, K. (2007). ‘SMS, Communication, and Citizenship in China`s Information Society`. Critical Asian Studies, pp. 295–314, Vol. 39, No. 2 (June).
    Lessig, L. (2006). Code. New York, Basic Books.
    Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, N.Y.: Anchor Press/Doubleday, 416–18.
    Lorentzen, P. (2013). China’s Strategic Censorship. American Journal of Political Science, Vol. 58, No. 2, April 2014, Pp. 402–414, Midwest Political Science Association DOI: 10.1111/ajps.12065
    Lukes, S. (1974). `Power: A Radical View`. Macmillan, p.13.
    Mackenzie, D. (1996). `Knowing Machines`. Cambridge: The MIT Press.
    MacKenzie, D., and Judy, W. (eds.) (1999). `The Social Shaping of Technology`. Philadelphia: Open University Press.
    MacKinnon, R. (2010). Networked Authoritarianism in China and Beyond Implications for global Internet freedom. Liberation Technology in Authoritarian Regimes. Hoover Institution & the Center of Democracy, Developmental Rule of Law (CDDRL), Stanford University.
    Marcuse, H. (2013). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. New York, NY: Routledge.
    Mayer-Schoenberger, V., and Brodnig, G. (2001). `Information Power: International Affairs in the Cyber Age`. SSRN Electronic Journal.
    Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics, London: W.W.Norton.
    Merics Papers on China (2016). Made in China 2025, The making of a high-tech superpower and consequences for industrial countries, Merics.
    Merics China Monitor (2017). China’s Social Credit System, A big-data enabled approach to market regulation with broad implications for doing business in China, Merics.
    MIIT (2017). Notice of the Ministry of Industry and Information Technology on Cleaning Up and Regulating the Internet Access Service Market [Effective]. No.32, People`s Republic of China, Available at: http://en.pkulaw.cn/display.aspx?cgid=992e987ace0e25e7bdfb&lib=law
    Morgenthau, H. (1978). Politics Among Nations: The Struggle for Power and Peace, 5th Edition Revised, New York, NY: Alfred A. Knopf.
    Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom, New York, NY: PublicAffairs.
    Mumford, L. (1970). The Myth of the Machine: The Pentagon of Power, New York, NY: Harcourt Brace Jovanovich.
    National Science Report (2018). Science and Engineering Indicators, from https://nsf.gov/statistics/2018/nsb20181/
    Nye, J.S. (1990). `Bound To Lead: The Changing Nature of American Power`. Basic Books.
    Nye, Joseph S. (2002). `The Paradox of American Power: Why the World`s Only Superpower Can`t Go It Alone`. Oxford: Oxford University Press.
    Nye, Joseph S. (2004) Soft Power: The Means to Success in World Politics, New York, NY: PublicAffairs.
    Olson, M. (1993). Dictatorship, Democracy, and Development. American Political Science Review 87 (3): 567-576.
    Perlmutter, A., and William M. L. (1982). "The Party in Uniform: Toward a Theory
    of Civil-Military Relations in Communist Political Systems." The American Political
    Science Review 76 (4):778. doi: 10.2307/1962970.

    Project Zero (2019). Google Project Zero, Available at: https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
    Quartz in the Shadows (2017). Meet Shadowsocks, the underground tool that China’s coders use to blast through the Great Firewall, Available at: https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall/
    Reagle, J. (1999) “Why the Internet is good: community governance that works well,” Berkman Center Working Draft.
    Reuters Business News (2017). Apple says it is removing VPN services from China App Store. Retrieved 24 December 2019, Available at: https://www.reuters.com/article/us-china-apple-vpn/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQ
    Rothkopf, D.J. (1998). ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, pp. 325–59, Vol. 51, No. 2 (Spring).
    Rouse, M. (2007). What is reverse engineering? - Definition from WhatIs.com. [online] SearchSoftwareQuality. Available at: https://searchsoftwarequality.techtarget.com/definition/reverse-engineering [Accessed 26 Aug. 2019].
    Sassen, S. (1999). ‘The Impact of the Internet on Sovereignty: Unfounded and Real Worries’, Paper presented to the Internet and International Systems: Information Technology and American Foreign Policy Decision-Making Workshop, Nautilus Institute, San Francisco (10 December), http://www.nautilus.org/gps/ info-policy/workshop/papers/sassen.html.
    Schneider, F. (2018). China’s Digital Nationalism, Published to Oxford Scholarship, DOI:10.1093/oso/9780190876791.003.0001
    SCMP (2019). Artificial intelligence is watching China’s students but how well can it really see? South China Morning Post, China/ Politics, Available at: https://www.scmp.com/news/china/politics/article/3027349/artificial-intelligence-watching-chinas-students-how-well-can
    Singer, J.D. and Small, M. (1966). "The Composition and Status Ordering of the International System: 1815-1940," World Politics 18
    Smith, G. and Moises N. (2000). Altered States: Globalization, Sovereignty and Governance, Ottawa: International Development Research Centre.
    Smith, J.O. (2010). Physical Audio Signal Processing, online book, 2010 edition, from http://ccrma.stanford.edu/~jos/pasp/
    Strange, S. (1988). States and Markets, Blackwell.
    Symantec Acquires SafeWeb. (2003). Retrieved 27 December 2019, from https://www.nortonlifelock.com/about/newsroom/press-releases/2003/symantec_1020_01
    Tanji, M. (2007). ‘Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats’, Journal of Cyber Conflict Studies, pp. 4–11, Vol. 1, No. 1 (December). The MIT Press.
    TechCrunch (2019). Sources say China used iPhone hacks to target Uyghur Muslims, Available at: https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/
    Tett, Gillian. (2017). “Trump, Cambridge Analytica and How Big Data Is Reshaping Politics.” Financial Times, Available at: https://www.ft.com/content/e66232e4-a30e-11e7-9e4f-7f5e6a7c98a2
    Thaler, R.H., and Cass R.S. (2009). Nudge: Improving Decisions About Health, Wealth, and Happiness. Revised & Expanded edition. New York: Penguin Books.
    The Citizen Lab (2015). China’s Great Cannon, Munk School of Global Affairs, University of Toronto, Available at: https://citizenlab.ca/2015/04/chinas-great-cannon/
    Unver, H.A. (2018). Artificial Intelligence, Authoritarianism, and the Future of Political Systems, Cyber Governance and Digital Democracy 2018/9, EDAM.
    Vig, N. (1988). ‘Technology, Philosophy and the State’, in Technology and Politics, Michael E. Kraft and Norman J. Vig (eds.), Durham and London: Duke University Press.
    Wagner, P.R. (2005). “On Software Regulation,” Southern California Law Review 78: 457, 487.

    Waltz, K.N. (1979). Theory of International Politics, Boston: McGraw Hill.
    Wendt, A. (1999). Social Theory of International Politics, Cambridge: Cambridge University Press.
    Winner, L. (1985). ‘Do Artefacts have Politics?’ in The Social Shaping of Tech- nology: How the Refrigerator Got Its Hum, Donald MacKenzie and Judy Wacjman (eds.), Philadelphia: Open University Press.
    World Bank (2018). Literacy rate, youth total (% of people ages 15-24) - India, China, from https://data.worldbank.org/indicator/SE.ADT.1524.LT.ZS?locations=IN-CN
    Wu, J. and Lam, O. (2017). The evolution of China`s Great Firewall: 21 years of censorship. (online) Hong Kong Free Press HKFP. Available at: https://www.hongkongfp.com/2017/09/03/evolution-chinas-great-firewall-21-years-censorship/
    描述: 碩士
    國立政治大學
    亞太研究英語碩士學位學程(IMAS)
    106926024
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0106926024
    数据类型: thesis
    DOI: 10.6814/NCCU202000351
    显示于类别:[亞太研究英語博/碩士學位學程(IDAS/IMAS)] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    602401.pdf2778KbAdobe PDF294检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈