SlideShare a Scribd company logo
China And its Internet Revolution
Since China’s existence ,[object Object]
Only in the past few decades has China been able to Attempt to reclaim its glory in the industrial and technological  world
Through rapid industrialization and development, China is on its way to being a world superpower.
“ Everything that happens in the West is happening on steroids in China,”  –  Sam Flemming, Founder of CIC in Shanghai Image by VioletInk, Flickr
As you would have guessed... This change is happening to China’s social networks Image by Black Cloud Imagery
Today, there are nearly  400 million  internet users   in  China Source: Internet World Stats China 2010 And the number is growing by  10 million  every month! Image Source: Microsoft Office Clip Art
Compared to the  US , which only has  240 million users...   Image Source: Microsoft Office Clip Art Source: Internet World Stats USA 2010
China has a great potential for growth.
Of the  400 Million  Users... ,[object Object],[object Object],[object Object],[object Object],Image Source: Elmiurry, Flickr
And Yes,   Are all censored in  China. Source: Merritt Colaizzi, Social Media in China
So how is social media growing so much? Image Source: QuoinMonkey, Flickr
Enter:  BBS  (Bulletin Board System) China’s Heart of Social Media. Image Source: QQ website
BBS sites such as: Allow users to upload  images ,  videos , and  more  on an anonymous forum. Image Source: 51 website Image Source: QQ website
Information is circulated essentially Through word of  mouth. Image Source: J-P De Clerck
Similar to our Social Media,  BBS sites are linked to numerous Chinese equivalent sites like  Facebook  and  Youtube . Image Source: Ogilvy China
These equivalent sites are quite different than their counterparts. Image Source: Pulsarwallpapers
BBS is becoming so popular, Most sites have created virtual currency so users can trade online content.
Now,  Tencent  is an example to the West… Of how to Monetize Social Media. Image Source: Ad Solver Blog
China’s technological capabilities are rapidly growing And the Chinese people are embracing every aspect. Pretty soon the Western world will be the one struggling to keep up…

More Related Content

Similar to China1

The digital divide and staying ahead of technology
The digital divide and staying ahead of technologyThe digital divide and staying ahead of technology
The digital divide and staying ahead of technologyChris O'Brien
 
Creating Captivating Content
Creating Captivating ContentCreating Captivating Content
Creating Captivating Content
Daria Steigman | Steigman Communications, llc
 
Richard Apps: The influence of Social Media
Richard Apps: The influence of Social MediaRichard Apps: The influence of Social Media
Richard Apps: The influence of Social MediaUX People
 
Old Or New? The Future Of Media?
Old Or New? The Future Of Media?Old Or New? The Future Of Media?
Old Or New? The Future Of Media?
Altogether Digital
 
The Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving SocietyThe Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving Society
Chelsey McCord
 
Personal Learning Networks and Social Media
Personal Learning Networks and Social MediaPersonal Learning Networks and Social Media
Personal Learning Networks and Social Media
Mike McCready
 
51.com Introduction Presentation
51.com Introduction Presentation51.com Introduction Presentation
51.com Introduction Presentation
Amit Ranjan
 
Social Media Statistics - 2010 update
Social Media Statistics - 2010 updateSocial Media Statistics - 2010 update
Social Media Statistics - 2010 update
Social Media MC
 
(2010) Social Media Networking for Seniors
(2010) Social Media Networking for Seniors(2010) Social Media Networking for Seniors
(2010) Social Media Networking for Seniors
Devendra Shrikhande
 
Social Media In China
Social Media In ChinaSocial Media In China
Social Media In China
Des Walsh
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
Tom Seymour, PhD
 
China Social Network
China Social Network China Social Network
China Social Network
Li Zhang
 
WTF is Social Media?
WTF is Social Media?WTF is Social Media?
WTF is Social Media?
Justine Abigail
 
What's Possible Now
What's Possible NowWhat's Possible Now
What's Possible Now
Laura "@pistachio" Fitton
 
Know your rights
Know your rightsKnow your rights
Know your rightsLYRASIS
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speechrmackinnon
 
Social Media Emergence In China
Social Media Emergence In ChinaSocial Media Emergence In China
Social Media Emergence In China
Jia Liu
 

Similar to China1 (20)

The digital divide and staying ahead of technology
The digital divide and staying ahead of technologyThe digital divide and staying ahead of technology
The digital divide and staying ahead of technology
 
Creating Captivating Content
Creating Captivating ContentCreating Captivating Content
Creating Captivating Content
 
Richard Apps: The influence of Social Media
Richard Apps: The influence of Social MediaRichard Apps: The influence of Social Media
Richard Apps: The influence of Social Media
 
Social media kg
Social media   kgSocial media   kg
Social media kg
 
Old Or New? The Future Of Media?
Old Or New? The Future Of Media?Old Or New? The Future Of Media?
Old Or New? The Future Of Media?
 
The Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving SocietyThe Influence of Social Media on our Ever-Evolving Society
The Influence of Social Media on our Ever-Evolving Society
 
Personal Learning Networks and Social Media
Personal Learning Networks and Social MediaPersonal Learning Networks and Social Media
Personal Learning Networks and Social Media
 
51.com Introduction Presentation
51.com Introduction Presentation51.com Introduction Presentation
51.com Introduction Presentation
 
Social Media Statistics - 2010 update
Social Media Statistics - 2010 updateSocial Media Statistics - 2010 update
Social Media Statistics - 2010 update
 
(2010) Social Media Networking for Seniors
(2010) Social Media Networking for Seniors(2010) Social Media Networking for Seniors
(2010) Social Media Networking for Seniors
 
Social Media In China
Social Media In ChinaSocial Media In China
Social Media In China
 
Web 2.0 intro
Web 2.0 introWeb 2.0 intro
Web 2.0 intro
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
 
China Social Network
China Social Network China Social Network
China Social Network
 
WTF is Social Media?
WTF is Social Media?WTF is Social Media?
WTF is Social Media?
 
Film 260
Film 260Film 260
Film 260
 
What's Possible Now
What's Possible NowWhat's Possible Now
What's Possible Now
 
Know your rights
Know your rightsKnow your rights
Know your rights
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
 
Social Media Emergence In China
Social Media Emergence In ChinaSocial Media Emergence In China
Social Media Emergence In China
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

China1

  • 1. China And its Internet Revolution
  • 2.
  • 3. Only in the past few decades has China been able to Attempt to reclaim its glory in the industrial and technological world
  • 4. Through rapid industrialization and development, China is on its way to being a world superpower.
  • 5. “ Everything that happens in the West is happening on steroids in China,” – Sam Flemming, Founder of CIC in Shanghai Image by VioletInk, Flickr
  • 6. As you would have guessed... This change is happening to China’s social networks Image by Black Cloud Imagery
  • 7. Today, there are nearly 400 million internet users in China Source: Internet World Stats China 2010 And the number is growing by 10 million every month! Image Source: Microsoft Office Clip Art
  • 8. Compared to the US , which only has 240 million users... Image Source: Microsoft Office Clip Art Source: Internet World Stats USA 2010
  • 9. China has a great potential for growth.
  • 10.
  • 11. And Yes, Are all censored in China. Source: Merritt Colaizzi, Social Media in China
  • 12. So how is social media growing so much? Image Source: QuoinMonkey, Flickr
  • 13. Enter: BBS (Bulletin Board System) China’s Heart of Social Media. Image Source: QQ website
  • 14. BBS sites such as: Allow users to upload images , videos , and more on an anonymous forum. Image Source: 51 website Image Source: QQ website
  • 15. Information is circulated essentially Through word of mouth. Image Source: J-P De Clerck
  • 16. Similar to our Social Media, BBS sites are linked to numerous Chinese equivalent sites like Facebook and Youtube . Image Source: Ogilvy China
  • 17. These equivalent sites are quite different than their counterparts. Image Source: Pulsarwallpapers
  • 18. BBS is becoming so popular, Most sites have created virtual currency so users can trade online content.
  • 19. Now, Tencent is an example to the West… Of how to Monetize Social Media. Image Source: Ad Solver Blog
  • 20. China’s technological capabilities are rapidly growing And the Chinese people are embracing every aspect. Pretty soon the Western world will be the one struggling to keep up…