China's Cybersecurity Governance As Part Of Foreign And Security Policy

Authors

  • Mira Murniasari Sekolah Tinggi Intelijen Negara

DOI:

https://doi.org/10.70710/sitj.v1i2.23

Keywords:

China, Cyber, Security

Abstract

Cyberspace has become a new method of interaction for humans in the digital industrial era. One of the countries that play an important role in global cyberspace is China, which has the largest number of internet users, reaching 989 million. This has prompted Chinese Government to formulate a complex cybersecurity governance strategy to maintain national stability and security. Therefore, this study aims to explore China's approach to cybersecurity at domestic and foreign levels. Domestic level explores the governance in the country by examining strategic documents, policies, as well as legal and institutional frameworks, while foreign level discusses cybersecurity as part of foreign and security policy. The primary focus of this study is the series of Chinese diplomatic initiatives aimed at shaping governance norms across various international forums.

Downloads

Download data is not yet available.

References

th China-Japan-Korea CSIRT Annual Meeting for Cybersecurity Incident Response was held in Korea. (n.d.). CNCERT/CC. Retrieved October 20, 2021, from https://www.cert.org.cn/publish/english/55/2017/20170921100705257184781/201709 21100705257184781_.html

Akyesilmen, N. (2018), Cyber good Governance: A new Challenge in International Power Politics?” Cyberpolitik Journal 3(6). www.cyberpolitikjournal.org.

Ang, B. (2021). Singapore: A leading actor in ASEAN cybersecurity. Dalam Romaniuk, S. N. & Manjikian, M (ed) Routledge Companion to Global Cyber-security Strategy. Oxon: Routledge.

Areng, L. (2014). “Lilliputian States in Digital Affairs and Cyber Security.” Tallinn Paper No. 4. CCDCOE, Tallinn, Estonia. https://ccdcoe.org/uploads/2018/10/TP_04.pdf.

Austin, G. (2016). Mapping and Evaluating China’s Cyber Power (Policy Paper Series). Lau China Institute.

Austin, G. (2018). Cybersecurity in China: The Next Wave. Springer International Publishing. https://doi.org/10.1007/978-3-319-68436-9.

Australia and China Agree to Cooperate on Cyber Security. (2017, April 24). Department of the Prime Minister and Cabinet. https://pmtranscripts.pmc.gov.au/release/transcript- 40910.

Baram, G. (2017). “Israeli Defense in the Age of Cyber War.” Middle East Quarterly, 24(1):1– 10). www.meforum.org/middle-east-quarterly/pdfs/6399.pdf.

Brenner, Joel., & Lindsay, Jon R. (2015). Correspondence: Debating the Chinese Cyber Threat. International Security 40:1, 191-195

Brown, G., Carlye, M., Salmeron, J. & Wood, K. (2006). “Defending Critical Infrastructure,” Interfaces, 36(6): 530–544.

Buzan, B. & Hansen, L. (2009). The Evolution of International Security Studies. Cambridge: Cambridge University Press.

Cavelty, M. D. & Egloff, F. (2019). “The Politics of Cybersecurity: Balancing Different Roles of the States.” St. Antony’s International Review 15(1), 37-57.

Chang, Evelyn. (2021). China says it now has nearly 1 billion internet users. CNBC. https://www.cnbc.com/2021/02/04/china-says-it-now-has-nearly-1-billion-internet- users.html.

Cheung, T. M. (2018). The rise of China as a cybersecurity industrial power: Balancing national security, geopolitical, and development priorities. Journal of Cyber Policy, 3(3), 306– 326. https://doi.org/10.1080/23738871.2018.1556720.

China’s Submissions to the Open-ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security. (n.d.). Retrieved October 20, 2021, from chrome- extension://efaidnbmnnnibpcajpcglclefindmkaj/viewer.html?pdfurl=https%3A%2F%2Funoda-web.s3.amazonaws.com%2Fwpcontent%2Fuploads%2F2019%2F09%2Fchina-submissions-oewg- en.pdf&clen=109616&chunk=true.

China-UK High Level Security Dialogue: Communique. (2016, June 13). GOV.UK. https://www.gov.uk/government/publications/china-uk-high-level-security-dialogue- official-statement/china-uk-high-level-security-dialogue-communique.

Chouchri, Nazli., Madnick, Stuart., & Priscilla Koepke. (2017). Institutions for Cyber Security: International Responses and Data Sharing Initiatives. Cybersecurity Interdisciplinary Systems Laboratory (CISL), Sloan School of Management, Massachusetts Institute of Technology, DOI: 10.1080/02681102.2013.836699.

Costello, J., & McReynolds, J. (2018). China’s Strategic Support Force: A Force for a New Era (No. 13; China Strategic Perspectives, p. 84). Institute for National Strategic Studies.

Craigen, D., Diakun-Thibault, N., Purse, R. (2014). “Defining Cybersecurity.” Technology Innovation Management Review 4(10), 13-21.

Creemers, Roger. (2019). The International and Foreign Policy Impact of China’s Artificial Intelligence and Big-Data Strategies. Dalam Artificial Intelligence, China, Russia, and the Global Order. Air University Press.

Cristiano, F. (2021). Israel: Cyber defense and security as national trademarks of international legitimacy. Dalam Romaniuk, S. N. & Manjikian, M (ed) Routledge Companion to Global Cyber-security Strategy. Oxon: Routledge.

Cuihong, C. (2018). China and Global Cyber governance: Main Principles and Debates. Asian Perspective 42(4), 647-662.

de Bossey, Cgateay. (2005). Report of the Working Group on Internet Governance, Source: http://www.wgig.org/docs/WGIGREPORT.pdf.

DeVore, M. R. & Lee, S. (2017). “APT (Advanced Persistent Threat)s and Influence: Cyber Weapons and the Changing Calculus of Conflict,” The Journal of East Asian Affairs, 31(1): 39–64. Retrieved from www.jstor.org/stable/pdf/44321272.pdf.

Dhillon, G. (2007). Principles of Information Systems Security: Text and Cases. New York: John Wiley & Sons.

Eriksson, J. and Giacomello, G. (2006). ‘The Information Revolution, Security and International Relations: (IR)relevant Theory?’ International Political Science Review, 27(3): 221–44.

FACT SHEET: President Xi Jinping’s State Visit to the United States. (2015, September 25). The White House. https://obamawhitehouse.archives.gov/the-press- office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states

Fallows, D. (2008). Most Chinese Say They Approve of Government Internet Control. Pew Internet & American Life Project.

Fang, B. (2018). Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace. Springer.

Fei, Gao. (2011). China’s Cybersecurity Challenges and Foreign Policy. Georgetown Journal of International Affairs, International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity. 185-190.

First U.S.-China Law Enforcement and Cybersecurity Dialogue. (2017, October 6). Department of Homeland Security. https://www.dhs.gov/news/2017/10/06/first-us- china-law-enforcement-and-cybersecurity-dialogue

Fjäder, C. O. (2016). National security in a hyper-connected world: global interdependence and national security. Dalam Masys, A. J. (ed) Exploring the security landscape: non- traditional security challenges. Springer.

Full text of “National Cyberspace Security Strategy.” (2016, December 27). Office of the Central Cyberspace Affairs Commission. http://www.cac.gov.cn/2016- 12/27/c_1120195926.htm

Geiger, A. W. (2018). “How Americans Have Viewed Government Surveillance and Privacy since the Snowden Leaks,” Pew Research. www.pewresearch.org/fact- tank/2018/06/04/how-americanshave-viewed-government-surveillance-and-privacy- since-snowden-leaks.

Grauman, B. (2012). Cyber-Security: The Vexed Question of Global Rules. An Independent Report on Cyber Preparedness around the World. Brussels: Security & Defence Agenda (SDA) and McAfee Inc. (Security & Defence Agenda).

Hansen, L. & Nissenbaum, H. (2009). “Digital Disaster, Cyber Security, and the Copenhagen School,” International Studies Quarterly 53, 1155–1175.

Inkster, Nigel. (2015). Evolution of the Chinese Internet: Freedom and Control. Adelphi Series, 55: 456, 19-150. https://doi.org/10.1080/19445571.2015.1181441.

International Strategy of Cooperation on Cyberspace. (n.d.). Ministry of Foreign Affairs of the People’s Republic of China. Retrieved October 22, 2021, from https://www.fmprc.gov.cn/mfa_eng/wjb_663304/zzjg_663340/jks_665232/kjlc_6652 36/qtwt_665250/t1442390.shtml

International Telecommunication Union. (2017). Global Cybersecurity Index 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

Jiang, M. (2010). Authoritarian Informationalism: China’s Approach to Internet Sovereignty. SAIS Review of International Affairs, 30(2), 71–89. https://doi.org/10.1353/sais.2010.0006

Jiwei, L. (2018, April 25). The era of barbaric growth on the Internet is over. XINHUANET.Com. http://www.xinhuanet.com/tech/2018-04/25/c_1122740358.htm

Kementerian Luar Negeri dan Administrasi Ruang Siber China. (2017). International Cyberspace Cooperation Strategy. CD/2092. https://undocs.org/CD/2092

Korea, China join forces in responding to cyber threats, strengthening industry cooperation. (2016, December 21). Embassy of the Republic of Korea in the United Kingdom of Great Britain and Northern Ireland and Permanent Mission to the International Maritime Organization. https://overseas.mofa.go.kr/gb- en/brd/m_8349/view.do?seq=749192

Kurbaija, Jovan. (2016). An Introduction to Internet Governance, 7th Edition. Geneva: DiploFoundation.

Kurbalija, J. (2016). An Introduction to Internet Governance. DiploFoundation.

Li, J. (2021, August 23). How China’s top internet regulator became Chinese tech giants’ worst enemy. QUARTZ. https://qz.com/2039292/how-did-chinas-top-internet-regulator- become-so-powerful/

Lindsay, Jon R. (2015). The Impact of China on Cybersecurity: Fiction and Frcition. International Security 39:3, 7-47

Manjikian, Mary. (2021). The United States: A Declining Hegemon in Cyberspace? Dalam Romaniuk, S.N & Manjikian, M (ed). Routledge Companion to Global Cyber-security Strategy. Oxon: Routledge.

McKune, S. & Ahmed, S. (2018). “The Contestation and Shaping of Cyber Norms through China’s Internet Sovereignty Agenda,” International Journal of Communication, 12, 3835-3855.

McKune, S. (2015, September 28). An analysis of the International Code of Conduct for Information Security. Toronto, Canada: Citizen Lab. https://citizenlab.ca/2015/09/international-code-of-conduct/

Miao, W., & Lei, W. (2016). Policy review: The Cyberspace Administration of China. Global Media and Communication, 12(3), 337–340. https://doi.org/10.1177/1742766516680879

Miao, W., Jiang, M., & Pang, Y. (2021). Historicizing Internet Regulation in China: A Meta- Analysis of Chinese Internet Policies (1994–2017). International Journal of Communication, 15, 2003–2026.

Mueller, M. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press.

Mueller, M. (2017). Will the Internet Fragment? Sovereignty, Globalization and Cyberspace. London: Polity.

National Computer Network Emergency Response Technical Team/Coordination Center of China. (n.d.). CNCERT/CC. Retrieved October 20, 2021, from https://www.cert.org.cn/publish/english/index.html

Newman, K. L. (2000). Organizational transformation during institutional upheaval. The Academy of Management Review, 25(3), 602–619.

On the signing of an Agreement between the Government of the Russian Federation and the Government of the People’s Republic of China on cooperation in the field of ensuring international information security. (2015, May 8). Ministry of Foreign Affairs of the Russian Federation. https://www.mid.ru/ru/maps/cn/-/asset_publisher/WhKWb5DVBqKA/content/id/1257295

Panda, A. (2014, March 4). Xi Jinping: China Should Become a “Cyber Power.” The Diplomat. https://thediplomat.com/2014/03/xi-jinping-china-should-become-a-cyber-power/

PLA Cyberspace Strategic Intelligence Research Center founded. (2014, July 1).

Chinanews.Com. http://www.ecns.cn/military/2014/07-01/121758.shtml

Ran, J. (2017, March 15). American unrest proves China got the Internet right. Foreign Policy. https://foreignpolicy.com/2017/03/15/american-unrest-proves-china-got-the-internet- rightbeijing-great-firewall-censorship-trump/

Rapoza, K. (2013, June 22). U.S. Hacked China Universities, Mobile Phones, Snowden Tells China Press. Forbes. https://www.forbes.com/sites/kenrapoza/2013/06/22/u-s-hacked- china-universities-mobile-phones-snowden-tells-china-press/?sh=666824065340

Robinson, N. & Hardy, A. (2021). Estonia: From the “Bronze Night” to cybersecurity pioneers. Dalam Romaniuk, S. N. & Manjikian, M (ed) Routledge Companion to Global Cyber- security Strategy. Oxon: Routledge.

Stadnik, Ilona. (2021). Seeking a New Order for Global Cybersecurity: The Russian Approach to Cyber-sovereignty. Dalam Romaniuk, S.N & Manjikian, M (ed). Routledge Companion to Global Cyber-security Strategy. Oxon: Routledge.

Statista. (2021). Number of internet users in China from 2015 to 2020 with a forecast until 2026. https://www.statista.com/statistics/278417/number-of-internet-users-in-china/.

Stevens, Tim. (2021). United Kingdom: Pragmatism and Adaptability in the Cyber Realm. Dalam Romaniuk, S.N & Manjikian, M (ed). Routledge Companion to Global Cyber- security Strategy. Oxon: Routledge.

Tabansky, L. & Ben-Israel, I. (2015). Cyber Security in Israel. New York: Springer.

Tabansky, L. (2013). Cyberdefense Policy of Israel: Evolving Threats and Responses. Chair de Cyberdefense et Cybersecurite.

The 3rd Trilateral Cyber Policy Consultation. (2017, February 8). Ministry of Foreign Affairs of Japan. https://www.mofa.go.jp/press/release/press4e_001471.html

Third U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues. (2016, December 8). Department of Homeland Security. https://www.dhs.gov/news/2016/12/08/third-us-china-high-level-joint-dialogue- cybercrime-and-related-issues under-donald-trump.

Wickett, X., Smith, J., & Smart, C. “America’s International Role under Donald Trump.” Chatham House Reports. January 18, 2017.

https://www.chathamhouse.org/publication/americas-internationalrole-

World Bank. (2021). Individuals Using the Internet (% of Population). https://data.worldbank.org/indicator/IT.NET.USER.ZS?end=2019&start=1960&view=chart.

Xi wants China to be “cyber power.” (2014, March 1). DefenceTalk.Com. https://www.defencetalk.com/xi-wants-china-to-be-cyber-power-58886/

Ye, Z. & Zhao, B. (2014). Thoughts on Internet sovereignty, Internet borders, and national network defense. China Information Security.

Zeng, J. (2015). The Chinese Communist Party’s Capacity to Rule: Ideology, Legitimacy and Party Cohesion. Palgrave Macmillan.

Zeng, J., Stevens, T., & Chen, Y. (2017). China’s Solution to Global Cyber Governance: Unpacking the Domestic Discourse of “Internet Sovereignty.” Politics & Policy, 45(3), 432–464. https://doi.org/10.1111/polp.12202

Downloads

Published

2024-11-20

How to Cite

Murniasari, M. (2024). China’s Cybersecurity Governance As Part Of Foreign And Security Policy. Security Intelligence Terrorism Journal (SITJ), 1(2), 164–177. https://doi.org/10.70710/sitj.v1i2.23

Issue

Section

Articles

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.