The great firewall of china

1. Introduction

-Messages of Beijing Internet Information Administrative Bureau to the chief portals and web sites registered in the capital.

THESIS STATEMENT:

The Great Firewall of China promoted propaganda of the Chinese Communist Government in footings of monitoring, filtering, following and barricading the information that could be harmful for government of China but the GfoC have been advancing the anti authorities propaganda in footings of provoking and motivating people to be against to the authorities by agencies of misdemeanor of human rights and freedom of privateness life.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

2.1 CONTROL OF THE INTERNET

In this portion of research, the theoritical model will be examined. First, the inquiry why original features of the cyberspace made it difficult to command will be discussed. After that, the panapticon prison construct which means to utilize the cyberspace for the intent for control will be explained.

a ) Feature OF THE INTERNET

“The linking of the universe ‘s people to a huge exchange of information and thought is a dream that engineering is set to present. It will convey economic advancement, strong democracies… and a greater sense of shared stewardship of our little planet.” ( former Vice President Al Gore )

The Internet is a world-wide web of computing machines. It is an interconnectedness between big and little webs around the Earth. Furtherly, the cyberspace is one of most powerful communications tool. It empowers its users with great entree to a immense pool of informations, tools and the information to carry through many different undertakings. The Internet is used for concern and pleasance likewise. Here, we will discourse the chief features of the cyberspace.

There are several beds and manners of communications among the beds. Hence, some criterions have been raised to let proper degree of communicating across webs. However, these criterions do non curtail the entree of information to a peculiar location. The information spread freely across the webs in the standardised mode. Another singular characteristic of the Internet is Flexibility on the transportation of the information. Internet is fundamentally a web that carries information in digital signifier in the instances alternatively of voice information in parallel signifier ( FreeDialup,2007 ) .

The architecture of the cyberspace is besides different from the other types of communicating. The cyberspace follows a client sever architecture. A waiter is a computing machine loaded with a package bundle that provides requested information to clients. A client is a package plan that contacts to a waiter and petitions information. There are different sorts of waiters packages. A individual hardware waiter computing machine could hold several different types of waiter package bundles running on it. For illustration, you could hold a web waiter, e-mail waiter or a chat waiter running on a individual hardware computing machine waiter. Client sends its petition to the waiter with its ain reference so that the information will be returned to the right location. However, the client bespeaking services must fit the type of service that it is linking to. The client package has to fit up to an exact sort of waiter package and each waiter requires a specific sort of client package. For illustration, If you were looking for a web page, you would utilize a web client to entree a web waiter. If you want to acquire your electronic mail, you would utilize an e-mail waiter. These characteristics make Internet a alone and extremely efficient web of webs.

The features of the Internet that affect its utility in instruction and acquisition can be divided loosely into Information and Connectivity. “The advantages arise from the Internet ‘s tremendous capacity to associate participants with information and with each other” ( Fahy, 1998 ) . the information on the cyberspace is multimedia which capable of holding images, sound and besides picture. They are expensive to bring forth without aid of the cyberspace but progressively there are unfastened beginnings that these information can be found free of charge. Furthermore, comparing to cost of bring forthing hard-copy books, Cadmiums and movies, the cyberspace usage in footings of selling or present the stuffs is more and more cheaper. It makes the cyberspace more attractive to both Sellerss and purchasers every bit good.

In politic point of position, harmonizing to libertarians, autocratic governments such as China that rely on information control will be defenseless against the cyberspace ( Tsui,2001 ) . Since the civil society can ease from the cyberspace in footings of democratic ideas. Authoritarian governments condemn the cyberspace for being harmful to regimes. In 1998, the China Communist party feared the China Democracy Party ( CDP ) would engender a powerful new web that the party elites might non be able to command ( Goldman,2004 ) . States are unable to modulate the cyberspace because of ‘the engineering of the medium, the geographical distribution of its users, and the nature of its content ‘ ; what Boyle calls the “Internet Holy Trinity” ( Boyle,2000 ) . The namelessness is besides another feature of the cyberspace that makes it difficult to command. This characteristic of the cyberspace is besides used for depicting and distributing the ideas about any instance anonymously. However due to anon. single or groups that create danger for the authoritiess and their governments, the authoritiess had need to barricade or restrict that persons and groups. However, the authoritiess have started to concentrate on cencorships to barricade these harmful efforts. We will analyze these efforts in the other parts of the research in item.

B ) PANAPTICON

“Morals reformed – wellness preserved – industry invigorated – direction diffused – public burthens lightened – Economy seated, as it were, upon a stone – the Gordian knot of the Poor Laws non cut, but unfastened – all by a simple thought in Architecture! ” ( Jeremy Bentham, 1791 )

Jeremy Bentham describes panapticon a Greek-based neology for ‘all-seeing topographic point ‘ as how architecture can modulate behavior. Bentham explained the construct of Panapticon in 1791 as a theoretical account prison designed as agencies for social-disipline. The panapticon was created in order to all cells can be viewed from one cardinal point and captives can non state whether they are being watched or non, therefore a sense of fright is induced by them every bit good. That changeless fright of being viewed regulated the captives and induced “proper” behavior ( Lyon,1994 ) .

Lyon besides recognise some traits of the Panapticon construct which are reinforced by electronic surveilliance, invisibleness of the review and its automatic character ( Lyon,1994 ) . The panapticon additions its power from entire of information and controlling of subsidiaries. Therefore a normalizing subject from the captives is prepared.With respect to internet ordinance, Boyle proposes a theoretical account of ‘privatised Panopticons ‘ in his article ‘Foucault in Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors’.This theoretical account attempts to decentralize multiple parts of the Panopticon. The privatised Panopticons are responsible for what happens on their portion of the web, ensuing in a high grade of self-regulation ( Tsui,2001 ) .

2.2 THE INTERNET USE IN PRC ( LITERATURE REVIEW )

“The new technological revolution or information revolution… may assist China skip over some of the phases which have been experienced by other developing countries” ( former Prime Minister Zhao Ziyang, 1983 )

“We should … recognize the enormous power of information engineering and smartly advance its development. The melding of the traditional economic system and information engineering will supply the engine for the development of the economic system and society in the 21st century.” ( Jiang Zemin, August 2000 )

“None of the four modernisations would be possible without informatization.” ( Jiang Zemin )

This chapter will supply information about history and the beginnings of the cyberspace in China. First of wholly, we will look at why China wanted to modulate and restrict the usage of the cyberspace even if it is really difficult to command. Second, the function of media in the Chinese communism will be introduced. After innovation of the cyberspace, a batch of alterations were made in the construction of Chinese authorities therefore the different ministries and authorities organic structures and their duties are discussed. Lastly, some information will be provided about the development of the cyberspace in China.Furthermore, the demographic features of the current cyberspace users will be explored and the usage of the Chinese linguistic communication on the cyberspace will be examined every bit good.

Even though China reacted to the industrial revoloution excessively tardily, Chinese leaders do non desire China to lose the information revolution. The involvement in information revolution has started in the 1980s. It gained strong support because both conservativists and reformists agreed that this “class impersonal technology” was needed to shut the spread with its Asiatic neighbors and the western universe ( Taubman,1999 ) In the other manus like many others, Nicholas Kristof who is author of the New York Times believed that the cyberspace, once it reache a state, is an unstoppable liberating force ( Goldsmith, Wu,2000 ) . Therefore, it could be that the communist China authorities is besides in the same manner of thought because in 1998 the China Communist party feared the China Democracy Party ( CDP ) would engender a powerful new web that the party elites might non be able to control. ( Goldman,2004 ) . The CDP was instantly banned followed by apprehensions and imprisonment ( Goldsmith,2006 ) . That same twelvemonth the Golden Shield undertaking was started. The first portion of the undertaking lasted eight old ages and was completed in 2006. The 2nd portion began in 2006 and ended in 2008. Harmonizing to China Central Television ( CCTV ) , up to 2002, the preliminary work of the Golden Shield Project cost $ 800 million ( tantamount to RMB 6.4 billion, or ˆ650 million ) ( Epochtimes,2008 ) . The Golden Shield Project will be analysed in the 2.5 CONTROL OF THE INTERNET IN PRC portion of the research.

2.3 WHO CONTROLS THE INTERNET IN CHINA

  • The Internet Propaganda Administrative Bureau and the Centre for the Study of Public
  • Opinion, which come under the Information Office of the State Council ( the executive )
  • The Internet Bureau and Bureau of Information and Public Opinion, which come under the
  • CPC ‘s Publicity Department ( the former Propaganda Department )
  • The Ministry of Information Industry ( MII )
  • The Ministry of Public Security ‘s Computer Monitoring and Supervision Bureau
  • The MII ‘s Centre for the Registration of Illegal and Unsuitable Internet Content.

The last two organic structures ( 4 and 5 ) trade with the jobs of erotica, force and fraud, while the MII is non straight involved in Internet control. The truly effectual organic structures are those mentioned in 1 and 2.

2.4 THE CHANGING ROLE OF THE MEDIA IN PRC

“China temblor media policy reversal”

The function of media under consequence of the Chinese communism is dramaticly different from the function of media in Western democrasies. The media under effecet of Chinese communism is seen as a cardinal political tool by the authorities. The media should work under the Party ‘s setup and are responsible for educating the multitudes and circulating political orientation. Ideology as defined by Schurmann is a “systematic set of thoughts with action effects functioning the intent of making and utilizing organisation.” ( Tsui, ) . However, the party is the proprietor, director and practinioner of the media every bit good. Since the Open Door Policy in 1977, China agreed to open up to the West. Therefore, the function of media has besides changed and harmonizing to Lynch, three factors ( administrative atomization, property-rights reforms and technological progress ) are responsible for the alterations in idea work. ( Lynch,1999 ) . Furthermore, the authorities of China largely put force per unit area on the media in order to barricade the information that can be harmful both the government and the statue of the authorities. Even though the authorities tried to barricade alien endeavors to fall in the media of China, the media administrations had to happen associates due to the media administrations are non self sufficient in footings of fiscal issues. Therefore, the cencorship attempts of the authorities could non blockade all the media organisations that are discoursing and composing about authorities. However, the ordinance efforts incited the media administrations to protest the censorings that are using to authors, newspapers and the other media canals.

2.5 CONTROL OF THE INTERNET IN PRC ( LITERATURE REVIEW )

“In the new century, autonomy will distribute by cell phone and overseas telegram modem … We know how much the cyberspace has changed America, and we are already an unfastened society. Imagine how much it could alter China. Now, there ‘s no inquiry China has been seeking to check down on the cyberspace — – good fortune. That ‘s kind of like seeking to nail Jello to the wall.” ( former President of the United States Bill Clinton, 8 March 2000 )

The development of the cyberspace substructure in China started in academic and scientific circles like the most states. The first computing machine web was the China Academic Network ( CANET ) . It was set up in 1987 to supply support for academic and scientific research in computing machine scientific discipline ; the staff had entree to e-mail installations. Other academic webs shortly sprung up, amongst others the web of the Institute of High Energy Physics ( IHEP ) and the China Education and Research Network ( CERNET ) ( Tsui,2001 ) . When the freedom of idea in China started to distribute, the authorities started to try to happen a method that blocks or limits the unwanted information by the authorities. In September 22, 1998, the Minister of Public Security Office after meetings and through research with many public security variety meats across the state decided to transport out the work of public security information engineering – the “ Golden Shield Project ” ( Associated Content,2008 ) .

The Golden Shield Project which is frequently known in the media as the Great Firewall of China is a system which was set up by the authorities of China to restrict the entree of the Internet in the full state of China. Not merely the Golden Shield Project works as a censor but besides it monitors all on-line activity in and out of China. Not merely are the Chinese citizens being monitored but so is any messages sent between China and other states so if you have friends, household, or concern spouses you are being watched by large brother excessively ( Associated Content,2008 ) . For case, if you try to come in the Google and hunt for constabulary ferociousness, Tiananmen Square protests of 1989, freedom of address, democracy, and Marxist sites or Sites related to the Chinese authorities, you will likely confront a clean page or a page says that “This page can non be found” . Furthermore, The state frequently blocks an full Web site, even if lone parts of the site contain sensitive information, ( Edelman,2008 ) . For case, it blocks several sites for taking U.S. universities, including Columbia University and the Massachusetts Institute of Technology. Therefore, even if internet users in China are improbably increasing, the freedom of idea is diminishing and people today can non come in the web sites and can non make the information that they want, they can merely make to the information which the authorities allows they to make and larn. This effort can be examined as propaganda which will be evaluated in the following chapter of the research.

3.1. PROPAGANDA OF CHINA IN TERMS OF CONTROLLING THE INTERNET

“You make a job for us, and we ‘ll do a jurisprudence for you.” ( nameless Comrade X ) “Imagine a web that knows who you are, where you are, and can make you whether you ‘re on your nomadic phone or at your desktop. Even b vitamin E T T vitamin E R, imagine alternatively of happening your Web content, one t degree Fahrenheit I n vitamin D s you. Sounds personal. Precisely. ” – Nortel Netwo R K s,

Pe rsonal Internet Strategy

The first paramount leader of the Chinese Communist Party, Mao Zedong, one time said the followers that has become the slogan for the Party: if we Chinese Communist Party want to remain in power, we need to command two things – one is the gun, the other is the pen. That ‘s why the Chinese Communist Party has been using force every bit good as propaganda-plus-censorship in every one of its suppressions over the past 60 old ages of its opinion, whether the suppression is on Tiananmen pupils, Falun Gong, or Tibetans. ( Zhou,2009 )

China today faces a really modern paradox. On one side, the authorities understands that information engineerings are the engine driving the planetary economic system, and that Chinese economic growing will depend in big step on the extent to which the state is integrated with the planetary information substructure. At the same clip, nevertheless, China is an autocratic, single-party province. Continued societal stableness relies on the suppression of anti-government activities. To province the job merely, political control is dependent on economic growing and economic growing requires the modernisation of information engineerings, which in bend, have the possible to sabotage political control ( Walton,2008 ) .

To measure the Great Firewall of China-officially Golden Shield- in footings of propaganda, we should analyze the GfoC in footings of either tactics of propaganda or the position of propaganda or persuasion term.

The all tactics of propaganda are suited for GfoC and the authorities of China has already used them all. First of wholly, the most conspicious maneuver is the transportation. Although official name of firewall is the Golden Shield, it is represented as Great Firewall of China which reminds the Great Wall of China which is one of the most celebrated value of China. The ground for utilizing the name of Great Firewall of China by the propagandist authorities can be that idea of this firewall will protect the Chinese state like the Great Firewall of China. Therefore, Chinese people had sympathy for the firewall foremost and so Chinese people delivered their Personal computer and laptops to the sections of the authorities in which technicians installed the Firewall to all computers. ( Goldsmith,2006 ) . Second, at the same clip, the bandwagon tactic draws attending as two different signifiers. The first 1 is that, in 2006, 1000000s of cyberspace users allowed the authorities to put in the GfoC to their computing machines by convince of the other people who allowed before them. The 2nd signifier is that, China authorities produces advertizements and Television plans that describe the good sides of the firewall and furtherly some states such as Cuba, Zimbabwe, Belarus and Turkey have affected from the Golden Shield and some other states besides have started to bring forth a similar firewall ( Reporters Without Borders. 2006 ) . Third, the authorities of China is utilizing testimonial tactic really efficaciously by utilizing experiments of celebrated Chinese scientists and their testimonies to do people believe that the Golden Shield is good and necessary to salvage Chinese cultural values from devolution. On April 3, 1998 secretary of the Central Political Science and Law Committee, Luo Gan said: “ Overall, there must be a consideration, the ultimate end is to accomplish a national web. To be considered farther. The realisation of the national web to states and municipalities. ” For his there is a demand, “ To set up an overall monitoring of the Internet direction centre. ” ( Associated Content,2008 ) . Another tactic that can be defined is card stacking tactic because by aid of the censoring the goverment can incorporate the all information in such a manner that the all information is suited for benefits of the goverment to Chinese state by giving disinformation. For case, when the term of Tiananmen Square protests of 1989 is searched by Google.cn you can happen merely the information that the authorities provides and besides if you try to happen inconvenient words harmonizing to the Chinese goverment such as democracy in China or Tiananmem massacre you may be banned from the cyberspace for five proceedingss foremost so if you try once more you may be banned for 10 and your IP figure will be started to be watched. ( Fallows,2008 )

nevertheless, glistening generalizations tactic is besides widely used by the authorities, even if the authorities bound and barricade the freedom of state, the authorities make people believe that they will hold a more freedom and they will facilitiate from the trueness to censorship in footings of profiting from services of the authorities. Due to the fact that China is under control of Chinese Communist Party, the authorities uses name-calling tactic largely by naming the Western and the other powers that are against China such as Tibet or protesting monastics. For case, China calls the Dalai Lama a “cat ‘s paw of international anti-China forces.” Protesting monastics are labeled the “scum of Buddhism, ” and foreign critics are said to hold a “dark and ugly mentality.” In reacting to recent anti-Chinese protests in Tibet, Beijing has revived sharp linguistic communication from past decennaries, exposing the Communist government ‘s utmost sensitiveness over the issue and digesting autocratic nature. ( Ways That Are Dark,2008 )

To analyze the GfoC in footings of Cultural Value Orientation of Schwartz ( 2008 ) , foremost it should be known that China is the most hiearchical civilization in the universe harmonizing to Schwartz. Furthermore, China has been seeking to pull the other states and to look to be superior to others by following the harmonic cultural values such as esteeming to the nature. For case, The lensman, 41 twelvemonth old Liu Weiqing, was under contract with Xinhua to supply exposure for China ‘s largest government-run intelligence service. He faked the the exposure utilizing of Photoshop to unite two separate images and make the coveted consequence. That exposure was used for advertizements of some ISS companies which are applied scientists of the GfoC ( Ways That Are Dark,2008 ) . This is the purpose of propaganda anyhow, doing the unreal seem existent.

‘The truth is likely the antonym of what the image was seeking to claim, ‘ Su Jianping, a animal scientist at the Northwest Institute of Plateau Biology, in Xining, told the diary Nature last hebdomad. The antelopes are diffident and their migration forms are being disturbed by the trains. ‘There is no such thing as harmonious coexistence between trains and antelopes, ‘ Jiangping said ( Ways That Are Dark,2008 )

On the other manus, the hierarchal civilization value of China is really suited to propagandise and do people belive sometimes by inforcing. For case, the ego censoring is the effect of the propaganda of the GfoC. Peoples became voluntary for happening and complaning the web sites that should be blocked by the authorities free of charge because of the wonts of hierarchal cultural values. Peoples who are from hiearchical civilizations ever want to demo their trueness to Masterss.

Deflective Source Model of Propaganda

Legalizing beginning Model of propaganda

In order to measure the Great Firewall of China in footings of beginning theoretical accounts of propaganda ( Jowett, O’Donnel,1999 ) , we should believe widely and turn out the groundss. It is obvious that the Great Firewall of China is the refractive beginning of the authorities of China because the authorities determines the all information that people of China can make and larn. Therefore, China can supply information merely for benefit of the authorities by aid of the GfoC. Furthermore, in item,

this firewall can be used as legalizing beginning every bit good. By leting the web sites which seems to be from western states but at the same clip under control of the authorities of China, China can supply the information that will be served in that web site and than the authorities can show that information as if the web site that seems to be from western provided.

By aid of beginning theoretical accounts of propaganda, the authorities of China kill two birds with one rock which means that foremost by monitoring, filtering, following and barricading both authors of web sites and readers of those web sites, the authorities can command all informations flow on the cyberspace and can utilize the all those informations for its benefit. Second, by barricading the web sites that contains harmful content for communist government such as broad or democratic ideas, the goverment survives every bit much as it wants and prevents people to larn the other ideas and protest the recent government.

On the other manus, the manufacturer of the GfoC is Cisco which is an American based house. When an cyberspace user wants to come in a web site, this effort foremost reaches the waiters of Cisco and so if Cisco does non happen any prohibited content, it let user make the web site. In this mode, there could be another beginning theoretical account of propaganda that Cisco which is an American house can alter the information and can supply the information that the USA wants to incorporate to Chinese Public. It can sounds some sort of confederacy theory but harmonizing to Newsmax article ( 2009 ) ; Even if the USA does non incorporate the ideas of capitalist economy and liberalism straight, there are undertakings that make the Chinese users protest this firewall such as Global Information Freedom Consortium. This sort of efforts will be examined in the portion of counter propaganda in item.

2.6 COUNTERPROPAGANDA OF THE GREAT FIREWALL OF CHINA

“Everyone has the right to freedom of peaceable assembly and association” . The Universal Declaration of Human Rights, Article 20 “Enemy forces at place and abroad are saving no attempt to utilize this front line to infiltrate us, ”159 ( column in People ‘s Daily, January 2001 ) “China is traveling to develop the cyberspace, but we do non cognize whether it will be with the sort of unchained imperativeness freedom that Western experts want. Possibly we do non desire that sort of freedom.”160 ( Ke Guo, associate professor of news media at Shanghai International Studies University )

Since the GfoC is a really controversial issue in footings of human rights and freedom of idea, several administrations such as Global Information Freedom Consortium, Internet Freedom Project have been founded in different states. On the other manus, some civil efforts such as Tor which is an onion routing tool have been served in recent old ages. In add-on, the efforts to command to the cyberspace is critisized as restricting the freedom of thought by newspapers and authors in Western such as BBC, CBSnews, Guardian and by some pools such as Global Internet Freedom Consortium.

However, there is one frontline of the conflict that has been ignored until now by the anticensorship community. Besides technological chase in censoring execution, the Chinese communist government makes strategic programs to export their propaganda and disinformation machinery to free states inconspicuously, seemingly, using the “an discourtesy is the best defense” doctrine. Many Chinese-language web sites, every bit good as newspapers in the United States are mostly controlled by Beijing through ways such as investing or joint venture, and these media can distribute the same disinformation in the western universe as on the other side of the GFW. Sometimes it is dry to see web surfboarders from China, after successfully perforating the GFW, end up in traps skilfully set up by the censors they are seeking difficult to hedge. Hereby it is of import to construct and keep trusty content platforms in their native linguistic communication, to supply users with a true, independent internet immune to the censors ‘ infiltration. ( Tsui,2001 )

The development of the cyberspace will convey huge alterations to autocratic governments such as China. These governments are seeking to halt an resistless force in their attempts to command the internet.2 One can non but agree with Clinton when one keeps hearing from journalists and politicians that the cyberspace is the forerunner of freedom without boundaries. Information antecedently unavailable to the ordinary Chinese citizen is now accessible on the World Wide Web ( WWW ) ( Freidman,2000 ) Furthermore, there are several web sites that are motivating and arousing Chinese people by stating that censoring wholly opposes the Human Rights and those web sites gives the information in native linguistic communication. When those web sites are searched for, the GfoC blocks the connexion but by agencies of packages of those arousing web sites such as www.peacefire.org ” which are non banned by the GfoC ( GIFC,2007 ) . There is besides another refractive beginning theoretical account of propaganda in a instance that the libertarians and Democrats are utilizing those web sites which provoke people and allow people to come in banned web sites as refractive beginning and at the same clip those propagandists use the GfoC as legalizing beginning by seeking banned words such as democracy, freedom and so they criticize the government of the Communist Party of China with respect to changed messages of legalizing beginning. ( Jowett, O’Donnell,1999 )

Bibliography

  • Boyle, James, “Foucault in Cyberspace, ” ( 1997 ) hypertext transfer protocol: //www.law.duke.edu/boylesite/fouc1.html
  • China censors blamed for electronic mail pandemonium “ . Reuters ( July 18, 2007 )
  • Collins, Dan ( 2002 ) “China ‘s Internet Censorship”CBSnews
  • Column, “Freedom vs. the Firewall” The Washington Post, July 7, 2009 ( hypertext transfer protocol: //www.washingtonpost.com/wp-dyn/content/article/2009/07/06/AR200907… ) .
  • Eli Lake, “Hacking the Regime” , The New Republic, September 3, 2009,
  • Fahy, P. J. ( 1998 ) . Contemplations on the productiveness paradox and distance instruction engineering. Journal of Distance Education, 13 ( 2 ) , 66-73.
  • Friedman, Thomas, ( 2000 ) “Censors Beware, ” The New York Times
  • Hermida, Alfred ( 3 September, 2002 ) Behind China ‘s cyberspace Red Firewall, BBC News Online engineering staff
  • Jowett, Garth S. , and Victoria O’Donnell. ( 1999 ) Propaganda and Persuasion. 3rd erectile dysfunction. Thousand Oaks, Calif. : Sage,
  • Global Internet Freedom Consortium ( 2007 ) “Defeat Internet Censoring: Overview of Advanced Technologies and Products”
  • Goldman, Merle Goldman. Gu, Edward X. [ 2004 ] ( 2004 ) . Chinese Intellectuals between State and Market. Routledge publication.
  • Goldsmith, Jack L. ; Wu, Tim ( 2006 ) . Who Controls the Internet? : Illusions of Borderless World. Oxford university imperativeness
  • Goldsmith, Jack, “Against Cyberanarchy, ” Occasional Papers from The Law School The University of Chicago Number 40, hypertext transfer protocol: //www.law.uchicago.edu/Publications/Occasional/40.html
  • Lessig, Lawrence, ( 1999 ) Code and Other Laws of Cyberspace. New York: Basic Books,
  • Lyman, Jay, ( 2March 2001 ) , “SilentRunner Spyware Out-Snoops FBI ‘s Carnivore, ” NewsFactor Network hypertext transfer protocol: //newsfactor.com/perl/story/7873.html
  • Lynch, Daniel, ( 1999 ) After the Propaganda State: Media, Politics and “Thought Work” in Reformed China. Stanford, CA: Stanford University Press
  • Lyon, David, “From Big Brother to Electronic Panopticon, ”http: //www.rochester.edu/College/FS/Publications/Lyon.html
  • Lyon, David, ( 1994 ) The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press,
  • Lyon, David ( 2001 ) , Surveillance Society: Monitoring Everyday Life. Buckingham, Philadelphia: Open University Press,
  • Reporters Without Boundary lines. ( 2006 ) ” Traveling online in Cuba: Internet under surveillance “ .. hypertext transfer protocol: //www.rsf.org/IMG/pdf/rapport_gb_md_1.pdf.
  • Marquand, Robert ( 2006-02-04 ) . “ China ‘s media censoring rattling universe image “ . Christian Science Monitor.
  • NewsMax.com, Wires ( 2002 ) “U.S. Businesses Help China Suppress Internet”
  • Zhou, Shiyu ( 10June 2008 ) Symposium on People ‘s Republic of China: Foreign Policy Risks and Opportunities Room 200, West Block, Parliament Buildings, Ottawa
  • Watts, Jonathan ( 2005 ) “China ‘s secret cyberspace constabulary mark critics with web of propaganda”The Guardian Newspaper
  • Walton, Greg, ( 2001 ) China ‘s Golden Shield: Corporations and the Development of Surveillance Technology n the People ‘s Republic of China
  • Taylor, Richard ( 6January,2006 ) ” The great firewall of China” BBCnews
  • Tsui, Lokman, ( 2001 ) Internet in China: Large Mama is watching you: Internet control and the Chinese Government, Unpublished MA Thesis, University of Leiden
  • Tsui, Lokman, ( 2002 ) Panopticon Control: Regulation of the Internet in China by Surveillance, Submission for the AoIR 3.0 Conference held at Infonomics, Maastricht, The Netherlands
  • Zissis, Carin ( 2008 ) “Media Censorship in China” Research Associate Bilkent University

Leave a Reply

Your email address will not be published. Required fields are marked *