Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Mouton May 4, 2020

Exploring the cyber governance discourse: A perspective from China

  • Chunhui Wang , Le Cheng and Jiamin Pei EMAIL logo

Abstract

This study aims to examine China's approach to the cyber governance, especially the discourse of Internet information, through a detailed investigation of the Provision on Ecological Governance of Internet Information Content. The findings in this study indicate that China's approach to the governance of Internet information possesses the following essential features: the clarification of the dialectical relationship between Internet freedom and order, the unification of carrying forward positive energy and restraining negative information, the people-oriented and bottom-up participatory approach to the ecological governance of Internet information, as well as the strictly prohibitive conducts of three key administrative counterparts. The underlying reasons for choosing such an ecological path to regulate the Internet information can be attributed to China's national configuration, including its political system, cultural tradition, status quo of the Internet development, and the pervasive cybersecurity challenges facing its society. It is thus argued that the governance of Internet information, characteristic of spatiality, can merely be construed within specific socio-political and cultural contexts. Albeit the spatiality of the governance of the Internet information, China's approach can serve as a model for other nations to develop their own governance discourses pertaining to the Internet information. This study aims not only to unpack the Chinese discourse of the ecological governance of Internet information but also to provide useful insights into the discourse and practices of global cyber governance.


Corresponding author: Jiamin Pei,Center for Contemporary Chinese Discourse Studies and Research Base for Global Cyberspace Governance, Zhejiang University, Hangzhou, PR China, E-mail:

Funding source: Establishing and Perfecting the Comprehensive System of Cyber Governance

Funding source: Promoting the Cooperation on Cyberspace Strategy under the Belt and Road

Award Identifier / Grant number: SKY-505101-0003

Acknowledgments

This work was supported by Establishing and Perfecting the Comprehensive System of Cyber Governance (a major project of National Social Science Foundation) and Promoting the Cooperation on Cyberspace Strategy under the Belt and Road (Grant Number SKY-505101-0003).

References

Cheng, Le, JiaminPei, 2018. Interpreting cybersecurity law: A semiotic perspective. Journal of Zhejiang University (Humanities and Social Sciences) 48(6), 121–139. https://doi.org/10.3785/j.issn.1008-942X.CN33-6000/C.2018.03.283.Search in Google Scholar

Cheng, Le, Jiamin Pei & Marcel Danesi. 2019. A sociosemiotic interpretation of cybersecurity in U.S. legislative discourse. Social Semiotics 29(3), 286–302. https://doi.org/10.1080/10350330.2019.1587843.Search in Google Scholar

Cheng, Le & Winnie Cheng. 2014. Documentary evidence as hegemonic reconstruction. Semiotica 2014(200), 165–184. https://doi.org/10.1515/sem-2014-0009.Search in Google Scholar

Cheng, Le, Winnie Cheng & King Kui Sin. 2014. Revisiting legal terms: A semiotic perspective. Semiotica 2014(202), 167–182. https://doi.org/10.1515/sem-2014-0051.Search in Google Scholar

De Santo, Robert S., 1978. Concepts of applied ecology. Springer-Verlag, New York.10.1007/978-1-4613-9432-7Search in Google Scholar

Dougherty, Terri 2010. Freedom of expression and the Internet. Detroit: Gale Cengage Learning.Search in Google Scholar

Faber, Pamela & Arianne Reimerink 2019. Discourse, interests, and the law: Some pragma-legal reflections. International Journal of Legal Discourse 4(1), 15–46. https://doi.org/10.1515/ijld-2017-0004.Search in Google Scholar

Gartner. 2014. Information Technology Glossary. Available from https://www.gartner.com/en/information-technology/glossary/big-data (accessed 5 October 2019).Search in Google Scholar

Goldsmith, Jack. 2018. The failure of Internet freedom. Knight First Amendment Institute at Columbia University. Available from: https://knightcolumbia.org/content/failure-internet-freedom (accessed 28 September 2019).Search in Google Scholar

Gow, Michael. 2017. The Core Socialist Values of the Chinese Dream: Towards a Chinese integral state. Critical Asian Studies 49(1), 92–116. https://doi.org/10.1080/14672715.2016.1263803.Search in Google Scholar

Gutiérrez, Mario A., FrédéricVexo, DanielThalmann, 2008. Stepping into virtual reality. Springer, New York.10.1007/978-1-84800-117-6Search in Google Scholar

Hao, Yeli, 2017. A three-perspective theory of cyber sovereignty. PRISM 7(2), 109–115. https://cco.ndu.edu/Portals/96/Documents/prism/prism_7-2/10-3-Perspective%20Theory.pdf?ver=2017-12-21-110647-937 (accessed 15 February 2020).Search in Google Scholar

Kittichaisaree, Kriangsak. 2017. Public international law of cyberspace. Cham: Springer.10.1007/978-3-319-54657-5Search in Google Scholar

Macdonald, Stuart, Sara GiroCorreia, AmyWatkin, 2019. Regulating terrorist content on social media: Automation and the rule of law. International Journal of Law in Context 15, 183–197. https://doi.org/10.1017/S1744552319000119.Search in Google Scholar

Matulewska, Aleksandra, 2016. Walking on thin ice of translation of terminology in legal settings. International Journal of Legal Discourse 1(1), 65–85. https://doi.org/10.1515/ijld-2016-0001.Search in Google Scholar

Mey, Jacob Louis, 2017. Discourse, interests, and the law: Some pragma-legal reflections. International Journal of Legal Discourse 2(1), 13–27. https://doi.org/10.1515/ijld-2017-0004.Search in Google Scholar

Najafabadi, Maryam M., FlavioVillanustre, Taghi M.Khoshgoftaar, NaeemSeliya, RandallWald, EdinMuharemagic, 2015. Deep learning applications and challenges in big data analytics. Journal of Big Data 2, 1–21. https://doi.org/10.1186/s40537-014-0007-7.Search in Google Scholar

Pardeck, John T., 1998. An ecological approach for social work practice. The Journal of Society & Social Welfare 15(2), 133–142. https://scholarworks.wmich.edu/jssw/vol15/iss2/11 (accessed 15 February 2020).Search in Google Scholar

Sabatier, Paul A., 1986. Top-down and bottom-up approaches to implementation research: A critical analysis and suggested synthesis. Journal of Public Policy 6(1), 21–48. https://doi.org/10.1017/S0143814X00003846.Search in Google Scholar

Spellman, Frank R. 2007. Biology for nonbiologists. Plymouth: Government Institutes.Search in Google Scholar

Zhuang, Rachel. 2018. Scientifically understanding the natural laws of online communication, striving to boost the level of Internet use and network governance. Qiushi (21 September). Available from: https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-chinas-new-top-internet-official-lays-out-agenda-for-party-control-online/ (accessed 15 November 2019).Search in Google Scholar

Zozula, Daria. 2019. Features of the language of law: A comparative study of Polish, English and Indonesian legal texts. International Journal of Legal Discourse 4(1), 69–86. https://doi.org/10.1515/ijld-2019-2013.Search in Google Scholar

Published Online: 2020-05-04
Published in Print: 2020-05-26

© 2020 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 23.9.2023 from https://www.degruyter.com/document/doi/10.1515/ijld-2020-2025/html
Scroll to top button