China’s Great Firewall: Cybersecurity as Strategy for Building World Cyberpower


Harvardry Gerald Abraham Wowor(1*), Arfin Sudirman(2), Falhan Hakiki(3)

(1) Departemen Hubungan Internasional, Universitas Padjadjaran,  
(2) Departemen Hubungan Internasional, Universitas Padjadjaran,  
(3) Program Studi Ilmu Pemerintahan, Sekolah Tinggi Ilmu Sosial dan Ilmu Politik (STISIP) Imam Bonjol Padang,  
(*) Corresponding Author

Abstract


The information, communication, and technology (ICT) sector has grown significantly in China. One of the advancements they have seen is in the area of cybersecurity. China's growing cybersecurity competence enabled it to create the Great Firewall of China (GFW), a set of control and censorship regulations for internet communications in China. This article investigates the significance of cybersecurity in the development of China's authoritarian authority, with a focus on the GFW as a strategic component. The concepts of cybersecurity and cyberpower served as the article's theoretical foundation. Through interviews and literature reviews, this article employs qualitative methodologies.  This article demonstrates how China employs GFW to protect its citizens from cyber-attacks by focusing on political risks. China's cyber power is likewise increasing.


Keywords


China; Great Firewall; cybersecurity; cyberpower;

Full Text:

PDF

References


Anderson, P. 2005. The Global Politics of Power, Justice and Death. New York: Routledge.

Andress, J., and S. Winterfeld. 2014. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham: Elsevier.

Bajwa, J. S. 2008. “Defining Elements of Comprehensive National Power.” CLAWS Journal, 151-162.

Balke, L. 2018. “China's New Cybersecurity Law and U.S-China Cybersecurity Issues.” Santa Clara Law Review,137-163.

Bayuk, J.L., J. Healey, P. Rohmeyer, M.H. Sachs, J. Schmidt, and J. Weiss. 2012. Cyber Security Policy Guidebook. New York: John Wiley and Sons.

Bogdan, R., and S.K. Biklen. 2007. Qualitative Research for Education: An Introduction to Theories and Methods. Boston: Pearson A & B.

Bu, R. 2013. The Great Firewall of China. Murray: Murray State University.

Carr, M. 2016. US Power and the Internet in International Relations. New York: Palgrave Macmillan.

Carsten, P., and M, Martina. 2016. “U.S. Says China Internet Censorship A Burden for Businesses.” Reuters, https://www.reuters.com/article/us-usa-china-trade-internet/u-s-says-china-internet-censorship-a-burden-for-businesses-idUSKCN0X50RD

CBC Radio. 2019. “Counter-Protests Against Pro-Hong Kong Demonstrators May Reflect Chinese State Influence.” CBC, https://www.cbc.ca/radio/day6/hong-kong-counter-protests-vasek-pospisil-cosplaying-while-black-ao3-gets-a-hugo-how-to-free-dive-and-more-1.5256258/counter-protests-against-pro-hong-kong-demonstrators-may-reflect-chinese-state-influence-1.5256272

Chan, E. 2018. “The Great Firewall of China.” Bloomberg, https://www.bloomberg.com/quicktake/great-firewall-of-china

Chan, G. 1999. Chinese Perspectives on International Relations: A Framework for Analysis. London: Macmillan Press.

Chinese Academy of Cyberspace Studies, 2018. China Internet Development Report 2018: Blue Book of World Internet Conference, Beijing: Springer.

Choucri, N. 2012. Cyberpolitics in International Relations. Cambridge: Massachusetts Institute of Technology University Press.

Cornish, P. 2009. Cyber Security and Politically, Socially, and Religiously Motivated Cyber Attacks, Brussels: European Parliament.

Dainith, J., and E. Wright. 2006. The Facts on File Dictionary of Computer Science. New York: Facts On File.

Denyer, S. 2016. “China’s Scary Lesson to the World: Censoring the Internet Works.” Washington Post, https://www.washingtonpost.com/world/asia_pacific/chinas-scary-lesson-to-the-world-censoring-the-internet-works/2016/05/23/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html

Derian, J. D. 2003. “The Question of Information Technology in International Relations.” Millennium: Journal of International Studies, 441-456.

Dou, E. 2015. “China’s Great Firewall Gets Taller.” WSJ, https://www.wsj.com/articles/chinas-great-firewall-gets-taller-1422607143

Esfandiari, G. 2020. “Iran To Work with China to Create National Internet System.” RFERL,

https://www.rferl.org/amp/iran-china-national-internet-system-censorship/30820857.html [Accessed 6 April 2021].

FireEye. 2020. A Global Reset: Cyber Security Predictions 2021, Milpitas: FireEye.

Goldsmith, J., and T. Wu. 2006. Who Controls the Internet? Illusions of Borderless World. New York: Oxford University Press.

Goldsmith, J., and T. Wu. 2006. Who Controls the Internet? lllusions of Borderless World. New york: Oxford.

Goldstein, J. S., and J.C. Pevehouse. 2014. International Relations. New Jersey: Pearson.

Griffiths, J. 2019 . The Great Firewall of China; How To Build and Control an Alternative Version of the Internet. London: Zed Books.

Guo, S., and Feng, G. 2011. “Understanding Support for Internet Censorship in China: An Elaboration of the Theory of Reasoned Action.” Journal of Chinese Political Science 17 (1): 34-52. https://doi.org/10.1007/s1136601191778.

Haixia, Q., 2017. From Comprehensive National Power to Soft Power: A Study of the Chinese Scholars’ Perception of Power. Brisbane: Griffith University.

Hauben, R. 1998. From the ARPANET to the Internet: A Study of the ARPANET TCP/IP Digest and of the Role of Online Communication in the Transition from the ARPANET to the Internet. http://www.columbia.edu/~rh120/other/tcpdigest_paper.txt

Hilbert, M. 2016. “The Bad News is that the Digital Access Divide is Here to Stay: Domestically Installed Bandwidths Among 172 Countries for 1986 – 2014.” Telecommunications Policy 40 (6): 567-581. https://doi.org/10.1016/j.telpol.2016.01.006.

Jordan, T. 2003. Cyberpower: The Culture and Politics of Cyberspace and the Internet. London: Routledge.

Kalathil, S. 2017. Beyond the Great Firewall: How China Became a Global Information Power, Washington: CIMA.

Keith, R. C., and Z. Lin. 2006. New Crime in China: Public Order and Human Rights. Oxon: Routledge.

Keith, R. C., and Z. Lin. 2006. New Crime in China: Public Order and Human Rights. New York: Routledge.

Khumalo, N. B., and M. Baloyi. 2018. “The Importance of Information in International.” Library Philosophy and Practice.

King, G., J. Pan, and M.E. Roberts. 2013. “A Randomized Experimental Study of Censorship in China.” APSA 2013 Annual Meeting Paper, pp. 1-25.

Liang, B., and H. Lu. 2010. “Development, Censorship, and Cyber Crimes in China.” Journal of Contemporary Criminal Justice 26 (1): 103-120. https://doi.org/10.1177/1043986209350437.

Lukasik, S. J. 2011. “Why the Arpanet Was Built.” IEEE Annals of the History of Computing 33 (3): 4-21. https://doi.org/10.1109/MAHC.2010.11.

Lune, H., and B.L. Berg. 2017. Qualitative Research Methods for the Social Sciences. Essex: Pearson.

MacKinnon, R. 2008. “Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China.” Public Choice 134(1): 31-46. https://doi.org/10.1007/s11127-007-9199-0.

MacKinnon, R. 2012. Consent of the Networked. Philadelphia: Basic Books.

Mallik, A. 2016. Role of Technology in International Affairs. New Delhi: Pentagon Press.

Morgenthau, H. J. 1948. Politics among Nations: The Struggle for Power and Peace. A. A. Knopf.

Mozur, P. 2015. “Partnership Boosts Users Over China’s Great Firewall.” New York Times, 14 September.

Nye, J. S. 2011. The Future of Power. New York: Public Affairs.

Ping, P. 2017. China Internet Development Report 2017. Beijing: Springer.

Pollpeter, K. 2015. “China's Modernization Efforts and Activities in Outer Space, Cyberspace and the Arctic.” Pp. 113-135 in Assessing China's Power. Hampshire: Palgrave Macmillan.

Qi, A., G. Shao, and W. Zheng. 2018. “Assessing China’s Cybersecurity Law.” The International Journal of Technology Law and Practice 34 (6):1-13. https://doi.org/10.1016/j.clsr.2018.08.007.

Qinglian, H. 2008. The Fog of Censorship: Media Control in China. New York: Human Rights in China.

Radunovic, V. 2010. Diplo. https://www.diplomacy.edu/resources/general/role-information-and-communication-technologies-diplomacy

Rauhala, E. 2016. “America Wants to Believe China Can’t Innovate. Tech Tells A Different Story.” https://www.washingtonpost.com/world/asia_pacific/america-wants-to-believe-china-cant-innovate-tech-tells-a-different-story/2016/07/19/c17cbea9-6ee6-479c-81fa-54051df598c5_story.html

Roberts, M. E. 2018. Censored: Distraction and Diversion Inside China's Great Firewall. New Jersey: Princeton University Press.

Shao, G. 2012. Internet Law in China. Cambridge: Chandos Publishing.

Shao, G. 2012. Internet Law in China. Oxford: Chandos Publishing.

Singer, P. W. and A. Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press.

Sipress, A. 2004. “An Indonesian's Prison Memoir Takes Holy War into Cyberspace.” https://www.washingtonpost.com/archive/politics/2004/12/14/an-indonesians-prison-memoir-takes-holy-war-into-cyberspace/71edfe6f-5231-479f-8bab-2a3ce9944ccf/

Snape, D., and L. Spencer. 2003. “The Foundations of Qualitative Research.” Pp. 3-5 in Qualitative Research Practice: A Guide for Social Science Students and Researchers. London: SAGE.

StatCounter. 2021. “Mobile Vendor Market Share Worldwide.” https://gs.statcounter.com/vendor-market-share/mobile#

[Accessed 16 April 2021].

Stevenson, C. 2007. “Breaching the Great Firewall: China’s Internet Censorship and the Quest for Freedom of Expression in a Connected World.” Boston College International and Comparative Law Review 30(2): 531-558. http://lawdigitalcommons.bc.edu/iclr/vol30/iss2/8.

Stewart, B. 2007. “ARPANET – The First Internet.” https://www.livinginternet.com/i/ii_arpanet.htm

The United Nations. 2007. “Universal Declaration of Human Rights”. http://www.un.org/events/humanrights/2007/hrphotos/declaration%20_eng.pdf (Accessed 12 February 2009).

Weiss, C. 2005. “Science, Technology and International Relations.” Science, Technology and International Relations 27(3): 295-313. https://doi.org/10.1016/j.techsoc.2005.04.004.

Wijaya, T. 2015. “Democracy Deficit in China: A Choice or Foreordained?” Jurnal Ilmiah Hubungan Internasional 11 (2): 191-217. https://doi.org/10.26593/jihi.v11i2.1617.%25p.

Xu, X., Z.M. Mao, Z. M., and J.A. Halderman. 2011. Internet Censorship in China: Where Does the Filtering Occur? Atlanta: Springer.




DOI: https://doi.org/10.15575/jispo.v13i2.27713

Refbacks

  • There are currently no refbacks.




Copyright (c) 2023 Harvardry Gerald Abraham Wowor, Arfin Sudirman, Falhan Hakiki

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

________________________________________________________________________

P - ISSN : 2303-3169

E - ISSN : 2579-3098


JISPO is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.>

 

Published by : Fakultas Ilmu Sosial dan Ilmu Politik UIN Sunan Gunung Djati Bandung

Flag Counter

 

View My Stats