Book contents
- Public and Private Governance of Cybersecurity
- Public and Private Governance of Cybersecurity
- Copyright page
- Contents
- Contributors
- Acknowledgements
- Abbreviations
- 1 Introduction
- 2 International Relations Perspectives
- 3 The State-Oriented Model of Internet Regulation
- 4 Cybercrime, the United Nations, Prospects, and Challenges for International Co-operation
- 5 Responding to Public and Private Cyberattacks
- 6 International Data Transfers and Cybersecurity
- 7 International Trade Law and Cybersecurity
- 8 Cyberthreats, Human Rights, and FDI Restrictions
- 9 Public–Private Partnerships on Cybersecurity and International Law
- 10 The Geopolitical Divide, Norm Conflict, and Public–Private Partnership in Cybersecurity Governance
- Index
3 - The State-Oriented Model of Internet Regulation
The Case of China
Published online by Cambridge University Press: 09 November 2023
- Public and Private Governance of Cybersecurity
- Public and Private Governance of Cybersecurity
- Copyright page
- Contents
- Contributors
- Acknowledgements
- Abbreviations
- 1 Introduction
- 2 International Relations Perspectives
- 3 The State-Oriented Model of Internet Regulation
- 4 Cybercrime, the United Nations, Prospects, and Challenges for International Co-operation
- 5 Responding to Public and Private Cyberattacks
- 6 International Data Transfers and Cybersecurity
- 7 International Trade Law and Cybersecurity
- 8 Cyberthreats, Human Rights, and FDI Restrictions
- 9 Public–Private Partnerships on Cybersecurity and International Law
- 10 The Geopolitical Divide, Norm Conflict, and Public–Private Partnership in Cybersecurity Governance
- Index
Summary
The chapter gives a detailed account of Chinese cybersecurity policy as an example of a state-oriented model of internet governance. After describing China’s early attitudes towards cyberspace, it analyses in detail its cybersecurity policy under the Xi Jinping administration, and how its concept of ‘cyber sovereignty’ differs from Western countries’ approaches to cyberspace. It also examines China’s efforts to export the Chinese model of cyber laws and regulations based on the concept of cyber sovereignty to non-liberal countries. It also analyses how the country is actively involved in the formation of international rules for cybersecurity in order to spread this concept.
Keywords
- Type
- Chapter
- Information
- Public and Private Governance of CybersecurityChallenges and Potential, pp. 40 - 68Publisher: Cambridge University PressPrint publication year: 2023