SlideShare a Scribd company logo
1 of 30
How is the Internet Changing China?
How is China Changing the Internet?

            INTERNATIONAL REPORTING PROJECT
              SAIS, JOHNS HOPKINS UNIVERSITY
              WASHINGTON DC (MAY 7, 2010)


              Min Jiang (Ph.D.) | Twitter: @mindyjiang
                 Assistant Professor, Communication, UNCC
   2009-2010 Annenberg Fellow, Center for Global Communication Studies
                      University of Pennsylvania
Internet Adoption in China
Chinese Internet: An Overview
   400 million Internet users (CNNIC, 2010; Reuters, 2010)
   2/3 under age 30
   182 million bloggers (almost ½ of China’s netizens)
   700 million mobile phone users (½ of Chinese population)
   117 million Internet mobile phone users




Photos courtesy of MinnPost.Com, eChinaCities.com
Fragile Superpower




Photo TOP: http://www.indiantvtoday.com/wp-
      content/uploads/2008/08/beijing-olympics080808.jpg
Photo MIDDLE: http://unn.people.com.cn/GB/88607/11143350.html
Photo BOTTOM: http://www.flickr.com/photos/melody_am/1061440660/in/set-
      72157594475249707/
Fragile Superpower Online
“We Chinese Need to be Controlled”?

                       Jackie Chan:
                     Media quoted me out
                          of context
                                                Dai Qincheng: (HK)
                                                 Netizens demand
                                                Jackie Chan be sent
                                                  to North Korea
                                                      (reprint)




                                                    Han Han:
                                                Read the Emperor’s
                                               mind like Jackie Chan
ChinaNet, douban, Sina Blog (April 23, 2009)
Authoritarian Deliberation




                 Patriotism + Legitimacy-based Performance
Photo LEFT: http://www.flickr.com/photos/33673641@N00/1251068537 Photo RIGHT: http://rss.xinhuanet.com/newsc/english/2008-05/14/content_8168699.htm
Premier Wen Jiaobao Online Chat

                                                       知屋漏者在宇下,
                                                       知政失者在草野。
                                                       He who knows the
                                                       leakage of a house
                                                       lives under the roof.
                                                       He who knows the
                                                       mishandling of a
                                                       state is among the
                                                       populace.

Online chat with Chinese netizens: February 27, 2010
Net Advantage vs. State Advantage




           Photos TOP: The Prospect Magazine
           Photo BOTTOM LEFT: MediaBistro
           Photo BOTTOM RIGHT: EvgenyMorozov.com
Control 1.0 & 2.0
Regulating Commercial Sites




                 Image TOP LEFT: http://www.leedominic.com/
                 Image BOTTOM LEFT: XinhuaNet
                 http://news.xinhuanet.com/photo/2007-08/29/content_6625132.htm
                 Image RIGHT: Heredict Q blog
                 http://blog.myneverland.org/archives/844
River Crabs vs. Grass Mud Horse
Online Grassroots Discourse

   Rights

   Exposure

   Nationalism
Rights: Chongqing Nail House 2007




Image TOP : Eastwood Zhao.com
http://www.eastwoodzhao.com/stubborn-nail-house-demolished/
Image RIGHT: CBC
http://www.cbc.ca/arts/media/story/2007/03/26/nailhouse-censor.html
Rights: Deng Yujiao 2009
                                                           Punish Sex Offenders
                                                           Release Deng Yujiao




Shame on
Badong Police

   Sources: The Guardian, EastSouthWestNorth, Tianya BBS
Rights: Taking a Stroll in Xiamen 2007




Guard Harmonious Xiamen
Reject Petrochemical Pollution
Rights: Panyu “We Are Not to Be Represented” 2010


                                   Anti-Garbage
                                   Incineration
Rights: Green Dam Youth Escort 2009
Exposure: Cat Abuser 2006

                                                                          “Human Flesh Search”




Sources:
Photos TOP: Top 15 Amazing ly Fat Cats
http://offbeatstuff.blogspot.com/2008/09/top-15-amazingly-fat-cats.html
Photos RIGHT:
Netease BBS http://bbs.163.com
Exposure: Housing Administrator Sacked 2008

                                     What is he smoking?! It’s Nanjing
                                     Tobacco Co.’s most expensive
                                     cigarettes! 1500 RMB per carton!




 Sources:
 TOP: XinhuaNet, RIGHT: CQNews.net
(Self-) Exposure: Guangxi Tobacco Chief Sex Diary 2010




Sources:
TOP: Yahoo! CN News, RIGHT: eChinaCities
Nationalism Online: Anti-CNN
Who is Winning?
Shishou Mass Unrest 2009:
                  If Suppression Is Not The Way Forward…




Photo TOP: http://www.chinadaily.com.cn/china/2009-
      07/09/content_8403394.htm
Photo Middle: http://www.zonaeuropa.com/20090621_1.htm
Video BOTTOM: http://www.youtube.com/watch?v=n5K7U-
      TFDY0&feature=player_embedded
Ethnic Riots in Xinjiang 2009: Telecom Disconnect




Sources:
TOP: BBC
Google Inc. vs. Chinese Gov.




Photo TOP: PortlandMercury
Photo RIGHT: Reuters
Is “Scaling the Wall” the Ultimate Solution?
Getting “Real” on CN Internet 2010

                    “The Internet is an open
                    information system. As long
                    as Chinese Internet connects
                    with the international web,
                    harmful information of all
                    kinds will find its way to our
                    domestic websites. So long
                    as Chinese Internet is open
                    to the public, all sorts of
                    netizen remarks will
                    emerge.”

                            -- Wang Chen,
                            State Council
                            Information Office
The GFW & The Real Wall




        Photos LEFT: http://www.wired.com/politics/security/magazine/15-
        11/ff_chinafirewall?currentPage=all
        Photo Above: http://www.mobinode.com/wp-content/uploads/2008/05/internet-cafe.jpg
Micro Power, Big World




Source:
Photo TOP & RIGHT: Danwei.org

More Related Content

What's hot

Quiz - Online Regulation
Quiz - Online RegulationQuiz - Online Regulation
Quiz - Online RegulationKesby12
 
digital media growth by: becca o'd
digital media growth by: becca o'ddigital media growth by: becca o'd
digital media growth by: becca o'dBecca O'd
 
The human infrastructure of cyberinfrastructure
The human infrastructure of cyberinfrastructureThe human infrastructure of cyberinfrastructure
The human infrastructure of cyberinfrastructureUniversity of Michigan
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Herman cain youtube
Herman cain youtubeHerman cain youtube
Herman cain youtubeboomereng11
 
IOLUG Mobile Futures Keynote
IOLUG Mobile Futures KeynoteIOLUG Mobile Futures Keynote
IOLUG Mobile Futures KeynoteJason Griffey
 
OLITA: Mobility & Post-mobility
OLITA: Mobility & Post-mobilityOLITA: Mobility & Post-mobility
OLITA: Mobility & Post-mobilityJason Griffey
 
Bridges beat walls | Dome Magazine January 13, 2011
Bridges beat walls | Dome Magazine January 13, 2011Bridges beat walls | Dome Magazine January 13, 2011
Bridges beat walls | Dome Magazine January 13, 2011Joseph Serwach
 
Blogging While Brown Presentation
Blogging While Brown PresentationBlogging While Brown Presentation
Blogging While Brown Presentationcherylcontee
 

What's hot (9)

Quiz - Online Regulation
Quiz - Online RegulationQuiz - Online Regulation
Quiz - Online Regulation
 
digital media growth by: becca o'd
digital media growth by: becca o'ddigital media growth by: becca o'd
digital media growth by: becca o'd
 
The human infrastructure of cyberinfrastructure
The human infrastructure of cyberinfrastructureThe human infrastructure of cyberinfrastructure
The human infrastructure of cyberinfrastructure
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Herman cain youtube
Herman cain youtubeHerman cain youtube
Herman cain youtube
 
IOLUG Mobile Futures Keynote
IOLUG Mobile Futures KeynoteIOLUG Mobile Futures Keynote
IOLUG Mobile Futures Keynote
 
OLITA: Mobility & Post-mobility
OLITA: Mobility & Post-mobilityOLITA: Mobility & Post-mobility
OLITA: Mobility & Post-mobility
 
Bridges beat walls | Dome Magazine January 13, 2011
Bridges beat walls | Dome Magazine January 13, 2011Bridges beat walls | Dome Magazine January 13, 2011
Bridges beat walls | Dome Magazine January 13, 2011
 
Blogging While Brown Presentation
Blogging While Brown PresentationBlogging While Brown Presentation
Blogging While Brown Presentation
 

Viewers also liked

TweetChina Workshop Explores Big Data & Social Media
TweetChina Workshop Explores Big Data & Social MediaTweetChina Workshop Explores Big Data & Social Media
TweetChina Workshop Explores Big Data & Social MediaMin Jiang
 
China's National Search Engine Jike
China's National Search Engine JikeChina's National Search Engine Jike
China's National Search Engine JikeMin Jiang
 
Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...
Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...
Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...Min Jiang
 
Fulbright Summer Program - U.S. media puzzles issues news 2010
Fulbright Summer Program - U.S. media puzzles issues news 2010Fulbright Summer Program - U.S. media puzzles issues news 2010
Fulbright Summer Program - U.S. media puzzles issues news 2010Min Jiang
 
Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...
Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...
Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...Min Jiang
 
Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...
Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...
Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...Min Jiang
 
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...Min Jiang
 

Viewers also liked (7)

TweetChina Workshop Explores Big Data & Social Media
TweetChina Workshop Explores Big Data & Social MediaTweetChina Workshop Explores Big Data & Social Media
TweetChina Workshop Explores Big Data & Social Media
 
China's National Search Engine Jike
China's National Search Engine JikeChina's National Search Engine Jike
China's National Search Engine Jike
 
Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...
Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...
Search Concentration, Bias & Parochialism: Comparative Study of Baidu, Google...
 
Fulbright Summer Program - U.S. media puzzles issues news 2010
Fulbright Summer Program - U.S. media puzzles issues news 2010Fulbright Summer Program - U.S. media puzzles issues news 2010
Fulbright Summer Program - U.S. media puzzles issues news 2010
 
Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...
Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...
Harvard Fairbank Center - Min Jiang - Online Authoritarian Deliberation (Medi...
 
Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...
Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...
Annenberg-Oxford Summer Institute - Min Jiang - Chinese Media Regulatory Stru...
 
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
Annenberg-Oxford Summer Institute - Min Jiang - Authoritarian Deliberation On...
 

Similar to Johns Hopkins SAIS IRP Gatekeepers Talk - Min Jiang

Observing Paradigm Change in China through 10 years
Observing Paradigm Change in China through 10 yearsObserving Paradigm Change in China through 10 years
Observing Paradigm Change in China through 10 yearsIsaac Mao
 
How the Net aids dictatorships
How the Net aids dictatorshipsHow the Net aids dictatorships
How the Net aids dictatorshipsevgeny.morozov
 
Legal Power and The Internet
Legal Power and The InternetLegal Power and The Internet
Legal Power and The InternetRamsey Ismail
 
IWOM Watch - Sichuan Earthquake Special Edition
IWOM Watch - Sichuan Earthquake Special EditionIWOM Watch - Sichuan Earthquake Special Edition
IWOM Watch - Sichuan Earthquake Special EditionJason Zhan Jia
 
Magdalena Paul: Fake news
Magdalena Paul: Fake newsMagdalena Paul: Fake news
Magdalena Paul: Fake newsÚISK FF UK
 
China Politics 2.0
China Politics 2.0China Politics 2.0
China Politics 2.0sinocismblog
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspaceevgeny.morozov
 
Social media in conflict situations - Ushahidi, Twitter and More
Social media in conflict situations - Ushahidi, Twitter and MoreSocial media in conflict situations - Ushahidi, Twitter and More
Social media in conflict situations - Ushahidi, Twitter and Morespieli
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozovevgeny.morozov
 
Social media in china
Social media in chinaSocial media in china
Social media in chinaXinfeng Gao
 
Social Media In China
Social Media In ChinaSocial Media In China
Social Media In ChinaDes Walsh
 
DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University
DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University
DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University Dataconomy Media
 
Undermining democracy | Alisa Kolesnikova | DN18
Undermining  democracy | Alisa Kolesnikova | DN18Undermining  democracy | Alisa Kolesnikova | DN18
Undermining democracy | Alisa Kolesnikova | DN18DataconomyGmbH
 
Discussion presentation 4.25.11
Discussion presentation 4.25.11Discussion presentation 4.25.11
Discussion presentation 4.25.11jgmullally
 
Social Media in an Emergency - Crash, BOOM, tweet...with a twist
Social Media in an Emergency - Crash, BOOM, tweet...with a twistSocial Media in an Emergency - Crash, BOOM, tweet...with a twist
Social Media in an Emergency - Crash, BOOM, tweet...with a twistLee Yount
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discoursermackinnon
 

Similar to Johns Hopkins SAIS IRP Gatekeepers Talk - Min Jiang (17)

Observing Paradigm Change in China through 10 years
Observing Paradigm Change in China through 10 yearsObserving Paradigm Change in China through 10 years
Observing Paradigm Change in China through 10 years
 
How the Net aids dictatorships
How the Net aids dictatorshipsHow the Net aids dictatorships
How the Net aids dictatorships
 
Soong_Roland---Internet, Tibet, the Olimpics and the Earthquake
Soong_Roland---Internet, Tibet, the Olimpics and the EarthquakeSoong_Roland---Internet, Tibet, the Olimpics and the Earthquake
Soong_Roland---Internet, Tibet, the Olimpics and the Earthquake
 
Legal Power and The Internet
Legal Power and The InternetLegal Power and The Internet
Legal Power and The Internet
 
IWOM Watch - Sichuan Earthquake Special Edition
IWOM Watch - Sichuan Earthquake Special EditionIWOM Watch - Sichuan Earthquake Special Edition
IWOM Watch - Sichuan Earthquake Special Edition
 
Magdalena Paul: Fake news
Magdalena Paul: Fake newsMagdalena Paul: Fake news
Magdalena Paul: Fake news
 
China Politics 2.0
China Politics 2.0China Politics 2.0
China Politics 2.0
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
Social media in conflict situations - Ushahidi, Twitter and More
Social media in conflict situations - Ushahidi, Twitter and MoreSocial media in conflict situations - Ushahidi, Twitter and More
Social media in conflict situations - Ushahidi, Twitter and More
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
 
Social media in china
Social media in chinaSocial media in china
Social media in china
 
Social Media In China
Social Media In ChinaSocial Media In China
Social Media In China
 
DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University
DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University
DN18 | Undermining Democracy | Alisa Kolesnikova | Humboldt University
 
Undermining democracy | Alisa Kolesnikova | DN18
Undermining  democracy | Alisa Kolesnikova | DN18Undermining  democracy | Alisa Kolesnikova | DN18
Undermining democracy | Alisa Kolesnikova | DN18
 
Discussion presentation 4.25.11
Discussion presentation 4.25.11Discussion presentation 4.25.11
Discussion presentation 4.25.11
 
Social Media in an Emergency - Crash, BOOM, tweet...with a twist
Social Media in an Emergency - Crash, BOOM, tweet...with a twistSocial Media in an Emergency - Crash, BOOM, tweet...with a twist
Social Media in an Emergency - Crash, BOOM, tweet...with a twist
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discourse
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Johns Hopkins SAIS IRP Gatekeepers Talk - Min Jiang

  • 1. How is the Internet Changing China? How is China Changing the Internet? INTERNATIONAL REPORTING PROJECT SAIS, JOHNS HOPKINS UNIVERSITY WASHINGTON DC (MAY 7, 2010) Min Jiang (Ph.D.) | Twitter: @mindyjiang Assistant Professor, Communication, UNCC 2009-2010 Annenberg Fellow, Center for Global Communication Studies University of Pennsylvania
  • 3. Chinese Internet: An Overview  400 million Internet users (CNNIC, 2010; Reuters, 2010)  2/3 under age 30  182 million bloggers (almost ½ of China’s netizens)  700 million mobile phone users (½ of Chinese population)  117 million Internet mobile phone users Photos courtesy of MinnPost.Com, eChinaCities.com
  • 4. Fragile Superpower Photo TOP: http://www.indiantvtoday.com/wp- content/uploads/2008/08/beijing-olympics080808.jpg Photo MIDDLE: http://unn.people.com.cn/GB/88607/11143350.html Photo BOTTOM: http://www.flickr.com/photos/melody_am/1061440660/in/set- 72157594475249707/
  • 6. “We Chinese Need to be Controlled”? Jackie Chan: Media quoted me out of context Dai Qincheng: (HK) Netizens demand Jackie Chan be sent to North Korea (reprint) Han Han: Read the Emperor’s mind like Jackie Chan ChinaNet, douban, Sina Blog (April 23, 2009)
  • 7. Authoritarian Deliberation Patriotism + Legitimacy-based Performance Photo LEFT: http://www.flickr.com/photos/33673641@N00/1251068537 Photo RIGHT: http://rss.xinhuanet.com/newsc/english/2008-05/14/content_8168699.htm
  • 8. Premier Wen Jiaobao Online Chat 知屋漏者在宇下, 知政失者在草野。 He who knows the leakage of a house lives under the roof. He who knows the mishandling of a state is among the populace. Online chat with Chinese netizens: February 27, 2010
  • 9. Net Advantage vs. State Advantage Photos TOP: The Prospect Magazine Photo BOTTOM LEFT: MediaBistro Photo BOTTOM RIGHT: EvgenyMorozov.com
  • 11. Regulating Commercial Sites Image TOP LEFT: http://www.leedominic.com/ Image BOTTOM LEFT: XinhuaNet http://news.xinhuanet.com/photo/2007-08/29/content_6625132.htm Image RIGHT: Heredict Q blog http://blog.myneverland.org/archives/844
  • 12. River Crabs vs. Grass Mud Horse
  • 13. Online Grassroots Discourse  Rights  Exposure  Nationalism
  • 14. Rights: Chongqing Nail House 2007 Image TOP : Eastwood Zhao.com http://www.eastwoodzhao.com/stubborn-nail-house-demolished/ Image RIGHT: CBC http://www.cbc.ca/arts/media/story/2007/03/26/nailhouse-censor.html
  • 15. Rights: Deng Yujiao 2009 Punish Sex Offenders Release Deng Yujiao Shame on Badong Police Sources: The Guardian, EastSouthWestNorth, Tianya BBS
  • 16. Rights: Taking a Stroll in Xiamen 2007 Guard Harmonious Xiamen Reject Petrochemical Pollution
  • 17. Rights: Panyu “We Are Not to Be Represented” 2010 Anti-Garbage Incineration
  • 18. Rights: Green Dam Youth Escort 2009
  • 19. Exposure: Cat Abuser 2006 “Human Flesh Search” Sources: Photos TOP: Top 15 Amazing ly Fat Cats http://offbeatstuff.blogspot.com/2008/09/top-15-amazingly-fat-cats.html Photos RIGHT: Netease BBS http://bbs.163.com
  • 20. Exposure: Housing Administrator Sacked 2008 What is he smoking?! It’s Nanjing Tobacco Co.’s most expensive cigarettes! 1500 RMB per carton! Sources: TOP: XinhuaNet, RIGHT: CQNews.net
  • 21. (Self-) Exposure: Guangxi Tobacco Chief Sex Diary 2010 Sources: TOP: Yahoo! CN News, RIGHT: eChinaCities
  • 24. Shishou Mass Unrest 2009: If Suppression Is Not The Way Forward… Photo TOP: http://www.chinadaily.com.cn/china/2009- 07/09/content_8403394.htm Photo Middle: http://www.zonaeuropa.com/20090621_1.htm Video BOTTOM: http://www.youtube.com/watch?v=n5K7U- TFDY0&feature=player_embedded
  • 25. Ethnic Riots in Xinjiang 2009: Telecom Disconnect Sources: TOP: BBC
  • 26. Google Inc. vs. Chinese Gov. Photo TOP: PortlandMercury Photo RIGHT: Reuters
  • 27. Is “Scaling the Wall” the Ultimate Solution?
  • 28. Getting “Real” on CN Internet 2010 “The Internet is an open information system. As long as Chinese Internet connects with the international web, harmful information of all kinds will find its way to our domestic websites. So long as Chinese Internet is open to the public, all sorts of netizen remarks will emerge.” -- Wang Chen, State Council Information Office
  • 29. The GFW & The Real Wall Photos LEFT: http://www.wired.com/politics/security/magazine/15- 11/ff_chinafirewall?currentPage=all Photo Above: http://www.mobinode.com/wp-content/uploads/2008/05/internet-cafe.jpg
  • 30. Micro Power, Big World Source: Photo TOP & RIGHT: Danwei.org