The Emergence of China's Smart State
The Emergence of China's Smart State
The Emergence of
China’s Smart State
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
While other disciplines like law, sociology and computer science have engaged
closely with the Information Age, international relations scholars have yet to bring
the full analytic power of their discipline to developing our understanding of what
new digital technologies mean for concepts like war, peace, security, cooperation,
human rights, equity, and power. This series brings together the latest research from
international relations scholars—particularly those working across disciplines—to
challenge and extend our understanding of world politics in the Information Age.
The Emergence of
China’s Smart State
Edited by Rogier Creemers, Straton
Papagianneas, and Adam Knight
Credits and acknowledgments for material borrowed from other sources, and reproduced
with permission, appear on the appropriate pages within the text.
Published by Rowman & Littlefield
An imprint of The Rowman & Littlefield Publishing Group, Inc.
4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706
www.rowman.com
All rights reserved. No part of this book may be reproduced in any form or by any elec-
tronic or mechanical means, including information storage and retrieval systems, without
written permission from the publisher, except by a reviewer who may quote passages
in a review.
978-1-5381-8442-4 (ebook)
The paper used in this publication meets the minimum requirements of American
National Standard for Information Sciences—Permanence of Paper for Printed Library
Materials, ANSI/NISO Z39.48-1992.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Contents
Introduction 1
vi Contents
List of Abbreviations
vii
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
viii L
ist of Abbreviations
List of Abbreviations ix
Introduction
Rogier Creemers
2 Rogier Creemers
Introduction 3
4 Rogier Creemers
This book brings together authoritative voices from the academic and
think tank world to open up these debates across four topic areas. The first
is conceptual, discussing how China conceives of the role of digital tech-
nologies in its development process, and how institutional reforms are made
to realise these. The second addresses China’s progress in certain strategic
emerging technologies, including fintech, semiconductor manufacturing, and
blockchain-enabled services. The third addresses the local component of the
digital power strategy, reviewing how local governments have responded to
the gradual expansion of digital ambitions. The last reviews cross-border pro-
cesses and China’s engagement with global technical governance processes.
REFERENCES
Cary, Dakota. 2021. China’s National Cybersecurity Center: A Base for Military-Civil
Fusion in the Cyber Domain, CSET, July. Available from: https://cset.georgetown
.edu/publication/chinas-national-cybersecurity-center.
China Copyright and Media. 2014. Central Leading Group for Internet
Security and Informatization Established. 1 March. Available from: https: //
chinacopyrightandmedia.wordpress.com/2014/03/01/central-leading-group-for
-internet-security-and-informatization-established.
Clarke, Donald. 2003. Puzzling Observations in Chinese Law: When Is a Riddle Just
a Mistake? In Hsu, C. Stephen, ed. Understanding China’s Legal System. New
York University Press, 93–121.
Creemers, Rogier. 2020. China’s Cyber Governance Institutions. Leiden Asia Centre
Report. Available from: https://leidenasiacentre.nl/report-chinas-cyber-governance
-institutions.
Li, Yin. 2021. The Semiconductor Industry: A Strategic Look at China’s Supply
Chain. In Spigarelli, Francesca, and John McIntrye, eds. The New Chinese Dream.
Palgrave Macmillan, 121–36.
Lu, Lerong and Ningyao Ye. 2019. Promoting High-tech Innovations through Capital
Markets Law Reform: Deciphering the Sci-Tech Innovation Board of the Shanghai
Stock Exchange. Journal of International Banking and Financial Law 35: 140–43.
Naughton, Barry. 2022. Grand Steerage as the New Paradigm for State-Economy
Relations. In Pieke, Frank, and Bert Hofman, eds. CPC Futures: The New Era of
Socialism with Chinese Characteristics. NUS East Asian Institute, 105–12.
Pan, Fenghua, Fangzhu Zhang, and Fulong Wu. 2021. State-led Financialization in
China: The Case of the Government-guided Investment Fund. The China Quarterly
247: 749–72.
State Council. 2016. “Shisan wu” guojia xinxihua guihua (13th Five-Year Plan for
National Informatization), issued 15 December. Available from: http://www.gov.cn
/zhengce/content/2016-12/27/content_5153411.htm.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Introduction 5
White, Edward and Qian’er Lu. 2022. China’s Big Fund Corruption Probe Casts
Shadow over Chip Sector. Financial Times, 29 September. Available from: https://
www.ft.com/content/8358e81b-f4e7-4bad-bc08-19a77035e1b4.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
PART I
7
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 1
The Cyberspace
Administration of China
A Portrait
INTRODUCTION
The CAC was founded in May 2011, under the name of the State Internet
Information Office (SIIO). At that time, it was a relatively unobtrusive
department of the State Council Information Office, itself the State face of the
Party Central Propaganda Department (CPD), without independent staffing.
The litany of problems it was intended to address remain well-recognised,
including “false information and malicious speculation, pornographic and
vulgar information, fraud and gambling, illegal marketing, etc..” Moreover,
presaging Xi Jinping’s dialectic view of cybersecurity and informatisation,
the vision that the SIIO was set out to realise in the online information space
was that “development and management complement each other, develop-
ment requires management, and management enables sound and fast devel-
opment.” The list of responsibilities this new department should bear was,
however, rather out of kilter with its relatively low bureaucratic status and
shortage of resources, including licensing of online businesses, overseeing
online games, video and publishing, managing online news and propaganda,
law enforcement against illegal websites, and coordinating the management
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Regulatory Responsibilities
Online Content
Online content management, assigned to CAC by the State Council in 2014,
is arguably the area where it has been the most successful and effective. This
is unsurprising: CAC has inherited and continued content control practices
going back decades, and the necessity of censorship and content management
are not politically contentious. CAC did bring a new approach to the online
environment. Hitherto, legacy regulators had governed online media like
traditional media, relying on tools such as prepublication review that were
increasingly obsolescent in times of social media and user-generated content.
CAC, in contrast, outsourced management tasks to platform companies them-
selves, culminating in the concept of “principal responsibility” (zhuti zeren
主体责任). This makes companies liable for the legality of content posted
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Cybersecurity
The CSL gave CAC responsibility for overall planning, coordination, and
supervision and management of cybersecurity work. It also established sev-
eral specific technical mandates for CAC, including the protection of critical
information infrastructure (CII), cybersecurity review of online products and
services, and cybersecurity incident response. The first of these mandates
again caused friction with the MPS, as there were clear overlaps between the
mooted CII regime and the already existing Multi-Level Protection System
(MLPS) run by the MPS. This imposes incremental security requirements on
network operators, depending on the importance of their systems. Resolution
of this overlap came in 2021, when the State Council issued comprehensive
regulations on CII protection, giving a coordinating role to CAC and an
executive function to MPS (State Council 2021).
CAC also holds responsibility for “cybersecurity review” (wangluo
anquan shencha). Originally, because of 2017 rules under the CSL, this was a
relatively limited mandate, focusing predominantly on assessing whether par-
ticular online products could be securely included into telecommunications
networks (CAC 2017). At that time, CAC also established a Cybersecurity
Review Committee, which has since been upgraded into the Cybersecurity
Review Office. This Office has gained quite some notoriety in recent years,
however, imposing cybersecurity reviews on, among others, ride hailing giant
Didi after its IPO on the New York Stock Exchange in 2021, and on academic
database operator CNKI in 2022 (DigiChina 2022a, Chen and Bandurski
2022). Both these reviews were broadly seen as having political grounds,
rather than technical cybersecurity concerns. Revised cybersecurity review
measures reflected this shift, expanding the grounds for review to include
nontechnical elements such as foreign listings of businesses holding large
amounts of data on Chinese citizens and compliance with DSL requirements
(CAC at al. 2021). This effectively turns CAC into a securities regulator of
sorts and creates new questions about its interaction with legacy financial and
securities authorities.
A last important CAC task is cyber incident response. This is where
CNCERT/CC plays an important technical role in countering the sources
of an attack, but the CSL’s conception of cybersecurity is far broader than
hacks or intrusions alone. Consequently, CAC has issued an overall plan
that defines incidents into categories including malware, attacks, equipment
failures, natural disasters as well as information security incidents. It also
established a National Cybersecurity Emergency Office that continuously
monitors the cybersecurity status and maintains a readiness state consist-
ing of blue, yellow, orange, and red tiers. These, in turn, affect the level to
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
which other government departments must maintain the state of alert of their
resources and personnel (CAC 2017a)
In these different areas, CAC’s authority is rarely completely exclusive.
Even in content, traditional media regulators such as the National Radio and
Television Administration retain powers over, for instance, the production
of audio-visual programmes, even if their distribution primarily takes place
online. In other areas too, CAC collaborates with a range of line ministries in
passing, implementing and enforcing regulations, a sign of both its growing
maturity as a coordinating body and the nature of the governance questions it
is tasked to address: as “the digital” penetrates into ever more aspects of daily
life, digital policy will become less of a discrete regulatory sphere.
Policy Coordination
In its role as Office of the CCIC, CAC has prime responsibility in coordinat-
ing the drafting and promulgation of overall policy documents pertaining to
digital policy. To be sure, none of the three major documents in the 14th Five-
Year Plan cycle dealing with the digital realm was published under CAC’s
name. Instead, the overall plan was issued by the CCIC itself (CCIC 2021),
with the more detailed documents for digital government and the digital
economy published respectively by the National Development and Reform
Commission, and the State Council. Still, it can be expected that the CAC
had considerable input, most notably at the level of the CCIC. CAC also
convenes deliberation events at the working level, such as a recent “National
Online Civilisation Construction Work Progress Meeting” attended by rep-
resentatives from fifty-seven member entities of the CCIC and the Central
Civilisation Committee, as well as provincial representatives (CAC 2022).
Lastly, CAC has a particular role in coordinating different agencies in fur-
thering the advance of connectivity, publishing regular plans including, since
2020, annual plans for developing the “digital countryside” (CAC 2020).
The CAC also oversees the activities of subordinate, technically special-
ised bodies. In most cases, that line of authority is direct, with CAC having
either established them itself, as in the case of the Chinese Academy of
Cyberspace Studies, or having its authority recognised by official writ, such
as with CNNIC. One exception is TC260, the National Information Security
Standardisation Technical Committee nominally affiliated with MIIT. This
has been chaired, for many years, by Zhao Zeliang, whose main function is
CAC Chief Engineer and Deputy Director, and was previously the head of its
Cybersecurity Coordination Bureau (CAC undated). On top of this personnel
linkage, the most authoritative policy document on cybersecurity standardisa-
tion was issued with CAC as lead entity (CAC, AQSIQ, and SSMC 2016) and
CAC and TC260 regularly co-organise relevant events. Although there is no
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Foreign Engagement
In its early days, under Lu Wei, CAC not only attempted to make its mark
domestically, it also sought to establish itself as the primary Chinese body
engaging with global digital commerce and governance processes. As indi-
cated earlier, Lu Wei racked up several high-profile appearances at events
like ICANN’s London meeting and the China-US Internet industry Forum.
Furthermore, CAC sent its own delegations to international events such as
the 2015 Global Conference on Cyberspace, where CAC Deputy Director
Wang Xiujun gave a speech (Xinhua 2015). Following Lu Wei’s departure,
however, CAC’s role in foreign affairs has diminished considerably. It still
participates in international diplomatic and publicity-oriented engagements,
but with the Ministry of Foreign Affairs (MFA) in the lead. For instance, CAC
has promoted Xi’s vision of jointly building a community with a shared future
in cyberspace with Africa (CAC 2021c) and sponsored an APEC symposium
on using digital technology for poverty reduction (CAC 2021d) together
with the MFA. It has also lobbied for international support of China’s Global
Initiative for Data Security (MFA 2020), a proposed model for handling
data storage and digital commerce security (DigiChina 2022; Webster and
Triolo 2020).
CAC’s most notable effort to connect with the outside world remains the
World Internet Conference (WIC), organised annually in the Zhejiang river
town of Wuzhen since 2014. Within China, this event has become very pres-
tigious. A completely new conference centre was built for it, and Politburo
Standing Committee members routinely speak at its opening ceremony. In
2015, Xi Jinping personally attended, delivering a speech that still forms the
foundation of China’s approach to digital diplomacy (Xi 2015). In terms of
gaining international traction, however, Wuzhen has had little impact. At the
WIC’s first iteration, consternation arose among foreign attendees as a pro-
posed ‘Wuzhen Declaration’ was posted under the doors of their hotel rooms,
to be announced as reflecting their support for, essentially, China’s approach
to global Internet governance (Shu 2014). After heated arguments during
the night, the draft declaration was, eventually, not released but did cause
lingering mistrust about Chinese tactics. A subsequent ‘Wuzhen Initiative,’
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
has become the dominant platform for information dissemination, and the
CPD has become considerably less prominent in recent years.
CAC uses its Party identity as the CCIC Office when undertaking
Party-related activities, such as policymaking and Internet-related cheerlead-
ing and propaganda initiatives. Little is known about how CAC interacts with
the CCIC, whose membership, procedures, and meetings have not been dis-
closed. Unofficial reporting suggests the Commission includes minister-level
officials from all Party and State bodies with a substantial stake in digital
affairs, as well as the military (Guancha 2014). Reports on its work meetings
have identified General Secretary Xi Jinping as the CCIC chairman, with
Politburo Standing Committee Members Premier Li Keqiang, and ideologi-
cal theorist Wang Huning as vice chairs (China Copyright and Media 2018).
Other meeting reports provide the names and affiliations of some thirty
attendees, but those appear to include members of both the CCIC and another
body, the Central Civilisation Commission, so CCIC’s exact membership is
still not entirely clear (CAC 2022b). CAC uses its state identity, which in
Mandarin remains the original “SIIO” (guojia hulianwang xinxi bangong-
shi) and includes the designation of “State,” when conducting traditional
government affairs. These include rulemaking (although it is not clear that
its rules have the same status as government departmental rules), licensing
and enforcement, which it appears to generally conduct in accordance with
administrative law procedures that govern the State Council government
agencies (Horsley 2022). For example, CAC typically publishes its draft rules
for comment and incorporates input into the final version, which it generally
files with the State Council for review and recording.
With cyberspace viewed as the main battleground of ideological struggle,
impacting regime security as well as national security (Central Committee
2017), putting a directly led party institution in charge helps ensure the
Party’s leadership over the cyberspace domain. CAC’s Party pedigree, com-
bined with the range of regulatory responsibilities it has been assigned, would
seem to provide it a status somewhat higher than the State regulators of the
internet and informatisation sector, or at least on a par with the superminis-
terial National Development and Reform Commission (NDRC), with all of
which CAC must collaborate.
Paradoxically, to an extent not seen with other dual Party-state institutions,
the Party has buttressed CAC’s political power with State legal authority
through laws adopted by the national legislature—the CSL, DSL, and PIPL—
and nationwide regulations enacted by the State Council. Endowing CAC
with a state aspect enhances its legitimacy as a regulator, even while it creates
challenges for China’s administrative law system (Lin 2019). Nonetheless,
CAC’s statutory role outside of its few clearly demarcated direct responsi-
bilities, is generally framed in terms of coordinating and overseeing relevant
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
State departments such as MPS and MIIT as they carry out their respective
duties. This is in line with general Central Committee instructions for the
Party to support public and state security authorities to safeguard national
security and investigate crimes and terrorist activities, and for industrial or
sectoral ministries like MIIT to be primarily responsible for front line work,
including cybersecurity inspections and handling cybersecurity incidents,
while keeping the local CACs informed (Central Committee 2017).
As also required by the relevant law, CAC frequently collaborates with
one or more State departments and Party institutions on policy documents,
rulemaking, and enforcement actions, often but not always taking the lead
when those impact the cybersecurity and informatisation sector. Jointly issued
documents often call on different departments to implement them indepen-
dently in accordance with their respective responsibilities. In other cases,
CAC is supposed to share implementation responsibilities with State depart-
ments, such as through joint cybersecurity assessment review mechanisms
housed within CAC’s Cybersecurity Coordination Bureau (CAC 2021g). It
also joined in 2019 with MIIT, MPS, and SAMR, as well as several associa-
tions and technical institutions, to form a working group to better regulate
the illegal collection of personal information by online apps. The online app
working group initiative included announcements, various measures, a new
standard and publicised campaigns by different ministries and localities to
crack down on app violations (Fang and Yu 2020). Also in 2019, the State
Council tasked the NDRC to lead work with the CCIC Office, MIIT, SAMR
and MPS to ensure sound development of the platform economy (State
Council 2019). CAC, together with tax authorities, participated at least twice
in interdepartmental regulatory guidance meetings led by SAMR with tens of
platform companies to curb monopolistic and other unfair and illegal online
conduct, including tax evasion and infringing personal information.
Possible bureaucratic tensions surface at times. CAC led an interagency
drafting and issuance of cybersecurity review measures that stipulated
general procedures in 2020. However, it acted more unilaterally in quickly
publishing for comment and approving, with the “agreement” of twelve other
regulators, the revision in 2021 that gave CAC new authority to review over-
seas listings by companies holding the personal information of one million or
more users (CAC, etc. 2021) That revision provided retroactive authority for
CAC’s unexpected cybersecurity review of Didi and other Chinese platforms,
accompanied by restrictions on related apps and new user registrations (Liu
and Jia 2021). CAC’s actions contributed to an extended regulatory onslaught
that triggered market devaluations, employee lay-offs and foreign investor
jitters. In March 2022, financial regulators appeared to push back, calling for
greater regulatory coordination in announcing new policies that might impact
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
the market (Xinhua 2022a). CAC subsequently assured the public of its sup-
port for Chinese companies to list overseas (Xinhua 2022b).
Central-Local Relationships
CAC’s own website links to thirty-one provincial CACs, and higher-level
CACs are to supervise lower-level CAC work. However, institutionally,
China’s perennial problem of fragmented authority remains. Local CACs are
established directly under the provincial party committees, with overlapping
leadership including with the propaganda departments. CAC, in its guise
as the Office of the CCIC, reported in August 2022 that all party commit-
tees at the levels of the center, provinces and municipalities had established
cybersecurity and informatisation commissions to consolidate cyber ideology
and security work under the Party’s leadership (Xinhua 2022b). Lower-level
CACs are similarly under the party committees at the same level, just as CAC
is under the Central Committee, again highlighting the Party nature of the
CAC network. Unfortunately, information concerning the structure, funding
and missions of local cyber authorities is also incomplete.
The CAC and, where they exist, local CAC websites offer scant insight
into the local CACs, other than the top leadership and scattered, and not
always up-to-date, public events. The Guangdong Provincial CAC website,
for example, discloses the names of the director and two deputy directors,
announces some local activities such as training and policy-related meetings,
but does not report any enforcement actions. More information is available
on some local CACs through publicly-disclosed annual budget reports, which
are not available for CAC itself. These describe in varying detail the main
functions, institutional structure, staffing, and income and expenditures of
those local CACs, but this information is largely a matter of speculation—
other than its functions—in the case of the CAC.
While CAC is an active rule maker, issuing rules to regulate on a nationwide
basis the sectors and activities subject to its authority, the local CACs are not.
However, both CAC and the local CACs conduct enforcement activities, cov-
ering a range of actions, with a jurisdictional division of authority. CAC leads
on issues of national scope, working with other relevant departments, for
example, on cybersecurity reviews. For seemingly most enforcement matters,
the CAC network implements the territorial principle, with local CACs taking
general and specific instruction or ‘guidance’ from higher levels with respect
to companies and matters falling within their regions. For example, the CAC
requested Beijing CAC to summon the online question-and-answer platform
Zhihu for publishing illegal information, after which Beijing CAC filed an
administrative punishment case against Zhihu (Global Times 2021). CAC
reportedly first admonished, and then instructed the Beijing CAC to fine,
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China’s leading social media platform Sina Weibo US$470,000 for allegedly
repeatedly publishing or transmitting illegal information, the forty-fifth and
largest fine so imposed against the company in 2021 (Song 2021). That fine
surpassed the over US$1.4 billion in fines for content transgressions that the
Beijing CAC imposed that year on popular online entertainment discussion
platform Douban.com (Lin 2021), in which Beijing CAC, upon orders from
CAC, stationed inspectors in March 2022 to deal with “serious online chaos”
(CAC 2022c). As another example, CAC outlined a series of more internet
content actions planned for 2022 that task local CACs, as well as key website
platforms, to formulate work plans based on CAC’s rectification priorities to
ensure unified standards and actions (CAC 2022a).
CAC and the local CACs also rely on sectoral government departments to
be involved in or on the front line for many regulatory actions (CAC et al.
2021). For example, the Shenzhen Municipal CAC in Guangdong province,
jointly with the local public security, market supervision and transportation
authorities, met with more than twenty Internet companies to discuss and
have them sign publicly-disclosed pledges to better protect personal infor-
mation on their apps (CAC 2021e). CAC also looks to the public to help
with enforcement, including through the Reporting Centre for Illegal and
Unhealthy Online Information that receives complaints and passes them
along to individual online operators, monitoring their handling. Illustratively,
in April 2022, the Centre accepted nearly 440,000 reports, the vast major-
ity of which concerned the Weibo platform (CAC 2022d). Local CACs also
receive reports from the public, amounting to 806,000 instances in the same
month (CAC 2022e)
the Ministry of Finance, CIIF, has taken shares in regulated companies and
reportedly may take one in Didi (Reuters 2021), ostensibly to have a more
direct voice in their management.
The CAC network is seemingly immune from administrative law require-
ments on transparency that apply to government agencies, including publish-
ing its structure, finances, powers, and responsibilities, and accountability
through an appeal process and litigation. A proposed overhaul of 2017 CAC
rules on enforcing internet information content requirements would supple-
ment and expand the coverage of CAC’s enforcement authority as provided
under the CSL, DSL, and PIPL to apply as well to cybersecurity, data
security and personal information protection obligations (CAC 2022f). The
draft provisions incorporate some but not all procedural requirements in the
Administrative Procedure Law that was substantially revised in 2021, which
would to a certain extent constrain the CAC’s enforcement authority by pro-
viding more protections to the parties subject to enforcement. They, however,
do not incorporate disclosure requirements or an obligation to provide com-
pensation to injured parties that are imposed on its regulatory counterparts
like MIIT and MPS (MPS 2018). Surprisingly, however, unlike CAC itself,
many provincial and lower-level CACs publish their annual budgets and
accounts; some local CACs also publish annual open government information
reports. Such diversity suggests that the CAC network is in practice decen-
tralised in some respects.
The Party under Xi Jinping has promoted law-based governance to put
power in a ‘cage of regulations.’ As part of its concurrent drive to enhance
party leadership, however, it created in CAC an opaque, complex, active,
and seemingly unaccountable party regulator with tentacles in many sectors
and issues.
QUESTIONS RAISED
NOTES
REFERENCES
Arcesati, Rebecca and Antonia Hmaidi. 2022. Shanghai Police Database Breach
Exposes Lax Data Protection. MERICS, 20 July. Available from: https://merics.org
/en/short-analysis/shanghai-police-database-breach-exposes-lax-data-protection.
Boyd, Alexander. 2021. The Historical Nihil-List: Cyberspace Administration Targets
Top Ten Deviations from Approved History. China Digital Times, 16 August
2022. Available from: https://chinadigitaltimes.net/2021/08/the-historical-nihil-list
-cyberspace-administration-targets-top-ten-deviations-from-approved-history.
Boyd, Alexander. 2022. Cyberspace Administration of China Lists 500 Paeans
to “Positive Energy. China Digital Times, 18 January 2022. Available from:
https://chinadigitaltimes.net/2022/01/cyberspace-administration-of-china-lists-500
-paeans-to-positive-energy.
CAC. Undated. Zhao Zeliang jianli (CV of Zhao Zeliang). Available from: http://
www.cac.gov.cn/bgs/ldhd/xzr/jl/A0902010504index_1.htm.
CAC. 2015. Hulianwang yonghu zhanghao mingcheng guanli guiding (Internet User
Account Naming Management Measures), issued 4 February. Translation available
from: https://chinacopyrightandmedia.wordpress.com/2015/02/04/internet-user
-account-name-management-regulations.
CAC. 2017. Wangluo chanpin he fuwu anquan shencha banfa (shixing) (Interim
Security Review Measures for Network Products and Services), issued 2 May.
Translation available from: https://chinacopyrightandmedia.wordpress.com/2017
/05/02/interim-security-review-measures-for-network-products-and-services.
CAC. 2017a. Guojia wangluo anquan shijian yingji yu’an (National Cybersecurity
Incident Emergency Response Plan), issued 10 January. Available from: http://wlaq
.xjtu.edu.cn/info/1009/1013.htm.
CAC. 2019. Zhongguo Hulianwang Touzi Jijin: ziben zhuli wangxin qiye xin-
gwen zhiyuan (China Internet Investment Fund: Capital Assists Cybersecurity
and Informatization Enterprises to Operate Steadily and Grow Far). 30 October.
Available from: http://www.cac.gov.cn/2019-10/30/c_1573967258883096.htm.
CAC. 2019a. Ertong geren xinxi wangluo baohu guiding (Measures on the Online
Protection of Childrens’ Personal Information), issued 22 August. Available from:
http://www.cac.gov.cn/2019-08/23/c_1124913903.htm.
CAC. 2021. Guanyu jinyibu yashi wangzhan pingtai xinxi neirong guanli
zhuti zeren de yijian (Opinions concerning Further Consolidating
the Principal Responsibility of Website Platforms for Information
Content Management), issued 15 September. Available from:
http://www.gov.cn/zhengce/zhengceku/2021-09/16/content_5637727.htm.
CAC. 2021a. Wangluo shuju anquan guanli tiaoli (zhenqiu yijian gao) (Online Data
Security Management Regulations [Draft for Comment]), issued 14 November.
Translation available from: https://digichina.stanford.edu/work/translation-online
-data-security-management-regulations-draft-for-comment-nov-2021.
CAC. 2021b. Qiche shuju anquan guanli ruogan guiding (shixing) (Some Measures
on Vehicle Data Security Management [Trial]), issued 16 August. Available from:
http://www.cac.gov.cn/2021-08/20/c_1631049984897667.htm.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China Copyright and Media 2018. Xi Jinping’s Speech at the National Cybersecurity
and Informatization Work Conference. Digichina, 22 April. Available from: https:
//chinacopyrightandmedia.wordpress.com/2018/04/22/xi-jinpings-speech-at-the
-national-cybersecurity-and-informatization-work-conference.
CIUHIRC (China Internet Unlawful and Harmful Information Reporting Centre).
2014. Zhongguo Hulianwang Weifa he Buliang Xinxi Jubao Zhongxin de jian-
jie (Brief Introduction of the China Internet Unlawful and Harmful Information
Reporting Centre). 2 September. Available from: https://web.archive.org/web
/20180801190640/http://www.12377.cn/txt/2014-09/02/content_7198763.htm.
Creemers, Rogier. 2017. Cyber China: Upgrading Propaganda, Public Opinion Work
and Social Management for the Twenty-first Century. Journal of Contemporary
China 26(103), 85–100.
Creemers, Rogier. 2022. “Cybersecurity Law and Regulation in China: Securing the
Smart State.” China Law and Society Review. OnlineFirst.
Creemers, Rogier. 2022a. China’s Emerging Data Protection Framework. Journal of
Cybersecurity 8(1).
CSAC. 2019. Zhongguo Wangluo Kongjian Anquan Xiehui zhangcheng (Charter of
the Cyberspace Security Association of China), issued on 2 December. Available
from: https://www.cybersac.cn/News/getNewsDetail/id/87/type/41.
Daum, Jeremy. 2022. Children and the Law in China: An Overview of Recent
Reforms (Working Paper Draft). China Law Translate. Available from: https://
www.chinalawtranslate.com/en/working-paper-children-and-the-law-in-china-an
-overview-of-recent-reforms.
DigiChina. 2022. Knowledge Base: China’s ‘Global Data Security Initiative’ 全球
数据安全倡议, 31 March. Available from: https://digichina.stanford.edu/work/
knowledge-base-chinas-global-data-security-initiative.
DigiChina. 2022a. Translation: Chinese Authorities Announce $1.2B Fine in DiDi
Case, Describe ‘Despicable’ Data Abuses. DigiChina, 21 July. Available from:
https://digichina.stanford.edu/work/translation-chinese-authorities-announce-2b
-fine-in-didi-case-describe-despicable-data-abuses.
Economist. 2021. China’s Communist Authorities are Tightening Their Grip on
the Private Sector. 18 November. Available from: https://www.economist.com/
business/chinas-communist-authorities-reinvent-state-capitalism/21806311.
Fang, Jianwei and Wenpei Yu. 2020. China Apps Governance in 2019: Retrospect and
Suggestions. Zhong Lun, 21 January. Available from: http://www.zhonglun.com/
Content/2020/01-21/1425120471.html.
Gao, Charlotte. 2019. ‘Double-Faced’ Lu Wei Jailed for 14 Years for Bribery. The
Diplomat. 27 March. Available from: https://thediplomat.com/2019/03/double
-faced-lu-wei-jailed-for-14-years-for-bribery.
Global Times. 2021. China’s Cyberspace Regulator Summons Quora-like Platform
Zhihu for Publishing Illegal Information. Global Times. 20 December. Available
from: https://www.globaltimes.cn/page/202112/1242950.shtml.
Guancha. 2014. Zhongyang Wangluo Anquan he Xinxihua Lingdao Xiaozu chengyuan
mingdan, 12 zhengfu guoji jianzhi shengaizu (Name List of the Members of the
Central Leading Group for Cybersecurity and Informatization, 12 Full and Vice
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 2
INTRODUCTION
China, like all modern states, has sought to introduce digital and data-driven
practices into its domestic governance as it adapts to the challenges of the
twenty-first century. Evolving out of an emerging scientism in the 1980s, this
process of informatisation (xinxihua) can be understood as one element of a
broader package of neoliberal tools and techniques applied in public manage-
ment (Pieke 2009; Gewirtz 2022; Bray and Jeffreys 2016). Governance in
China’s post-Tiananmen era has been characterised by its application of more
complex, diffuse, and immersive methods—both foreign and home-grown—
to the heart of China’s state building project, modernising, and strengthening
the Party’s leading role in society in the process (Shue and Thornton 2017;
Bray and Jeffreys 2016). A major goal of this process has been the automa-
tion of certain aspects of public administration as a way of stimulating eco-
nomic activity and streamlining bureaucracy, all without compromising on
the Party’s absolute authority on matters of ideology and morality. As with
the rollout of other key government initiatives, the construction of China’s
‘Smart State’ has relied on a process of experimentation whereby overall
principles are set centrally, but the specifics of execution are trialled at the
local level (Knight 2020). While providing significant benefit in terms of
adaptability, policy outcomes are often hampered by ‘implementation gaps,’
as entrenched technical, legal, and political standards and interests frustrate
the smooth realisation of central objectives (Chen and Greitens 2022).
35
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
This chapter assesses the progress of China’s ‘Smart State’ through the
lens of such fragmented policy experimentation by examining two case stud-
ies, the Social Credit System (SCS) and Smart Court Reform (SCR). Both
examples—in particular the SCS—have received relatively wide coverage
in English-language media, though little work has been done to situate the
systems within broader patterns of governing practice and informatisation.
Anglophone coverage of the SCS has grown in recent years, owed in part
to significant—though often problematic—media coverage of the topic. A
significant strand of this literature is rooted in the framework of ‘authoritarian
resilience’ and questions of whether big-data enabled projects such as social
credit will strengthen or weaken the Chinese Communist Party’s (CCP) con-
trol over society (Chen and Cheung 2017; Hoffman 2018; Liang et al. 2018).
A limited number of empirical studies have been carried out to date, mostly
based on survey data to show levels of public awareness and acceptance of
social credit (Kostka 2019). Similarly, a handful of case study–based projects
have illuminated specific applications of the system on-the-ground (Knight
2020; Knight and Creemers 2021). Some limited work has been done to
situate the SCS within China’s broader governance and reform agenda, upon
which this chapter will build (Creemers 2018; Zhang 2020).
English-language scholarship on SCR has tended to focus on its legality
and functional purposes (Peng and Xiang 2020; Wang and Tian 2022a). Other
scholars have depicted SCR as a means to strengthen central control over
judicial power (Zheng 2020; Stern et al. 2021). In general, English-language
scholarship has expressed its concerns for the potentially undermining effect
of automation and digitisation to judicial adjudication (Shi et al. 2021). In
contrast, Papagianneas (2021b) found a generally positive attitude toward
SCR and their effect on justice in the Chinese language scholarship. This
is explained by the positivist organisational and ideological principles of
Marxism-Leninism: technology and automation provide a way forward
toward achieving the dream of rational Marxist governance (Munro 1971;
Bakken 2000; Hoffman 2017). This is why automation projects such as the
SCS and SCR are so enthusiastically embraced by both central and local
state actors.
This chapter asks a simple question: Where are we now? In this short over-
view, we discuss and assess the latest regulatory developments of the SCS
and SCR. In addition, we examine example case studies as a way to discuss
the Smart State ‘in action,’ concluding that they ought to be viewed as part of
a broader attempt to recentralise vertical governing power through technol-
ogy. The first section will explore the origins and principles of both systems,
paying particular attention to their roots in the desire to automate elements of
public administration that gathered pace from the 1990s through to the 2010s.
The second section will then examine the processes through which the SCS
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
architects of the SCS was simple: to find a solution that mitigated these risks
and institutionalised the kind of commercial trust required for the free flow
of finance, goods, and services in marketized economies.
To achieve this, policy researchers from the Chinese Academy of Social
Sciences turned to credit systems around the world for inspiration, in particu-
lar the United States. Yet while the SCS may have had its roots in Western
financial practice, the system quickly evolved to take on several uniquely
Chinese features. These developments mapped neatly onto other prevailing
trends in Chinese governance and politics as a response to a wide range of
regulatory challenges, most notably the revival of traditionalist strands of
virtue-based rule and the elevation of the Socialist Core Values across all
aspects of law and governance (Gow 2017; Creemers and Trevaskes 2020).
In the early 2010s, the definition of ‘creditworthiness’ or ‘trustworthiness’
(chengxin) was expanded beyond the merely financial to incorporate addi-
tional meaning in the social, judicial, and governmental realms. This was
codified in the State Council’s 2014 Planning Outline for the Construction
of a Social Credit System, often referred to as the first true SCS document
(Creemers 2018). The Planning Outline described a credit system whose
scope covered not only economic but also social management, encouraging
and discouraging a wide range of behaviours and sectors, from taxation to
transportation, and the environment to education.
At its core, the SCS can be distilled to a single principle multiplied across
the many jurisdictions in which it is operational. The system’s guiding logic
is to ensure that ‘those deemed untrustworthy in one area shall be restricted
everywhere’ (yichu shixin, chuchu shouxian). Participating ministries at both
the central and local level maintain ‘blacklists’ (hei mingdan) of entities
deemed to have violated relevant rules within the jurisdiction of that particu-
lar authority. Details of blacklisted entities are then published online through
the department’s own website, as well as on the national level ‘Credit China’
platform managed by the NDRC. Businesses and individuals can search these
databases for offending parties, while departments undertake to mutually rec-
ognise and jointly impose ‘disciplinary measures’ (chengjie) within their own
jurisdiction (known as the ‘joint punishment system’ (lianhe chengjie zhidu)
through a network of MoUs. The goal here is twofold: (1) to increase the cost
of ‘untrustworthy’ (shixin) behaviour through additional layers of punish-
ment so as to (2) gradually transition from a postevent regulatory regime to a
preprevention model in which ‘untrustworthiness’ is reduced across the board
(Shen Y. 2019).
In social credit, we see an attempt to use information to increase account-
ability for one’s actions—both directly through punishments, as well as indi-
rectly through reputational damage—and for the fear of such accountability
to encourage compliance with rules and directives. In delegating such control
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Make full use of technologies such as the internet, cloud computing, big data,
artificial intelligence and so on, to promote the modernization of trial system
and judgement capability, so as to achieve the highly intellectualised operation
and management of people’s court.
Subsequently, the SPC published the Five-Year Development Plan for the
Informatisation of People’s Courts (‘Development Plan’), the 2016 Opinion
on Comprehensively Promoting the Synchronous Generation and In-depth
Application of Electronic Archives, and the 2017 Opinion on Accelerating the
Building of Smart Court (‘2017 SPC Opinion’). The main task of informatisa-
tion at the time was primarily to support other judicial reforms, such as the
circuit-courts, improving judicial services, increasing judicial responsibility,
and expanding and improving channels of oversight in courts. SCR is only
one part of a series of unprecedented vast and broad reforms of the entire
judiciary, which started in 2013.
At a basic level, the goal of SCR is to create courts where judicial officers
use technological applications to facilitate their internal and operational judi-
cial and administrative work, provide better judicial services to the public,
and improve enforcement of judicial decisions. The term ‘smart court’ (zhihui
fayuan) is used to indicate any (physical or online) court where the judicial
process is conducted on a digital platform. This platform is integrated with
advanced applications based on algorithms, AI, and big data analytics, which
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
allows for the automation of specific judicial processes. They are enthusiasti-
cally embraced by both frontline and senior judges because they facilitate the
day-to-day work of the former and the oversight and management tasks of the
latter (Stern et al. 2021; Papagianneas 2022).
The first step of SCR was to digitise the entire judicial process (i.e.,
case-submission, trial preparation, trial hearing, issuing of judgment, serving
court documents). It improved and facilitated the work of judicial officers
(e.g., frontline judges, senior supervisors, and court leadership). Full digitisa-
tion allows people to submit cases via the internet or via automated dockets
in court halls, therefore improving access to justice (Xu 2017). It also allows
a complete recording of every procedural step and the real-time monitoring
of frontline judges’ work by their superiors. This possibility improved trial
management and oversight by the court leadership over their subordinates,
which also improved uniform adjudication (Papagianneas 2022).
The second step came when full digitisation of the judicial process allowed
for the automation of certain processes. The possibility of AI indepen-
dently adjudicating complex (politically or socially) sensitive cases remains
minimal, as this is the discretion of the Chinese Communist Party (CCP).
Nonetheless, AI is used in other ways: software application exist that can
automatically index the facts of a case, match it with similar legal cases,
provide applicable legislation and regulations, and give recommendations to
the case-handling judge on how to rule, based on big-data analysis of similar
cases (Faxin 2020; Ma 2020). Another example is the use of AI to adjudi-
cate similar cases (e.g., online financial borrowing and small loan contract
disputes) automatically in bulk. These kinds of applications are integrated in
courts’ digital case management platform (Guo 2019).
Nonetheless, automation refers not so much to the automation of adjudica-
tion. Rather, in SCR discourse, automation refers to the reduction of human
agency in the making of discretionary decisions during the judicial process:
the Development Plan implies that the end-goal of informatisation, and,
therefore, SCR is to build a ‘systemic iron cage’ or a ‘digital big-data iron
cage’ around adjudicators. The 2017 Opinion states that smart courts should
promote ‘the organic unification of substantive and procedural justice.’ This
implies that digitisation should improve the adherence to procedures, but that
these procedures remain in service of substantive outcomes. Together with
other judicial reforms, SCR is about improving and better enforcing judicial
procedures at the cost of human discretion. Judicial reformers believe that
this makes the judiciary more efficient, more consistent, and, therefore, fairer
(Hu 2019).
According to a research report in 2022, the third phase of People’s Court
Informatisation has been officially completed. It means that smart courts
can conduct all judicial operations completely online, have achieved full
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
disclosure of the judicial process through digitisation, and are able to provide
all-round intelligent services. By the end of 2021, electronic or online litiga-
tion was used in eighteen percent of judicial trials nationwide, which is a
seventeen percent-point increase from 2016. The next phase, People’s Court
Informatisation 4.0 will be about building ‘all-round intelligence, full system
integration, full business collaboration, full ubiquity over space and time, and
full system autonomy’ (Wang and Tian 2022b)
In the next section, we give an overview of the way that SCS and SCR have
been implemented and the consequent issues.
IMPLEMENTATION: FRAGMENTED
EXPERIMENTATION
while also shielding the central government from criticism should the sys-
tems have met with public pushback. This honeycomb-like pattern of siloed
schemes with differing technical standards and practices has, however, caused
no end of problems when it comes to integration at the regional or national
level. Such unfettered expansion has come at the expense of uniformity and
moderation, causing bottlenecks in the systems’ standardisation that threaten
their continued rollout, as well as their legitimacy in the eyes of policymakers
and the wider public.
At the heart of this issue lies the critique that programmes such as the SCS
and SCR have become overly ‘generalised’ (fanhua), incorporating all man-
ner of technological efforts outside of their original scope. This has led to
accusations of policy short-cuts, with ‘lazy’ officials ‘hijacking’ the SCS and
SCR as vehicles for their short-term goals to avoid the more arduous process
of creating actual legislation (Wang 2020). In the case of the SCS, this has
led to numerous examples of system overreach, wherein localities introduce
new behaviours or incentives into the SCS without any legal grounding,
essentially introducing a system of extrajudicial punishment and reward. This
has been particularly controversial in the twenty or so municipalities where
points-scoring mechanisms have been constructed. Many of the system’s
earliest architects have looked on with a degree of horror as the SCS has
expanded in this way since 2014, fearing that such a lack of legal foundation
risks undermining the overall legitimacy of the SCS (Knight 2022).
Similarly, in the case of SCR, the term ‘smart courts’ has provided rhetori-
cal cover for all manner of technological applications, from the most basic
digitisation efforts (e.g., enabling digital filing) to the automation of processes
with sophisticated algorithmic software (e.g., automatic analysis of cases and
pushing of relevant legislation, past decisions, and sentence recommendation
to adjudicating judges). Just as with the SCS, the introduction of such tech-
niques outpaced their incorporation into law. Without a coherent legal frame-
work, there exists no strong legal basis for the digitised judicial process, as
procedural laws do not yet recognise the legal validity of electronic versions
of submitted evidence, witness statements, etc. While local courts, such as the
Internet Courts had issued relevant documents for digital processes, such as
e-filing, they did not have national effect. Therefore, concerns have emerged
that this legal uncertainty and inconsistent regional regulations could under-
mine the credibility and ambition of the smart courts (Peng and Xiang 2020).
The legal issues created by these uses of technology in governance have,
in the minds of many scholars and officials, undermined access to justice and
fairness in China. Of course, official discourse claims that the SCS and SCR
will only increase judicial accountability and fairness. These kinds of state-
ments typify a kind of technological solutionism common among Chinese
officials. In the case of SCR, however, the reality is that its emphasis on a
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
was only done later as new national rules require smart courts to align their
data-management practices with new personal information protection laws.
CONSOLIDATION STAGE
Considering the above issues and the potentially existential threat they pose
to the continued development of the Smart State, the last two years have seen
a concerted effort by many scholars and policymakers to bring reform to both
the SCS and SCR. Indeed, after a period of rapid expansion and experimen-
tation, both systems have now firmly entered a phase of consolidation and
reform, with the primary focus of introducing greater regulatory or proce-
dural standardisation at the national level.
In the case of the SCS, the last two years have seen a raft of new regula-
tions published with the goal of upgrading the system beyond the original
2014 Planning Outline. This shift has come against a backdrop of an increas-
ingly hawkish stance among the SCS’s key planning bodies. In August 2019,
the deputy director of the NDRC Policy Research Office stated, ‘We have
noticed that [the SCS in] some places violates laws and regulations by incor-
porating behaviours that are not applicable within the scope of the punish-
ment mechanism for untrustworthiness within personal credit records. We are
correcting and dealing with the situation without further delay’ (Credit China
2019). The spokesperson went on to lay out a strategy of ‘three prevents,’
namely to avoid the generalisation and expansion (1) of what is defined as
an untrustworthy behaviour and their incorporation into credit records, (2)
of further blacklists and other punishment measures, and (3) of the creation
of further credit-building measures such as personal credit points and scores
(Credit China 2019). The goal was to create a SCS that sits within China’s
legal system, not in parallel to it. This rhetorical shift was quickly matched
in terms of legislative updates, with five major new documents published by
the State Council, NDRC, and PBoC between July 2020 and March 2022
(Knight 2022). Since 2019, progress has also been made toward the creation
of a Social Credit Law, with multiple symposia between policymakers, aca-
demics, and industry held to discuss its design.
Taken in sum, these updates have sought to rein in the SCS at its fringes,
curtailing the excesses of its phase of fragmented experimentation. They clar-
ify what data should be collected and classified within the remit of the SCS,
when those data should be shared publicly and how, what punishments could
be applied, and how one’s credit record could be appealed and altered. The
new draft rules look to further standardise blacklisting and punishments in
particular, ensuring that any disciplinary measures taken are rooted in law and
are not overly punitive. If officials feel that a particular law is not adequately
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
tough, they must lobby for changes to that law rather than simply fabricat-
ing their own administrative punishments through the SCS. Crucially, these
documents stipulated that all local or ministerial systems would be evaluated
in due course, with noncomplying versions then shut down.
Likewise, SCR has seen the introduction of regulatory and procedural
standardisation at the national level. In 2021 and 2022, the SPC introduced
national rules to standardise and unify SCR. In quick succession, the SPC
issued the Online Litigation Rules (OLR), the Online Mediation Rules
(OMR), the Online Courts Operation Rules (OCOR), and the Opinions on
Strengthening the Judicial Application of Blockchain (Blockchain Opinion).
The publication of these documents indicate that the stage of consolidat-
ing experiences and unifying practice has begun. They are most likely the
first step in standardising smart court procedures. In the future, we might
see the development of a national law related to online procedures, on par
with the Civil and Criminal Procedure Laws (Papagianneas 2021a). These
documents aim to unify and standardise the smart systems as well as their
application, operation, and management (OCOR, article 1). They ask for
more coordination and planning from the top (OCOR, article 2.3), which is a
strong signal of more centralised planning and coordination. The Blockchain
Opinion also signals a focus on improving interconnectivity, collaboration,
and information-sharing between courts and other sectors and standardis-
ing the use of blockchain systems in the judicial system at a national level
(Deng 2022).
These updates have sought to address key concerns around human agency
and control in particular. New national regulations aim to provide increased
agency to litigants during the digital judicial process, giving them a concrete
sense of control over the process. Litigants have, for example, the right to
choose the method of litigation (online or offline) (OLR, Article 2). It obliges
courts to obtain the explicit consent of litigating parties and inform them
of their rights and obligations, the practicalities, and legal consequences of
online litigation (OLR, Article 4). It allows parties to separate procedures
between online and offline, that is, consenting to conducting part of the
judicial process online may not be seen as consent to conducting the entire
judicial process online (OLR, Article 4.4). Consent to online litigation may
be revoked at any time during the judicial process, and the court is obliged to
transfer the process back to offline if it does not find any objections (OLR,
Article 5). The courts may also conduct the process on a double offline—
online track if one of the parties does not consent to online litigation (OLR,
Article 10). The OLR also has multiple provisions that allow litigants to
maintain control over and access to the judicial process as much as possible:
Article 14 and 20 allow parties to participate in the litigation process at
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
CONCLUSION
REFERENCES
Ahl, B. and Sprick, D. 2017. Towards judicial transparency in China: The new public
access database for court decisions. China Information 32, 3–22.
Bakken, B. 2000. The Exemplary Society: Human Improvement, Social Control and
the Dangers of Modernity in China. Oxford: Oxford University Press.
Bray, D. and Jeffreys, E. 2016. New Mentalities of Government in China. Routledge.
Chen, Huirong, and Greitens, S. 2022. Information capacity and social order: The
local politics of information integration in China. Governance 35, 497–523.
Chen, Yongxi, and Cheung, A. 2017. The Transparent Self Under Big Data Profiling:
Privacy and Chinese Legislation on the Social Credit System. The Journal of
Comparative Law 12, 356–78.
Credit China. 2019. ‘NDRC: Prevent the Generalization of Untrustworthy ‘Blacklists”
[国家发改委:要防止失信‘黑名单’认定的泛化]. Available at https://www
.creditchina.gov.cn/xinyongfuwu/shixinheimingdan/heimingdanyanxi/201908/
t20190816_165743.html.
Creemers, R. 2018. China’s Social Credit System: An Evolving Practice of Control.
http://dx.doi.org/10.2139/ssrn.3175792.
Creemers, R. and Trevaskes, S. 2020. Law and the Party in China: Ideology and
Organisation Cambridge: Cambridge University Press.
Cui, Yadong. 2020. Artificial Intelligence and Judicial Modernization. New York:
Springer Publishing.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Knight, A. 2022. ‘Basket Case: Socialist Law and the Reform of China’s Social Credit
System.’ China Law and Society Review. Forthcoming.
Knight, A, and Creemers, R. 2021. Going viral: The social credit system and
COVID-19. Available at SSRN 3770208.
Kostka, G. 2019. China’s social credit systems and public opinion: Explaining high
levels of approval. New Media & Society 21, 1565–93.
Lee, Haiyan. 2014. The Stranger and the Chinese Moral Imagination. Stanford
University Press.
Li, Ling. 2012. The ‘production’ of corruption in China’s courts: Judicial politics and
decision making in a one-party-state. Law & Social Inquiry 37, 848–77.
Liang, Fan, Das, V, Kostyuk, N. and Hussain, M. 2018. Constructing a data‐driven
society: China’s social credit system as a state surveillance infrastructure. Policy
& Internet 10, 415– 53.
Liebman, B, Roberts, M, Stern, R. and Wang, A. 2019. Mass Digitization of Chinese
Court Decisions: How to Use Text as Data in the Field of Chinese Law. Journal of
Law and Courts 8, 177–201. http://dx.doi.org/10.2139/ssrn.2985861.
Liu, Chuncheng. 2019. Multiple Social Credit Systems in China. Economic Sociology:
The European Electronic Newsletter 21, 22–32.
Ma, Cong. 2020. ‘‘Faxin 2.0 zhitui xitong’ shangxian! Quanmian duijie quanguo
fayuan dianzi juanzong ban’an xitong [‘The Faxin 2.0 Smart Push System’ is
online! Fully connected with the national court electronic case handling system].’
Smart Court Times, 30 October 2020. Accessed 30 March 2022. https://www.anpcn
.com/hangyezixun/566.html.
Ma, Qingyu. 2018. ‘An Interpretation of the Connotations of the Coconstruction,
Co-governance, Co-sharing Social Governance Setup’ [共建共治共享社会治理格
局的意涵解读]. Administrative Management Reform [行政管理改革].
Mingay, A. 2019. ‘Size matters: Alibaba shapes China’s first ‘Court of the Internet.’’
Mercator Institute for China Studies. Accessed 17 October 2019. https://merics.org
/en/analysis/size-matters-alibaba-shapes-chinas-first-court-internet.
Munro, D. 1971. The Malleability of Man in Chinese Marxism. The China Quarterly
48, 609–40.
Ng, Kwai Hang, and Xin He. 2017. Embedded Courts: Judicial Decision-Making in
China. Cambridge: Cambridge University Press.
Papagianneas, S. 2021a. ‘Brief: Consolidating Digital Justice.’ China Law
Translate. Accessed 02 March 2021. https://www.chinalawtranslate.com/en/brief
-consolidating-digital-justice.
Papagianneas, S. 2021b. Towards Smarter and Fairer Justice? A Review of the
Chinese Scholarship on Building Smart Courts and Automating Justice. Journal of
Current Chinese Affairs 51, 327–47. https://doi.org/10.1177/18681026211021412.
Papagianneas, S. 2022. Automating Intervention in Chinese Justice: Smart Courts and
Supervision Reform. Asian Journal of Law and Society Forthcoming.
Peng, Junlin, and Wen Xiang. 2020. The Rise of Smart Courts in China. NAVEIÑ
REET: Nordic Journal of Law and Social Research 1, 345–72.
Pieke, F. 2009. The good communist: Elite training and state building in today’s
China: Cambridge University Press.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Shen, Yilong. 2019. ‘On Administrative Joint Disciplinary Measures for the
Untrustworthy and its Legal Control’ [论失信的行政联合惩戒及其法律控制].
The Jurist [法学家] 4.
Shi, Changqing, Sourdin, T. and Bin Li. 2021. The Smart Court—A New Pathway to
Justice in China? International Journal for Court Administration 12, 1–19.
Shue, V, and Thornton, P. 2017. To govern China: Evolving practices of power:
Cambridge University Press.
Snape, H. 2019. Social Management or Social Governance: A Review of Party and
Government Discourse and why it Matters in Understanding Chinese Politics.
Journal of Chinese Political Science 24, 685–99. https://doi.org/10.1007/s11366
-019-09605-2.
Stern, R, Liebman, B, Roberts, M, and Wang, A. 2021. Automating Fairness?
Artificial Intelligence in the Chinese Courts. Columbia Journal of Transnational
Law 59, 515–53.
Sun, Daocui 2019. 我国刑事司法智能化的知识解构与应对逻辑 [Knowledge
Deconstruction and Corresponding Logic of China’s Criminal Judicial Intelligence].
当代法学 [Contemporary Legal Studies] 3, 15–26.
The Paper 2020. ‘14省市健康码仅3地有知情同意和隐私保护条款’ [‘Out of 14
Provincial and Municipal Health Codes, Only Three Have Informed Consent and
Privacy Protection Clauses’], April 30, 2020, accessed December 5, 2020, https://
www.thepaper.cn/newsDetail_forward_7210904.
Wang, Lu 2020. ‘Discussing Generalized Credit Over Ten Days’ [泛化信用十日谈].
Caixin Online [财新网]. Available here https://opinion.caixin.com/2020-06-10
/101565405.html.
Wang, Nyu, and Tian, M. 2022a. “Intelligent Justice’: AI Implementations in China’s
Legal Systems.’ In Artificial Intelligence and Its Discontents. Social and Cultural
Studies of Robots and AI, edited by Hanemaayer, A. 197–222. London: Palgrave
Macmillan.
Wang, Yiming, and He Tian. 2022b. ‘The development of China’s court infor-
matization in 2021 and the outlook for 2022.’ In China Court Informatization
Development Report No. 6, edited by Guoping Chen, He Tian, Yanbin Lu and
Changming Hu. Beijing: Social Sciences Literature Press.
Wang, Yueduan 2020. Overcoming Embeddedness: How China’s Judicial
Accountability Reforms Makes Its Judges More Autonomous. Fordham
International Law Journal 43, 737–66.
Wu, Yulin and Heng Liu 2020. ‘Memoranda of Understanding on Credit Joint
Punishments and Rewards: Operational Logic, Legal Nature and Approach to
Rule of Law’ [信用联合奖惩合作备忘录:运作逻辑、法律性质与法治化进
路]. Social Science Journal of Henan [河南社会科学] 28(3), 11–20.
Xu, A. 2017. Chinese judicial justice on the cloud: a future call or a Pandora’s box? An
analysis of the ‘intelligent court system’of China. Information & Communications
Technology Law 26, 59–71.
Yan, Jun 2021. Social Credit System Based on Personal Benefit Records of Social
Insurance. Financial Engineering and Risk Management 4, 91–95.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
PART II
53
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 3
John Lee
55
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
56 John Lee
2022; SCMP 2022). The structure of this industry limits Chinese prospects for
dominance but also provides Beijing with sources of power that Washington
will find difficult to constrain. As a unique example of technological catch-up
by a developing country in the era of ‘asymmetrical globalisation,’ and in
view of semiconductors’ crucial role in the Chinese Party-State’s’ goals,
China’s place in this industry sheds light on the structural nature of power in
the international system and the trajectory of China’s national development.
This chapter explains China’s place in the globalised semiconductor indus-
try, and its policy goals, development ecosystem, and prospects for advance-
ment in this most foundational of technologies. The discussion highlights
major obstacles to Chinese progress that are presented by this industry’s
features, and the limited capacity to meet these challenges that still character-
ises China’s domestic semiconductor ecosystem. But it also shows how even
limited Chinese success in this industry has potentially far-reaching conse-
quences for international politics, even if these falls short of the Party-State’s’
ambitions by leaving China as a ‘partial power’ (Shambaugh 2013) in high
technology.
The chapter first examines China’s involvement in the transnational value
chains that typify information technology (IT) industries under ‘asymmetrical
globalisation,’ and in the semiconductor value chain specifically. Second, it
reviews the Party-State’s’ strategic goals that guide its policy for developing
the nation’s semiconductor industry. Third, it looks at the value chain’s objec-
tive features, and how these shape priorities in targeting specific processes
and technologies. Fourth, it describes China’s semiconductor ecosystem—the
‘government-research-industrial complex’ that drives outcomes in this indus-
try—and China’s aggregate position in the global semiconductor value chain.
The chapter’s conclusion returns to the implications for international power
relations, in the context of weaponised interdependence and drift toward
strategies of technological containment.
that downstream firms require to perform their functions and thereby reaping
most of the profits from this economic activity (Malkin 2022).
Since the 1990s, developing economies’ participation in GVCs has deliv-
ered disappointing results in moving up the technological ladder and so cap-
turing a larger share of value generated by economic activity, resulting in a
failure to achieve broad-based wage growth (UNCTAD 2018). This trend has
been reinforced by evolution of the WTO trading regime, which has opened
developing countries’ markets to industry-leading firms from advanced
economies, while restricting national autonomy to assist domestic firms with
interventionist and protectionist policies. Such measures had previously been
used by Japan, South Korea, and Taiwan to help domestic firms to accumulate
market share and IP, allowing them to upgrade their technology and thereby
their competitive position in globalised industries, notably semiconductors
(Matthews and Cho 2009).
China is the salient case of a developing country that, with uneven success,
has broken out of this asymmetrical relationship with advanced economies
in GVCs. During the 1990s, as China’s integration with the global economy
proceeded, policymakers tried to push technological upgrading through both
command economy style interventions—for example, in semiconductor
fabrication (Fuller 2016)—and joint ventures with foreign industry leaders
in GVCs. By the early 2000s, these approaches were widely recognised as
ineffective (Zhou, Lazonick and Sun 2016, 44). The Party-State adapted its
method of involvement in China’s economic and technological development
to one that has been described as ‘grand steerage,’ channelling resources
through indirect, market-conforming instruments to ‘steer’ the economy
towards broadly defined goals (Naughton 2022).
This approach was still premised on China’s integration into a global econ-
omy driven by market principles, and into GVCs dominated by foreign firms.
But it recognised that ‘domestic determinants,’ notably state-led industrial
policy and the capabilities accrued by domestic firms, are crucial factors in
capturing benefits from international trade, including technological advance-
ment (Coe et al. 2004; Ernst 2016; Poon 2018). Chinese state interventionism
was enabled by the scale of China’s workforce and markets, which attracted
foreign industry leaders to China and gave Chinese authorities leverage to
impose policies that foreign actors would not accept in smaller developing
countries (UNCTAD 2018; Ernst 2016).
These state interventions in the market—creating infrastructure, compen-
sating for firm-level externalities, developing human capital, creating markets
for domestic firms, facilitating technology transfer from foreign actors, and
subsidising strategic but uncompetitive industries—have created the condi-
tions for China’s comparative advantages to be used effectively (Lin and
Zhang 2019; Zhou, Lazonick, and Sun 2016). China’s exports have shown
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
58 John Lee
60 John Lee
Supporting Leadership in
Next-Generation Technologies
By the early 2000s, lacklustre results in sectors such as semiconductor fab-
rication (Fuller 2016, 122–125) led Chinese policymakers to recognise the
poor prospects for technology transfer under conditions of asymmetrical
globalisation. This stimulated the policy drive for ‘indigenous innovation’ to
bootstrap domestic technological progress, and the promulgation in 2006 of
a fifteen-year ‘National and Medium Long-Term Plan (NMLTP) for Science
and Technology’ (To 2022, 74–75; Zhou, Lazonick, and Sun 2016), which
included list of sectoral ‘mega-projects’ with one dedicated to ICs (Lee and
Kleinhans 2021a, 12). However, the NMLTP still recognised multiple innova-
tion pathways and the benefits of incorporating foreign technology (Cheung
2018, 309–311).
Policy evolved again under Xi’s leadership from the early 2010s, respond-
ing to the need for upgrading China’s development model in the face of
accumulating economic and demographic pressures, and to the new political
imperative to show a ‘great rejuvenation of the Chinese nation’ through tangi-
ble metrics such as technological progress (To 2022; MERICS 2021). In 2015
the ‘Made in China 2025’ (MiC-25) plan set out ambitious industrial upgrad-
ing and import substitution goals for multiple sectors focusing on emerging
technologies, and the accompanying industry roadmap addressed various
semiconductor-related technologies. The focus on building high technology
industries also justified perpetuation of an investment and supply-side driven
approach to economic growth, instead of rebalancing the economy towards
consumption, which would have required more radical and politically risky
changes to China’s political economy (Naughton 2022).
Growing pressure on China’s access to critical technology inputs from
abroad has reinforced the urgency of upgrading domestic industry. China’s
current (2021–2025) Five-Year Plan lists semiconductors as one of seven
‘frontier technologies’ prioritised for breakthroughs. In September 2022, a
top-level statement was issued on the need for a whole-of-society, Party-led
mobilisation to make breakthroughs in ‘key core technologies,’ albeit still
within a market framework (Xinhua 2022). This was followed by the writing
of S&T into the Party’s constitution at the 20th Congress in October 2022,
cementing its place in the ‘mission statement’ justifying the Party’s rule
over China.
62 John Lee
Jinping 2020). Chinese firms are thus trying to maintain or expand foreign
business relations, even if some activities like acquisitions are increasingly
unfeasible, while progressively introducing domestic suppliers and investing
in promising start-ups for this purpose.
MiC-25 set a goal of 40 percent self-sufficiency in IC production by 2020,
but by one recent estimate, China will have reached only half this figure
by 2025 (IC Insights 2021). China’s import substitution rate as of 2020 for
SME has been estimated at under 30 percent for all but one among ten SME
categories, with the rate for five categories judged to be under 10 percent
(Great Wall Glory Securities 2022). For EDA tools, the import substitution
rate is generally estimated as remaining under 10 percent. By 2030, these
dependencies are likely to be reduced but far from eliminated (Lee and
Kleinhans 2021a).
One reason for this slow progress with import substitution is the expo-
nential rise in the Chinese economy’s demand for semiconductors. This has
encouraged much investment in China’s semiconductor sector to be directed
at meeting immediate requirements, rather than at long-term technological
progress. For example, from 2017 to 2022, SME worth US$93 billion was
shipped to China, more than to any other region over the same timeframe.
Most if not all this equipment was for use in trailing-edge fabrication, which
also reflects existing US export controls on cutting-edge SME and stockpiling
by Chinese firms to risk mitigate against future expansion of export controls.
64 John Lee
Figure 3.1. Semiconductor Value Chain Steps Mapped Against National Interest Criteria
Source: John Lee and Jan-Peter Kleinhans, “Mapping China’s Semiconductor Ecosystem in Global Context:
Strategic Dimensions and Conclusions,” 30 June, 2021 Mercator Institute for China Studies and Stiftung
Neue Verantwortung, p. 11.
66 John Lee
In 2014, China adopted its most recent dedicated industrial plan for the semi-
conductor industry (State Council 2014). This established a national leading
small group to guide policy for the IC industry, as well as the National IC
Industry Investment Fund (‘Big Fund’). The Big Fund is a representative
type of the so-called ‘government guidance fund,’ an institutional model for
market-oriented ‘grand steerage’ that Chinese authorities have increasingly
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
turned to over the last decade (Naughton 2022, 108; CSET 2021). These two
institutions play key roles within the ecosystem of state, nonstate and mixed
actors shaping activity in China’s semiconductor industry (Figure 3.2).
‘Grand Steerage’
‘Leading small groups’ (LSGs) in China bring together senior officials from
different agencies with the aim of overcoming bureaucratic stove piping, iner-
tia, and turf wars. At its establishment, the National IC LSG’s deputy director
was the head of the Ministry of Industry and Information Technology (MIIT),
which leads development of China’s digital technology-based sectors. It was
68 John Lee
70 John Lee
• Chinese firms are now present throughout the value chain and are grow-
ing their capabilities and market share. Even faced with the extensive
US export controls of October 2022, Chinese firms are probably already
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
72 John Lee
74 John Lee
76 John Lee
integration (Edge 2022). The reluctance of the Netherlands, Japan, and South
Korea to replicate the October 2022 US export controls, despite pressure from
Washington, shows how China’s extant position in the semiconductor sector
and end-user industries affects international power relations.
The partial success of China’s semiconductor ecosystem, and its limited
prospects for closing the gap with the US-allied community in most of the
industry’s commanding heights, suggests that China’s further progress in this
field will append rather than supplant US dominance (Malkin 2022). China’s
growing presence in chip design, trailing-edge fabrication and ATP already
has clear implications for the resilience of the global supply of semiconduc-
tors and the dependencies of foreign industry actors (Lee and Kleinhans
2021b). Elsewhere, Chinese industry will suffer from US export controls,
especially in its international competitiveness. But while US controls may
achieve their stated goal of precluding Chinese technological leadership, they
are unlikely to stop China’s accumulation of structural power in the global
economy, as embedded in technological networks. This trend may not deliver
on the Party-State’s’ ambitions for semiconductors and other advanced tech-
nologies, but it is growing the resources and international leverage available
to Beijing.
The realities of the semiconductor value chain mean that every country
involved is a ‘partial power,’ including the United States itself. In such a key
technology, even limited success in breaking the mould of ‘asymmetrical
globalisation’ enhances China’s power in the international system and its
capture of gains from trade. This appears increasingly to be a model for other
large developing countries, notably India and Indonesia. Even the advanced
economies are now adopting ambitious industrial policy for semiconductors,
recognising their implications for the distribution of wealth and power. But
policymakers should be wary of making choices that harm their own econo-
mies, by clamping down on international trade and globalised innovation
simply because this also benefits countries that are perceived as strategic
rivals. Despite the concentrated character and strategic importance of the
semiconductor industry, it presents a case for managing economic interde-
pendence with China, rather than seeking China’s technological containment
in absolute terms.
REFERENCES
Antipolis, Sophia. 2022. Silicon Carbide (SiC) patents support the emergence of
a complete domestic supply chain in China. KnowMade Patent & Technology
Intelligence, 20 January. Available from: https://www.knowmade.com/technology
-news/semiconductor-news/power-electronics-devices-news/silicon-carbide-sic
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
-patents-support-the-emergence-of-a-complete-domestic-supply-chain-in-china [9
December 2022].
Austin, G. 2014. Cyber Policy in China. Cambridge: Polity Press.
Bresnick, S. and Sher, N. 2022. New Export Controls on Chinese Semiconductors
May Prove Self-Defeating. China File, 16 September. Available from: https:
//www.chinafile.com/reporting-opinion/viewpoint/new-export-controls-chinese
-semiconductors-may-prove-self-defeating [9 December 2022].
Bureau of Industry and Security, United States Department of Commerce. 2022.
Implementation of Additional Export Controls: Certain Advanced Computing and
Semiconductor Manufacturing Items; Supercomputer and Semiconductor End Use;
Entity List Modification. Federal Register. 7 October. Available from: https://public
-inspection.federalregister.gov/2022-21658.pdf [9 December 2022].
Business Wire. 2022. Leaders in Semiconductors, Packaging, IP Suppliers, Foundries,
and Cloud Service Providers Join Forces to Standardize Chiplet Ecosystem.
Business Wire. 2 March. Available from: https://www.businesswire.com/news
/home/20220302005254/en/Leaders-in-Semiconductors-Packaging-IP-Suppliers
-Foundries-and-Cloud-Service-Providers-Join-Forces-to-Standardize-Chiplet
-Ecosystem [9 December 2022].
Caixin. 2020. Head of Firm That Runs National Chipmaking Investment Fund Steps
Down. Caixin, 23 December. Available from: https://www.caixinglobal.com/2020
-12-23/head-of-firm-that-runs-national-chipmaking-investment-fund-steps-down
-101642641.html [9 December 2022].
Cheung, Tai Ming. 2018. The rise of China as a cybersecurity industrial power: bal-
ancing national security, geopolitical, and development priorities. Journal of Cyber
Policy 3(3), 306–26.
China-cer.com.cn. 2022. Guanyu jianquan shehuizhuyi shichang jingji tiaojianxia
guanjian hexin jishu zhengguan xingxing juguo tizhi de yijian (‘Opinions on
Improving the New National System for Tackling Key Core Technologies under
the Conditions of Socialist Market Economy’). China-cer.com.cn, 8 September.
Available from: http://www.china-cer.com.cn/zhengcefagui/2022090821090.html
[9 December 2022].
Coe, Nei, Hess, Martin, Yeung, Henry Wai-Chung, Dicken, Peter and Henderson,
Jeffrey. 2004. ‘Globalizing’ Regional Development: A Global Production Networks
Perspective. Transactions of the Institute of British Geographers 29(4), 468–84.
Crawford, Alan. 2021. The U.S.-China Tech Conflict Front Line Goes Through
Belgium. Bloomberg, 13 July. Available from: https://www.bloomberg.com/news
/features/2021-07-13/u-s-and-china-fix-their-sights-on-world-s-top-chip-research
-center [9 December 2022].
Deloitte. 2022. 2022 semiconductor industry outlook. Available from: https://www2
.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/
semiconductor-industry-outlook.html [9 December 2022].
Eckl-Dorna, W. 2022. German CEOs warn China exit would threaten growth,
prosperity. The Edge Markets, 10 November. Available from: https://www
.theedgemarkets.com/article/german-ceos-warn-china-exit-would-threaten-growth
-prosperity [9 December 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
78 John Lee
The Economic Times. 2022. India to invest $30 billion in tech sector, semicon-
ductor supply chain: report. The Economic Times, 16 June. Available from:
https://economictimes.indiatimes.com/tech/technology/india-to-invest-30-billion
-in-tech-sector-semiconductor-supply-chain-report/articleshow/92243988.cms [9
December 2022].
Ernst, D. 2016. The Information Technology Agreement, Manufacturing and
Innovation—China’s and India’s Contrasting Experiences. East-West Center,
Honolulu and Centre for International Governance Innovation, Waterloo. Available
from: https://www.eastwestcenter.org/sites/default/files/filemanager/pubs/pdfs/6
-1Ernst-20160925.pdf [9 December 2022].
Ernst, Dieter, and Kim, Linsu. 2002. Global production networks, knowledge diffu-
sion, and local capability formation. Research Policy 31, 1417–29.
Financial Times. 2022. China’s Big Fund corruption probe casts shadow over chip
sector. Financial Times, 29 September. Available from: https://www.ft.com/content
/8358e81b-f4e7-4bad-bc08-19a77035e1b4 [9 December 2022].
Fuller, Douglas. 2014. Chip design in China and India: Multinationals, industry struc-
ture and development outcomes in the integrated circuit industry. Technological
Forecasting and Social Change 81, 1–10.
Fuller, D. 2019. Growth, Upgrading, and Limited Catch-Up in China’s Semiconductor
Industry. In Brandt, L. and Rawski, T., eds. Policy, Regulation and Innovation in
China’s Electricity and Telecom Industries. Cambridge: Cambridge University
Press.
Fuller, D. 2016. Paper Tigers, Hidden Dragons: Firms and the Political Economy of
China’s Technological Development. Oxford: Oxford University Press.
Great Wall Glory Securities. 2022. Hangye chuyu guochan tidai chuqi, 2022nian
shebei xuqiu qiangjing (‘The Industry remains in an early phase of import
substitution, equipment demand is strong in 2022’). Eastmonye.com, 19 May.
Available from: https://data.eastmoney.com/report/zw_industry.jshtml?infocode
=AP202205191566491722 [9 December 2022].
Grimes, Seamus and Sun, Yutao. 2016. China’s evolving role in Apple’s global value
chain. Area Development and Policy 1(1), 94–112.
Grimes, Seamus and Du, Debin. 2022. China’s emerging role in the global semicon-
ductor value chain. Telecommunications Policy 46(2), 1–14.
Huang, R. and Henderson, J. 2021. Is There a Method Behind China’s Tech
Crackdown Madness? MacroPolo, 21 October. Available from: https://macropolo
.org/china-tech-crackdown-software-hardware/?rp=e [9 December 2022].
Hwang, Hye-Ran and Choung, Jae-Young. 2014. The Co-evolution of Technology
and Institutions in the Catch-up Process: The Case of the Semiconductor Industry
in Korea and Taiwan. The Journal of Development Studies 50(9), 1240–60.
IC Insights. 2021. Cited in: Sales of Logic ICs Account for Largest Share of China’s
IC Market in 2020. Design and Reuse, 18 February. Available from: https: //
www.design-reuse.com/news/49515/2020-china-ic-market-by-product-type.html
[9 December 2022].
Irwin, D. 1996. The U.S.-Japan Semiconductor Trade Conflict. In Krueger, A. ed.
The Political Economy of Trade Protection. Chicago: University of Chicago Press.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Jolly, J., and Badshah, N. 2022. British government blocks takeover of Welsh semi-
conductor producer. The Guardian, 16 November. Available from: https://www
.theguardian.com/technology/2022/nov/16/british-government-blocks-takeover-of
-welsh-semiconductor-producer [9 December 2022].
Kleinhans, J. 2022. U.S.–China Competition in Global Supply Chains. Testimony
before the U.S.–China Economic and Security Review Commission. 9 June.
Available from: https://www.uscc.gov/sites/default/files/2022-06/Jan-Peter_
Kleinhans_Testimony.pdf [9 December 2022].
Koc, C. and Wu, D. 2022. Dutch Minister Says US Can’t Dictate Approach to China
Exports. Bloomberg, 18 November. Available from: https://www.bloomberg.com
/news/articles/2022-11-18/dutch-minister-says-us-can-t-dictate-approach-to-china
-exports [9 December 2022].
Kroeber, Arthur. 2016. China’s Economy: What Everyone Needs to Know. Oxford:
Oxford University Press.
Kushida, Kenji. 2011. Leading without Followers: How Politics and Market Dynamics
Trapped Innovations in Japan’s Domestic ‘Galapagos’ Telecommunications Sector.
Journal of Industry, Competition and Trade 11: 279–307.
Lee, J. and Kleinhans, J. 2020. Taiwan, Chips, and Geopolitics: Part 1. The Diplomat,
10 December. Available from: https://thediplomat.com/2020/12/taiwan-chips-and
-geopolitics-part-1/ [9 December 2022].
Lee, J. 2021. The Connection of Everything: China and the Internet of Things.
Mercator Institute for China Studies. 24 June. Available from: https://merics.org
/en/report/connection-everything-china-and-internet-things [9 December 2022].
Lee, J. and Kleinhans, J. 2021a. Mapping China’s semiconductor ecosystem in
global context: Strategic dimensions and conclusions. Mercator Institute for China
Studies and Stiftung Neue Verantwortung. 30 June. Available from: https://merics
.org/en/report/mapping-chinas-semiconductor-ecosystem-global-context-strategic
-dimensions-and-conclusions [9 December 2022].
Lee, J. and Kleinhans, J. 2021b. China’s rise in semiconductors and Europe:
Recommendations for policy makers. Mercator Institute for China Studies and
Stiftung Neue Verantwortung. 8 December. Available from: https://merics.org/en/
report/chinas-rise-semiconductors-and-europe-recommendations-policy-makers [9
December 2022].
Li, Y. The Semiconductor Industry: A Strategic Look at China’s Supply Chain. In F.
Spigarelli and J. McIntyre, eds. The New Chinese Dream: Industrial Transition in
the Post-Pandemic Era. Cham: Palgrave Macmillan.
Lin, J. and Zhang, J. 2019. China: Learning to Catch up in a Globalized World.
In Oqubay, A. and Ohno, K., eds. How Nations Learn: Technological Learning,
Industrial Policy, and Catch-up. Oxford: Oxford University Press.
Matthews, J. and Cho, D. 2009. Tiger Technology: The Creation of a Semiconductor
Industry in East Asia. Cambridge: Cambridge University Press.
Mercator Institute for China Studies. 2021. ‘The CCP’s next century: expanding
economic control, digital governance and national security.’ 15 June. Available
from: https://merics.org/en/report/ccps-next-century-expanding-economic-control
-digital-governance-and-national-security [9 December 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
80 John Lee
Poon, D. 2018. China broke the rules of global trade—but for good reason. South
China Morning Post, 21 June. Available from: https://www.scmp.com/comment/
insight-opinion/united-states/article/2151688/china-broke-rules-global-trade-good
-reason [9 December 2022].
Randall, S. 2021. Are Chinese chipmakers spending enough on R&D? TechNode, 10
September. Available from: https://technode.com/2021/09/10/silicon-are-chinese
-chipmakers-spending-enough-on-rd/ [9 December 2022].
Randall, S. 2022. Why is China investigating the state-backed semiconductor “Big
Fund”? TechNode. 12 August. Available from: https://technode.com/2022/08/12
/silicon-why-is-china-investigating-the-state-backed-semiconductor-big-fund/ [9
December 2022].
Rasser, M. 2022. ‘A Conversation with Under Secretary of Commerce Alan F.
Estevez’ (transcript). Available from: https://www.cnas.org/publications/transcript
/a-conversation-with-under-secretary-of-commerce-alan-f-estevez [9 December
2022].
Rho, Sungho, and Kim, Yongshin. 2021. Sectoral Divergence of Industrial Catch-Up
in China’s Loosely Coupled System: A Comparative Study of FPD and IC
Manufacturing Industries. Pacific Focus 36(3), 512–43.
Shambaugh, D. 2014. China Goes Global: The Partial Power. Oxford: Oxford
University Press.
SIA: Semiconductor Industry Association. 2021. 2021 Factbook. Available from:
https://www.semiconductors.org/wp-content/uploads/2021/05/2021-SIA-Factbook
-FINAL1.pdf [9 December 2022].
State Council. 2021. Zhonghuaremingongheguo Guomin jingji he shehui fazhan
dishisige wunian guihua he 2035 nian yuanjing mubiao gangyao (‘14th Five Year
Plan of the People’s Republic of China for the nation’s social and economic devel-
opment, and outline of long-term goals to 2035’). Gov.cn, 27 December. Available
from: http://www.gov.cn/xinwen/2021-03/13/content_5592681.htm [9 December
2022].
State Council. 2021. ‘Shisiwu’ Guojia Xinxihua Guihua (‘14th Five Year Plan for
National Informatisation’). Cyberspace Administration of China, 13 March.
Available from: http://www.cac.gov.cn/2021-12/27/c_1642205314518676.htm [9
December 2022].
Thomas, C. 2021. Lagging but motivated: the state of China’s Semiconductor Industry.
Brookings Institution, 7 January. Available from: https://www.brookings.edu/
techstream/lagging-but-motivated-the-state-of-chinas-semiconductor-industry/ [9
December 2022].
To, Y. 2022. Contested Development in China’s Transition to an Innovation Driven
Economy. Abingdon: Routledge.
Triolo, P. 2021. The Future of China’s Semiconductor Industry. American Affairs
V(I). Available from: https://americanaffairsjournal.org/2021/02/the-future-of
-chinas-semiconductor-industry/ [9 December 2022].
UNCTAD: United Nations Conference on Trade and Development. 2018. Trade and
Development Report 2018. Available from: https://unctad.org/webflyer/trade-and
-development-report-2018 [9 December 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
82 John Lee
Chapter 4
Fintech in China
Trading off Growth and Risk,
Innovation, and Control
Martin Chorzempa
83
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
84 Martin Chorzempa
could use technology to remake the way the RMB is used in international
payments, reducing the leverage and sanction power the United States cur-
rently wields thanks to the dominant role of the dollar in global commerce
and investment.
Yet, the rapid growth of innovative finance has not been an unalloyed
good. It has also brought the risk of financial instability, the creation of new
potentially unassailable monopolies in the form of ‘super apps,’ as well as
data protection concerns. Authorities are now hoping to reduce risk and dis-
ruption without cutting off needed credit or the room for still needed financial
innovation. They have largely been successful at reducing risk, but their hope
to remake the fintech sector will need years to implement complex and some-
times mutually contradictory policy goals.
When China’s largest internet firms were getting started in the early 2000s,
China’s cash-based payment system was a major impediment to their busi-
ness. Unlike in the United States, digital advertising provided too few oppor-
tunities to raise revenue, so they needed to collect payment for digital goods
directly from consumers to become profitable. The problem, however, was
that payments through credit cards and other digital means taken for granted
in advanced economies were inconvenient or not available. Tencent, one of
China’s internet giants with a focus on social media and gaming, struggled
to collect small payments for in-game items or cheap subscriptions to digital
services. ‘Pony’ Ma Huateng, Tencent’s founder, recalled that ‘almost none
of China’s young consumers had a credit card. They had to run to the post
office to make a transfer, which few netizens were willing to do for a 10
RMB payment every month’ (quoted in Wu 2017). It issued its own virtual
currency, the Q coin, so that users could make one payment to Tencent with
the clunky legacy financial system and then use a digital one with Q coins to
make smaller purchases seamlessly and with no fees.
China’s State Council recognised the problem. It issued opinions in 2005
to signal clear support for online payments to help electronic commerce
‘change the way our economy grows and raise the quality and efficiency of
citizens’ economic activity’ (State Council 2005). Though state-backed China
Union Pay retained a monopoly on card payments, playing a role analogous
to Mastercard or Visa in the United States, the government encouraged the
development of private online payments options. China’s central bank, the
People’s Bank of China (PBOC), left online payments free of regulation
until 2010, seemingly a libertarian paradise in an authoritarian country, to
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Fintech in China 85
86 Martin Chorzempa
small business credit is a major challenge around the world, because small
firms do not tend to have assets that can be put up as collateral.
The traditional way to evaluate such borrowers outside China is to look at
their credit history, but China faced a chicken and egg problem because it his-
torically had so little formal consumer and small business credit. Few lenders
wanted to extend credit to the hundreds of millions of Chinese without credit
histories, but unless that changed there was no way they could get a credit his-
tory needed to borrow. Fintech overcame the chicken and egg problem with
big data sets generated by online payments and commerce to develop credit
screening tools that allowed lenders to estimate even a first-time borrower’s
financial resources and risk level, all without costly human involvement in
lending decisions. They could also generate credit histories quickly by lend-
ing small amounts to consumers very short term. Control of the payment
system helped monitor what the borrowed funds were spent on. Ant Group,
spun off from Alibaba, became one of China’s largest lenders with this model
built into Alipay.
For small business credit, e-commerce and running the payments system
provided Alibaba and other firms like JD with real time information on an
online business’s health that they could use to control credit risk. Because
the seller relies on the platform, they have a strong motivation to repay, lest
they be kicked down the rankings or risk losing access to their revenues
from Alipay.
MAJOR PLAYERS
Fintech in China 87
said, ‘We’re dealing with the issue of getting private capital into the finance
sector, essentially, that means we have to break up [the state banks’] monop-
oly’ (Reuters 2012). Regulators then implemented the promised openings,
permitting fintech firms to enter the wealth management, consumer lending,
offline payments, banking, insurance, and other sensitive markets.
The most important fintech companies are Alibaba and Tencent. Alibaba’s
main strength is in e-commerce, while Tencent is primarily a gaming and
social media company. Both had strong political patronage, technical exper-
tise, and large bodies of users to which they could push financial services.
Though their main lines of business did not overlap that much until the arrival
of smartphones, mobile internet launched an era of platforms, in which each
turned their main apps into an ever-larger bundle of services. One of the first
competitive areas was so-called online to offline (O2O) services that could
use smartphones to order in-person goods and services like Didi and Kuaidi
(equivalent to Uber elsewhere). Alibaba and Tencent competed with a war of
subsidies to get consumers and businesses to adopt QR code payments for
such services, starting with taxis and, as figure 4.1 shows, becoming the main
way Chinese paid for items online and off starting in 2016.
Tech firms competing achieved what over a decade of state monopoly, as
China UnionPay cards issued by the state banks, could not: a wholesale shift
from cash to digital payments. Alibaba affiliate Alipay had a 55 percent mar-
ket share of the nonbank mobile payments market in 2020, and the latter 38
percent, together thus controlling 93 percent—an effective duopoly (Analysys
2020). Alipay had 711 million monthly active users in 2020, more than 60
percent of China’s adult population (Alipay 2020), and WeChat Pay counts
more than one billion users. UnionPay tried and failed to preserve its de facto
Figure 4.1. How Chinese Citizens Pay for Items Online and Off
Source: Author calculations based on People’s Bank of China data.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
88 Martin Chorzempa
Fintech in China 89
Fintech in China dwarfs other countries. It has the largest number of users and
transaction volume of mobile payments systems, the largest outstanding fin-
tech credit, and the most valuable fintech firms in the world. It also the high-
est overall penetration of fintech as a portion of its population, at 87 percent,
higher than the Netherlands’ 73 percent and far larger than the United States’
paltry 46 percent (EY 2019). The role of big tech firms was crucial, and here
China is an outlier, with big tech facilitated payments at more than 16 percent
of GDP, compared to the United States at only 0.6 percent (Figure 4.1).
In terms of central bank digital currency, almost all central banks are
exploring issuance of this new type of currency, and a few smaller countries
have already issued one. Among major economies, however, China is the
furthest along, having committed to launch one back in 2016, back when
top officials at the Federal Reserve in the United States had not even pub-
licly mentioned the prospect (Chorzempa 2021). Concretely, its leadership
in CBDC makes it a hub for knowledge on trade-offs in these systems and
makes it able to be an early mover for any future cross-border infrastructure
that transacts CBDC. China is involved in experimental proofs of concept
for this infrastructure, as are central banks like the Bank of England, Bank
of Canada, Bank of Japan, and the European Central Bank. Where it is dif-
ferent than those is on the retail side, where the others have not committed
to launching one or have had very limited domestic pilots. In China around a
quarter billion people have downloaded the eCNY wallets, giving the PBOC
a unique set of practical knowledge around these systems.
Central banks tend to focus on operating payment systems between finan-
cial institutions, leaving many thorny issues of retail payments to the private
sector. This makes it a steep but useful learning curve for the PBOC to be
90 Martin Chorzempa
on as it builds elements like developing its own app for the eCNY wallets,
‘you’re your customer’ systems to check identities, onboarding procedures
for millions of individual merchants that will accept its payment tools, algo-
rithms that identify and stop fraud, and the regulatory system to manage
cooperation and regulation with banks and mobile wallets that form part of
the system. It will also see what cyber threats arise with the limited scale
pilots, where glitches in code create issues, and the kind of payment volumes
it can handle with different architecture.
China’s goals have shifted as fintech grew from a fledgling upstart to the
way that most Chinese organise their financial lives. Initial encouragement
and a hands-off attitude largely paid off as a thriving fintech sector seemed
to replace a backward system, bringing it closer to achieving goals like
financial inclusion, larger digitisation of China’s economy, increased com-
petition for traditional finance that improved services, and a better image for
China abroad as an innovative country. Yet, in 2017 China Communist Party
General Secretary Xi Jinping convened a Politburo study session with a focus
on ‘financial security,’ which turned into a sustained campaign against finan-
cial risk that would sweep up fintech as well. Fintech’s large scale and much
of the low hanging fruit of digitisation already being picked led to much more
regulation (Chorzempa 2018).
The financial regulatory side advanced, held back to some extent by the
political power of fintech firms and their allies. Meanwhile a global move-
ment to better protect privacy and restrain monopolistic practices among big
tech firms changed policy goals. The Politburo’s commitment on December
11, 2020 (Xinhua 2020), to ‘prevent the disorderly expansion of capital’ was
precipitated by Alibaba founder Jack Ma’s comments at a major conference
that suggested that regulatory policy was excessively focused on reducing
risk to the detriment of innovation and growth—just before what was to be a
record breaking initial public offering of his fintech giant Ant Group. Pressure
had already been building to rein in big tech, and Ma’s comments appeared to
be a public rebuke of Xi. Xi had personally advocated for a focus on financial
security, and anyone willing to openly contradict this message could be con-
sidered a political threat. The political and economic issues were intertwined
as well—if Ma could use public influence to shape regulatory policy in his
interest, Ant Group could engage in riskier activities to increase profits. Much
of ultimate costs of those risks, considering Ant could be considered too big
to fail, would be borne by the public and the state.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Fintech in China 91
Managing and reducing financial risk is the first and probably the most
important of China’s goals for fintech, and it is one where policymakers
have achieved extraordinary success by reining in not only fintech, but also
other types of loosely regulated so-called shadow banking. In 2018, the
peer-to-peer lending sector, which at one point created around 5 percent of
credit in China, was full of Ponzi schemes waiting to implode, with thousands
of online platforms suffering from massive losses on poorly thought-out loans
on the one side and owing millions of investors over a trillion RMB on the
other. Authorities gradually diffused the risk and shut down the entire sector
with minimal fallout to the financial system and social stability, the latter
thanks to the quick mobilisation of the state security apparatus to discourage
protests among investors taking losses in failed platforms (Chorzempa 2022).
In the payments space, risk from the rise of loosely regulated online pay-
ments has been diffused, as the state has ensured that all on and off ramps
to online payment tools like Alipay and WeChat pay are regulated through a
state clearinghouse called NetsUnion. All funds in these digital wallets are in
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
92 Martin Chorzempa
turn deposited in special accounts at the central bank to ensure that payments
companies cannot gamble with customer funds, and that if Alipay were to
fail, customers would be easily made whole by the central bank. Security
standards have tightened as well, ensuring that initially unsecure ‘static’ QR
codes have moved to ‘dynamic’ ones that are much harder for criminals to
use to drain people’s digital wallets by sneaking a picture of the codes they
present to pay.
Authorities have also successfully pressured Ant to slow down its con-
sumer loans business and restructure it. The previous version allowed regula-
tory arbitrage, in which Ant’s affiliated microloan company regulated at the
provincial level originated hundreds of billions of RMB in loans nationwide
that would then be sold to banks—meaning that Ant made money from the
payments and loan origination while its IPO prospectus revealed that banks
were on the hook for 98 percent of the credit risk (Ant 2020). Instead, it will
have to issue loans through better regulated joint ventures.
Most importantly, regulators have created a financial holding com-
pany (FHC) regime to ensure that firms like Ant with multiple financial
licenses along with non-financial business, are regulated at the group level.
Previously, regulators had an incomplete picture because different pieces of
Ant and other financial conglomerates were regulated by different authori-
ties, with no overarching framework that takes into account the risks posed
by interconnection of, say, payments with credit, investment, and banking.
While this has not been a major problem in fintech thus far, other major
financial instability has resulted when it turned out the banks like Baoshang
Bank affiliated with commercial companies made risky, underpriced loans to
their parent firms and related companies, leaving the government to foot the
bill and make depositors whole.
Ant has been required to put its entire business in the financial holding
company structure, but the process is not yet complete. The regime is a work
in progress, and it will have to balance between risk considerations and ensur-
ing it does not micromanage firms to the point of choking off useful product
innovation, for example, making firms wait months for approval to launch a
new product. However, its existence closes a major loophole in financial rules
that fintech benefitted from for years.
Draconian bans on cryptocurrencies and exchanges used to trade them
have been successful at stamping out a large share of this activity in China,
which policymakers see as focused on risky speculation without benefit for
the real economy. Though there may be a trade-off if cryptocurrency-based
‘Web3’ becomes a source of real innovation instead of mostly speculation
and overhyped Ponzi schemes, but for now China is effectively avoiding
the instability, losses, and gambling nature of cryptocurrencies, probably for
the better.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Fintech in China 93
RMB INTERNATIONALISATION
94 Martin Chorzempa
but it still ranked fifth (International Monetary Fund 2022). Meanwhile the
US dollar made up nearly 60 percent. Overall, China has prioritised domestic
control and stability, with strict capital controls, over a greater international
role for its currency. Technological upgrades and China’s growing role in
trade and finance are not enough for greater Chinese leadership in this space.
China’s reliance on the Society for Worldwide Interbank Financial
Telecommunications (SWIFT), a communications system for payments, for
cross-border payments is another point of vulnerability that China’s fintech
progress has made limited progress to removing. Though SWIFT is based in
Belgium, the threat of ‘secondary’ sanctions (applying sanctions to entities
that deals with sanctioned entities) against SWIFT have led it to disconnect
Iranian and now many Russian banks under US sanctions from the system.
China’s own financial messaging system, Cross-Border Interbank Payment
System (CIPS) is not yet a substitute for SWIFT and in fact incorporates
SWIFT standards and messaging. It has only about one-tenth of the reach of
SWIFT (Jin 2022). In April 2022, CIPS handled 14,500 transactions per day
on average, 0.03 percent of SWIFT’s average of more than 46 million per
day in 2022.
Beijing hopes that the move to central bank digital currencies will provide
a reset for international payments, potentially obviating the need for the US
dollar or SWIFT. However, it has not yet made headway despite its leading
status among major economies in central bank digital currency development.
The PBOC’s head of digital currency, Mu Changchun, proposed in 2021
a new foreign exchange trading platform to enable exchange over ‘virtual
borders’ between digital wallets, synchronising elements of financial infra-
structure to facilitate cross-border payments (Mu 2021), but there has not
been a follow up to flesh out this idea. Cross-border CBDC pilots are hap-
pening among many central banks, including one at the Bank for International
Settlements that includes the PBOC and a few other central banks, but these
are in the very early proof of concept stage, Meanwhile the advanced trial
work the PBOC has done has focused on rolling out a domestic currency and
payment system that will compete and cooperate with the big private fintech
payment offerings.
Overall, despite the shock of Russia sanctions creating more urgency for
sanctions-proofing China’s financial system, China still has a long road to
go before tools like the eCNY, CIPS, or other financial infrastructures could
make a real dent in its dependence on the US dollar and infrastructures it can
influence.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Fintech in China 95
96 Martin Chorzempa
with state firms, which would then help lenders, including the state-owned
banks, leverage these data to provide credit. This is supposed to make that
firm’s outputs more objective and reduce conflicts of interest through inde-
pendence from Ant, which competes as a lender with the institutions it sup-
plies with data or credit scores.
CONCLUSION
Chinese authorities have achieved many of their long-term goals for the fin-
tech sector, but balancing competing and shifting objectives will be a major
future challenge. Financial technology innovation has which has helped
Chinese internet firms grow, becoming a crucial enabler for the develop-
ment of China’s digital economy. Hundreds of millions of Chinese now have
abundant choice for payments, investments, and loans, and together with
other services in super apps they have transformed daily life in China. Still,
the challenge remains that China’s financial system remains dominated, even
if not as much as before, by state-owned banks with often non-commercial
incentives, outdated IT systems, and mindsets around credit that struggle to
effectively adopt new technology that can make things more efficient. A con-
tinued larger role for state companies, which are easier to control, does not
bode well for the future of fintech innovation, which has almost exclusively
been driven by private firms.
Authorities’ goal is to marry the fintech innovators and their data with the
capital advantages and political reliability of the state banks, but this has not
yet been achieved. Instead, they have restrained some of the consumer credit
especially of the big fintech firms, which has contributed (though swamped
by the zero covid disruptions) to the slowdown in consumption. Now,
authorities have to balance these traditional financial trade-offs with those in
a complex new set of issues.
One challenge is balancing privacy and competition. Ideas for opening up
the data troves of the big tech companies to other firms will make it more
difficult to ensure these data are protected. For example, hackers could use
fake user requests to download “their” data or exploit the systems under con-
sideration to allow big tech firm data to flow to startups. Another is sustaining
innovation in fintech, which may struggle under a much higher regulatory
burden. More approvals will be needed, which will slow down the process,
and authorities have become more risk averse. Efforts to internationalize the
RMB and have globally competitive fintech firms are more likely to face bar-
riers abroad if they are perceived internationally as operating as tools of the
state. It is harder to justify allowing them to collect sensitive data abroad due
to the state’s assertion of increased control domestically, some cases forcing
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Fintech in China 97
fintech firms into joint ventures with state firms, and integration into the sur-
veillance apparatus, like their hosting of Covid apps with tracking functions.
REFERENCES
Analysys. 2022. Yidong Zhifu Hangye Shuzihua Jincheng Fenxi: (Mobile pay-
ment industry digitization analysis). 30 September. Available from: https://www
.analysys.cn/article/detail/20019936 [5 July 2022].
Ant Group. 2020. “IPO Prospectus” Available from: https://web.archive.org/web
/20201105212227/https://www1.hkexnews.hk/app/sehk/2020/102484/documents/
sehk20082500535.pdf [5 July 2022].
Bank for International Settlements. 2019. Annual Economic Report. Available from:
https://www.bis.org/publ/arpdf/ar2019e3.htm [12 January 2022].
Barnett, W and Lorentzen, P. 2006. ‘EachNet.com,’ Stanford Business School Case
No. SM91. Available from: www.gsb.stanford.edu/faculty-research/case-studies/
eachnetcom [16 November 2022].
Chorzempa, M. 2018. ‘Beijing’s Grip on Internet Finance Is Tightening’ 9 January.
2018. China Economic Watch. Peterson Institute for International Economics.
https://www.piie.com/blogs/china-economic-watch/beijings-grip-internet-finance
-tightening [16 November 2022].
Chorzempa, M. 2021. ‘China, the United States, and Central Bank Digital Currencies:
How Important Is It to Be First?’ China Economic Journal 14(1), 102–15.
Chorzempa, M. 2022. The Cashless Revolution: China’s Reinvention of Money and
the End of America’s Domination of Finance and Technology, New York: Public
Affairs.
Cornelli G., Frost J., Gambacorta L., Rao R., and Ziegler T. 2020. Fintech and big
tech credit: A new database. BIS Working Papers no. 887. Bank for International
Settlements. Available from: https://www.bis.org/publ/work887.pdf [13 January
2022].
Demirgüç-Kunt, A., Leora K., Singer, D. and Ansar, S. 2022. Global Findex
Database 2021: Financial Inclusion, Digital Payments, and Resilience in the Age
of COVID-19. Washington, DC: World Bank. doi:10.1596/978-1-4648-1897-4.
Engen, J. 2018. ‘Lessons from a mobile payments revolution,’ American Banker.
Available from: https://www.americanbanker.com/news/why-chinas-mobile
-payments-revolution-matters-for-us-bankers [16 November 2022].
EY. 2019 Global Fintech Adoption Index. Available from: https://www.ey.com/en_gl
/banking-capital-markets/what-is-next-for-asia-in-fintech-adoption [16 November
2022].
Guo Feng, Wang Jingyi, Wang Fang, Kong Tao, Zhang Xun, Cheng Zhiyun. 2019.
‘Measuring China’s Digital Financial Inclusion: Index Compilation and Spatial
Characteristics,’ Working paper. Institute of Digital Finance. Peking University.
Available from: https://en.idf.pku.edu.cn/docs/20190610145822397835.pdf.
Guo, Shuqing. 2020. ‘FinTech developments, challenges and supervision in China.’
Video Speech at the Singapore FinTech Festival (SFF) 2020. 8 December.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
98 Martin Chorzempa
Fintech in China 99
-and-shared-services/business-intelligence/renminbi/rmb-tracker/rmb-tracker
-document-centre [18 November 2022].
State Council of the People’s Republic of China. 2005. ‘Guowuyuan Bangongting
Guanyu Jiakuai Dianzi Shangwu Fazhan de Ruogan Yijian’ (State Council General
Office opinions on how to accelerate e-commerce’s development). Issued January
8. Available from: www.gov.cn/gongbao/content/2005/content_63341.htm [18
November 2022].
Xiaobo Wu. 2017. Tengxun Zhuan 1998–2016: Zhongguo Hulianwang Gongsi Jinhua
Lun (Tencent biography 1998‒2016: Theory of evolution of China’s internet com-
pany] Hangzhou: Zhejiang University Press, 39.
Xinhua News. 2021. ‘Xi Jinping Zhuchi Zhaokai Zhongyang Caijing Weiyuanhui Di
Jiu Ci Hui Yi’ (Xi Jinping Presided over the Ninth Meeting of the Central Financial
and Economic Work Commission).’ 15 March. Available from: http://www.gov.cn/
xinwen/2021-03/15/content_5593154.htm [18 November 2022].
Xinhua News. 2020. ‘Zhonggong Zhongyang Zhengzhi Ju Zhaokai Huiyi, Xi
Jinping Chuxi’ (Xi Jinping chairs a meeting of the Political Bureau of the Central
Committee of the Chinese Communist Party).’ 11 December. Available from:
http://www.xinhuanet.com/politics/leaders/2020-12/11/c_1126850644.htm [18
November 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
PART III
International Engagement
and Confrontation
101
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 5
China
A Technical Standardisation Power?
Tim Rühlig
When the Central Committee of the Chinese Communist Party (CCPCC) and
the State Council of the People’s Republic of China (PRC) jointly published
China’s new “Standardisation Outline” (in the following simple the “Outline”)
in October 2021, the crucial importance of technical standard-setting con-
trasted with a remarkably modest description of China’s aspirations. As the
quote above illustrates, the Chinese leaders describe technical standards hav-
ing a “fundamental and leading role” for national governance and acknowl-
edge an “urgent need” to strengthen technical standardisation to “build a
modern socialist country.” These are high expectations for voluntary and
highly technical documents that are mostly developed by engineers from
companies and research institutions.
While the Outline formulates a comprehensive reform plan that would
strengthen China’s technical standardisation capabilities, it falls far short
of a “grand strategy” to global domination in this field as some might have
expected. Referring to “China Standards 2035,” an often-misunderstood
attempt of some actors within the Chinese party-state to push for further
reform, technical standardisation is more and more perceived through the
lenses of geopolitical competition. However, “China Standards 2035” was
a research project concluded launched by reform-oriented elites from within
the party-state. The results of the project never became public. While the
Outline contains some of its results it also deviates from “China Standards
2035.” This is illustrative of the fact that China’s standardisation approach
remains contested within the party-state.
Considering the emerging competition over high technology between
the United States and the PRC, observers on both sides of the Pacific have
103
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China 105
that enable charging and the exchange of data on a wide range of devices.
Similarly, Wi-Fi is a family of radio technologies built on technical standards
that allow for wireless local area networking (WLAN) of a wide range of
technological equipment. Technical standards allow products of all kinds to
be applicable in a multitude of contexts across countries and manufacturers.
Hence, technical standards are highly specific technological product specifi-
cations, developed by private industry and accessible to everyone. It is not
obvious how the host state of a company that has suggested a given technical
solution to become a standard politically profit from the proposal’s success.
Second, the debate on technical standards as part of the emerging com-
petition over high technology mostly takes for granted that China possesses
increasing impact on standard-setting. In the political debate more specifi-
cally, many observers assume that China is about to “dominate” international
technical standard-setting (Gargeyas 2021). This bears the question how to
precisely measure technical standardisation power and whether China’s foot-
print2 is factually dominant or reaching a state of domination.
Third, in the West, China’s growing “standardisation power” is mostly
discussed in an alarming tone (SFRC Democratic Staff 2020). Not least
historical analogies are introduced to argue that standard-setting can have
devastating impact if great powers ignore growing engagement by rising
powers (Brookings Institution 2021). While such line of argument might not
be unreasonable it mostly lacks a clear concept of “standardisation power.”
This absence hinders observers to be precise about the inherent risks.
This chapter addresses three questions to better understand the importance,
the ambitions, the achievements, and the risks of China’s technical standardi-
sation approach. First, this chapter asks why technical standardisation power
is important for China. Second, the chapter explores to what extent China has
already turned into a technical standardisation power. Third and finally, the
chapter assesses how different China’s policy is from that of the rest of the
world and what the potential inherent risks of China’s growing presence in
technical standardisation are.
China 107
Country A is locked into country B’s technology and fully reliant on supply
from country B. Economists have long referred to these lock-in effects as
“network effects” or “network externalities” (Bonardi and Durand 2002).
These studies have convincingly demonstrated that high switching costs lead
to the preservation of dominant technical standards (Arthur 1989; Farrell and
Saloner 1985); standards developed in an early stage often prevail, even if
they are technologically inferior (Schilling 2002).
Politically, this remains unproblematic as long as the respective product is
not of strategic importance to the well-being of a society. Railways, however,
are a critical infrastructure enabling the flow of goods and people, thereby
generating welfare and mobility. A lock-in effect in such a critical sector has
political implications. If all suppliers that are compliant with the respective
technical standards are based in country B, it could ask country A for political
concessions in return for the maintenance and buildout of the critical infra-
structure. Even if country B does not explicitly ask for such concessions,
country A would think twice before adopting a confrontational stance on
issues of core interest to country B in fear of the consequences for the func-
tioning of its critical infrastructure.
Apart from such lock-in effects, some experts suggest that technical stan-
dards have the potential to impinge on what is often regarded as the crown
jewel of state power: security. Regarding cybersecurity, those who develop
a standard could have a deeper knowledge of the technology including its
vulnerabilities. If adopted as an international standard, the technology spreads
globally. Consequently, the developer of the technology in question possesses
prime knowledge of its flaws that can be used to undermine an adversary’s
cybersecurity (Eisenstark 2018; Medin and Louie 2019). Other observers
counter that standardisation is a process of maximum transparency in which
it is hardly possible to hide security-relevant flaws from the eyes of the
engineers of potential adversaries. From this perspective, a high degree of
standardisation even increases the cybersecurity by means of transparency.
Whichever perspective is more accurate, technical standardisation influences
the degree of cybersecurity (Rühlig 2019).4
Ideational dimension: How technology is designed is highly political as
it inscribes ethical values to it. Technology does not exist in a vacuum.
Technical standards shape the physical world and contribute to the constitu-
tion of our social lives (Busch 2011). Hence, technical standards determine
what is perceived as “normal” technology. Several critical scholars have
described technical standards as social institutions in their own right (Krislov
1997; Hallström 2004; Timmermans and Epstein 2010). For instance, Wi-Fi
is seldom questioned as the dominant WLAN standard. However, a few
years after Wi-Fi had been established as the international standard, China
proposed the WAPI technology as a new standard. WAPI promised better
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China 109
performance but provided worse privacy (Lee and Oh 2006). Finally, the
Chinese proposal failed mostly due to procedural issues (Suttmeier, Yao, and
Tan 2009). Whether intended or not, by rejecting WAPI international SDOs
prioritised privacy over performance, shaping what consumers expect from
WLAN technology.
This is not an isolated example. Emerging technologies are increasingly
penetrating all spheres of public and private life. Whoever sets technical
standards on algorithmic bias, data privacy and similar issues shapes ethical,
political, and security angles of key enabling technologies (Seaman 2020).
Moreover, the ideational power of technical standardisation is not limited to
underlying ethical values. If a country shapes international technical stan-
dardisation, it is likely to gain a reputation as a technology leader, which is a
sigh of societal progress beyond economic and military prowess.
These institutional leadership positions help shaping the agenda and are the
result of preexisting power, but they come with relatively little impact on the
actual standard-setting. For this process, technical leadership positions, often
called “secretariats,” are more crucial. Secretariats are supposed to be neutral
(ISO 2018), but technical standardisation experts agree in that secretariats
have an enormous influence by structuring, organising, and coordinating the
process.5 In ISO, China currently holds sixty-eight secretariats; five coun-
tries lead more technical committees. In IEC, China ranks seventh with a
total of twelve secretariats. This illustrates that China is far from dominating
international SDOs in terms of technical leadership positions. However, the
proportion of China’s influence is growing. In the period 2011–2018, China’s
share in ISO Technical Committee and Subcommittee secretariats grew from
5 percent to 8.21 percent, that of ISO Working Group secretariats even from
2 percent to 6.58 percent.6
In the ITU, China has achieved an even greater influence. Together with
Japan, it holds the most ITU-T study group chair positions and is the sole
leader in ITU-T study group vice-chair positions. The PRC is also the strongest
of all nations in terms of ITU-T work program chair and vice-chair positions;
the same holds for ITU-T rapporteur posts. In ITU-T Focus groups, China
ranks second behind the United States in chairs, but it outnumbers all with
regard to vice-chairs. In the Third Generation Partnership Project (3GPP),
another important SDO in the telecommunications sector, China holds the
most Working Group chairs and vice-chairs (DiploFoundation 2021).
Technical leadership positions are important but not a necessary
requirement to impact standardisation. A second proxy, participation in
standard-developing committees, captures which actors can submit proposals
and comments to the standardisation process. China’s influence has grown
enormously since 2007 having surpassed that of the United States, France,
and Japan. However, China still falls slightly short of the United Kingdom
and Germany.
Another measure for participation is the number of participations. Data
from 3GPP shows that, in 2018, China accounted for the highest share of
participants (23.7 percent). Representatives from firms based in the EU and
the United States fell slightly short with 22.5 percent each.7 This corresponds
with the fact that no other country has more individual members in 3GPP.
ITU member statistics similarly indicate that among all countries, China falls
only short of the United States.8
In many SDOs (including ISO and IEC), membership in standard-developing
committee requires regular contributions. Otherwise, national SDOs lose
the status as active participant. However, membership does not reveal the
number of contributions and whether they are adopted. Hence, such data is
considered to be the third proxy. Statistics on standard contributions are rare
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China 111
respective patent in other declared SEPs. While the size of the patent family
is supposed to measure how extensive the patents are, the number of citations
serves to indicate how relevant a certain patent is for other components of 5G
technology by being referenced in other 5G-relevant patents. Based on the
IPlytics database, Chinese patents turn out to be the least important compared
with the those filed by companies from other major technological leaders
in 5G based in Europe, the United States, South Korea, Japan, Taiwan, and
Canada (ibid.).
While all these quantitative proxies consistently point to a growth in
Chinese impact on international technical standard-setting, hardly any figure
can capture the entire development. Therefore, a fifth proxy deals with the
qualitative description of influence in the standardisation. Interviews with par-
ticipants in international SDOs helps. For this chapter, more than seventy-five
interviews with European and US representatives in international SDOs have
been conducted. The results confirm the quantitative findings.10
A decade ago, our Chinese colleagues could contribute good proposals in only
very few fields. To this day, many Chinese proposals are rejected because their
technological quality is inferior to the contributions of other experts. Regardless
of these continuous challenges, you cannot ignore the improvements. The time
when some of my colleagues would not take Chinese contributions seriously
are gone.12
China 113
Five or ten years ago, we could not make a lot of real contributions to interna-
tional technical standardisation. Our own innovation was not good enough, but
we also did not quite understand the importance of standard-setting. [. . .] We
are proud to say we have made much progress. But we still need to learn a great
deal from Europe and the US.15
Finally, technical standards are not only developed in SDOs, but can also
be established as de facto standards. The most prominent examples are the
operating systems of Microsoft and Apple that have never been adopted by
an SDO. However, the fact that any software needs to be compatible with
Windows or iOS if it does not want to end up in a niche makes both operat-
ing systems de facto standards. Quantitative accounts of de facto standards
are hardly feasible, which requires qualitative investigations including inter-
views. If one aims to generally grasp impact in de facto standard-setting,
a focus on specific vehicles can be helpful. As an example, this chapter
explores the role of the BRI as a sixth proxy for China’s influence in interna-
tional standardisation.
To begin with, China’s BRI includes an explicit standardisation dimension.
In 2015, China’s main macroeconomic agency, the National Development
and Reform Commission (NDRC), issued its first “Action Plan for the
Harmonisation of Standards along the Belt and Road” (PCR 2015). In
late-2017, the NDRC published another action plan setting further bench-
marks.16 As part of the plan, China began to translate its domestic technical
standards into foreign languages to facilitate their adoption in third countries.
By September 2019, China had signed ninety bilateral agreements on tech-
nical standardisation cooperation with fifty-two countries and regions.17
Chinese experts acknowledge, however, that the agreements are vague
and often meaningless. A major state-sponsored research project, “China
Standards 2035,” suggests transforming these agreements into a regional
technical standardisation organisation, the BRI Standards Forum, that could
develop BRI Regional Standards.18 Whether such a Forum could fulfill the
ambitious goal of developing regional standards that are acknowledged along
the BRI remains to be seen. The Forum, if established, could also simply
serve to coordinate activities in ISO and IEC with the potential to further
strengthen Chinese influence in these institutions.
More importantly, many concrete BRI projects incorporate Chinese tech-
nical standards. It is through these projects that the PRC disseminates its
domestic technical standards to third countries without submitting them to
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China 115
those of the West. However, the PRC has adapted these practices to its state-
centric approach thereby externalising its domestic standardisation. For
example, party-state investment and guidance has been crucial to increase
Chinese companies’ technical expertise. Similarly, state funding has been
made available for active participation in international standardisation bodies.
In order to exploit first-mover advantage, a central feature of the
party-state’s industrial policy is to establish regulatory and financial condi-
tions to facilitate early commercialisation of key enabling technologies. In
5G, the PRC has not only sponsored the world’s largest 5G trial area in the
Yangtse River Delta, but the state-controlled mobile operators have been
instructed to roll out the most innovative version of 5G, known as standalone
5G (Shi-Kupfer and Ohlberg 2019). Western countries, in contrast, have
tended to opt for the less innovative update of 4G/LTE networks to non-
standalone 5G because private industry has identified that this path requires
less investment and is therefore more economical in the short and medium
term (Eisenstark 2018; Rühlig and Björk 2020).
Another example of party-state involvement is the coordination in order to
speak with one voice. Practitioners from all countries confirm that conflicts
of interest among industry representatives from one country are the rule
rather than the exception. At the same time, coordination to ensure partici-
pants speak with one voice helps to establish support around a given standard
proposal. In the West, such coordination is left to industry or to committees
within private SDOs. While China’s unity is often overestimated, in fields
of national priority such as 5G, the Party-state indeed actively facilitates
coordination. For the purpose of coordination, in 2013, the PRC founded the
IMT 2020 (5G) Promotion Group, which comprises Chinese public agen-
cies (Ministry for Industry and Information Technology, Ministry of Science
and Technology and the National Development and Reform Commission),
research institutes (Beijing University of Posts and Telecommunications) as
well as all sorts of Chinese tech companies (Chen and Kang 2018).
When it comes to de facto standardisation outside of existing SDOs, China
has exploited similar mechanisms that we are familiar with in the West. Large
companies, package deals in which technical standards are adopted along-
side favourable financial conditions and the creation of long-term liabilities
are practices that the PRC has not invented. However, in contrast to most
Western cases, the party-state has been actively engaged in the creation of
large firms (Lardy 2019), state-owned banks have provided the funding
for BRI infrastructure projects that spread Chinese technical standards and
long-term liabilities in these projects often make recipient countries depen-
dent from Chinese state-owned firms, not private companies. In short, while
China’s technical standardisation approach shows some similarities with
Western practices and the externalisation of domestic structures resembles
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
some Western tactics too, the PRC has adopted a much more state-directed
approach. This contributes to two current trends: the politicisation and the
fragmentation of technical standard-setting.
Politicisation of technical standards. Although historically a subject of
power politics of states, the potential source of state power stemming from
technical standards has largely been ignored by practitioners for the last few
decades. The Chinese party-state’s strategic approach to international techni-
cal standard-setting coupled with the emerging power competition over high
technology is leading to a politicisation of the subject. Not least China’s
growing footprint could lead other, primarily developing countries to consider
adopting a state-steered approach as it is practiced in the PRC (Rühlig and ten
Brink 2021). Such politicisation alters the character of standardisation.
In economic terms, the politicisation incorporates a focus on the conditions
upon which actors from different political entities get involved in interna-
tional technical standard-setting. In strategic sectors such as key-enabling
technologies, Chinese firms profit from party-state support. Hence, technical
standardisation could be included in the West’s drive to create a level playing
field including sanction regimes.
Technical standards have further unfolded significant transformative force
because once the world had agreed on a standard it was costly to change it.
Complementary products and technologies would have needed to go through
a process of adaptation generating switching costs. This relatively unques-
tioned character made international technical standards into an accepted part
of international trade law. If technical standardisation will increasingly be
seen through a political lens the “impartiality” attributed to standards could
be undermined.
The politicisation of technical standards also directs the attention to
cybersecurity implications of standard-setting. One example for the political
dimension is that the US Department of Defence has issued concerns that
China’s strong presence in 5G standardisation could shift 5G technologi-
cal development to focus on low-frequencies while US manufacturers have
prioritised high-frequencies (mmWave). Some US experts argue that high
frequencies provide a greater degree of security for wireless communications.
Another concern is that US troops might need to rely on Chinese technology
for their communications in overseas operations given Chinese strength in
low frequency 5G technology (DIB 2019).
Finally, the technological character of standard-setting negotiations has
long covered the ideational dimension of standardisation. Surely, technical
standards have never been nonpolitical in substance. However, the recent
politicisation could substantially change the process of standard-setting. The
actors involved could pay more attention to ethnical, societal, and political
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
China 117
CONCLUSION
NOTES
China 119
REFERENCES
China 121
Rühlig, T. and Björk, M. 2020. What to make of the Huawei debate? 5G network
security and technology dependency in Europe. UI Paper 1, 4–37.
Rühlig, T. N. and ten Brink, T. 2021. The Externalization of China’s Technical
Standardization Approach. Development and Change 52(5), 1196–1221.
SAC. 2017. ‘Zhōnghuá rénmín gònghéguó biāozhǔnhuàfǎ’ (Standardization Law of
the People’s Republic of China), issued 08 November. Available from: www.sac
.gov.cn/sbgs/flfg/fl/bzhf/201711/t20171108_318652.htm [5 February 2021].
SAC. 2018. “’标准联通共建‘一带一路’行动计划(2018–2020年” (Action Plan for
Standard Unicom to Build the “Belt and Road” (2018–2020)), issued 19 January.
Avaiable from: http://www.sac.gov.cn/zt/ydyl/bzhyw/201801/t20180119_341413
.htm [26 October 2018].
Schilling, M. A. 2002. Technology success and failure in winner-take-all markets:
The impact of learning orientation, timing, and network externalities. Academy of
management journal 45(2), 387–98.
Schneiderman, R. 2015. International Standards Development Organizations Defined.
In Modern Standardization. Case Studies at the Crossroads of Technology,
Economics and Politics. Piscataway: IEEE Press, 2015, 253.
Seaman, J. 2020. China and the new geopolitics of technical standardization. Notes
de l’Ifri 34, 3–31.
SFRC Democratic Staff. 2020. The New Big Brother—China and Digital
Authoritarianism, issued 21 July. Available from: https://www.govinfo.gov/content
/pkg/CPRT-116SPRT42356/pdf/CPRT-116SPRT42356.pdf.
Shalal, A. 2020. Biden Adviser Says Unrealistic to ‘Fully Decouple’ from China.
Reuters, 22 September. Available from: https://www.reuters.com/article/us-usa
-trade-china-biden-idUSKCN26D1SM [12 April 2021].
Shi-Kupfer, K. and M. Ohlberg. 2019. China’s Digital Rise. Challenges for Europe.
Merics 7, 7–55.
Strumpf, D. 2019. Where China Dominates in 5G Technology. WSJ. 26 February.
Available from: https://outline.com/dVsKLJ [13 April 2019].
Suttmeier, R. P., Yao, X. and Tan, A. Z. 2009. Standards of power? Technology,
institutions, and politics in the development of China’s national standards strategy.
Geopolitics, History, and International Relations 1(1), 46–84.
The ‘China, Inc.’ Challenge to Cyberspace Norms. Hoover Institution, n.d.
Available from: https://www.hoover.org/sites/default/files/research/docs/williams
_webreadypdf1.pdf.
Timmermans, S. and Epstein, S. 2010. A world of standards but not a standard world:
Toward a sociology of standards and standardization. Annual review of Sociology
36(1), 69–89.
Väisänen, T. A. (2011). Enforcement of FRAND Commitments under Article 102
TFEU: The Nature of FRAND Defence in Patent Litigation (1st ed.). Baden-Baden:
Nomos Verlagsgesellschaft mbH.
Williams, R. 2018. The ‘China, Inc.’Challenge to Cyberspace Norms. Hoover
Institution, n.d. Available from: https://www.hoover.org/sites/default/files/research
/docs/williams_webreadypdf1.pdf.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
World Trade Organization. 2012. Trade and public policies: A closer look at non-tariff
measures in the 21st century, issued n.d. Available from https://www.wto.org/
english/res_e/booksp_e/anrep_e/world_trade_report12_e.pdf.
Wu, M. 2016. The China, Inc. challenge to global trade governance. Harvard
International Law Journal 57(2), 261–324.
Xinhua. 2021. 两会受权发布)中华人民共和国国民经济和社会发展第十四个五
年规划和2035年远景目标纲要 (The 14th Five-Year Plan for National Economic
and Social Development of the People’s Republic of China and Outline of Long-
term Goals for 2035), issued 13 March. Available from: http://www.xinhuanet.com
/2021-03/13/c_1127205564.htm [3 April 2021].
Xue Yujie. 2019. 27 Companies Drafting China’s First National Facial Recognition
Standard. Sixth Tone, November 27. Available from: http://www.sixthtone.com
/news/1004893/27-companies-drafting-chinas-first-national-facial-recognition
-standard [04 April 2020].
Yan, Xuetong. 2020. Bipolar Rivalry in the Early Digital Age. Chinese Journal of
International Politics 13(3): 313–41.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 6
Hunter Dorwart
facilitating data flows across borders but in a way that ensures security and
regime stability.
While China’s overarching objective is clear, its strategy to translate the
twin aims into international rules and principles remains inchoate. Not only
are there information gaps in China’s preferred outcome, but current evi-
dence also suggests that the roadmap for practical implementation remains
fragmented. The country’s leaders have stressed the need for China to help
formulate international rules with partners, and have even launched global
initiatives to start this, but have produced few results that would meaning-
fully structure international data transfers outside of China or influence other
countries to adopt China’s preferred approach.
Nonetheless, through its data ordering (a combination of regulatory rule-
making and technology practice), the PRC has produced three spill-over
effects that have formed a multi-dimensional foundation through which China
may influence global data transfer rules in the future. Data ordering is related
to data governance, which refers to the regulatory and technical tools that
governments employ to govern information and technology but is different
as it emphasises the practice of Chinese administrative institutions to instil
order through means that dodge conventional legal concepts and vocabulary
(Clarke 2020).
Each spill-over effect contains key shortcomings that complicate measur-
ing China’s current impact on data transfers rulemaking. Part of the difficulty
lies in determining whether China wants to construct international rules and
exert regulatory leadership or whether officials wish to assert influence only
to favour a limited, domestic interest. In other words, translating China’s
domestic aims into international goals with respect to data transfers involves
taking a conceptual leap in an environment where existing evidence does not
always point to an easy solution. As of writing, the answer remains relatively
unclear. Yet the shape of China’s data ordering has come into form through
the following spill-over effects:
This chapter traces the development of China’s strategy and the three
spill-over effects by analysing government policy documents, administrative
regulations, and corporate public data in China. It also relies on interviews
and conversations with Chinese lawyers, compliance teams, and data secu-
rity researchers to explain how companies have responded to China’s data
transfers framework and its impact on global data flows. While it focuses
primarily on corporate transfers, many of this chapter’s arguments apply
to the important issue of government access to data, although relatively
underexplored.
In highlighting these vectors, this chapter attempts to lay the foundation
for future research and draw attention to methodological challenges that face
grasping the extent of China’s rise as a cyber power. Any analysis of China’s
technology strategy and capabilities must confront gaps in information and
recognise that in the absence of additional data, researchers must not let their
assumptions finish the explanation. This chapter attempts to highlight these
gaps while drawing attention to known trends.
Over the past few years, China’s strategic goals for global data transfers have
come into view, but their concrete path for implementation remains unclear.
At the heart of this uncertainty lies the twin aims of balancing the free flow of
data across borders for commercial interests with a restrictive approach that
prioritises security. Put simply, China wants to realise both goals—it wants
a world where data governance principles facilitate digital development at
home and abroad, but also one where it can develop comprehensive policy
tools like data localisation to uphold security. How and through what tools
China will shape this world remains unanswered.
This section attempts to provide an account of the intention behind China’s
strategic goals with respect to global data transfers by first situating the twin
aims within the broader context of China’s cyber governance values. It argues
that the orderly flow of data has emerged as a unique concept that reflects
the need to prioritise national security over other interests. Next, this section
highlights emerging ambiguities in China’s strategy to translate its domestic
goals into international rules. While China has promoted cooperation to cre-
ate international rules, its efforts so far have left many questions unanswered.
likewise implies that data shall not flow unless certain conditions are met,
including compliance with Chinese law.
Chinese policymakers are still working out the balance between commer-
cial and security interests when it comes to data flows, which makes arriving
at a systematic definition of the concept somewhat of a moving target. The
twin aims have often produced tension within China’s political and admin-
istrative institutions, and in ways that have not always been easy to resolve
(Boullenois 2021). Such tension has involved battles over regulatory turf,
power-sharing between new and old bodies such as the CAC and the Ministry
of Public Security (MPS), and concerns about the position of tech companies
within China’s larger digital economy (Creemers 2021; Zhang 2016). The
Chinese government has yet to resolve many details of the twin aims, which
has created even more ambiguity in the context of international rulemaking.
is in the process of operationalising the second while initiating the third and
fourth (Weng and Song 2022).
Chinese ministries, administrative bodies, and other lawmakers have also
indicated their preference for rulemaking, albeit in a general manner (Hong
2020; Zheng 2020; Huang 2020). For instance, both the DSL and the PIPL
speak of the need for China to ‘actively participate in the formulation of inter-
national rules’ with respect to international data transfers, but do not specify
what rules should be created (Wu 2021).
More concretely, the Chinese government has made data flows a key prior-
ity in two types of international settings: 1) negotiations in trade agreements
that contain digital services chapters; and 2) plurilateral institutions and
initiatives that involve data regulation. While China has increased its partici-
pation in both settings, efforts to create binding rules have so far produced
mixed results. This has generated scepticism as to China’s true strategic aim
with both settings. Such ambiguity raises questions about what China’s lead-
ers wish to accomplish with data transfers.
that the Obama administration spearheaded to set the rules for digital trade
in Asia. While the United States later withdrew from the initiative, its other
signatories have revived it, making the agreement one of the largest ongoing
trade deals in negotiation (Williams and Sutherland 2021). The CPTPP con-
tains language to prohibit countries from adopting a data localisation model
like the PRC’s. It goes further than RCEP by requiring members to demon-
strate that restrictions on data flows meet a legitimate public policy objective,
are not discriminatory or arbitrary, and are proportionate and necessary (Kong
and Tong 2021). Chinese experts assert that the country’s data governance
laws are compatible with CPTPP’s conditions, despite widespread scepticism
(Hong 2020). However, as of writing, the status of China’s ascension to the
agreement is still ongoing.
the G20 (Park 2022). Chinese ministries have made the GDSI a key part of
its bilateral and regional engagement on cyber issues including in fora like
the China-Arab Data Security Cooperation and the China-ASEAN Digital
Governance Cooperation.
The GDSI has received support, albeit in a general and limited manner,
from numerous countries around the world especially in the Global South.
However, little information beyond terse readouts and press releases of this
engagement exists. Indeed, the GDSI’s role in larger plurilateral fora remains
unclear—the initiative proposes principles that other countries may agree to
but leaves the work of filling in the details to other cooperative efforts (Park
2022). China may prefer to do this on a bilateral basis, as its recent cyberse-
curity agreements with Thailand and Indonesia suggest, or it may increase its
efforts in other institutional settings (CAC 2022c; CAC 2022d).
While the pathway for China to accomplish its twin aims remains fragmented,
the PRC has nonetheless already influenced the global debate around data
flows, internet governance, and cross-border transfers. This influence is not
limited to formal rulemaking but extends to other practices such as gover-
nance norms and design choices in contracts. These different vectors—hard
law, soft law, corporate governance—overlap with each other but exist on
different conceptual planes.
As a result, measuring the effects of each requires different methodological
tools. For instance, focusing exclusively on whether Chinese data protection
law will become a global de facto standard like the GDPR risks ignoring how
the country’s technology exports may shape corporate governance practices
in recipient jurisdictions (Erie and Streinz 2021). Likewise, an emphasis
on soft law and other non-binding mechanisms like standards may ignore
the concrete impact and cost China’s localisation rules have already had on
global technology firms.
The lack of a consistent framework that addresses each of these dimensions
has challenged evaluating China’s influence on global data transfers. This
section attempts to address this gap by identifying three spill-over effects of
Chinese data ordering that have and will continue to impact debates around
data flows. Data ordering involves a combination of law and technology
to create certainty and norms over the management of data. It includes the
participation of regulatory authorities that implement data regulations and
technology companies that design and export commercial products. Notably,
businesses to process their data locally within the territory of the PRC and
receive mandatory security assessment (i.e., government approval) for over-
seas transfers.
In other circumstances, organisations must choose an enumerated transfer
mechanism before sending data overseas, such as using a SCC or receiving
certification for the transfer. The current system reflects a need to ensure
the orderly flow of data, but also indicates the strong position of national
security within that need, given that the threshold triggering localisation
seems very low.
The development of this framework has not been straightforward and easy
and has often reflected the changing attitudes of lawmakers to localisation
and data security (Hong 2017). With the promulgation of the Cybersecurity
Law, policymakers took a step towards localisation, but struggled to imple-
ment the rules on the ministerial level (CAC 2017; CAC 2019). The compila-
tion of the Chinese Civil Code in 2020 and the adoption of the PIPL and the
DSL in 2021 marked a new stage in the evolution of China’s data transfers
With respect to data transfers, there are two widely discussed sources
where Chinese data ordering can shape norms and principles beyond binding
international rules. First, China’s localisation regime may directly or indi-
rectly incentivise other governments to adopt similar rules or values. Second,
China’s participation in international fora could further entrench its norms
into data governance institutions.
The PRC’s position in each of these institutions varies and has changed
over time. While officials have expressed scepticism for multi-stakeholder
bodies, Chinese companies continue to send large delegations to many of
them with government support (Negro 2020). China has articulated differ-
ent goals in the ITU and the GGE than in the WTO JSI, which has largely
focused on facilitating e-commerce for companies like Alibaba and JD (Gao
2022). This notwithstanding, the PRC has routinely reiterated its commitment
to data sovereignty and state control of the Internet in many institutions (Erie
and Streinz 2021). Indeed, the country’s efforts in these bodies have strength-
ened perceptions that global consensus on Internet governance is fragment-
ing and that the trend towards stricter state control over data is irreversible
(Nanni 2018).
However, many of these institutions have not placed global data transfer
rules at the top of their agendas, and those that have addressed them have
produced mixed results (Gao and Shaffer 2020). Despite the link between
data sovereignty and localisation, China’s efforts with respect to data trans-
fers in these institutions have been inconsistent and indirect. It has committed
both to promoting data flows between countries (evening signing on to the
‘Data Free Flow with Trust’ initiative at the G20), but also the need to uphold
the sovereign rights of countries to control such data at any cost. Attempts
to translate these commitments into binding agreements have advanced at a
relatively slow pace, while data transfers are but one of many issues on the
table (see Section II[B][1]).
One notable exception is China’s Global Data Security Initiative (GDSI),
which the country created on its own effort, and which directly touches upon
data flows. The principles it sets forth around government access to data
could help China create cross-border transfer agreements with other coun-
tries in a bilateral or plurilateral manner (Hong 2020). Yet little information
beyond short readouts of these initiatives exists. Indeed, these initiatives may
be driven more by a diplomatic effort to counter US and EU assertions of the
lack of credibility of China’s ICT products rather than a genuine attempt to
craft international rules around data flows (Kak and Sacks 2021). Regardless,
the initiative may help China promote its own preferred style of negotiating,
especially if more countries continue to formally acknowledge it.
CONCLUSION
China’s rise as a cyber power has raised implications for the future rules of
cross-border data transfers. Government policy documents and other legal
instruments indicate the recent coalescence of a strategy to realise two aims
with respect to data transfers: (1) ensuring that data flows freely to power
innovation and digital development while (2) restricting data sharing where
necessary to preserve national security, regime stability, and public order.
This trade-off, increasingly articulated through the concept of the orderly
flow of data, has become a central goal of Chinese policymakers, albeit one
that is scattered across ministerial departments with no unified definition.
On the global front, Chinese policymakers seek to legitimise China’s cyber
sovereignty while fostering data transfer rules favourable to the expansion
of Chinese tech companies and China’s national interests. There are notable
information gaps in how this policy will be articulated and the actual pathway
for realisation. While Chinese officials and companies have increased their
collaboration in bilateral and multilateral fora on a range of digital gover-
nance issues, the ultimate goals of such engagement are unclear and vary
depending on the forum. At a minimum, Chinese leaders have expressed
their desire for non-interference in their own regulatory choices. There are
examples where Chinese officials have indicated a desire to create binding
international rules but also instances of collaboration that are oriented only
around broad principles.
Despite the ambiguity in China’s strategy, the country’s current regulatory
and market practices (what this chapter calls data ordering) have produced
three spill-over effects that will likely shape the future of global data trans-
fers in key ways. Each of these faces notable limitations that makes arriving
at a conclusive answer analytically challenging. First, the solidification of
China’s data governance regime has shaped international expectations on
data localisation and influenced how the private and public sectors under-
stand global transfers. Yet, while China’s influence on global data transfers
has increased, the country’s laws may have little impact beyond its domes-
tic market.
Second, moving beyond formal rulemaking, Chinese data ordering may
influence other countries by shaping expectations and norms around digital
sovereignty. While there is some evidence to suggest that other countries
have taken inspiration from China’s approach to data governance, it is hard
to isolate the degree of this influence, given that many countries have devel-
oped similar approaches simultaneously with China. Despite this, China’s
growing participation in international data governance institutions and its
ability to attract and train foreign officials will likely strengthen its influence
on future norms.
Third, Chinese companies have shaped discourse on global data flows by
exporting governance through technology. Particularly, the construction of
data centres in international jurisdictions contains an important governance
component—cross-border security compliance as a service. Regulators have
already begun experimenting with this, often partnering with SOEs and other
tech companies that run data centres. Officials plan to develop a data ‘cus-
toms’ hub in the GBA to facilitate transfers between Hong Kong and China
through streamlined compliance services. It remains unclear to what extent
these hubs will be successful, but they could indicate a future trend.
REFERENCES
Huang, Jie. 2020. Applicable law to transnational personal data: trends and dynamics.
German Law Journal 21(6), 1283–1308.
Hummel, P. et al. 2021. Data sovereignty: a review. Big Data and Society 1: 1–17.
ICCSZ. 2022. Ali yun hanguo shuju zhongxin zhenshi qiyong jiasu yatai shichang buju
(Alibaba cloud South Korea data centre officially opened to accelerate Asia-Pacific
market layout), xunshi guangtong xunwang (ICCSZ), 31 March. Available from
http://www.iccsz.com/site/cn/News/2022/03/31/20220331023932348574.htm [15
June 2022].
Kak. A and Sacks, S. 2021. Shifting narratives and emergent trends in data-governance
policy: developments in China, India, and the EU. Yale Law School Paul Tsai
China Center. 8 August. Available from https://law.yale.edu/sites/default/files/area
/center/china/document/shifting_narratives.pdf [17 August 2022].
Kong, T. and Tong, S. 2021. China’s Comprehensive and Progressive Agreement
for Trans-Pacific Partnership application. East Asian Institute Commentary 37. 4
October. Available from https://research.nus.edu.sg/eai/wp-content/uploads/sites/2
/2021/10/EAIC-37-20211004.pdf [15 August 2022].
Kuner, C. 2011. Regulation of transborder data flows under data protection and pri-
vacy law, OECD Digital Economy Papers 187.
Li, Jiaxing. 2022. China’s World Internet Conference goes ‘international’ as Beijing
seeks to promote its own vision of global cyberspace. South China Morning Post.
13 July 2022. Available from https://www.scmp.com/tech/big-tech/article/3185151
/chinas-world-internet-conference-goes-international-beijing-seeks [13 July 2022].
Liu, Lizhi. 2021. The rise of data politics: digital China and the world. Studies in
Comparative International Development 56(3), 45–67.
Lu, Chuanying. 2014. Zhuquan gainian de yanjin jiqi zai wangluo shidai mianlin de
tiaozhan (Evolution of the concept of sovereignty in the challenges of the internet
age). Guoji guanxi yanjiu (International Relations Studies 1(3), 75–77.
Lu, Chuanying. 2016. China’s emerging cyberspace strategy. The Diplomat. 24 May.
Available from https://thediplomat.com/2016/05/chinas-emerging-cyberspace
-strategy/ [14 June 2022].
Lu, Xiaomeng. 2020. Is China changing its thinking on data localization?. The
Diplomat. 4 June. Available from https://thediplomat.com/2020/06/is-china
-changing-its-thinking-on-data-localization/ [15 July 2022].
McAuliffe, Z. 2022. Tiktok is the most downloaded app worldwide in 2022 so far,
analyst says. CNET. 14 April. Available from https://www.cnet.com/news/social
-media/tiktok-is-the-most-downloaded-app-worldwide-in-2022-so-far-analyst
-says/ [25 August 2022].
McKune, S. and Ahmed, S. 2018. The contestation and shaping of cyber norms through
China’s internet sovereignty agenda. International Journal of Communication 12,
3835–55.
MFA (Ministry of Foreign Affairs). 2015. Remarks by H.E. Xi Jinping President
of the People’s Republic of China at the opening ceremony of the second World
Internet Conference, issued 16 December. Available from https://www.fmprc.gov
.cn/eng/wjdt_665385/zyjh_665391/201512/t20151224_678467.html [13 January
2022].
.stanford.edu/work/translation-personal-information-protection-law-of-the-peoples
-republic-of-china-effective-nov-1-2021/.
NPC (National People’s Congress). 2021a. Zhonghua renmin gongheguo shuju
anquan fa (Data Security Law). Available from https://digichina.stanford.edu/work
/translation-data-security-law-of-the-peoples-republic-of-china/
Pandaily. 2022. Alibaba cloud ranks third in global cloud computing market in
2021. Pandaily 28 April. Available from https://pandaily.com/alibaba-cloud-ranks
-third-in-global-cloud-computing-market-in-2021/#:~:text=Cloud%27s%20market
%20share%20took%20up,to%20enter%20the%20top%20three [14 June 2022].
Park, Chaeri. 2022. Knowledge Base: China’s ‘Global Data Security Initiative.’
DigiChina. 31 March. Available from https://digichina.stanford.edu/work/
knowledge-base-chinas-global-data-security-initiative/ [24 August 2022].
Pongratz, S. 2020. Key takeaways—the telecom equipment market 1H20. Dell’Oro
Group. 7 September. Available from https://www.delloro.com/key-takeaways-the
-telecom-equipment-market-1h20/ [August 18 2022].
Qiushi. 2021. Bu duan zuoqiang zuoyou zuoda wo guo shuzi jingji (Continuously
make our country’s digital economy stronger, better, and bigger). Speech from Xi
Jinping. 18 October. Available from http://www.qstheory.cn/dukan/qs/2022-01/15
/c_1128261632.htm [17 May 2022].
RCCL. 2019. Legal research project: proposal for Hong Kong to be a data center
hub for the Greater Bay Area and China. Centre for Chinese and Comparataive
Law, 20 December. Available from https://beltandroad.hktdc.com/en/insights/legal
-research-project-proposal-hong-kong-be-data-center-hub-greater-bay-area-and
-china [6 April 2022].
Sacks, S. and Li, M. 2018. How Chinese cybersecurity standards impact doing busi-
ness in China. Center for Strategic and International Studies. 2 August. Available
from https://www.csis.org/analysis/how-chinese-cybersecurity-standards-impact
-doing-business-china [15 June 2022].
Segal, A. 2020. China’s alternative cyber governance regime. U.S. China Economic
Security Review Commission 13 March. Available from http://www.uscc.gov/sites
/default/files/testimonies/March%2013%20Hearing_Panel%203_Adam%20Segal
%20CFR.pdf [21 June 2022].
SCIO (State Council Information Office). 2010. White paper on the internet in China,
issued 8 June. Available from http://www.chinadaily.com.cn/china/2010-06/08/
content_9950198.htm [4 January 2022].
Shenzhen. 2022. Shenzhen jiang jian xinxing shuju maoyi xinxihua pingtai peiyu
yao 5 jia zhiming kuajing shuju shang (Shenzhen will build a new data transaction
information platform to cultivate roughly five well-known cross-border data pro-
viders), issued 16 May. Available from http://www.sz.gov.cn/cn/xxgk/zfxxgj/zwdt/
content/post_9783306.html [16 June 2022].
State Council. 2015. Cujin da shuju fazhan xingdong wangyao (Action plan for pro-
moting big data development), issued 31 August. Available from http://www.gov
.cn/zhengce/content/2015-09/05/content_10137.htm [14 May].
State Council. 2016. Shisanwu goujia xinxi guihua (Thirteenth Five-Year Plan for
National Informatization), issued 15 December. Available from http://www.gov.cn/
zhengce/content/2016-12/27/content_5153411.htm [24 March 2022].
Suter, D. 2015. The Shanghai Cooperation Organisation of a Chinese practice of
international law. Zurcher Studien zum offentlichen Recht 232.
TC260 (National Information Security Standardization Technical Committee). 2022.
Wangluo anquan biaozhun shixian zhinan, yi geren xinxi kuajing chuli huodong
renzheng jishu guifan (Technical specifications for certification of cross-border
processing activities of personal information), issued 24 June. Available from https:
//www.tc260.org.cn/front/postDetail.html?id=20220429181520 [25 August 2022].
TC260 (National Information Security Standardization Technical Committee). 2019.
Wangluo anquan biaozhun shixian zhinan—wangluo shuju fenlei fenji zhiyin
(Network security standard practice guidelines—guidelines for categorization and
grading of network data), issued 31 December. Available from https://www.tc260
.org.cn/front/postDetail.html?id=20211231160823 [18 August 2022].
Tencent. 2021. Privacy Policy. Tencent. Available from https://www.tencent.com/en
-us/privacy-policy.html [25 May 2022].
TikTok. 2021. Privacy Poicy. TikTok. 5 October. Available from
https://www.tiktok.com/legal/privacy-policy-eea?lang=en [25 May 2022].
UNCTAD (United Nations Conference on Trade and Development). 2021. Digital
economy report. 2021. United Nations. 29 September. Available from https: //
unctad.org/system/files/official-document/der2021_en.pdf [17 June 2022].
USTR (United States Trade Representative). 2022. National trade estimate report on
foreign trade barriers, issued 31 March. Available from https://ustr.gov/sites/default
/files/2022%20National%20Trade%20Estimate%20Report%20on%20Foreign
%20Trade%20Barriers.pdf [16 April 2022].
Voss, G. 2020. Cross-border data flows, the GDPR, and data governance. Washington
International Law Journal 29(3), 485–532.
Weng, Guomin and Song, Li. 2020. Shuju kuajing chuanshu de falu guiding (Legal
regulation of cross-border data transfer). Zhejiang daxue xuebao (Journal of
Zhejiang University) 50(2), 38–53.
WIC (World Internet Conference). 2020. Overview of WIC. World Internet
Conference, 15 October. Available from https://www.wuzhenwic.org/2020-10/15/c
_547699.htm [23 June 2022].
Williams, B. and Sutherland, M. 2021. China and Taiwan both seek to join the
CPTPP. Congressional Research Service. 24 September. Available from https://
crsreports.congress.gov/product/pdf/IN/IN11760 [22 August 2022].
Wu, Xuan. 2021. Shuju zhuquan shiye xia geren xinxi kuajing guize de jiangou (The
construction of personal information cross-border rules from the perspective of
data sovereignty), Tsinghua faxue (Tsinghua University Law Journal) 15(2), 74–91.
Yakoleva, S. and Iron, K. 2020. Pitching trade against privacy: reconciling EU gover-
nance of personal data flows with external trade. International Data Privacy Law
10(3), 201–21.
Yang, Rongjun. 2014. Lun wangluo kongjian zhili guoji hezuo mianlin de nanti
jiqi yingdui celue (On problems and strategies of international cooperation in
Chapter 7
Gianluigi Negro
In line with the rationale of the book, this chapter explores the engagement
of the Chinese government into the Internet governance discussion. Previous
studies have already highlighted that, during the last two decades, China has
been shifting its role into the internet governance discussion from norm taker
to a norm maker one (Galloway, 2015; Negro, forthcoming). This contribu-
tion shows how China has been increasing its presence into two of the most
relevant international organisations in the field of the internet governance:
the International Telecommunication Union and the Internet Corporation for
Assigned Numbers (ICANN). This chapter also focuses on the role of the
World Internet Conference (also known as the Wuzhen Summit), a Chinese
initiative launched by the Chinese government to promote an alternative
vision of global Internet governance.
The analysis of these three cases studies is based on official documents and
specialised Chinese academic journals and magazines and it supports three
main arguments. First, the Chinese idea of Internet governance cannot be
limited to the role of the government, whereas it involves a variety of stake-
holders that, at least form a historic perspective, have not been always fully
matching the state’s interests (Shen, 2016). Views of policymakers, scholars
and businesspersons are not always convergent with official statements. This
trend shows a degree of inconsistency in the Chinese narrative.
153
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The second argument raised from this contribution challenges the idea
according to which China’s contribution to the Internet governance discus-
sion is limited to a dichotomy between a multi-stakeholder model, closer to
US values and the status quo of the Internet governance, and a multilateral-
ism, a vision often promoted by the Chinese official narrative but that does
not fully reflect the complex vision of Chinese Internet governance, which
de facto match a series of multi stakeholder principles. In general terms, the
second argument challenges the idea according to which China is contribut-
ing to the fragmentation of the Internet (Guan, 2019; Lindsay, Cheung, and
Reveron, 2015) or paradigms as the Internet Yalta (Klimburg, 2013) and the
Digital Cold War (O’Connor, 2014).
The third argument of this this contribution highlights the China’s ambi-
tion to play a more pivotal role into the Internet governance discussion, as it
is demonstrated by the creation of the World Internet Conference, an original
space to foster and coordinate an alternative vision of the global Internet
governance.
There are at least two reasons to support the relevance of ITU for the Chinese
vision on the global Internet. First, in the field of telecommunications, it is an
international organisation that is not structured along multistakeholder lines
(Raymond and DeNardis 2013). Indeed, although it includes international
organisations, NGOs, firms and academic institutions in its decision mak-
ing processes, the main decision making powers on the regulation of inter-
national telecommunication are reserved to the ITU’s member states. The
preponderance of the member state’s contributions and their sovereign rights
to determinate Internet policies and regulation form the core of the “mul-
tilateral” model of Internet governance (Bauer and Dutton 2015). In other
words, the ITU approach is in line with the China’s idea of “Internet sover-
eignty” (hulianwang zhuquan) defined on December 2016 by the National
Cyberspace Security Strategy as states’ right to “prevent curb and publish the
online dissemination of harmful information endangering national security
and interests, and to safeguard order in cyberspace” (CAC 2016).
The second strategic reason behind China’s interest and growing presence
at the ITU is justified by the role played by a particular section called ITU-T
and aimed at coordinating standards for telecommunications and ICTs such
as cybersecurity, machine learning and video compression. Participating
in standards-setting at the global level provides several political and eco-
nomic advantages as Tim Rühlig’s chapter in this volume discusses in depth.
Previous studies argue that standards can seizure the definition of a particular
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
technology trajectory, the direction and, to some extent, the rate at which
future technology progress develops (Suttemeier and Yao 2008).
ITU and China relations are important also from a historical and symbolic
perspective. ITU is the first international organisation in the field of telecom-
munications. In 1994, it sent a delegation to China to support the country
in creating its first Internet telecommunication infrastructure, it also sup-
ported China to develop a know how among Chinese engineers in the field of
Information Communication Technologies through a series of ITU sponsor
seminars and workshops. At the time of writing, Zhao Houlin was serving
his second term as ITU Secretary General. Furthermore, during the last two
decades, China has increased its presence also in specific technical commit-
tees and secretariats. The presence of China in ITU is not limited to Chinese
officials but includes also important private sector actors such as Huawei.
The Shenzhen based company, played a crucial role in the proposal of a the
“New-IP” project, a choice that can be read as strategic because it sees a
direct engagement of a Chinese company to support a state-centric approach
in the standard setting process. At this concern, it should be also noted that
at the December 2020 plenary session of ITU-T Study Group 11 and 15 it
was decided to not accept “New IP” repeated questions as new work items
and to stop discussing “New IP” at least until the World Telecommunication
Standardisation Assembly that took in March 2022. However, since that deci-
sion documents that support “New IP” proposal continued to appear in forms
of new proposals in different study groups at ITU-T (Drolet 2022). Huawei
experience apart, the growing presence at Geneva headquarters of Chinese
delegates and sector actors in the last years suggests more confidence to
influence the decision making process at ITU compared to other standards
developing organisations such as IEFT and ICANN.
Beside private sector actors, important Chinese contributions to ITU
also come from the academic sector, including Tsinghua University, Wuhan
University and the Beijing University of Posts and Telecommunications. The
rising role of the Chinese academic sector at ITU is further illustrated by a
memorandum of understanding co-signed by ITU and Tsinghua University in
January 2019 aimed at launching the academic journal ICT Discoveries. This
is intended to promote academic debate on the latest ITCs technical develop-
ments and their policy, regulatory, economic, social, and legal dimensions.
In more general terms, at the time of writing the number of Chinese del-
egates in the telecommunications section of ITU (ITU-T) is second only to
the United States, and ahead of Japan (ITU, List of Sector Members 2022).
However, the presence of delegates in the ITU-T does not necessarily mean
a concrete influence. Indeed, within the working groups of ITU-T the role
played by chairs and vice chairs has more influence than delegates. At the
present stage, China has a chair position only in the SG16, a study group
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
the creation of the Internet Governance Forum (IGF), an annual event based
on the idea of the multistakeholder approach, but with an only deliberative
power. Furthermore, after two years from the WSIS failure, in 2007, Zhao
Houlin, at that time president of the ITU Telecommunication Standardisation
Bureau, published a research article on the academic journal Information
Polity suggesting the break away from ICANN centralised administration of
Internet domain names to move towards the decentralised administration that
characterises other telecommunications naming and addressing resources (in
particular, telephone numbers) (Zhao 2007, see also Negro, 2022).
The two WSIS phases were seen strategic for China because they rep-
resented a chance to shift the management of the Internet resources from
ICANN to ITU, an international organisation with a closer vision to its idea
of internet sovereignty but it was also important for the ITU to gain support
from China and other developing countries to take over ICANN’s role in its
management of Internet resources.
This process represented a shift from earlier definitions of Internet gov-
ernance, focusing on the global technical management of the Internet’s core
resources: domain names, IP addresses, Internet protocols and the root server
system (Kleinwächter 2004). All these issues were already regulated by
ICANN, which it was established in 1998 thanks to the support of the US
Clinton-Gore administration, with the aim to support neoliberalist values
as well as a network of interests among the technical community, the US
government, intellectual property rights holders and other agents form the
private sector (Mathison 2009). There are at least two reasons that could
contextualise the neoliberalist approach. The first one is the publication of
the White Paper on Internet Governance issued by the Clinton administra-
tion, a document that influenced the creation of ICANN and focused on the
importance of individual freedom and on the protection of private property
and a commitment to economic laissez-faire (Harvey 2005). Furthermore, as
Chenou aptly notes, the Clinton administration issued another document a
few months before the publication of the White paper on which the authors
suggest an active role in the creation of new self-reliant markets (Chenou
2014). In other words, the main goal to create a neoliberal legal framework
of the Internet was the creation of a market for domain names where the
institutions and rules are designed to ensure the straightforward function-
ing of the market. The role of the institutions is to ensure the stability of the
network infrastructure and to safeguard private intellectual property (ICANN
& DoC, art II). According to this neoliberal approach the Internet needs to
be regulated by an individualised and market-based competition, which is
considered the most appropriate expression of governance compared to other
forms of organisation.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The second reason that justifies the neoliberalist approach is the structure
of ICANN itself, which de facto does not support intergovernmental forms
of governance. Even its Governmental Advisory Committee appoints a non-
voting liaison to the ICANN Board. Whereas the ICANN board runs the
market-enabling institutional role supporting a private, transnational, and not
for profit cooperation.
The institution of ICANN reflected the phenomenon of “Internet excep-
tionalism” (Chenou 2014), justifying the decision to bypass the ITU. Indeed,
since its foundation, ICANN has overseen allocating top-level domains
(ccTLD). Finally, ICANN’s nature as a private company created a new mar-
ket for Internet domain names based on the self-organisation of the Internet
community, without the interference of government (Bygrave & Bing 2009).
To achieve its goal, China played an active role in the activities of the
Working Group on Internet Governance (WGIG), a platform created to col-
lect ideas and proposal, which eventually published a series of reports on
Internet governance during the two phases of the WSIS (Shen 2016). The
Chinese presence into WGIG did not only include Chinese official but also
private corporations like ZTE and Huawei.
During the two WSIS phases, Chinese delegations officially lamented how
“Internet governance was monopolised by one state, one corporation or a
handful of private corporations” (Sha 2003). Chinese authorities considered
the ITU and UN, as well as the events they sponsored, as the appropriate
venues to support voices from the Global South. The Chinese Ministry of
Information Industry stated at the first WSIS meeting that “developing coun-
tries, through their own efforts, explore development modes of information
society that suit their own national conditions, and China will work unremit-
tingly towards this end” (2003). It is interesting to note that already during
WGIG activities and the first WSIS phase, China adopted a pivotal role for
the Global South discussion in the field of the Internet governance.
If, sometimes, the Chinese approach to Internet governance seems incon-
sistent and sometimes even contradictory, its engagement with ITU and
WGIG in particular, can be considered rational. Indeed, the Chinese partici-
pation to WGIG activities reflects both an occasion to the Chinese govern-
ment to express its own view on Internet governance but also a moment to
obtain credibility within ITU. It also foreshadowed several key points that
would gain greater priority in the decades later. At a 2004 WGIG meeting,
Hu Qiheng, then advisor for the Science and Technology Commission of the
Ministry of Information Industry and vice president of the Chinese Academy
of Social Sciences, stated that “Internet governance and the administration of
the domestic Internet falls within the sovereignty of each country,” claiming
the interests of a state and its people are best represented by governments,
and that private sector and civil society actors cannot do so (2004; see Negro,
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
2020). All in all, during this stage, China clearly expressed its criticism
towards the status quo of the Internet governance. China kept on investing its
efforts on United Nations and ITU initiatives also after the two WSIS phases.
That said, ICANN is still one of the main international organisations in the
field of the Internet governance. This not necessarily means that the China
strategy has been unsuccessful. China’s contribution to the ITU has been ben-
eficial to the international organisation at least to challenge the role of ICANN
and to start an international discussion on Internet governance. Furthermore,
ITU is now one of the most important international organisations where
China can propose its own vision of Internet governance outside its borders
establishing forms of cooperation with other countries. The Chinese presence
into ITU technical sectors study groups is important because, although they
could not directly impact the operations of the Internet, they are relevant for
setting international standards in the global infrastructure of ICTs (ITU-T),
for managing radio systems (including satellite ownership and spectrum
allocation) (ITU-R) and for closing the digital divide providing technical and
capacity service for developing countries.
The relationship between China and ICANN has not been particularly linear
and has evolved in four distinct stages. First, between the late 1990s and the
beginning of the new millennium. the China–ICANN relation was mainly
formal and inconsistent. Subsequently, during the 2000s, a series of conflicts
and contrasts led to a clear divergence of visions on global Internet gover-
nance. Third, from 2009 onwards, Chinese official delegations reintegrated
with ICANN. Finally, from 2016 on, after the IANA transition, which severed
ICANN’s formal links with the US Department of Commerce, China’s reac-
tion was largely positive and led to an ongoing discussion on how China can
enhance its position in the current ICANN arrangements.
The first official encounter between ICANN and a (nongovernmental)
Chinese delegation took place in 1999, five years after China officially
gained accessed to the Internet, Tsinghua Professor Wu Jianping was elected
a member of ICANN’s Address Supporting Organisation. The same year,
the deputy bureau director of the Ministry of Information Industry (MII)1
Chen Yin, represented China at the meeting of the ICANN Governmental
Advisory Committee (GAC), a body with a limited power in the Internet
domain politics.
Divergences emerged very soon, for two reasons. A first problem was the
formal acknowledgment of Taiwan as an independent country in the GAC
(Mackinnon, 2009), an agreement was reached in 2000 after ICANN also
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
agreed to refer to the island as “Chinese Taipei” (ibid.). The second reason
involved a case where a Virginia court ordered the Chinese company Maya
to relinquish ownership of the CNNnews.com after a domain name squat-
ting complaint from CNN, even though Maya had legally acquired it from
a China-based domain name registrar. In response, China suspended official
delegations to GAC meetings from 2001 to 2009. However, this decision
did not compromise other engagements of Chinese individuals and Internet
operators (Shen 2016). Qian Hualin, deputy director of the China Internet
Network Information Center (CNNIC), China’s domain registry, served as
ICANN Board of Director from 2003 to 2006. Moreover, an ICANN meeting
took place in in Shanghai in 2002 with full support of the Internet Society of
China and CNNIC. It is interesting to note that although China government
officials did not take part to GAC activities, China played an active role
through the engagement to ICANN activities through the Internet Society
of China, one of its most representative nongovernmental organisations
with more of four hundred members in the field of industry and academia.
Even more interesting, this support took place at the same moment ICANN
formalised the creation of a Support Organisation to represent country code
interests in ICANN replacing the Domain Name Supporting Organisation
(DNSO)2 (ICANN, 2002). Due to these circumstances, it is possible to argue
that the Chinese engagement with ICANN remained ambiguous.
In 2009, China resumed participation in the GAC, while ICANN imple-
mented two important measures. The first measure was to reform the domain
space by allowing any established entity located everywhere in the world to
operate a new TLD registry (Zhu, 2012). This operation opened de facto the
domain name market with a global bid for the creation and management of
new general top-level domains (gTLDs) (Arsene, 2015) leading to an expan-
sion for the market and a reshuffle of the registrar and registry industry.
Chinese institutions such as MIIT and CNNIC supported Chinese companies
to occupy the new domain landscape limiting the entrance of foreign registries
such as Verisign and Neustar and transnational registrars such as GoDaddy
and Tucows. The Chinese rush to occupy a reformed domain market can be
justified not only by a protectionist move by the Chinese institutions but
also by the spending power of Chinese registrars and registries. Obviously,
this phenomenon was beneficial to ICANN. This historical change reveals a
contradiction in the Chinese Internet governance strategy. On the one hand,
Chinese officials during the two WSIS phases, lamented the unilateral US
management (ICANN in particular) in the field of Internet resources; on
the other hand, with huge and fast investments into the new domain names
market China privileged the private interests of its registrars and registries
supporting the ICANN market driven approach. The economic impact of this
first measure was clear in 2016, that year China covered 54 percent of global
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
domain names with new gTLD extensions, with an increase of 400 percent
between 2013 and 2015 (CNBC, 2016).
The second measure was that ICANN created “internationalised” TLDs in
non-Roman letter scripts. This new scenario opened a new market for Internet
addresses, amongst others in Chinese characters, with significant economic
potential.
It also should be noted that, even before the IANA transition, China
strengthened its cooperation with ICANN. In 2013, the 46th ICANN meet-
ing took place in Beijing, then the most-attended event in terms in ICANN’s
history. At that occasion, the GAC issued the Beijing Communiqué, a docu-
ment outlining a series of “safeguards” on top-level domains and suggesting
“a public requirement” for the approval of new “exclusive registry access”
gTLDs (ICANN, GAC, 2013). Also, in the same occasion, ICANN opened its
first Engagement Centre in Beijing in order to strengthen collaboration with
Chinese authorities (ICANN, 2013). Interestingly, the announcement was
made by Hu Qiheng, the Chinese scholar who during a WGIG event in 2004
had criticised ICANN for its lack of transparency and attention to the Global
South. Subsequently, the MIIT’s China Academy of Telecommunications
Research concluded a Memorandum of Understanding in 2014, on expanding
communication between ICANN and Chinese institutions (ICANN, 2014).
Even so, it remains difficult to quantify China’s presence in ICANN. At
the present stage, Chinese actors not only participate in ICANN initiatives
but also rhetorically support its role. For instance, Nanni notes how despite
a low profile during the stewardship IANA transition, China expressed pub-
lic support to ICANN and multistakeholder model. An interesting case is
provided at ICANN50 by Lu Wei, at that time Ministry for cyberspace. That
event took place in London in 2014 and can be considered one of the start-
ing points of the IANA stewardship transition (Nanni, 2021). After the IANA
stewardship transition, the discussion became more articulated at least at the
academic level. It is possible to find both scholars who suggest an alterna-
tive path of global Internet governance in which China create new areas and
platform to develop its global internet governance vision (Li & Zeng, 2019)
and other academics who suggest a more direct engagement of China into
ICANN activities (Lin & Ren, 2017). From an institutional perspective, it is
worth noting that, right after the transition, Guo Feng, China’s governmental
representative, was appointed vice chair of ICANN’s GAC.
Reviewing China’s participation at ICANN’s activities, Lin and Ren two
Tsinghua scholars who publish their commentaries also on CCP news portal
diagnose a lack of consistent strategy, poor organisation and fragmented
participation. Their study suggests that first, ICANN governance is based on
bottom-up process, so its decision making process differs from UN organisa-
tions like ITU. China has not accepted this difference. Second, both before
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
and after the break in ICANN GAC relations, China has always participated
passively, and Chinese technical contribution has always been very limited.
Third, the above mentioned withdrawal from GAC from 2001 to 2009 had a
very negative effect in the global discussion on Internet governance (Lin &
Ren, 2017).
The IANA transition presented an important step to develop a new Chinese
approach on Internet governance. Indeed, the two Chinese scholars suggest
moving away from a vision juxtaposing the multistakeholder versus multilat-
eral model, as these two models are not necessarily in conflict. This requires
the Chinese government to play a role in the background, leaving more space
to technicians, engineers, scholars and think thanks. Furthermore, the transi-
tion opens space to replicate the same pattern of Chinese participation in
the ITU that is increasing the engagement in terms proposals addressed by
delegates and technicians. To enhance China’s role in ICANN, they advo-
cate a more active Chinese presence at ICANN activities as well as a more
defined and leading role in the ICANN governance through the organisation
of ICANN sponsored meetings. This process requires the creation of a com-
petitive national network of technicians and engineers serving to increase
Chinese influence on the global internet discussion through to the develop-
ment of new theories, initiatives, and actions. They maintain an optimistic
view on the overall role ICANN, which will become an increasingly inclusive
and open organisation (jiang chengwei yige yue lai yue kaifang baorong de
guoji zuzhi). Despite the two scholars’ optimism, there are no concrete evi-
dences and suggestions on how Chinese new theories, initiatives, and actions
will be implemented.
Declaration” presented at the first edition effectively was a draft joint state-
ment supporting the idea that every nation has its own right to develop, use
and govern the Internet as it sees fit. The document was criticised in circles
such as the Internet Governance Forum Members Advisory Group (Aizu
2014) not only because of its content but also because it was slid under the
doors of attendees’ hotel doors the last night before the closing ceremony.
At the second World Internet Conference, Xi Jinping presented once again,
his vision of “cyber sovereignty” according to which the global Internet
governance should “respect the right of individual countries to independently
choose their own path of cyber development, model of cyber regulation, and
internet public policies, and participate in international cyberspace gover-
nance on equal footing.”
Furthermore, the World Internet conference was an important occasion to
present to an international audience a new Chinese international governance
theory based on Five Propositions (wu dian zhuzhang) (respect for cyber
sovereignty, maintenance of peace and security, promotion of opens and
cooperation, cultivation of good order) to create a cyberspace of shared des-
tiny through the advancement of Four Principles (si xiang yuanze) (speed up
the building of global Internet infrastructure and promote inter-connectivity;
build an online platform for cultural exchange and mutual learning, promote
innovative development of cyber economy for common prosperity, maintain
cyber security and promote orderly development).
The role of the World Internet Conference was to challenge the status
quo of the global Internet governance, and to propose a Chinese-led alter-
native to many countries. The organisers claimed that in 2015, “the World
Internet Conference became truly global” through the engagement over of
two thousand delegates form 120 countries and 20 international organisa-
tions (Thussu, 2018). Furthermore, compared to the “Wuzhen declaration,”
the “Wuzhen Initiative 2015,” the official document published at this second
World Internet Conference, supported a more inclusive and cosmopolitan
approach to justify the Chinese vision on cyber sovereignty. Indeed, accord-
ing to Shi, the second edition of the World Internet Conference expresses a
vision that softens the nationalistic approach of China’s advocacy on cyber
sovereignty, whereas it highlights new keywords and expression such as the
call to build “a community of common destiny, a concept that intertwines
the classical Chinese philosophy of Tianxia (all under Heaven) with the
Euro-American concept of cosmopolitanism” (Shi, 2017). If the “Wuzhen
declaration” mainly reflects the need to defend cyber security and intellec-
tual property, the “Wuzhen Initiative” at least from a narrative point of view,
invests on the idea of co-governance, which can be considered a basic feature
of the community of common destiny. In 2015 the Chinese government also
issued a white paper introducing the idea of the “Information Silk Road,” a
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
strategy framed within the Belt and Road Initiative (BRI), aimed at creating
synergies with BRI countries on emerging technologies for development
and trade (Shen 2018; Bora 2020). The “Information Silk Road” was further
elaborated into the concept of “Digital Silk Road” during the fourth World
Internet Conference in 2017. A document published at this conference was
co-signed by BRI partners like Laos, Egypt, Turkey, Thailand, Saudi Arabia,
and Serbia outlining specific components focused on the improvement of
broadband access, the promotion of digital technologies, the development
of e-commerce capabilities and the promotion of international standards.
Although some studies argue that the formalisation of these initiatives was
below Beijing exceptions (Triolo et al. 2020), the World Internet Conference
had a leading role in promoting Chinese global ambitions aimed at mitigating
industrial overcapacity, facilitating corporate China’s global expansion, con-
structing a China-cantered transnational network infrastructure, and promot-
ing an Internet-enabled “inclusive globalisation” (Shen 2018). These goals
have not been achieved yet also because of COVD-19, US-China trade war.
The WIC has also sought to attract high-profile participants. Previous
ICANN CEO Fadi Chehadé became co-chair of the event’s oversight com-
mittee in 2016. In 2017, Apple made its first appearance at the conference
as its CEO Tim Cook gave a keynote speech. A Qualcomm senior officer
hold a speech on the future of 5G standards and Artificial Intelligence. Even
Bob Kahn, who is considered one of the fathers of the Transmission Control
Protocol (TCP) and Internet Protocol (IP), delivered a speech at the event.
The appointment of Mr. Chehadé, as well as the engagement with US pri-
vate corporations, can be interpreted as an effort to improve the reputation
of the event at the international level but also as an attempt to facilitate the
discussion with Western agents in the field of global Internet governance.
This effort is further illustrated by more recent appearance of ITU delegates
at the World Internet Conference. In 2017 ICANN delegate Sally Costerton
considered an opportunity “to interact with different stakeholder groups to
raise awareness of ICANN and multistakeholder model” (Costerton 2017).
In 2019, Malcolm Johnson, ITU Deputy Secretary, delivered a speech in
which he clarified that ITU counted on China as a major partner, reiterating
its gratitude to the Chinese government for its strong support to ITU (ITU
2019). At the present stage, there is not empirical evidence about concrete
changes in the global Internet governance caused by the past editions of
the World Internet Conferences. However, it still important to note how the
international engagement has been growing at least until the fifth edition of
the event. Indeed, in 2018 the conference registered the direct engagement
of five international organisations such as the United Nations Department
of Economic and Social Affairs, the ITU and the World Intellectual Property
Organisation. Beside the political dimension, it also should be noted that that
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
from the fifth edition, the World Internet Conference host collateral events
addressed to the private sector. This is the case of “The light of the Internet
Expo” an international event hosted in Wuzhen during the World Internet
Conference, joined by more than eighty enterprises and aimed at facilitating
the exchange between Internet companies. Also in this case, although these
initiatives do not concretely impact the development of Internet governance
neither in the narrow or broader sense, they are still useful to see how China
has increased its confidence at the international level also in the field of the
Internet and its willingness to actively influence its future trends.
It remains to be seen whether the World Internet Conference will maintain
its global ambition and attractiveness at the international level. Even before
the US-China trade and the COVID-19 pandemic, the conference experi-
enced a decrease in terms of attendees, especially from America’s biggest
tech companies (Lahiri 2018). That said, the World Internet Conference can
still be seen as a Chinese attempt to propose an alternative platform aimed
at presenting its vision of Internet governance raising its discursive power
in this specific domain (xianshi chu zhongguo zai hulianwang lingyu huayu
quan de tigao) (Li and Zeng 2019).
CONCLUSION
This chapter presented three different arenas in which China engages with
global Internet governance discussions: ITU, ICANN, and the World Internet
Conference. ITU is still the international organisation that most reflects
China’s preferred views, based on the concept of cyber-sovereignty and the
role of the state. It this sense, it should not be surprising the fact that, at the
time of writing, China’s presence at ITU is relevant. Indeed, beside the presi-
dency of Mr. Zhao as secretary general, two study group of the ITU-T are
chaired by Chinese delegates.
However, ICANN is still one of the most important international organisa-
tions with a higher impact of the global Internet governance. This chapter
shows how China changed its relations moving from a lack of official of com-
munications, refuting to send its delegation to join GAC meetings to develop
new forms of cooperation like the establishment of the first Engagement
Centre in Beijing aimed at facilitating the collaboration Chinese authorities
in 2013 but also expressions of public support to ICANN and the multistake-
holder model like it happened during ICANN50 in London. This shift is
important because it is now possible to argue that China has largely accepted
the role of ICANN, suggesting its vision on global Internet governance is
more complex than the simple notion of interstate multilateralism.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Finally, this chapter argues that to further promote its own vision, China
created the World Internet Conference as a new platform for discussion that,
in eight years, shifted its approach from the promotion of a defined vision
on cyber sovereignty to the support of a more inclusive and less normative
approach. Indeed, after the case of the “Wuzhen declaration,” most of the
topics discussed in the last editions of the annual World Internet Conference
emphasise keywords such as “mutual trust” and “collective governance,”
more in line with the current multi stakeholder model and, at least apparently,
in contrast with the “cyber sovereign” (Shi 2017). That said, we still need
time and empirical evidence to understand to what extent this attitude will be
concrete and sincere.
These three arenas and their relations with China remain uncertain espe-
cially after the US–China trade war and the COVID-19 pandemic. Coming
to the ICANN case, this article shows how the debate on the China’s role is
polarised: if, on the one hand, two influential Chinese scholars on ICANN
and close to the CCP’s line suggest a more active role, others support the idea
of an alternative platform as the World Internet Conference, which, however,
witnessed a decrease of engagement from US companies in the last few years
because of COVID-19 and US–China trade war. All in all, although China
raised its voice, presence, and activities in the global discussion, it still has
not changed the status quo of the global Internet governance. In the coming
years it will be crucial to see further developments of the Chinese presence
within ITU, its contributions in the field of new standards recommendations
as well as its role in influencing different working and study groups. This
new stage will not see the engagement of Mr. Zhao Houlin who ended its
second mandated in September 2022. At the same time, it will be interesting
to note how ICANN–China relationships will develop both in China and at
the international level and whether China will maintain its positive attitude
on multistakeholder model. Finally, the new editions of the World Internet
Conferences will tell us whether its role will remain focused on a discursive
domain or whether (and eventually how) it will gain a real and concrete
power in the global Internet governance process.
NOTES
REFERENCES
Hu, Qiheng. (2004) Speech on the Consultation Meeting on the Establishment of the
UN Working Group on Internet Governance,” Geneva, 23–25 November.
Hughes, C. R., and Ermert, M. (2003). What’s in a name?: China and the domain
name system.
黄旭 (Huang, Xu). (2016). 我国参与全球互联网治理组织的过程和动力分
析——以互联网工程任务组为例. 湖南科技大学学报: 社会科学版 19(5),
128–33.
ICANN & DoC. (1998). Memorandum of understanding between the US Department
of Commerce and Internet corporation for assigned names and numbers. http://
www.icann.org/en/general/icann-mou-25nov98.htm.
ICANN (2002). DNSO Structure https://archive.icann.org/en/dnso/dnso.htm
ICANN46 (2013) ICANN Engagement Center to Open in Beijing https://www.icann
.org/resources/press-material/release-2013-04-08-en.
ICANN, GAC. (2013). ICANN46 Beijing Communique. https://gac.icann.org/content-
Migrated/icann46-beijing-communique.
ICANN. (2014, June 23). LONDON—Welcome ceremony and president’s opening.
Retrieved from https://archive.icann.org/meetings/london2014/en/schedule/mon
-welcome/transcript-welcome-23jun14-en.pdf.
IGF. (2012). Main Sessions 2012 | Internet Governance Forum. https://www.intgov-
forum.org/multilingual/content/main-sessions-2012.
ITU (n/a). ITU of ITU-T Sector Members https://www.itu.int/online/mm/scripts/
gensel11?_sect=T.
ITU. (s.d.). Sixth Wuzhen World Internet Conference—Opening. ITU. Retrieved on
27 June 2022 from https://www.itu.int:443/en/osg/dsg/speeches/Pages/2019-10-20
.aspx.
ITU (2019). Opening Speech by Malcom Johnson, ITU Deputy Secretary General, 29
October https://www.itu.int/en/osg/dsg/speeches/Pages/2019-10-20.aspx.
Kleinwacher, W. (2004). Beyond ICANN Vs ITU? How WSIS tries to enter the new
territory of Internet governance. Gazette (Leiden, Netherlands) 66(3–4), 233–51.
Klimburg, A. (2013). The Internet Yalta. Center for a New American Security.
American Society, 2. Retrieved from https://www.cnas.org/publications/reports/the
-internet-yalta.
Lahiri, T. (2018). Silicon Valley is less visible at China’s Wuzhen internet conference
this year—Quartz. https://qz.com/1455436/silicon-valley-is-less-visible-at-chinas
-wuzhen-internet-conference-this-year.
Li Yan (李彦) & Zeng Runxi (曾润喜). (2019). 中国参与国际互联网治理制度建构
的路径比较. 当代传播 5.
Lin Han (刘晗) & Ren Qiming (任启明). (2017). 简析如何在 ICANN 新机制下维
护我国网络主权. 中国信息安全 5, 43–5.
Lindsay, J. R., Cheung, T. M., and Reveron, D. S. (2015). China and cybersecu-
rity: Espionage, strategy, and politics in the digital domain. New York: Oxford
University Press.
Mathiason, J. (2009). Internet governance: The new frontier of global institutions.
London: Routledge.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
MacKinnon, R. (s.d.). China @ ICANN: Thoughts from former CEO Paul Twomey.
RConversation. Recuperato 27 giugno 2022, da https://rconversation.blogs.com/
rconversation/2009/07/china-icann-thoughts-from-former-ceo-paul-twomey.html.
Mueller, M. L. (2011). China and global Internet governance: A tiger by the tail.
Access contested: Security, identity, and resistance in Asian cyberspace, 177–94.
Nanni, R. (2021). The ‘China’question in mobile Internet standard-making: Insights
from expert interviews. Telecommunications Policy 45(6), 102151.
Negro, G. (2020). A history of Chinese global Internet governance and its relations
with ITU and ICANN. Chinese Journal of Communication 13(1), 104–21.
Negro, G. (2022). China’s Perspective on Internet Governance: a more Integrated
Role in the Global Discussion? Journal of Chinese Political Science, 1–21.
O’Connor, J. (2014, August 23). The battle for soft power: America’s digital cold
war with China. Huffington Post. Retrieved from https://www.huffingtonpost.com
/justinoaconnor/america-china-digital-war_b_5523110.html.
PRC State Council. (2015). Initiative offers road map for peace, prosperity. http://
english.www.gov.cn/archive/publications/2015/03/30/content_281475080249035
.htm.
Scribd. (s.d.). World Internet Conference Draft Declaration | PDF. Recuperato
27 giugno 2022, da https://it.scribd.com/document/247566581/World-Internet
-Conference-Draft-Declaration.
Sha, Zukang (2003). “Statement by Head of the Chinese Delegation” WSIS
PreConference 1, Geneva, 1–5.
Shen, Hong. (2016). China and global internet governance: Toward an alternative
analytical framework. Chinese Journal of Communication 9(3), 304–24.
Shen, Hong. (2018). Building a digital silk road? Situating the internet in China’s belt
and road initiative. International Journal of Communication 12, 19.
Shi, Anbin. (2017). China’s role in remapping global communication. In China’s
media go global. Routledge, 34–51.
Suttmeier, R. P., Yao, X., and Tan, A. Z. (2009). Standards of power? Technology,
institutions, and politics in the development of China’s national standards strategy.
Geopolitics, History, and International Relations 1(1), 46–84.
Thussu, D. (2018). A new global communication order for a multipolar world.
Communication Research and Practice 4(1), 52–66.
Triolo, P., Allison, K., Brown, C., and Broderick, K. (2020). The Digital Silk Road:
Expanding China’s Digital Footprint. Eurasia Group 8.
WSIS (World Summit on the Information Society). (2005). Tunis agenda for the
information society, WSIS-05/TUNIS/DOC/6(Rev. 1)-E, 18 November 2005.
Xinhua. (2017). Full Text: International Strategy of Cooperation on Cyberspace—
Xinhua | English.news.cn. 3 January, http://www.xinhuanet.com//english/china
/2017-03/01/c_136094371_2.htm.
Yan, Li. (2015). Reforming Internet Governance and the Role of China. Focus Asia
(12).
Zhang, Qiang. (2019). China’s Internet Governance: A New Conceptualization of the
Cyber-Sovereignty Model.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 8
Mei Danowski
Over the past thirty years, China’s information and communications technol-
ogy (ICT) sector has seen explosive growth. China has become the world’s
largest ICT exporter since 2004 (Ning Lutao 2009). The ICT sector is also
the largest manufacturing sector within the Chinese economy, representing
55 percent China’s GDP in 2021(China—Technology and ICT 2022). As
China’s ICT sector grows, so has China’s investment and focus on cyber-
security. The three-year (2021–2023) cybersecurity industry development
plan, published in July 2021 by China’s Ministry of Industry and Information
Technology (MIIT), aimed to grow the industry to $39 billion by 2023, over
15 percent compound annual growth rate (Xiong Xinyi Zhang Hongpei
2021). China’s pursuit of offensive cyber capability parallels the development
of the country’s ICT. Both developments are part of China’s goal of becom-
ing a “cyber superpower (wangluo qiangguo),” which China defines as being
on a par with the United States in cyberspace (Kania, Sacks, Webster, and
Triolo 2017).
There are many definitions of offensive cyber capabilities. This paper
defines a nation state’s offensive cyber as the capability of breaching an
adversary’s computer systems to carry out disruptive, destructive, or psycho-
logical effects in cyberspace to achieve strategic goals (Moor, 2022; Austin,
Tay, and Sharma 2022; Smeets and Lin 2018; JP3-12 2018; Zetter 2022). This
definition can include surveillance carried out to facilitate military action but,
for the purpose of this paper, does not include purely cyber espionage that
171
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
172 M
ei Danowski
The three types of cyber warfare forces display a clear picture of the dif-
ferent roles that military, government, industry, and hacker communities play
in China’s cyber warfare capabilities.
Figure 8.1. In the Chinese context, China building its offensive capability is part of its
cyber warfare capability under the umbrella of information warfare.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
174 M
ei Danowski
was purely theoretical. Chinese Army Major Shen Weiguang published “The
Rise of Information Warfare” in the People’s Liberation Army (PLA) Daily
on April 17, 1987, and published the book Information Warfare (xinxi zhan)
in 1990. The book claimed the dawn of the information era would inevitably
lead to information warfare. Unlike conventional conflicts, such a war would
be waged on the battlefields of information network systems, using informa-
tion weapons that can both destroy enemy information systems and influence
the psychology of the adversary’s population. The book calls for utilising
information technology to complement military weaponry and equipment and
for “occupying the high ground” in the battlefield of the information war (Li
Qingshan 2002; Krekel, Adams, and Bakos 2012).
Events around the turn of the millennium convinced Chinese leadership
of the need to develop information warfare capabilities they could control.
In 1996, internet access became officially available to the public in China
(Evolution of Internet in China 2001). Shortly after that, from 1999 to the
early 2000s, during times of geopolitical tension, Chinese patriotic hackers
waged what they termed a “cyberwar” against official websites in the United
States, Japan, and Taiwan with disruptive denial-of-service (DoS) attacks or
rudimentary website defacements (Aljazeera 2022). These state-encouraged
patriotic hackers carried out their own form of offensive cyber operations
to defend China against a perceived “attack.” For example, in April 2001, a
Chinese PLA Navy fighter jet pilot died in a mid-air collision with a US spy
plane (CNN 2001). The infamous Honker Union hacker group led disruptive
cyberattacks targeting hundreds of US websites, including those of the White
House and California Department of Justice (Harris 2001). Interestingly, the
Chinese government sometimes distanced itself from these hacktivists, claim-
ing to disapprove of their operations. The People’s Daily, China’s Communist
Party (CCP) newspaper, called these activities “web terrorism” and “unfor-
givable” (Smith, C. S. 2001). This is likely because the government wanted
to have more state-controlled offensive capabilities. Since this was the first
time the government denounced patriotic hackers openly, it likely wanted to
portray the patriotic hackers as having gone out of control and to deny any
government encouragement. The government remained silent on activities
conducted by patriotic hackers previously, such as when they tried to “take
down North Atlantic Treaty Organisation (NATO) networks” after NATO
bombed the Chinese Embassy in Belgrade in 1999 (Wired 1999). The leader
of the Honker Union claimed they had “achieved” their goal and called for an
end (Smith, C. S. 2001). Hacktivism activities in China gradually died down
after 2002. Though it reined in the patriotic hackers, the Chinese govern-
ment seemed to realise the importance of offensive cyber capability, judging
from subsequent government policy statements and actions. From then on,
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Figure 8.2. The timeline of China building offensive cyber capability suggests doctrine
and strategy development and force capability development have been parallel over past
three decades while China putting its capability into practice happened more recently
over last six years.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
176 M
ei Danowski
178 M
ei Danowski
China leapt into the internet era in the early 2000s when many Chinese tech-
nology companies sprang up. As described above, although the Chinese gov-
ernment initially denounced the actions of early patriotic hackers as “overly
enthusiastic,” these same hackers later became part of the establishment
after their started companies as entrepreneurs (Tencent Security Labs 2017).
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
180 M
ei Danowski
building China’s cyber combat forces because they are extremely capable
forces, as in the example of Chengdu 404, below.
The authors of the 2013 Science of Military Strategy noted that cyber war-
fare has a “broad mass base (qunzhong jichu),” likely referring to the earlier
patriotic hacker activities. However, they stated it is impossible to achieve
the traditional Communist Chinese military strategy of “all people are sol-
diers (quan min jie bing)” in cyberspace. This is because network offensive
and defensive operations require specialised practitioners who are extremely
capable. The category of “civilian forces” cited in the book likely refers to
the talents from cyber security companies which play an important role in
the military-civil fusion strategy and the development of cyber militia forces.
China’s rapid technological development pushed many cyber security
companies to recruit the best talent and promote innovation. Specialists
from these companies are part of those “extremely lean” groups of capable
practitioners that the Science of Military Strategy cites. These cyber secu-
rity companies are among those civilian forces that the government and the
military often mobilise to conduct network operations. As described more
fully below, Chengdu Silingsi (404) Network Technology Company is one
of these examples.
182 M
ei Danowski
Shortly after the September 2017 Internet Security Conference, China prohib-
ited Chinese security researchers from participating in international hacking
competitions in early 2018. This move made it easier for the Chinese govern-
ment to control and retain vulnerability information inside the country (Bing
2018). In November 2018, Chinese technology giants including Alibaba,
Tencent, and Baidu founded China’s own international hacking competition,
the Tianfu Cup (N 2018). In the 2018 Tianfu Cup, a team from 360Security,
a subsidiary of Qihoo360, won first place. The team discovered and success-
fully exploited zero-day vulnerabilities from Apple Safari, iPhone X, Google
Chrome, Microsoft Edge, Microsoft Office, and Oracle Virtual Box, since
then, the Tianfu Cup competition target list has focused on foreign products
(N 2018). At the 2021’s Tianfu Cup, teams continued to focus on popular
Western products such as Windows 10, Microsoft Exchange Server, Chrome,
VMware workstation, and iPhone 13 Pro. In the meantime, the Tianfu Cup
has drawn more attention from the Chinese government. In 2021 a cyber
security summit, held as part of the hacking competition, attracted partici-
pants in the security field from military, central and local governments, gov-
ernment research institutes, and the Ministry of Public Security (Xinhuanet
2021). The choice of foreign products for the competition list of the Tianfu
Cup encourages the discovery of vulnerabilities that Chinese strategists or
military cyber forces can exploit.
The Chinese government values vulnerabilities so highly that it requires
Chinese researchers do not divulge the vulnerabilities they discover until after
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
184 M
ei Danowski
China claims its national cyber security strategy is to maintain active defence,
defined as a combination of strategic defence and actively preparing for
offensive attacks (Xinhua News, Active Defense Strategy 2015). This dif-
fers from the approach of countries such as the United States and many
of its allies, which explicitly prescribes going beyond defence to develop
offensive cyber forces and cyber deterrence strategy (Lu Chuanying 2019).
At the 2021 World Internet Conference, also known as the Wuzhen Summit,
a global conference organised by the Cyberspace Administration of China,
Chinese President Xi Jinping presented China’s solution to “build a strong
digital security barrier” (shuzi anquan pinzhang) to ensure cyber security (He
Yin 2021). However, China’s Defence White Paper in 2019 also advocated
the building of cyberspace capabilities that are “consistent with China’s
international standing as a major cyber power,” thereby implying the neces-
sity of building offensive capabilities as well (Ding Yang 2019). China has
used offensive cyber resources in cyber espionage and, increasingly, in other
destructive operations.
The US government published alerts with lists of vulnerabilities used by
Chinese state-sponsored threat actors, often in particular combinations for
greater potency. One such alert from October 2020 listed twenty-four pub-
licly known vulnerabilities that Chinese state-sponsored threat actors had
exploited against various network and communication systems and devices
(National Security Agency Cybersecurity Advisory 2020). In June 2022,
the US government warned that Chinese actors were using well-known, but
inconsistently patched vulnerabilities to breach firewalls and other elements
of communications networks to gain a foothold throughout essential commu-
nications infrastructure (Cybersecurity Advisory 2022).
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
186 M
ei Danowski
WHAT’S NEXT?
188 M
ei Danowski
NOTES
REFERENCES
Armed Police Force. (2021, November 27). Retrieved from TengXun Wang: https://
new.qq.com/omn/20211127/20211127A04QOY00.html.
Aljazeera. (2022, April 7). Hacked: Inside the US-China Cyberwar. Retrieved from
Aljazeera: https://www.aljazeera.com/program/101-east/2022/4/7/hacked-inside
-the-us-china-cyber-war.
Allia Z-Park Joint Innovation Civil-Military Integration Equipment Industry Alliance.
(2021, December 17). Lianmeng yu Lvmeng Keji Qianshu Zhanlue Hezuo Xieyi
(The Alliance and NSFOCUS Signed a Strategic Cooperation Agreement).
Retrieved from Z-Park Joint Innovation Civil-Military Integration Equipment
Industry Alliance Enterprise Service Platform: https://web.archive.org/web
/20220608032032/http://39.105.31.242/union/lmnewsdetail?id=44.
Antiy. (2021, September 30). Youli Baozhang Gaofen Wuhao Weixing Fashe Renwu
Yuanman Chenggong Antian Shoudao Ganxiexin (Antiy received a letter of thanks
for the successful launch of the Gaofen-5 02 satellite mission). Retrieved from
ANTIY: https://archive.ph/s3a7M.
Austin, G., Tay, K., and Sharma, M. (2022, February 24). Great-Power Offensive
Cyber Campaigns: Experiments in Strategy. Retrieved from The International
Institute for Strategic Studies (IISS): https://www.iiss.org/blogs/research-paper
/2022/02/great-power-offensive-cyber-campaigns.
Beech, H. (2013, February 21). China’s Red Hackers: The Tale of One Patriotic
Cyberwarrior. Retrieved from Time: https://world.time.com/2013/02/21/chinas
-red-hackers-the-tale-of-one-patriotic-cyberwarrior.
Bing, C. (2018, March 8). China’s government is keeping its security researchers from
attending conferences. Retrieved from CyberScoop: https://www.cyberscoop.com/
pwn2own-chinese-researchers-360-technologies-trend-micro.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
BOSS. (2022, March 31). Chengdu 404 Hiring. Retrieved from BOSS: https://archive
.ph/dkuFu.
Brown, R., Ta, V., and Bienstock, D. (2022, March 8). Does This Look Infected? A
Summary of APT41 Targeting U.S. State Governments. Retrieved from Mandiant:
https://www.mandiant.com/resources/apt41-us-state-governments.
CAC. (2021, July 13). Gongye he Xinxihua bu Guojia Hulianwang Xinxi Bangongshi
Gonganbu Guanyu Yinfa Wangluo Chanping Anquan Loudong Guanli Guiding de
Tongzhi (MIIT, SIIO, and MPS Notice of Network Products Security Vulnerability
Management Regulations). Retrieved from Cyberspace Administration of China
(CAC): https://archive.ph/OywzR.
CCTV. (2017, July 30). Zhongguo Shoubu Heike Jilupai “Wo shi Heike” (China’s
First Hacker Documentary “I am a Hacker”). Retrieved from QQ Video: https://v
.qq.com/x/page/t0531ltq698.html.
China—Technology and ICT. (2022, August). Retrieved from Privacy Shield:
https://www.privacyshield.gov/article?id=China-Technology-and-ICT#:~:text=and
%20trade%20data.-,Overview,(IT)%20consulting%20firm%20IDC.
China Daily. (2014, September 1). Army needs ‘information warfare’ plan, declares
Xi. Retrieved from China Daily: https://archive.ph/0g4K0.
China National Radio. (2017, December 26). Wangluo Kongjian Anquan Junmin
Ronghe Chuangxin Zhongxin Zhengshi Chengli (Cyberspace Security Civil-Military
Fusion Innovation Center was Officially Established). Retrieved from CNR:
https://web.archive.org/web/20220606171951/http://china.cnr.cn/gdgg/20171226/
t20171226_524077343.shtml.
CNN. (2001, April 1). US aircraft collides with Chinese fighter forced to land.
Retrieved from CNN.com: https://web.archive.org/web/20081211063330/http://
archives.cnn.com/2001/US/04/01/us.china.plane.03.
Computer security Resource Center. (n.d.). Vulnerability. Retrieved from NIST: https:
//csrc.nist.gov/glossary/term/vulnerability.
Creemers, R., Triolo, P., and Webster, G. (2018, April 30). Translation: Xi Jinping’s
April 20 Speech at the National Cybersecurity and Informatization Work
Conference. Retrieved from New America Cybersecurity Initiative: https://www
.newamerica.org/cybersecurity-initiative/digichina/blog/translation-xi-jinpings
-april-20-speech-national-cybersecurity-and-informatization-work-conference.
Cybersecurity Advisory. (2022, June 7). NSA, CISA, and FBI Expose PRC
State-Sponsored Exploitation of Network Providers, Devices. Retrieved from
National Security Agency/Central Security Service: https://www.nsa.gov/Press
-Room/News-Highlights/Article/Article/3055748/nsa-cisa-and-fbi-expose-prc
-state-sponsored-exploitation-of-network-providers-d.
Defence Refence. (2016, 1 6). “Guang zhanzheng”: 30 nian hou de Zhanzheng xin
Xingtai (the “War of Light”: A new form of warfare 30 years later). Retrieved from
Xinhua Net: https://archive.ph/1GMXO.
Department of Justice (DOJ). (2014, May 19). U.S. Charges Five Chinese Military
Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization
for Commercial Advantage. Retrieved from United States Department of Justice:
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
190 M
ei Danowski
https://www.justice.gov/usao-wdpa/pr/us-charges-five-chinese-military-hackers
-cyber-espionage-against-us-corporations-and.
Department of Justice (DOJ). (2020, February 10). Chinese Military Personnel
Charged with Computer Fraud, Economic Espionage and Wire Fraud for Hacking
into Credit Reporting Agency Equifax. Retrieved from United States Department
of Justice: https://www.justice.gov/opa/pr/chinese-military-personnel-charged
-computer-fraud-economic-espionage-and-wire-fraud-hacking.
Department of Justice (DOJ). (2020, September 16). Seven International Cyber
Defendants, Including “Apt41” Actors, Charged in Connection with Computer
Intrusion Campaigns Against More Than 100 Victims Globally. Retrieved
from The United States Department of Justice: https://www.justice.gov/opa/pr/
seven-international-cyber-defendants-including-apt41-actors-charged-connection
-computer.
Department of Justice (DOJ). (2020, July 21). Two Chinese Hackers Working with
the Ministry of State Security Charged with Global Computer Intrusion Campaign
Targeting Intellectual Property and Confidential Business Information, Including
COVID-19 Research. Retrieved from the US Department of Justice: https://www
.justice.gov/opa/pr/two-chinese-hackers-working-ministry-state-security-charged
-global-computer-intrusion.
Ding Yang. (2019, July 24). Xin Shidai de Zhongguo Guofang Baipishi Quanwen
(Full text of the White Paper on China’s National Defence in the New Era).
Retrieved from Ministry of National Defence of the People’s Repubic of China:
https://archive.ph/ZaCtJ.
Evolution of Internet in China. (2001, January 1). Retrieved from China Education
and Research Network: https://web.archive.org/web/20120527120608/http://www
.edu.cn/introduction_1378/20060323/t20060323_4285.shtml.
Fraser, N., Plan, F., and O’Leary, J. (2019, August 7). APT41: A Dual Espionage and
Cyber Crime Operation. Retrieved from MANDIANT: https://www.mandiant.com
/resources/apt41-dual-espionage-and-cyber-crime-operation.
Greig, J. (2021, December 22). Chinese regulators suspend Alibaba Cloud over
failure to report Log4j vulnerability. Retrieved from ZDNET: https://www.zdnet
.com/article/log4j-chinese-regulators-suspend-alibaba-partnership-over-failure-to
-report-vulnerability.
Guo, L., Gu, C., and Wu, N. (2011, June 27). Zhuanjia tan Zhongguo Zujian Wangluo
Landui Yuanyin Zhizai Baozhang Wangluo Anquan (Experts talk about the reasons
for China to form a cyber blue team aimed at ensuring cyber security). Retrieved
from www.chinanews.com: https://archive.ph/pFc2c.
Harbin Institute of Technology Alumnni Association. (2020, September 29). Lv
Yueguang. Retrieved from Harbin Institute of Technology Alumnni Association:
https://archive.ph/HxcmX.
Harris, S. (2001, May 2). Chinese hackers declare war on US web sites. Retrieved
from Government Executive: https://www.govexec.com/technology/2001/05/chi-
nese-hackers-declare-war-on-us-web-sites/9062.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
He Yin. (2021, September 29). Bawo Jiyu Xieshou Goujian Wangluo Kongjian
Mingyun Gongtongti (Seize the Opportunity to Build a Community of Destiny in
Cyberspace Together). Retrieved from qstheory.cn: https://archive.ph/6kLKX.
Hillie, K. (2011, October 12). Chinese military mobilises cybermilitias. Retrieved
from Financial Times: https://www.ft.com/content/33dc83e4-c800-11e0-9501
-00144feabdc0.
Intelligence Warfare. (2022, January 20). Retrieved from Encyclopedia of China:
https://www.zgbk.com/ecph/words?SiteID=1&Name=情报战&Type=bkzyb&sub-
SourceType=000003000011000001.
Investigation Bureau. (2020, May 15). Guonei Zhongyao Qiye Zao Lesou Ruanti
Gongji Shijian Diaocha Shuoming (Investigation of Ransomware Attack on
Important Domestic Enterprises). Retrieved from Taiwan Ministry of Justice
Investigation Bureau: https://archive.ph/Vc5qw.
ISCCC. (n.d.). Jiedu Guoneiwai Wangluozhan Xingshi (Interpreting the Situation
of Domestic and Foreign Cyber Warfare). Retrieved from China Cybersecurity
Review Technology and Certification Center: https://www.isccc.gov.cn/xwdt/xwkx
/04/253384.shtml (https://archive.ph/bbmYI#selection-509.0-509.10).
JP3–12. (2018, June 8). Joint Publication JP 3–12, Cyberspace Operations.
USCYBERCOM. Retrieved from https://irp.fas.org/doddir/dod/jp3_12.pdf.
Kania, E., Sacks, S., Webster, G., and Triolo, P. (2017, September 25). China’s
Strategic Thinking on Building Power in Cyberspace. Retrieved from DigiChina
Stanford University: https://digichina.stanford.edu/work/chinas-strategic-thinking
-on-building-power-in-cyberspace.
Knwonsec. (n.d.). Milestones. Retrieved from Knownsec.com: https://web.archive
.org/web/20220617022132/https://www.knownsec.com/#/milestones.
Krekel, B., Adams, P., and Bakos, G. (2012). Occupying the Information High Groud:
Chinese capabilities for computer network operations and cyber espionage.
Washington DC: Northrop Grumman.
Li Guoqiang, C. W. (2006). Minbing Wangluozhan Fendui de Renwu Jianshe yu
Yunyong (Mission, Construction and Operation of Cyber Militia Force). National
Defence Magazine, 8.
Li Qingshan. (2002). Study of high technology war. In A. O. Sciences, Military
Science: Chinese Academic Canon in the 20th Century (168). Fuzhou: Fujuan
Education Publisher.
Lin Kongshi, H. J. (2016, August 30). Xi Jinping Shicha de Zhanlue Zhiyuan Budui
shi Yizhi Zenyang de Liliang (What Kind of Force Is the Strategic Support Force
that Xi Jinping Visited?). Retrieved from CCTV.COM: https://archive.ph/jmUKm.
Lu Chuanying. (2019, October 20). Goujian Wangluo Kongjian Mingyun Gongtongti
Youzhu yu Jiaqiang Guoji Wangluo Anquan Zhili (Building a Community of
Destiny in Cyberspace Helps Strengthen International Cybersecurity Governance).
Retrieved from Sohu.com: https://archive.ph/fAe3z.
Lyu, J. (2019, April 1). What Are China’s Cyber Capabilities and Intentions?
Retrieved from Carnegie Endowment for International Peace: https://carnegieen-
dowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions-pub
-78734.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
192 M
ei Danowski
Martin, R. (2011, May 27). China Insists Cyber Blue Team is Temporary, for Defence.
Retrieved from TechAsia: https://www.techinasia.com/china-cyber-blue-team.
Microsoft Defender Threat Intelligence. (2021, December 11). Guidance for pre-
venting, detecting, and hunting for exploitation of the Log4j 2 vulnerability.
Retrieved from Microsoft Security: https://www.microsoft.com/security/blog/2021
/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j
-2-exploitation/#NightSky.
Microsoft Threat Intelligence Center. (2021, March 2). HAFNIUM targeting
Exchange Servers with 0-day exploits. Retrieved from Microsoft Security:
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange
-servers.
Military Strategy Institute. (2013). Military Battle in Cyber Domain. In M. S. AMS,
The Science of Military Strategy (196). Beijing: Academy of Military Sciences.
Military Strategy Institute. (2013). The Science of Military Strategy. Beijing:
Academy of Military Sciences.
Moor, D. (2022). Offensive Cyber Operations: Understanding Intangible Warfare.
London: Hurst & Company.
N, B. (2018, November 20). Tianfu Cup 2018 PWN—Ethical Hackers Hacked Apple,
Adobe, Google, Microsoft, Oracle, VMware & Earned 1,000,000 USD. Retrieved
from GBHackers on Security: https://gbhackers.com/tianfu-cup-2018-pwn.
National Security Agency Cybersecurity Advisory. (2020, October). Chinese
State-Sponsored Actors Exploit Publicly Known Vulnerabilities. Retrieved from
media.defence.gov: https://media.defence.gov/2020/Oct/20/2002519884/-1/-1/0/
CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF.
Naval Technology. (2019, January 9). New Navy Cyber Warfare Development Group
Reserve Unit Opens. Retrieved from Naval Technology: www.naval-technology
.com/news/cyber-warfare-development-reserve.
Ning Lutao. (2009). China’s Rise in the World ICT Industry: Industrial Strategies and
the Catch-Up Development Model. New York: Routledge.
O’Neill, P. H. (2021, May 6). How China turned a prize-winning iPhone hack against
the Uyghurs. Retrieved from MIT Technology Review: https://www.technologyre-
view.com/2021/05/06/1024621/china-apple-spy-uyghur-hacker-tianfu.
Paganini, P. (2022, June 26). China-linked APT Bronze Starlight is deploying
post-intrusion ransomware families as a diversionary action to its cyber espionage
operations. Retrieved from Security Affairs: https://securityaffairs.co/wordpress
/132624/apt/bronze-starlight-deploy-ransomware.html.
Pan Ting. (2005, January 1). Duihua “Xinxi Zhan” (“Information Warfare” Dialogue).
Retrieved from Chinese Youth Daily: http://zqb.cyol.com/content/2005-01/22/con-
tent_1021198.htm.
People’s Daily. (2015, Decemeber 20). Tixi Zuozhan (System Operations). Retrieved
from Xinhuanet: http://news.xinhuanet.com/politics/2015-12/20/c_128548116
.htm.
QCC. (2022, July 29). Chengdu 404. Retrieved from Qcc.com: https://archive.ph/
cIQk4.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Qian Fengshui. (2004, July 22). Junshi Pinglun: Jiedu Xinxizhan, Wangluozhan,
Wangluo Zhongxinzhan (Military Commentary: Interpreting Information Warfare,
Cyber Warfare, and Network Centric Warfare). Retrieved from Sina Military: http:
//jczs.news.sina.com.cn/2004-07-22/2153212084.html.
Qianxin Innovation Teams. (n.d.). Retrieved from Qianxin: https://web.archive.org/
web/20220620000031/https://www.qianxin.com/threat/threatsafeinstitute?tid=56.
Qin An. (2019, January 22). Zhongguo Ying Ruhe Jiejian Meiguo Jingyan Dazao
‘Wangluo Minbing’ (Boost Cyber Militia Forces by Learning from the US
Experience). Retrieved from The Paper: http://m.thepaper.cn/yidian_promDetail
.jsp?contid=2882486&from=yidian.
Qiu Yue. (2016, 01 05). Zhuanjia Jiemi Zhanlue Zhiyuan Budui Shi Wojun Zai
Taikong deng Zhanchang Qude Jubu Youshi (Experts unveil strategic support
forces to enable our military to achieve local advantage in space and other battle-
fields). Retrieved from The Paper: https://www.thepaper.cn/newsDetail_forward
_1417087.
Red Team/Blue Team Approach. (n.d.). Retrieved from NIST Computer Security
Resource Center: https://csrc.nist.gov/glossary/term/red_team_blue_team
_approach.
Sharma, Y. (2018, October 29). Scholar hide military links from Western universities.
Retrieved from University World News: https://www.universityworldnews.com/
post-mobile.php?story=20181029193127483.
Sichuan Economic Daily. (2018, October 28). Doyinyushi de “Baimao Heike” Fang
Chengdu shi Silingsi Wangluo Keji Youxian Gongsi (The Hidden “White Hat
Hacker” Chengdu404 Network Technology Company). Retrieved from Read01:
https://archive.ph/qB8df.
Sina Photo News. (2017, September 12). Diwujie Hulianwang Anquan Dahui
Zhaokai Zhou Hongyi Ren shi Da Anquan Shidai Hexin (The 5th Internet Security
Conference, Zhou Hongyi: People is the Core of Great Security). Retrieved from
photo.sina.com.cn: https://archive.ph/PwKpN.
Smalley, S. (2022, August 10). China could be reviewing security bugs before tech
companies issue patches, DHS official says. Retrieved from CyberScoop: https://
www.cyberscoop.com/dhs-official-chinese-rules-exploit.
Smeets, M., and Lin, H. S. (2018). Offensive Cyber Capabilities: to What Ends.
In T. Minarik, R. Jakschis, and L. Lindstrom, 10th International Conference on
Cyber Conflict CyCon: Maximising Effects (55–72). Tallinn: NATO CCD COE
Publications.
Smith, C. (2001, May 13). May 6–12; The First World Hacker War. Retrieved from
the New York Times: https://www.nytimes.com/2001/05/13/weekinreview/may-6
-12-the-first-world-hacker-war.html.
Staff writer. (2020, May 17). Bureau names ransomware culprits. Retrieved from
Taipei Times: https://www.taipeitimes.com/News/taiwan/archives/2020/05/17
/2003736564.
Stokes, M. A., Lin, J., and Hsiao, L. R. (2011, November 11). The Chinese People’s
Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
194 M
ei Danowski
PART IV
Local Dynamics
197
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 9
Genia Kostka
In the battle for global tech dominance, China is rapidly surpassing its
Western competitors (Olsen, 2020).1 The country is quickly reaching global
leadership in many areas of science and technology, including facial recogni-
tion, certain fields of AI and e-mobility. In this chapter, I argue that the rise
is both fueled and constrained by the specific institutions of the party-state.
The ‘fuel’ is the party-state’s capacity and will to lead China up the value
chain thanks to massive investments. The ‘constraints’ have to do with the
downside of decentralised and fragmented authoritarianism.
This chapter begins by analysing China’s growing technological power by
juxtaposing national ambitions with local realities. Despite Beijing’s impres-
sive efforts to devise industrial policies for technology upgrading (Naughton
2021), there is a substantial high-tech policy implementation gap. The term
‘implementation gap’ refers here to differences between Beijing’s high-tech
ambitions and local policy outcomes. The reason for the gap may be that
many elements of Beijing’s tech agenda fall to local governments for deliv-
ery. As local governments’ pre-existing industrial structures, interests, and
capabilities differ widely, national plans and investment funds are often not
(or only partially) implemented, poorly executed, or significantly delayed.
The analysis further shows that China’s national technology policies and
plans have been implemented unevenly across regions. By focusing on three
provinces (i.e., Sichuan, Anhui, and Zhejiang), this analysis highlights how
different institutional structures have shaped the provinces’ technological
development trajectories. A historical comparison sheds light on the diverse
state–business relations in the high-tech industry: While Sichuan’s tech indus-
try has, to a large extent, been dictated by government and defence projects,
199
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
NATIONAL AMBITIONS
China has seen astonishing technological advances in the past few decades.
It has the largest 5G network and the most extensive optical fibre cable
network in the world, and it is producing self-driving cars. It is already lead-
ing in many AI technologies, including AI-based emotion recognition and
facial recognition technologies (Kharpal 2019). Two of the world’s largest
supercomputers—Tianhe-2 and Sunway TaihuLight—are also located in the
country (Abbany 2017). Rapid advances have also been made in high-speed
quantum computing. In 2016, China successfully launched its quantum sat-
ellite, Micius (or QUESS), the first in the world (Disha 2021). Researchers
at the University of Science and Technology of China in Hefei recently
announced a new quantum computing breakthrough that allegedly surpassed
Google’s achievements, making it the world’s leader in quantum technology
(Corbett and Singer 2022). On the Global Innovative Index, China climbed
from twenty-ninth place in 2015 to twelfth in 2021 (World Intellectual
Property Organisation 2022). These are impressive achievements, and there
is no question that China is becoming a leader in global science and technol-
ogy innovation.
However, China’s industrial technology capabilities should not be over-
stated, and for many digital technologies, China is still catching up. Particular
vulnerabilities are in the integrated circuit and basic software industries. In
1999, then Minister of Science and Technology Xu Guanhua famously said,
‘The Chinese ICT industry lacks a core (chips) and souls (basic software)’
(Zhongguo xinxi chanye ’que xin shao hun’) (Bu 2020). Since then, China
has invested massive sums in the semiconductor and software industries to
increase domestic capacity, but it still relies largely on imports for high-end
chips, which state media often describe as being ‘wedged by the neck’
(Ka bozi).
No matter how one assesses China’s technological capabilities, there is
general agreement that technological progress has been at the core of the
political agenda for a very long time. The period following the global finan-
cial crisis in 2009 was especially significant as policymakers shifted from
an indicative planning approach to new industrial policies in which the state
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
investments (Li 2021). A stated programme goal was to move Chinese inno-
vation power from ‘Made in China’ (Zhongguo zhizao) to ‘Created in China’
(Zhongguo chuangzao) (Huang 2016). In the first batch, twelve universities
were selected with strengths in critical technologies such as aerospace, AI,
quantum information science, marine technology, and life and health science.
The plan is to expand this to another twenty to thirty ‘Schools of Future
Technology’ in the future. Table 1 lists the twelve higher-education institu-
tions selected to implement the programme (Zhongguo Jiaoyu Zaixian 2021).
Table 9.1: Twelve Universities Selected for the School of Future Technology Programme
Higher-Education Institution Technologies
1 Peking University, Beijing Big Data and Biomedical Artificial Intelligence
Department: biomedical imaging, molecular
medical sciences, biomedical engineer-
ing, big data, and biomedical artificial
intelligence
2 Tsinghua University, Beijing Advanced chips, new materials, software,
AI, intelligent manufacturing, and national
security
3 Beihang University (BUAA), Aerospace/aviation
Beijing
4 Tianjin University (TJU), Tianjin
Smart/intelligent machines and systems, stor-
age science and engineering, smart city, etc.
5 Northeastern University (NEU), Control science and engineering, computer
Shenyang, Liaoning, in coop- science and technology, software engineer-
eration with Huawei ing, robotics
6 Harbin Institute of Technology AI, intelligent manufacturing, life and health
(HIT), Harbin sciences
7 Shanghai Jiao Tong University Energy and environment, health and medicine
(SJTU), Shanghai
8 Southeast University (SEU), Chip design, information materials, future
Nanjing communication, intelligent perception and
sensing (zhineng ganzhi 智能感知)
9 University of Science and Quantum technology
Technology of China (USTC),
Hefei, Anhui
10 Huazhong University of Science Advanced intelligent manufacturing, biomedi-
and Technology (HUST), cal imaging, photoelectron chips and sys-
Wuhan tem, AI
11 South China University of intelligent perception and sensing, big data,
Technology, Guangzhou AI+ technologies
12 Xi’an Jiaotong University AI, energy storage sciences and engineering,
(XJTU), Xi’an intelligent manufacturing, biomedical engi-
neering, smart city
Sources: Zou 2021; Li 2021; Zhongguo Jiaoyu Zaixian (eol.cn) 2021
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Despite all the planning and investment, turning these tech ambitions into
reality is a challenge. It is well known that in China’s highly decentralised
authoritarian structures (Landry 2008), local governments play a key role
in shaping implementation outcomes, which often results in the ‘selective’
implementation of national policy (Li and O’Brien 1999). Often it is the local
governments that have to create an attractive investment environment for
innovation and research. For instance, many local governments have created
special development zones and high-tech industrial parks, but not all of them
were successful in creating the necessary conditions for high-tech industrial
cluster growth (Kania and Laskai 2021). Many examples are known where
local governments simply picked the wrong tech companies as a ‘local cham-
pion’ or where they overinvested in certain industries (Segal 2018), resulting
in a duplication of efforts. In other words, Beijing strongly depends on pro-
vincial governments to support its tech agenda with the right means and tools.
The next section highlights how technological trajectories vary across
regions. At the provincial level, the trajectory of tech advancement is often
shaped by multiple pre-existing economic, social, and political factors. By
looking at local governments’ technical, financial, and political capacities to
push for tech leadership in their locally grown tech industries, the final sec-
tion will explain why national tech ambitions are often only partially imple-
mented at the local level.
Sichuan
Located in Western China, Sichuan province is home to many car manufac-
turing plants and major high-tech suppliers of critical car manufacturing com-
ponents, such as lithium batteries for Tesla and integrated circuit assembly for
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
foreign companies like Intel, Texas Instruments, and Onsemi. Sichuan is also
home to a large military and defence sector, with many research institutions
and factories for military-use aircraft, rockets, and components for nuclear
weapons headquartered there. Some of the high-tech products produced in
Sichuan are dual-use technologies, that is, they partly or fully originate in the
defence industry, which has made use of AI and other advanced technologies
(Chen 2022).
Sichuan showcases how a national security movement in the 1960s set
the stage for a strong linkage between a local defence industrial base and
a growing civilian, high-tech economy. The origin of Sichuan’s high-tech
industrial sector is often linked to China’s Western Development Strategy
(Xibu dakaifa) in 2001. However, this explanation gives insufficient credit to
industrial policies that can be traced back further—specifically, to the Mao
era. In the early 1960s, during the Cold War, Mao proposed a geo-military
industrial grand plan called the Third Front Movement (Sanxian jianshe),
which started in 1964 and targeted mountain regions in southwestern and
western parts of China for key military production. The isolated mountain
areas were chosen as they would be the hardest for foreign forces to invade.
As a result of Mao’s plan, large-scale investments were made in national
defence complexes in the remote and mountainous areas of Sichuan. The
new provincial military and defence sector included defence-related technol-
ogy research, the transport sector, and other basic supporting industries such
as manufacturing, mining, metal, and electricity supply. Table 2 provides
an overview of key sectors developed during the Third Front Movement
in Sichuan.
Although many Third Front plants went bankrupt after the 1980s because
of bad planning, hasty implementation, and the geographical inaccessibility
of supplies and markets, these areas retained a certain level of industrial infra-
structure into the era of reform and opening. In the early 1980s, many com-
panies and factories moved out of the mountainous areas to gain better access
to the market and reinvented themselves to produce civilian goods rather than
military supplies (Butterfield 1980). The purpose of this ‘defence conversion’
was to ‘pull the military into the process of national macro-economic adjust-
ment’ (Lee 2011: 3). By 1996, almost all former military sectors, including
the aviation and electronic industries, which formed industry clusters in
Sichuan, were producing more than 80 percent of their total output on civilian
products (Lee 2011: 4). Thus, the early industrial structures built during the
Third Front provided fertile ground to grow a local electronic manufacturing
sector in Sichuan province. In subsequent years, many of Sichuan’s military
firms diversified into the manufacturing sectors and even established joint
ventures with foreign firms.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Table 9.2: Industrial Sectors Developed During the Third Front Movement in Sichuan
Sector Location
Industrial manufacturing Chongqing*, Chengdu
Arms industry, including Chongqing* (production of conventional weapons
research institutions on such as rifles, tanks, trucks, and conventional
defence, midsize to large powered submarines), Chengdu, Mianyang,
enterprises specialising in the Guangyuan, Leshan, Xichang, Daxian (now
defence industry and civil– Dazhou)
military enterprises
Coal mining Dukou (now Panzhihua; Panzhihua Iron and Steel),
Guang’an Huaying (Lushuidong coal mine)
Petrochemical industry Nanchong
Metallurgical industry Dukou (Panzhihua), Daxian (Dazhou), Leshan,
E’mei, Zigong, Jiangyou
Hydropower stations Chengdu, Deyang, Gongzui, Zigong, Chongqing*
Machinery and electronic Chengdu, Deyang, Mianyang, Jiangyou, Guangyuan,
plants Leshan, Xichang, Zigong, Neijiang, Luzhou, Ya’an,
Fuling Dist. (Chongqing)*, Wanxian (Chongqing)*,
Guang’an Huaying
Aviation and aerospace industry Chengdu and satellite cities such as Deyang/
Guang’han (Civil Aviation Flight University of
China), Ya’an, Mianyang, Xichang and Daxian
(Dazhou)
Nuclear industry Mianyang (research, the Chinese Academy of
Engineering Physics), Yibin (components, Plant
812), Guangyuan (plutonium production com-
plex, Plant 821), Leshan
Textile industry Daxian (now Dazhou), Neijiang, Suining, Nanchong
* Although Chongqing is not counted as part of Sichuan in terms of the administrative level, it is listed here
due to its geographic proximity.
Source: Gu et al. (1999: 185), Xu and Xiao (2009), Jencks (1980) and the Federation of American Scientists
(FAS) (2010).
Sichuan’s repurposed industrial firms later provided the necessary basis for
today’s local high-tech sector to flourish. In the early 2000s, with maturing
electronic manufacturing capacity and skills, provincial policies started push-
ing for an upgrade from traditional mechanical manufacturing to a ‘digital
military industry/informatisation (jungong xinxihua)’ with a focus on reform-
ing the defence industry to adapt to information warfare, including digital
security systems, AI-equipment, and combat technologies (People’s Daily
Online 2004). Sichuan’s digital innovation industry has grown substantially,
and by 2022, the high-tech industry was contributing significantly to the local
GDP (Tian 2022).
The historical trajectory of Sichuan’s military and defence sector helps
to explain why Sichuan’s high-tech industry is spread out across the prov-
ince. Today, the high-tech industry clusters are not only concentrated in
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
the provincial capital city, Chengdu, but they are also spread around in the
Sichuan Basin (e.g., Chengdu, Miangyang, Meishan) as well as in mountain-
ous areas (e.g., Guangyuan, Yibin, Ya’an, Ganzi). Many of these remote pre-
fectures are less developed than larger urban cities in the province, but they
benefitted from industrial development during the Third Front Movement
(Chen 2011, 40). One leading prefecture in industrial and technological
development is Mianyang prefecture, which is frequently dubbed the ‘China
Science and Technology City.’ The prefecture is leading not only in high-tech
military technologies such as AI for hypersonic weapon design but also in the
commercial electronic and high-tech industries (Chen 2022).
When tracking local digital initiatives in Sichuan from 2015 to 2022
(Digital Index Database 2022), one also notices that prefecture-level digi-
tal initiatives are widely spread across the province.4 Of the 222 initiatives
tracked, in the Sichuan Basin, Mianyang prefecture topped the chart by
leading 28 local digital initiatives. Chengdu city (the provincial capital) and
Neijiang prefecture followed closely in second place with 27 digital initia-
tives. Mianyang, Chendu, and Neijiang are all prefectures that benefitted
from machinery and electronic plants during the Third Front Movement (see
Table 2). Guang’an prefecture is also home to many digital initiatives, likely
because it is in Chongqing’s spill-over zone. Overall, in Sichuan, the setup of
a military defence sector during the Mao period helps to explain the regional
layout and character of this province’s high-tech sector.
Zhejiang
The growth of the high-tech sector in Zhejiang has a very different origin
than Sichuan’s state-led development of the military complex. In this coastal
province, developments have been shaped by the active role of the private
sector and the relatively laissez-faire style of local governance. Today,
Zhejiang is home to some of the biggest tech companies and start-ups in
China. Hangzhou’s Alibaba is the province’s most famous tech firm, but other
prominent players include Hikvision, Dataqin, Geely, NetEase, and Kuaidi
Dache. In this region, the relationship between the provincial government and
local private tech entrepreneurs has historically been very cooperative. Early
on in their development, the provincial government became a major customer
of the bigger private tech companies and provided high-tech start-ups with
a certain level of freedom essential for private entrepreneurship to flourish
(Breslin 2012).
Historical path dependencies play a key role in explaining the growth
of Zhejiang’s high-tech industry and the close public–private cooperation.
Wenzhou, a prefecture in southeast Zhejiang, has long been famous as a
cradle of private micro-entrepreneurs. The prefecture also played a key role
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
in shaping the province’s economic path (Tsai 2002). During the early 1980s,
Wenzhou’s high population density and lack of arable land pushed local
government officials to promote private entrepreneurship instead of agricul-
ture. This was very risky at the time, as private entrepreneurship in the early
post-Mao period was still a political taboo and framed as the ‘tail end of capi-
talism.’ Zhejiang’s local governments allowed private enterprises to formally
register as public or collective enterprises, giving rise to so-called red-hat
(Hong maozi) enterprises. These red-hat private enterprises had better access
to capital and other favourable policies and, as a result, were able to grow
quickly in the 1980s and early 1990s (Tsai 2002). Terms such as ‘Zhejiang
business culture’ and the ‘Wenzhou (economic) model’ are still very widely
used in China to describe the active bottom-up business activities that origi-
nated in Zhejiang province.
The provincial legacy of strong local entrepreneurship and its freer market
environment eventually became a growth platform for the high-tech indus-
try. Here developments were based on win-win bargains between the state
and industry. Provincial leaders benefitted from a rapidly growing high-tech
industry, which helped them to meet their economic growth targets in the
cadre evaluation process. At the same time, the development of private tech
enterprises was helped by a nurturing environment largely free of big-data
technology regulation (Lv and Luo 2018). Zhejiang’s provincial government
also served as the main customer of tech enterprises to improve the provincial
e-government services. For instance, Zhejiang was one of the first provinces
to start a ‘Maximum one visit for administrative procedures’ digital proj-
ect to showcase more efficient e-government services (Gao and Tan 2020;
Kostka 2022).
Another example of close state–business cooperation is Zhejiang’s ‘City
Brain’ project. The project took shape in 2016 when Alibaba’s then Chief
Technology Officer Wang Jian proposed the concept to integrate differ-
ent Hangzhou city administrative services in order to solve urgent city
governance issues. Alibaba’s City Brain project began in Hangzhou and
has spread to cities throughout Zhejiang province (Chen 2021) and even
abroad (Szewcow and Andrews 2020). The cooperation with Alibaba helped
Zhejiang’s government to position itself as the frontrunner and provincial
role model for smart technologies for other provinces (14th Five-Year Plan
of Zhejiang). The success of City Brain helped to deepen the provincial
government’s cooperation with the high-tech sector, creating new forms of
mixed ownership and interdependence (Kostka 2022). In 2020, the govern-
ment initiated the Zhejiang City Brain Industry Alliance, a local ‘non-profit
organisation,’ (Zhejiang University Holding Group 2021) that comprises
331 members (as of May 2021) across the public sector, private sectors,
civil organisations, and research institutions to further promote and develop
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Zhejiang’s flagship programme City Brain (Zhong Tuo Bang 2021). In short,
for Zhejiang, the provincial hardship in the 1970s and ’80s provided fertile
ground for local private sector growth (Kostka 2012), which, in turn, eventu-
ally helped to produce high-tech entrepreneurs such as Jack Ma.
Zhejiang province’s capital, Hangzhou, played a key role in local digital
initiatives between 2015 and 2022 by offering positive spillovers to its neigh-
bouring prefectures. The prefectures with the highest number of digital initia-
tives include Jinhua (53), Shaoxing (52), Huzhou (43), and Hangzhou (42),
while Quzhou (16) and Taizhou (14) were significantly left behind.5 Jinhua
prefecture, the locality with the most digital initiatives, is home to dozens of
industrial parks and start-up incubators and has a unique development trajec-
tory. Jinhua’s local innovation and high-tech sector was strengthened in 2015,
when the Jinhua Peking University Science Park Branch was established with
the help of the Jinhua Municipal Party Committee Organisation Department
and Peking University (China Cultural Chamber of Commerce for the Private
Sector 2017). The park’s close cooperation with the prefecture’s Party
Committee Organisation Department and Peking University, in particular,
helped to recruit top local talents from within the government and outside
the park (China Cultural Chamber of Commerce for the Private Sector 2017).
Shaoxing and Huzhou prefectures are geographically close to Hangzhou and
benefit from positive spillover effects from Hangzhou. Alibaba’s headquar-
ters are in Hangzhou, and City Brain has been an important trademark for
the entire Zhejiang province. The ‘Hangzhou City Brain Experience’ was
repeatedly used as the benchmark for the whole province’s digital initiatives
work (Zhejiang Digital Economic Development Administration and Zhejiang
Governance Digitalisation Promotion Committee 2020). Prefectures with the
lowest number of initiatives are located farther away from Hangzhou and did
not benefit from positive spillovers.
Anhui
The agricultural province of Anhui in central China has a surprisingly large
and thriving high-tech industry. In 2017, Anhui set up a fund of US$1.6 bil-
lion to support construction of the world’s biggest quantum research facil-
ity (Shi-Kupfer and Ohlberg 2019, 32). The high-tech industry in Anhui is
heavily concentrated in and around the provincial capital, Hefei City. Hefei
is home to the Gaoxin industrial complex, which encompasses dozens of
high-tech industrial parks. One of them is China Speech Valley (Zhongguo
shenggu), which focuses on AI-powered voice recognition technologies
(Hefei STIP Co. Ltd 2022). Hefei’s high-tech start-ups and companies focus
on integrated circuits, biomedicine, and high-end medical equipment. Within
the Gaoxin industrial complex, the different industrial parks work closely
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Table 9.3: Anhui’s strategic emerging industries in the 14th Anhui provincial FYP.
District Strategic Emerging Industry Clusters Industry Sectors
Hefei New energy vehicles, biomedicine and Smart technology/electronic
high-end medical equipment, culture appliances, AI
and creative industry, and cyber security ICTs, Green food
Ma’anshan High-end computer numerical con-
trol machine tools, railway transport
equipment
Suzhou Cloud computing
Huainan Big data
Chizhou Semiconductors
Wuhu Robots, new energy vehicles, modern agri-
cultural machines, general aviation
Chuzhou Smart household electronic appliances
Bengbu Silicon-based new materials Six new materials: bronze-
Tongling Bronze-based new materials based, iron-based,
Anqing New materials for chemical engineering aluminium-based, mag-
Huaibei Aluminium-based metal materials, high- nesium-based, silicon-
end macromolecule material based, and bio-based
Huangshan Cultural tourism Digital culture and creative
industry
Bozhou Modern traditional Chinese medicine Life and health industry
Fuyang Modern medicine
Xuancheng Core basic assembly units and parts Units and parts pro-
(production) duction for machine
Lu’an High-end equipment assembly units and manufacturing
parts (production)
Source: Anhui Province 14th FYP (2021).
the leading prefectures in the south include Ma’anshan (18), Wuhu (14), and
Hefei (13), while many poorer prefectures were left behind. Hefei, the provin-
cial capital city, became the new focal point for Anhui’s tech industry thanks
to its industrial parks and the location of many research institutes. Ma’anshan
and Wuhu are located close to both Nanjing, the capital of the prosperous
Jiangsu province, and Hefei, the capital of Anhui. With more than thirty-three
digital initiatives, Bozhou is an interesting exception. It is in Northern Anhui
and economically in the middle among the sixteen prefecture-level cities of
Anhui (Zhang 2022), but the city’s economic development relies predomi-
nantly on a specific sector: traditional Chinese medicine. ‘Bozhou medicine’
is famous throughout China. The importance of the traditional Chinese
medicine industry in Bozhou gives its digital initiatives a distinct character:
the City Brain project in Bozhou, for example, was tasked with tracing and
controlling the quality of traditional Chinese medicine ingredients and moni-
toring online vendors, along with other general functions in the area of traffic
and pollution (Inspur 2022).
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
national governments, but these funding applications are often lengthy and
require sustained effort by local leadership over several years (Lo and Tang
2006; Kostka 2014).
The shortage of funding was also very clear in local governments’ efforts
to create a local semiconductor industry. Many of the projects described in
Table 5 failed due to insufficient financial capacities. The case of Nanjing
Tacoma is a vivid illustration of the local governments’ limited capacity to
support this costly sector. Taiwanese businessman Joseph Lee established the
semiconductor company Tacoma in Taiwan in 2003. He later moved part of
the business to China. In 2015, the Nanjing government invited Tacoma to
the Nanjing Economic and Technological Development Zone and Tacoma
signed a contract with the Israeli semiconductor giant Tower Semiconductor
to buy technology know-how and IP rights from Tower for US$60 mil-
lion. In 2016, Nanjing Tacoma Semiconductor Technology was officially
founded. This took place against the backdrop of the ‘chip rush’ created
by the publication of the 2014 Guidelines to Promote National Integrated
Circuit Industry Development issued by the central government. The local
government was said to have invested US$billion in Nanjing Tacoma (Zha
2016). Nanjing Tacoma was a comprehensive project that aimed to cover
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
the whole semiconductor production chain: the plan was to set up IC design
studios, R&D centres, facilities reproduction factories, assembly, testing, and
packaging factories, as well as the downstream daily applications product
centres. Nanjing Tacoma also promised to deliver a mass production capacity
of 8-inch chips in June 2018.
It all turned out to be a big disappointment. Following a government
investigation, Lee was found not to have invested any money in the project
and to have relied solely on local government funds. However, according to
Lee, the local government had promised him substantial support from China
Invest Century Shareholding Investment Group Limited (Li and Shi 2020,
11). The park also failed to provide a credential financing guarantee com-
pany for Tacoma to lend money. Ultimately, the funding was unsustainable
and far below the mark for semiconductor investments. On 19 April 2019,
Lee announced that Tacoma would cease production, and eventually, the
half-finished Nanjing Tacoma factory buildings were completely abandoned.
While the local government has tried to frame Tacoma’s failure as the result
of Lee’s non-investment, the lack of sustainable government investment in
the project is hard to ignore. As Tacoma’s case highlights, initial state invest-
ments may be huge, but sustaining funding is a major problem. Similarly,
other start-ups like Hongxin, Incoflex and Dehuai (another project started by
Joseph Lee) were regarded as ‘scams,’ but they all followed the same pattern
of starting as a high-profile project with large local government investments
and high hopes from the local governments, leading to failure. The national
strategic focus on semiconductor technology development developed by the
central government generated an uncontrollable and wasteful ‘chip rush’ in
the process of implementation at local levels.
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
the implementation of the City Brain projects at the local level, a lead project
manager noted that there are ‘way too many brains’ involved (Liu and Zhang
2020). A city can have an environmental protection brain, a traffic brain,
a medical care brain, and so forth—all on top of a city brain. The CEO of
Hangzhou H3C City Digital Brain Research Institute, Peng Yue explained, “It
might be due to the fact that many government bureaus build their own data
warehouses and all call them ‘brains’” (Liu and Zhang 2020). With responsi-
bilities spread across many fragmented bureaucracies, it can be cumbersome
to coordinate high-tech projects. For instance, it is often not possible for a
low-ranking bureaucratic office to access relevant data from another bureau
higher up the hierarchy. The same happens with bureaus at the same level.
Many data systems and platforms are often only for internal use and not open
to external users, even those within the government.
The implementation capacity of local departments in charge of complex
high-tech projects is further constrained by competing demands and heavy
workloads in implementing local agencies. High-tech projects also fall into
the realm of local Development and Reform Commissions (DRCs), which
are powerful but often take on too many tasks and are, therefore, sometimes
understaffed. In addition, many local DRC officials lack the digital expertise
to push or coordinate complex local high-tech projects. For a project to be
successful, it often requires the local leadership taking it on as a pet project;
only such high-priority initiatives can secure sufficient long-term start-up
funding. For instance, in Zhejiang, some local digital projects have succeeded
because local politicians kept pushing for them. In particular, the fast devel-
opment of the ‘Maximum one visit for administrative procedures’ digital
project would not have been successful without significant attention from
Party Secretary Yuan Jiajun (Yuan, 2021).
In summary, local leaders in charge of high-tech projects receive mixed
signals: they are asked to fully implement high-tech projects, but these
demands by upper-level governments are not always matched by a corre-
sponding increase in political power and financial resources. The following
quotation summarises the challenge quite well: ‘In a word, Big Data bureaus
are a paradise for innovators, but hell for those who follow prescribed rou-
tines. Work in Big Data bureaus can be summarised with the following key
words: endless tasks, limited budget compared with other departments, glory,
outstanding performance, bright future’ (Zhang, 2020).
CONCLUSION
This chapter argued that China’s technological rise is both fueled and
constrained by the specific institutions of the party-state. The ‘fuel’ is the
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
party-state’s capacity and will to lead China up the value chain thanks to
massive investments. China’s policymakers have shifted from an indicative
planning approach to new industrial policies in which the state plans to invest
unprecedented sums to leapfrog in technology—thereby helping Chinese tech
firms to advance rapidly in the global tech war.
The ‘constraints’ involve the downside of decentralised and fragmented
authoritarianism. As illustrated with the cases of Anhui, Sichuan, and
Zhejiang provinces, at the provincial level, the trajectory of technology indus-
trial growth differs across regions and is often shaped by multiple pre-existing
economic, social, and political factors. Furthermore, many national tech
ambitions are often only partially implemented at the local level due to local
governments’ insufficient technical, financial, and political capacities to push
for tech leadership in their locally grown tech industries. In particular, the
lack of long-term finances has been the main hurdle to the development of
viable high-tech industries at the local level.
NOTES
REFERENCES
Corbett, T. and Singer, P. 2022. China may have just taken the lead in the quantum
computing race. Defence One. 14 April. Available from: https://www.defenceone
.com/ideas/2022/04/china-may-have-just-taken-lead-quantum-computing-race
/365707/ [6 October 2022].
Deloitte. 2018. Supercharging the Smart City—Smarter people and better gover-
nance. Deloitte Perspective Volume VII. Deloitte. Available from: https://www2
.deloitte.com/cn/en/pages/about-deloitte/articles/deloitte-perspective-v7-chapter7
.html [6 June 2022].
Disha. 2021. Quantum Computing: Top Countries Participating in Quantum Race.
Global Tech Outlook. 16 August. Available from: https://www.globaltechout-
look.com/quantum-computing-top-countries-participating-in-quantum-race/ [20
October 2022].
Federation of American Scientists. 2010. Subtitled Clips of Chin”s Declassified
Underground Nuclear Facility in Chongqing. DNI Open Source Center. 23 April.
Available from: https://nuke.fas.org/guide/china/facility/chongqing.pdf [6 October
2022].
Feng, Emily. 2021. A cautionary tale for China’s ambitious chipmakers. NPR. 25
March. Available from: https://www.npr.org/2021/03/25/980305760/a-cautionary
-tale-for-chinas-ambitious-chipmakers [31 October 2022].
Fuller, Douglas. 2016. Paper tigers, hidden dragons: Firms and the political economy
of China’s technological development. Oxford University Press.
Gao, Xiang and Tan, Jie. 2020. From web to Weber: Understanding the case of
“One-Go at Most” as ICT-driven government reform in contemporary China.
China Review 20(3), 71–97. Available from: https://www.muse.jhu.edu/article
/764071.
Geng, Yvonne. 2020. GlobalFoundries abandons Chengdu wafer fab. EETimes.
26 May. Available from: https://www.eetimes.com/globalfoundries-abandons
-chengdu-wafer-fab/ [31 October 2022].
Große-Bley, J. and Kostka, G. 2021. Big Data dreams and reality in Shenzhen: An
investigation of Smart City implementation in China. Big Data & Society 8(2).
Available from: https://doi.org/10.1177/20539517211045171
Gu, Chaolin, Tsai, Jianming, Niou, Yafei, Suen, Ying, Chen, Tian, Chai, Yenwei and
Ye, Jiaan. 1999. Zhongguo chengshi dili (Chinese Cities Geography), Shanghai:
Commercial Press.
Hefei STIP Co. Ltd. 2022. Chanye yuanqu (Catalog of the industrial parks). Hefei
STIP Co. Ltd. Available from: https://pinyin.thl.tw/converter?s=产业园区&c=title [7
November 2022].
Huang, Xin. 2016. Tuidong Zhongguo zhizao xiang Zhongguo chuangzao zhuanbian.
(Pushing transformation from Made in China to Invented in China). Economic
Daily. 30 August. Available from: http://www.gov.cn/xinwen/2016-08/30/content
_5103373.htm [13 October 2022].
Inspur. 2022. Bozhou ‘chengshi danao,’ yong dashuju shouhu chengshi wendu
(Bozhou City Brain: Protect the warmthof thee city with the help of big
data). Inspur. Available from: https://www.inspur.com/lcjtww/2315750/2320981
/2345517/2345521/2548085/index.html [9 November 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Li, Xiaoguang and Shi, Dan. 2020. Zhongguo xinpian chanye ‘lan wei.’ diaocha: Shei
wie chongdong maidan? (Investigation into the Chinese chip industry ‘rotten tails’:
Who pays for the blind impulse?). Business School. November, 9–15. Available
from: https://finance.sina.com.cn/china/2020-11-03/doc-iiznctkc9234057.shtml
[31 October 2022].
Lian, Si. 2022. Woguo gaokeji rencai peiyang lujing tanxi (Study on the route of our
country’s high-tech talents cultivation). People’s Forum. 26 May. Available from
http://www.rmlt.com.cn/2022/0526/648044.shtml [1 November 2022].
Liu, Jingfeng and Zhang, Heng. 2020. 7 nian le, weisheme zhihui chengshi hai bu zhi-
hui? | Jiazi Guangnian (7 years have passed, why aren’t Smart Cities smart? | Jiazi
Guangnian) Jiazi Guangnian. 15 December. Available from: https://mp.weixin.qq
.com/s/YHDkiJgyI-b3kmUcWFzTlg [15 August 2022].
Liu, Yi. 2022. Jiangxi 600 yi yindao jijin, lai le (Jiangxi’s 60 billion government
guiding fund is coming). Sina Technology. 17 May. Available from: https://finance
.sina.com.cn/tech/2022-05-17/doc-imcwipik0351234.shtml [10 November 2022].
Liu, Xin. 2017. [Guangzhou ribao] ‘Liang ge huigui’ shengeng bentu, Guangzhou
jijin fadong ‘3·50’ jihua ([Guangzhou Daily] ‘The two comebacks’ deeply
engaged locally, Guangzhou fund activated the ‘3.50’ plan). Guangzhou Daily. 29
December. Available from: https://www.sfund.com/news/shownews.php?id=301
[11 November 2022].
Lo, Wing-Hung C. and Tang, Shui-Yang. 2006. Institutional reform, economic
changes, and local environmental management in China: The case of Guangdong
Province. Environmental Politics 15(2), 190–210.
Luong N., Arnold Z. and Murphy B. 2021. Understanding Chinese government guid-
ance funds: An analysis of Chinese-Language sources. Center for Security and
Emerging Technology (CSET), March. Available from: https://cset.georgetown
.edu/publication/understanding-chinese-government-guidance-funds/ [21 October
2022].
Lv, Aofei and Luo, Ting. 2018. Asymmetrical power between internet Giants and
users in China. International Journal of Communication 12, 3877–95.
Market Screener. 2022. IFLYTEK Co. Ltd. Market Screener. Available from: https://
www.marketscreener.com/quote/stock/IFLYTEK-CO-LTD-6500190/ [19 October
2022].
Naughton, B. 2021. The Rise of China’s Industrial Policy 1978 to 2020 (Primera
edición). Universidad Nacional Autónomica de México, Facultad de Economía.
National Development and Reform Commission (NDRC). 2016. The 13th Five-Year
Plan for economic and social development of the People’s Republic of China
2016–2020, Central Compilation & Translation Press of PRC, issued December.
Available from: https://en.ndrc.gov.cn/policies/202105/P020210527785800103339
.pdf [4 November 2022].
National Development and Reform Commission (NDRC). 2021. Zhonghua renmin
gongheguo guomin jingji he shehui fazhan di shi si ge wu nian guihua he 2035
nian yuanjing mubiao gangyao (The 14th Five-Year Plan of the PRC), issued
23 March. Available from: https://www.ndrc.gov.cn/xxgk/zcfb/ghwb/202103/
t20210323_1270124.html?code=&state=123 [4 June 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
National Bureau of Statistics of China. 2022. China’s R&D expenditure reached 2.79
trillion Yuan in 2021, issued January. Available from: http://www.stats.gov.cn/eng-
lish/PressRelease/202201/t20220127_1827065.html [24 October 2022].
Olsen, Sam. 2020. China is winning the war for global tech dominance https://
thehill.com/opinion/technology/518773-china-is-winning-the-war-for-global-tech
-dominance/ [24 October 2022].
Optical Valley Industrial Investment. 2022. Business area. Optical Valley Industrial
Investment. Available from: http://www.whovii.com/public/portal/list/index/id/4
.html [10 November 2022].
People’s Daily Online. 2004. China’s military manufacturing industry heading for
informationization and digitization. People’s Daily Online. 26 March. Available
from: http://en.people.cn/200403/26/eng20040326_138573.shtml [6 June 2022].
Reuters. 2016. Qualcomm unveils $280 million joint venture with Chinese province.
Reuters. 17 January. Available from: https://www.reuters.com/article/us-qualcomm
-china-jointventure-idUSKCN0UV10A [31 October 2022].
Segal, A. 2003. Segal, A. (2003). Digital dragon: high-technology enterprises in
China. Cornell University Press.
Segal, A. 2018. When China rules the web: Technology in service of the state.
Foreign Affairs 97(5), 10–8.
Shenzhen City Kunpeng Equity Investment Co., Ltd. 2022. Company Profile.
Shenzhen City Kunpeng Equity Investment Co., Ltd. Available from: http://www
.kpcapital.cn/about.aspx?TypeId=1&FId=t1:1:1 [10 November 2022].
Shi-Kupfer, K. and Ohlberg, M. 2019. China’s digital rise: Challenges for Europe.
Mercator Institute for China Studies (MERICS), 8 April. Available from: https://
www.merics.org/sites/default/files/2020-06/MPOC_No.7_ChinasDigitalRise_web
_final_2.pdf [13 October 2022].
Su, Jianxun. 2021. Ke Da Xun Fei tuijin AIoT zhanlüe, yu Ling Si Zhineng lianhe
tuichu xinpian jiejue fangan (iFlyTek marched forward with AIoT strategy, launch-
ing chips solution with Listenai). 36Krchuhai. 29 March. Available from: https:
//letschuhai.com/kedaxunfeituijin-aiot-zhanlueyulingsizhinenglianhetuichuxin-
pianjiejuefangan [6 July 2022].
Szewcow, B. and Andrews, J. 2020. Kuala Lumpur to build ‘City Brain’ with Alibaba
Cloud. The UN specialized agency for ICTs. 7 April. Available from: https://www
.itu.int/hub/2020/04/kuala-lumpur-to-build-city-brain-with-alibaba-cloud/ [6 July
2022].
Tian, Jiao. 2022. Sichuan’s high-tech industry’s revenue in the first half of the year
exceeds one trillion. Inf News. 10 November. Available from: https://inf.news/ne/
economy/37bfdf79a3f9513c7ead76232b2b6317.html [10 November 2022].
Tsai, Kellee. 2002. Back-Alley Banking: Private Entrepreneurs in China, Ithaca, New
York: Cornell University Press.
Webster G., Creemers R., Kania E. and Triolo P. 2017. Full translation: China’s
‘New generation artificial intelligence development plan.’ DigiChina. 1 August.
Available from: https://digichina.stanford.edu/work/full-translation-chinas-new
-generation-artificial-intelligence-development-plan-2017/ [13 October 2022]
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Wong, Christine. 2021. Plus ça change: Three decades of fiscal policy and central-local
relations in China. China: An International Journal, 19(4), 1–31.
World Intellectual Property Organization (WIPO). 2022. Global Innovation Index
2021—China. Available from: https://www.wipo.int/edocs/pubdocs/en/wipo_pub
_gii_2021/cn.pdf [8 October 2022].
Wu, Hua. 2021. 70 yi yuan! Guizhou shengji caizheng sheli xinxing gongyehua
fazhan jijin (70 billion RMB! Guizhou provincial finance set up new industrializa-
tion development fund). Guiyang Daily. 13 July. Available from: http://www.gywb
.cn/system/2021/07/13/031407975.shtml [11 November 2022].
Xi, Jinping. 2022. Buduan zuoqiang zuoyou zuoda woguo shuzi jingji (Continuously
strengthening, optimizing, growing our country’s digital economy). Qiushi.
15 January. Available from: http://www.qstheory.cn/dukan/qs/2022-01/15/c
_1128261632.htm [20 October 2022].
Xu, Bin and Xiao, Linxing. 2009. Planning and construction history of Panzhihua
during the three-front strategy period: Backgrounds, process, and mechanism.
Paper presented at the 15th International Historical Planning Society, Sao Paolo,
Brazil. 15–18 July. Available from: http://www.usp.br/fau/iphs/abstractsAndPa-
persFiles/Sessions/31/XU_XIAO.PDF [29 September 2022].
Yang, Sophia. 2020. Six of China’s largest semiconductor projects now halted.
Taiwan News. 5 October. Available from: https://www.taiwannews.com.tw/en/
news/4023601 [31 October 2022].
Zha, Jingzhong. 2016. Dekema bandaoti chanyeyuan kaigong jianshe (Nanjing
Tacoma Semiconductor Technology industrial park construction laying founda-
tion). Nanjing Daily. 9 June. Available from: https://news.sina.cn/2016-06-09/
detail-ifxszfak3441621.d.html [8 November 2022].
Zhang. 2022. Bozhou shi jingji zongliang jinru quan sheng qian ba (Bozhou city’s
total economic performance ranking in 8th place in the province). Anhui News.
3 November. Available from: http://ah.anhuinews.com/bozhou/news/jj/202211/
t20221103_6488121.html [9 November 2022].
Zhang, Xiao and Bao, Jing. 2018. Shuzi zhengfu ji pingtai: Yingguo zhengfu shuzi
hua zhuanxing zhanlüe yanjiu ji qi qishi (Digital government as a platform: a
study of the uk government’s digital transformation strategy and its implications).
Chinese Public Administration (18)3, 27–32.
Zhao, Wanxia and Zou, Yonghua. 2018. Hefei: An emerging city in inland China.
Cities 77, 158–169. Doi: https://doi.org/10.1016/j.cities.2018.01.008
Zhejiang Digital Economic Development Administration and Zhejiang Governance
Digitalisation Promotion Committee. 2020. Guanyu yinfa shenru guanche Xi
Jinping zongshuii kaocha Zhejiang zhongyao jianghua jingshen jiakuai chengshi
danao jianshe yu tuiguang gongzuo fangan de tongzhi (Notice on profoundly
implement the spirit of General Secretary Xi Jinping’s important speech in his
official inspection in Zhejiang), issued 11 August. Available from: https://zjjcms-
public.oss-cn-hangzhou-zwynet-d01-a.internet.cloud.zj.gov.cn/jcms_files/jcms1/
web3241/site/attach/0/6201073d6bfb41e696e4090ac8a77662.pdf [2 November
2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Zhejiang University Holding Group. 2021. Zhejiang chengli chengshi danao chanye
lianmeng, Tongdun keji rong ren shou pi huiyuan danwei (Zhejiang formed the
City Brain Industry Alliance, Tongdun Technology honourly elected in the first
group of members). Tongdun Technology. Available from: http://www.kggs.zju.edu
.cn/index.php?a=detail&id=2261 [7 October 2022].
Zhongguo Jiaoyu Zaixian (eol.cn). 2021. Shier suo ‘yiliu daxue’ ruxuan! Jiaoyubu
gongbu shoupi weilai jishu xueyuan mingdan (12 ‘excellent’ colleges elected!
Ministry of Education announced the list of the first round of the School of Future
Technology’) 26 May. Available from: https://www.eol.cn/news/yaowen/202105/
t20210526_2113699.shtml [6 June 2022].
Zhong Tuo Bang. 2021. [Yitou xiangmu dongtai] Shuqin keji chengwei Zhejiang
sheng chengshi danao chanye lianmeng chengyuan danwei ([News on invested
items] Dataqin became a member of the Zhejiang City Brain industry alliance).
Phoenix News. 31 May. Available from: https://ishare.ifeng.com/c/s/v002D1k1M-
HYDfFRr9VI--j6HYGCRjV9qEUHKunwkKB7VLVmE [21 October 2022].
Zhu, Xiaoming. 2019. Emerging Champions in the Digital Economy: New Theories
and Cases on Evolving Technologies and Business Models, Berlin/Heidelberg:
Springer.
Zou, Shuo. 2021. ‘Future technology schools’ get green light. China Daily.
5 June. Available from: https://www.chinadaily.com.cn/a/202106/05/
WS60bab74ba31024ad0bac3c42.html [7 November 2022].
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Chapter 10
Yujing Tan
227
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
and smart city policies, the city’s number of smart hardware start-ups has
surged (Shenzhen Bureau of Commence 2021). The incubator system for
these start-ups imitates the Silicon Valley model. For example, the business
incubator provides professional services such as consulting, patent registra-
tion, and business registration for entrepreneurs. The Silicon Valley model is
characterised by an industry-academia-research economy centred on univer-
sities or research institutions and supported by financial institutions (Aoki
2000). Most start-ups active in Shenzhen’s hardware innovation sector have
emerged through incubators and start-up competitions held by innovation
associations. However, the incubator system in Shenzhen is also different
from the Silicon Valley model in several ways.
First, the rise of incubators in Shenzhen is based on industrial upgrad-
ing and urban renewal planned by sectors of the local government (e.g.,
Tech-innovation Bureau and Shenzhen City Planning and Land Resources
Committee) and the local National Development and Reform Commission
(local NDRC). Since urban land in China is owned by the state, local govern-
ments convert abandoned factories into industrial parks to house innovative
incubators. Through activities such as start-up competitions organised by the
local government, entrepreneurs receive support from the local government
in the early stages of their business. Most entrepreneurs who register their
start-ups in Shenzhen can rent space at the incubator for less than average
market rent, or even use the incubator’s office space for free. At the same
time, urban industrial sites are often redeveloped into high-end residential
areas to attract financially established talent. Shenzhen’s government has
planned talent housing (rencai gongyu) in different areas, and technology
entrepreneurs who meet the criteria for talent recognition in Shenzhen can
apply for talent housing at a low price.
Second, most of the incubators in Shenzhen are registered as private
non-enterprises.12 Under the national Mass Entrepreneurship and Innovation
plan, business incubation is seen as a public service. By providing advice
to entrepreneurs and a network of investors, incubators registered as private
non-enterprises are able to take on public services from the local government.
This takes the form of the government procurement service (zhengfu goumai
fuwu) framework, a Chinese version of public-private-partnership (PPP).
It means that the local government can outsource their duty of promoting
entrepreneurship and innovation to non-governmental organisations. In some
sense, the local government distributes accountability, as well as policy risk,
to the organisations. Since the 2010s, the number of incubators that were reg-
istered as private non-enterprises in Shenzhen has increased significantly.13 It
is worth noting that the emergence of private non-enterprises does not mean
the growth of civil society in Shenzhen. Most of incubators were founded
on properties owned by either local government sectors or private real estate
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Beijing and then replicated elsewhere. In this way, Shenzhen has become a
model to be followed (O’Donnell, Wong, and Bach 2017). China studies and
urban anthropology have done much to analyse the political economy of this
Chinese model city. Modelling is, overall, a common way of governing urban
areas in contemporary, late-socialist China (Hoffman 2010). However, when
looking at Smart Shenzhen as a model, we have to realise that the institutional
phenomenon of modelling is rooted in the tension between central and local
government in China. This tension reverses the industrial blueprint of Smart
Shenzhen drawn by Shenzhen’s own government.
The urban-planning framework of Smart Shenzhen originally used Silicon
Valley, the EU’s smart city framework, and Singapore’s Smart State as ref-
erences (Shenzhen STITITC 2013). Although this framework emphasizes
the Ministry of Science and Technology’s launch of the smart city theme
in the national 863 program15 at the end of 2010, Shenzhen has become a
typical representative of China’s Silicon Valley. Moreover, Smart Shenzhen
is seen by pragmatic local government officials as a model for transform-
ing government services through industrial transformation. An expert who
has participated in Shenzhen’s smart city planning told me that they did not
choose smart city as a brand at the beginning. The momentum of Shenzhen’s
industrial renewal made the government realise that using the name Smart
Shenzhen to justify the city’s role as an innovation leader would help launch
other industrial upgrading projects. My interviewee said, “Around 2010,
some new technologies and technical terms began to appear in the indus-
try, such as Internet of Things (IoT) technology, which is a framework for
understanding cities as physical entities,” continuing that “The IoT was first
applied to solve the problem of manual water meter reading in hydropower
stations: by installing sensors on domestic or public sluices, hydropower
stations can account for household and even city water consumption with
relative accuracy.”16 Beyond solving the specific problem of reading water
meters, the Smart Shenzhen industrial plan aims to change the city manage-
ment model, to improve management efficiency and provide a strong techni-
cal guarantee. According to the policy discourse, its purpose is “to enhance
the monitoring, analysis, early warning, decision-making capacity and wis-
dom of urban management (Shenzhen STITITC 2013).” So far, this IT-driven
smart industry is regarded by local government as a source of technical social
management tools for public institutions.
However, the government’s hopes and expectations for smart industries
have not materialised smoothly. The plans of industrial policy experts to solve
management problems with technology require the cooperation of various
departments within the government. Smart Shenzhen requires various gov-
ernment sectors and local companies to integrate their data on one platform.
This data centring is not supported by all government departments nor by
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
most enterprises and, so far, interests are simply not aligned.17 This situation
is echoed by mainstream research on smart industries and smart city construc-
tion in China (Große-Bley and Kostka 2021).
Based on this finding, I further my argument that, when it comes to actual-
ising Smart Shenzhen only the industrial transformation aspect is a relatively
smooth process. Shenzhen’s large companies in the information industry,
such as Huawei and ZTE, have become world-renowned smart city hardware
and software suppliers. For example, through the smart city concept and 5G
base station construction, Huawei has launched Huawei Cloud, Government
Cloud, Kunpeng, and other products. Smart Shenzhen has been concretised
by Huawei, ZTE, Tencent, and Ping An Insurance as a business template for
urban renewal. Ping An Group, which has a full financial license, started to
build Shenzhen’s government services app, i-Shenzhen, in January 2019. It
covers services and information regarding social security, health care, trans-
portation, police security, life insurance, cultural, sporting events, and other
areas. Moreover, these large private enterprises are driving the transformation
of an outsourcing chain of IT service products. Shenzhen’s hardware manu-
facturers (those copycat hardware suppliers who were original equipment
manufacturers for European, Japanese, and American companies), software
application startups, and small and medium-sized enterprises in Shanghai and
Ningbo provide technical support for Huawei’s Kunpeng server board.
In addition to serving to strengthen the local government’s administrative
and economic legitimacy, the smart city branding is a tool for local compa-
nies in Shenzhen to expand and create impact beyond the city’s geographic
boundaries. The largest client base for IT companies expanding their smart
city templates outside Shenzhen is made up of the governments of other
Chinese cities. Various local governments are moving through the Shenzhen
experience, constantly competing for financial policy support from Beijing
to build new smart city infrastructure. Thus, Shenzhen’s information industry
has become contractors for other local city governments in China. These
governments try to compete to create the label of an advanced smart city by
using service offerings from IT companies in Shenzhen with sophisticated
smart city plans, thus further attracting investment. As explained by one
interviewee, when many local governments order this kind of product and
think it is useful, others will imitate this behavior so as not to be left behind.
Of course, Shenzhen IT companies themselves have done a lot of marketing
this end. More than 120 Chinese cities, such as Shenzhen, Shanghai, Ningbo,
Weifang, Yiyang, and Dunhuang have purchased Huawei’s smart city ser-
vices. However, it is worth noting here that after purchasing the smart city
services, each local government mainly aims to use IT enterprises to drive the
innovation of local industries. For example, the Ningbo government’s 14th
Five-Year Plan for Smart City Construction, launched in 2021, highlights that
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
CONCLUSION
NOTES
1. Three Import and Compensation Trade Enterprises (sanlai yibu): shorthand for
enterprises that process imported raw materials, manufacture products according to
imported samples, assemble imported parts, and repay loans for imported equipment
and technology with products. Emerging along the coast in the late 1980s, all these
enterprises export their products abroad.
2. Interview Huang, 12 September 2012.
3. Interview with Fu, an architect working at the Institute for Rural and Urban Plan-
ning Shenzhen, 5 October 2015.
4. Interview with Huang, 19 October 2015.
5. For more information about the influence of this policy purge, see “The
Cleansing of Copycat Cellphones,” available at: http://finance.ifeng.com/news/tech
/20130103/7507386.shtml (Accessed 8 August, 2018).
6. Interview with Cui, 22 November 2015.
7. Mass Innovation and Entrepreneurship is an innovation and entrepreneurship
policy promoted by the State Council of the People’s Republic of China since 2015.
This policy advocates sub-national government to promote entrepreneurship among
professionals, especially young people, in the technology sector. This arrived in the
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
context of the rapid growth of the new global economy and the rise of internet tech-
nology. Following this policy, local governments have issued policy documents to
support the construction of tech-entrepreneurship infrastructure (e.g., crowdsourcing
spaces, entrepreneurship guidance funds, and urban redevelopment funds).
8. Interview with Xiao Bo, 6 December 2015.
9. Interview with Xiao Bo, 6 December 2015.
10. Interview with Xiao Bo, 6 December 2015.
11. Interview with Bai, 22 November 2015.
12. According to the Interim Regulations on Registration and Administration of
Private Non-enterprise Units, the phrase private non-enterprise refers to social organ-
isations and other social forces, as well as private citizens, using nonstate assets to
engage in non-profit social service activities.
13. For more information about the influence of this policy purge, see “Hundreds
of Innovation Incubators: How Can the Quantity be High Quality?” available at: http:
//finance.china.com.cn/roll/20150727/3252851.shtml (Accessed 8 August 2018).
14. Interview Cai, 8 February 2016.
15. The 863 Program was approved by the State Council in March 1986 to promote
the development of high technology in China. This program began with an emphasis
on government policies and funding to nurture scientific and technological talent
and to support research in basic subject areas. Since then, as local governments have
worked towards and reshaped this central macro-goal, the central government has
continually revised the goals of the program. The most recent goal proposed that
China should not imitate the West, but rather focuses on “indigenous innovation.” The
program ended in 2016. For a more in-depth discussion of its evolution, please read:
Zhi, Q., and Pearson, M. M. 2017. China’s hybrid adaptive bureaucracy: The case of
the 863 program for science and technology. Governance 30(3), 407–24.
16. Interview with Zhang, 20 June 2022.
17. Interview with Zhang, 20 June 2022.
REFERENCES
Aoki, M. 2000. Information and governance in the Silicon Valley model. In X. Vives,
ed., Corporate Governance: Theoretical and Empirical Perspectives, New York:
Cambridge University Press, 9–20.
Große-Bley, J., & Kostka, G. 2021. Big data dreams and reality in Shenzhen: an
investigation of smart city implementation in China. Big Data & Society 8(2).
Hoffman, L. (2011). Urban modeling and contemporary technologies of city-building
in China: The production of regimes of green urbanisms. In A. Roy and A. Ong,
ed., Worlding Cities: Asian Experiments and the Art of Being Global, Hoboken:
John Wiley & Sons, 55–76.
Huang, P. C. 2009. China’s neglected informal economy: reality and theory. Modern
China 35(4), 405–38.
Hu, A. G., and Zhao, L. 2006. Zhongguo chengshihua zhuanxin zhongd feizhengshi
jingji yu feizhengshi guyong (Informal employment and informal economy in the
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Index
243
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
244 Index
cybersecurity, 9–10, 14–18, 21–26, 44, industrial policy, 57–58, 61, 104,
108, 116, 184–187 127, 199, 202
Cybersecurity Law, 2, 13, 15, 20, information warfare, 172–178,
24, 128, 134 180, 187, 205
Cyberspace Administration of China, informatisation, 2, 20–22, 35–37,
2, 9–33, 128–129, 132, 124–136, 47, 91, 187
139, 141–142 innovation,25, 41–42, 47, 60–62, 68–69,
71, 74, 76, 83–86, 80, 92, 95–96,
data protection, 10, 13–14, 95–96, 113, 115, 117, 143, 163, 172, 178,
123–152, 179 181, 201, 205, 208, 209, 212, 215,
Data Security Law, 2, 13–15, 20, 24, 218, 228–229, 231–239
128, 130, 134 International Electrotechnical
Didi, 15, 21, 23–24, 87, 128 Commission, 109–111, 113
digital currency, 83, 88–90, 94–96 International Standardization
Digital Silk Road, 141, 162–164 Organisation, 109–111, 113
Douban, 23 International Telecommunication
Union, 109–111, 131, 139, 153,
espionage, 63–64, 171, 184–188, 192 154–159, 164–166
extraterritoriality, 62, 107 Internet Corporation for Assigned
European Union, 107, 117, Names and Numbers, 12, 114, 139,
123, 140, 236 153, 157–162, 164–166
Internet Engineering Task Force,
Facebook, 12 111, 114, 139
fintech, 1, 4, 83–99, 142–143, 147 Internet Plus, 1, 201
free trade agreements, 130 Internet Society of China, 12, 160
Foxconn, 229
Japan, 57–58, 62, 75, 89, 93, 110, 112,
geopolitics, 55, 153, 174, 199 155, 174, 229, 237
Global Data Security Initiative, 131–132 JD, 86, 124, 140
global Internet governance, 12,
19 153–170 Li, Keqiang, 11, 20
globalisation, 55–57, 61, 65, Lu, Wei, 9, 11–12, 17–18, 161
76, 164, 231
Ma, Jack, 85, 90, 208
hacking, 15, 96; competitions, 172–193 Made in China 2025, 61, 63, 201
Hafnium, 186 Microsoft, 11, 113, 183, 186
health codes, 44, 238 Ministry of Commerce, 128, 141
HikVision, 123, 206 Ministry of Finance, 12, 24, 68–69
Hong Kong, 133, 143, 228–230 Ministry of Foreign Affairs, 18, 26
Huawei, 2, 60–61, 70, 73, 106, 123, Ministry of Industry and Information
158, 202, 230, 235, 237–238 Technology, 2, 11, 16, 21, 24–26,
67–69, 141, 158–160, 171, 184
IANA transition, 159–160, 162 Ministry of Public Security, 14–15,
iFlyTek, 42, 209 20–21, 25, 129, 172, 184, 188
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
Index 245
Semiconductors, 2, 4, 55–82, 186, 200, United States, 2–3, 112, 118, 140,
210, 213–216, 220, 225 174, 176; indictments of Chinese
SenseTime, 12 individuals by, 179, 184–185;
Shanghai Cooperation sanctions from, 2–3, 55–56,
Organisation, 131, 139 61–62, 123
Shenzhen, 23, 73, 142, 155, 227–242
Sichuan, 181, 182, 199, 203–206 vulnerabilities, 172, 177, 182–187
smart cities, 1, 202, 211–212, 227–228,
230–233, 235–238 WeChat, 137, 238
smart courts, 35–52 WeChat Pay, 85, 87–89, 91, 93
SMEE, 73 Weibo, 11–12, 23
SMIC, 73, 80 Wen, Jiabao, 86
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
246 Index
World Internet Conference, 12, 18–19, Zhao, Houlin, 109, 155, 157, 166
139, 153, 162–166, 185 Zhao, Zeliang, 16
World Trade Organization, 57, 105–106, Zhejiang, 42, 199, 206–209, 211, 218
130, 139–140 Zhou, Xiaochuan, 86
World Wide Web Consortium, 139 Zhuang, Rongwen, 12
Zoom, 128
Xi, Jinping, 1, 10–11, 18–20, 24–25, ZTE, 2, 158, 235, 237
90–91, 131, 178, 180, 187, 201
Xu, Lin, 12
The Emergence of China's Smart State by Creemers, Papagianneas & Knight
/ Open Access PDF from Rowman & Littlefield Publishers
to that, he spent time with a boutique law firm and the International Bar
Association (IBA) where he helped coordinate a project exploring the legal
implications of artificial intelligence and next-generation technologies.
Jamie Horsley is a visiting lecturer in law and a senior fellow of the Paul
Tsai China Center at Yale Law School. Her project work and research revolve
primarily around issues of administrative law, governance, and regulatory
reform, including promoting government transparency, public participa-
tion, and government accountability. She was formerly executive director
of the Yale China Law Center. Prior to joining Yale, she was a partner in the
international law firm of Paul, Weiss, Rifkind, Wharton & Garrison; com-
mercial attaché in the US embassies in Beijing and Manila; vice president
of Motorola International Inc.; and a consultant to the Carter Center’s China
Village Elections Project. She holds a BA from Stanford University, an MA
in Chinese Studies from the University of Michigan, a JD from Harvard Law
School, and a Diploma in Chinese Law from the University of East Asia.
Adam Knight is a Ph.D. candidate at the Institute for Area Studies at Leiden
University, where he focuses on the design, implementation, and conse-
quences of the Chinese social credit system. Adam holds a First-Class degree
in Chinese Studies from the University of Oxford, during which time he was
a Fung Scholar. Adam also holds an MSc in social science of the Internet (dis-
tinction) from the Oxford Internet Institute, where he was a Henfrey Scholar.
Adam frequently contributes to reports in media such as the BBC, Financial
Times, and South China Morning Post.