SlideShare a Scribd company logo
1 of 3
Download to read offline
China's Great Firewall
China has a population of over 1.4 billion people, and more than 700 million of its
citizens are Internet users. Given those statistics, it is perhaps not surprising that China
is the world's leader in e-commerce, with 40 percent of global sales volumedouble that
of the United States. China is also the home of 4 of the world's top 12 Internet
companies ranked by market capitalization: e-commerce giant Alibaba, social-media and
gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi.
China has accomplished all this while implementing a system of Internet censorship and
surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which
are some of the strictest in the world.
China's attempt to control access and limit content available to its citizens began shortly
after the Internet's introduction in China. The country's Golden Shield Project and the
Great Firewall are part of immense, multifaceted Internet surveillance and content
control system that is augmented by workers who delete and add posts to spin any
debate in favor of the government's stance. The goal of the Chinese government is to
block all content it deems undesirable, particularly news stories that are unfavorable to
China or its leaders, as well as references to infamous events, such as the 1989
Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic
sites, the Great Firewall stands at the international gateways, keeping out unwanted
foreign sites using a sophisticated and multitiered system. According to Simon Denyer,
the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge
one of the country's most fundamental contradictionsto have an economy intricately
connected to the outside world but a political culture closed off from such 'Western
values' as free speech and democracy."
Chinese Internet users have their own censored versions of popular services, including
Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook),
and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25
percent of all Internet sites, including the Chinese and English news websites of the
Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that
they are inaccessible in China.
Some Chinese Internet users are able to gain access to restricted content through the
use of virtual private networks (VPNs), which help users elude the restrictions of the
Great Firewall by changing the IP address on their computer, laptop, or mobile device
into one of many offered by the VPN provider. So, while a user may be accessing the
Internet from a city within China, the VPN makes it look like the user is in Japan or some
other country where Internet access is unrestricted. In addition, once users activate their
VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring
all of the data flowing back and forth between their device and the VPN server is private.
However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut
down at any time. Indeed, the government recently began blocking VPNs on which
thousands relied to circumvent the Great Firewall. Even with the option of using a VPN,
many Chinese are content to stay within the state-controlled version of the Internet. A
recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall
to browse the open Internet.
According to the nationalist state-owned Global Times newspaper, "It requires a
sophisticated capability to keep out harmful ideas without damaging the nation's global
connectivity. It enables China to communicate with the outside world, meanwhile,
Western opinion cannot easily penetrate as ideological tools."
Critical Thinking Questions
Some freedom of expression advocates is concerned that U.S.-based technology
firms will do whatever it takes to gain a foothold in the Chinese market, even going so
far as to implement surveillance and censorship measures in their products and
services in order to meet the demands of the Chinese government. How might global
Internet users react to Facebook or YouTube that censors its users' posts and
monitors its users to comply with laws in China? What ethical and economic factors
should an information technology company weigh when considering whether to enter
the Chinese marketplace? MINIMUM 150 words.
China's Great Firewall
China has a population of over 1.4 billion people, and more than 700 million of its
citizens are Internet users. Given those statistics, it is perhaps not surprising that China
is the world's leader in e-commerce, with 40 percent of global sales volumedouble that
of the United States. China is also the home of 4 of the world's top 12 Internet
companies ranked by market capitalization: e-commerce giant Alibaba, social-media and
gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi.
China has accomplished all this while implementing a system of Internet censorship and
surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which
are some of the strictest in the world.
China's attempt to control access and limit content available to its citizens began shortly
after the Internet's introduction in China. The country's Golden Shield Project and the
Great Firewall are part of immense, multifaceted Internet surveillance and content
control system that is augmented by workers who delete and add posts to spin any
debate in favor of the government's stance. The goal of the Chinese government is to
block all content it deems undesirable, particularly news stories that are unfavorable to
China or its leaders, as well as references to infamous events, such as the 1989
Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic
sites, the Great Firewall stands at the international gateways, keeping out unwanted
foreign sites using a sophisticated and multitiered system. According to Simon Denyer,
the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge
one of the country's most fundamental contradictionsto have an economy intricately
connected to the outside world but a political culture closed off from such 'Western
values' as free speech and democracy."
Chinese Internet users have their own censored versions of popular services, including
Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook),
and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25
percent of all Internet sites, including the Chinese and English news websites of the
Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that
they are inaccessible in China.
Some Chinese Internet users are able to gain access to restricted content through the
use of virtual private networks (VPNs), which help users elude the restrictions of the
Great Firewall by changing the IP address on their computer, laptop, or mobile device
into one of many offered by the VPN provider. So, while a user may be accessing the
Internet from a city within China, the VPN makes it look like the user is in Japan or some
other country where Internet access is unrestricted. In addition, once users activate their
VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring
all of the data flowing back and forth between their device and the VPN server is private.
However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut
down at any time. Indeed, the government recently began blocking VPNs on which
thousands relied to circumvent the Great Firewall. Even with the option of using a VPN,
many Chinese are content to stay within the state-controlled version of the Internet. A
recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall
to browse the open Internet.
According to the nationalist state-owned Global Times newspaper, "It requires a
sophisticated capability to keep out harmful ideas without damaging the nation's global
connectivity. It enables China to communicate with the outside world, meanwhile,
Western opinion cannot easily penetrate as ideological tools."
Critical Thinking Questions
Some freedom of expression advocates is concerned that U.S.-based technology firms will do
whatever it takes to gain a foothold in the Chinese market, even going so far as to implement
surveillance and censorship measures in their products and services in order to meet the
demands of the Chinese government. How might global Internet users react to Facebook or
YouTube that censors its users' posts and monitors its users to comply with laws in China? What
ethical and economic factors should an information technology company weigh when considering
whether to enter the Chinese marketplace? MINIMUM 150 words.

More Related Content

Similar to Chinas Great FirewallChina has a population of over 14 bil.pdf

"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxCase Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxtidwellveronique
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentationguestfbc5d4
 
Google in China | Varun Daahal
Google in China | Varun DaahalGoogle in China | Varun Daahal
Google in China | Varun DaahalVarun Daahal
 
Navigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaNavigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaGravity Media
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesYokimura Dimaunahan
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Dividehmjchung
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divideshmjchung
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Tissue Chowtszyan
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13devy7
 

Similar to Chinas Great FirewallChina has a population of over 14 bil.pdf (20)

"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxCase Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentation
 
Google in China | Varun Daahal
Google in China | Varun DaahalGoogle in China | Varun Daahal
Google in China | Varun Daahal
 
Navigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaNavigating the Social Media Landscape In China
Navigating the Social Media Landscape In China
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Policy primer
Policy primerPolicy primer
Policy primer
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Divide
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divides
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
 
Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 

More from aghsports

Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdfClck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdfaghsports
 
Classify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdfClassify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdfaghsports
 
Class Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdfClass Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdfaghsports
 
Class Buttercup public Buttercupint baddifs num_punc.pdf
Class Buttercup  public  Buttercupint baddifs  num_punc.pdfClass Buttercup  public  Buttercupint baddifs  num_punc.pdf
Class Buttercup public Buttercupint baddifs num_punc.pdfaghsports
 
class People protected string name int age public XXX .pdf
class People  protected string name int age public XXX .pdfclass People  protected string name int age public XXX .pdf
class People protected string name int age public XXX .pdfaghsports
 
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdfClasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdfaghsports
 
Circuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdfCircuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdfaghsports
 
Choose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdfChoose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdfaghsports
 
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdfCisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdfaghsports
 
CISC 341 Computer Architecture You must show your work to.pdf
CISC 341 Computer Architecture  You must show your work to.pdfCISC 341 Computer Architecture  You must show your work to.pdf
CISC 341 Computer Architecture You must show your work to.pdfaghsports
 
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdfCinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdfaghsports
 
CIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdfCIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdfaghsports
 
Choose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdfChoose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdfaghsports
 
Choose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdfChoose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdfaghsports
 
Choose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdfChoose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdfaghsports
 
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdfCHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdfaghsports
 
Choose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdfChoose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdfaghsports
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfaghsports
 
choose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdfchoose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdfaghsports
 
Choose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdfChoose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdfaghsports
 

More from aghsports (20)

Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdfClck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
 
Classify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdfClassify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdf
 
Class Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdfClass Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdf
 
Class Buttercup public Buttercupint baddifs num_punc.pdf
Class Buttercup  public  Buttercupint baddifs  num_punc.pdfClass Buttercup  public  Buttercupint baddifs  num_punc.pdf
Class Buttercup public Buttercupint baddifs num_punc.pdf
 
class People protected string name int age public XXX .pdf
class People  protected string name int age public XXX .pdfclass People  protected string name int age public XXX .pdf
class People protected string name int age public XXX .pdf
 
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdfClasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
 
Circuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdfCircuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdf
 
Choose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdfChoose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdf
 
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdfCisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
 
CISC 341 Computer Architecture You must show your work to.pdf
CISC 341 Computer Architecture  You must show your work to.pdfCISC 341 Computer Architecture  You must show your work to.pdf
CISC 341 Computer Architecture You must show your work to.pdf
 
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdfCinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
 
CIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdfCIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdf
 
Choose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdfChoose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdf
 
Choose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdfChoose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdf
 
Choose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdfChoose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdf
 
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdfCHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
 
Choose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdfChoose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdf
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdf
 
choose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdfchoose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdf
 
Choose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdfChoose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdf
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Chinas Great FirewallChina has a population of over 14 bil.pdf

  • 1. China's Great Firewall China has a population of over 1.4 billion people, and more than 700 million of its citizens are Internet users. Given those statistics, it is perhaps not surprising that China is the world's leader in e-commerce, with 40 percent of global sales volumedouble that of the United States. China is also the home of 4 of the world's top 12 Internet companies ranked by market capitalization: e-commerce giant Alibaba, social-media and gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi. China has accomplished all this while implementing a system of Internet censorship and surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which are some of the strictest in the world. China's attempt to control access and limit content available to its citizens began shortly after the Internet's introduction in China. The country's Golden Shield Project and the Great Firewall are part of immense, multifaceted Internet surveillance and content control system that is augmented by workers who delete and add posts to spin any debate in favor of the government's stance. The goal of the Chinese government is to block all content it deems undesirable, particularly news stories that are unfavorable to China or its leaders, as well as references to infamous events, such as the 1989 Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic sites, the Great Firewall stands at the international gateways, keeping out unwanted foreign sites using a sophisticated and multitiered system. According to Simon Denyer, the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge one of the country's most fundamental contradictionsto have an economy intricately connected to the outside world but a political culture closed off from such 'Western values' as free speech and democracy." Chinese Internet users have their own censored versions of popular services, including Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook), and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25 percent of all Internet sites, including the Chinese and English news websites of the Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that they are inaccessible in China. Some Chinese Internet users are able to gain access to restricted content through the use of virtual private networks (VPNs), which help users elude the restrictions of the Great Firewall by changing the IP address on their computer, laptop, or mobile device into one of many offered by the VPN provider. So, while a user may be accessing the Internet from a city within China, the VPN makes it look like the user is in Japan or some other country where Internet access is unrestricted. In addition, once users activate their VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring all of the data flowing back and forth between their device and the VPN server is private. However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut down at any time. Indeed, the government recently began blocking VPNs on which thousands relied to circumvent the Great Firewall. Even with the option of using a VPN, many Chinese are content to stay within the state-controlled version of the Internet. A
  • 2. recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall to browse the open Internet. According to the nationalist state-owned Global Times newspaper, "It requires a sophisticated capability to keep out harmful ideas without damaging the nation's global connectivity. It enables China to communicate with the outside world, meanwhile, Western opinion cannot easily penetrate as ideological tools." Critical Thinking Questions Some freedom of expression advocates is concerned that U.S.-based technology firms will do whatever it takes to gain a foothold in the Chinese market, even going so far as to implement surveillance and censorship measures in their products and services in order to meet the demands of the Chinese government. How might global Internet users react to Facebook or YouTube that censors its users' posts and monitors its users to comply with laws in China? What ethical and economic factors should an information technology company weigh when considering whether to enter the Chinese marketplace? MINIMUM 150 words. China's Great Firewall China has a population of over 1.4 billion people, and more than 700 million of its citizens are Internet users. Given those statistics, it is perhaps not surprising that China is the world's leader in e-commerce, with 40 percent of global sales volumedouble that of the United States. China is also the home of 4 of the world's top 12 Internet companies ranked by market capitalization: e-commerce giant Alibaba, social-media and gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi. China has accomplished all this while implementing a system of Internet censorship and surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which are some of the strictest in the world. China's attempt to control access and limit content available to its citizens began shortly after the Internet's introduction in China. The country's Golden Shield Project and the Great Firewall are part of immense, multifaceted Internet surveillance and content control system that is augmented by workers who delete and add posts to spin any debate in favor of the government's stance. The goal of the Chinese government is to block all content it deems undesirable, particularly news stories that are unfavorable to China or its leaders, as well as references to infamous events, such as the 1989 Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic sites, the Great Firewall stands at the international gateways, keeping out unwanted foreign sites using a sophisticated and multitiered system. According to Simon Denyer, the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge one of the country's most fundamental contradictionsto have an economy intricately connected to the outside world but a political culture closed off from such 'Western values' as free speech and democracy."
  • 3. Chinese Internet users have their own censored versions of popular services, including Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook), and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25 percent of all Internet sites, including the Chinese and English news websites of the Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that they are inaccessible in China. Some Chinese Internet users are able to gain access to restricted content through the use of virtual private networks (VPNs), which help users elude the restrictions of the Great Firewall by changing the IP address on their computer, laptop, or mobile device into one of many offered by the VPN provider. So, while a user may be accessing the Internet from a city within China, the VPN makes it look like the user is in Japan or some other country where Internet access is unrestricted. In addition, once users activate their VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring all of the data flowing back and forth between their device and the VPN server is private. However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut down at any time. Indeed, the government recently began blocking VPNs on which thousands relied to circumvent the Great Firewall. Even with the option of using a VPN, many Chinese are content to stay within the state-controlled version of the Internet. A recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall to browse the open Internet. According to the nationalist state-owned Global Times newspaper, "It requires a sophisticated capability to keep out harmful ideas without damaging the nation's global connectivity. It enables China to communicate with the outside world, meanwhile, Western opinion cannot easily penetrate as ideological tools." Critical Thinking Questions Some freedom of expression advocates is concerned that U.S.-based technology firms will do whatever it takes to gain a foothold in the Chinese market, even going so far as to implement surveillance and censorship measures in their products and services in order to meet the demands of the Chinese government. How might global Internet users react to Facebook or YouTube that censors its users' posts and monitors its users to comply with laws in China? What ethical and economic factors should an information technology company weigh when considering whether to enter the Chinese marketplace? MINIMUM 150 words.