SlideShare a Scribd company logo
China's Great Firewall
China has a population of over 1.4 billion people, and more than 700 million of its
citizens are Internet users. Given those statistics, it is perhaps not surprising that China
is the world's leader in e-commerce, with 40 percent of global sales volumedouble that
of the United States. China is also the home of 4 of the world's top 12 Internet
companies ranked by market capitalization: e-commerce giant Alibaba, social-media and
gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi.
China has accomplished all this while implementing a system of Internet censorship and
surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which
are some of the strictest in the world.
China's attempt to control access and limit content available to its citizens began shortly
after the Internet's introduction in China. The country's Golden Shield Project and the
Great Firewall are part of immense, multifaceted Internet surveillance and content
control system that is augmented by workers who delete and add posts to spin any
debate in favor of the government's stance. The goal of the Chinese government is to
block all content it deems undesirable, particularly news stories that are unfavorable to
China or its leaders, as well as references to infamous events, such as the 1989
Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic
sites, the Great Firewall stands at the international gateways, keeping out unwanted
foreign sites using a sophisticated and multitiered system. According to Simon Denyer,
the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge
one of the country's most fundamental contradictionsto have an economy intricately
connected to the outside world but a political culture closed off from such 'Western
values' as free speech and democracy."
Chinese Internet users have their own censored versions of popular services, including
Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook),
and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25
percent of all Internet sites, including the Chinese and English news websites of the
Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that
they are inaccessible in China.
Some Chinese Internet users are able to gain access to restricted content through the
use of virtual private networks (VPNs), which help users elude the restrictions of the
Great Firewall by changing the IP address on their computer, laptop, or mobile device
into one of many offered by the VPN provider. So, while a user may be accessing the
Internet from a city within China, the VPN makes it look like the user is in Japan or some
other country where Internet access is unrestricted. In addition, once users activate their
VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring
all of the data flowing back and forth between their device and the VPN server is private.
However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut
down at any time. Indeed, the government recently began blocking VPNs on which
thousands relied to circumvent the Great Firewall. Even with the option of using a VPN,
many Chinese are content to stay within the state-controlled version of the Internet. A
recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall
to browse the open Internet.
According to the nationalist state-owned Global Times newspaper, "It requires a
sophisticated capability to keep out harmful ideas without damaging the nation's global
connectivity. It enables China to communicate with the outside world, meanwhile,
Western opinion cannot easily penetrate as ideological tools."
Critical Thinking Questions
Some freedom of expression advocates is concerned that U.S.-based technology
firms will do whatever it takes to gain a foothold in the Chinese market, even going so
far as to implement surveillance and censorship measures in their products and
services in order to meet the demands of the Chinese government. How might global
Internet users react to Facebook or YouTube that censors its users' posts and
monitors its users to comply with laws in China? What ethical and economic factors
should an information technology company weigh when considering whether to enter
the Chinese marketplace? MINIMUM 150 words.
China's Great Firewall
China has a population of over 1.4 billion people, and more than 700 million of its
citizens are Internet users. Given those statistics, it is perhaps not surprising that China
is the world's leader in e-commerce, with 40 percent of global sales volumedouble that
of the United States. China is also the home of 4 of the world's top 12 Internet
companies ranked by market capitalization: e-commerce giant Alibaba, social-media and
gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi.
China has accomplished all this while implementing a system of Internet censorship and
surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which
are some of the strictest in the world.
China's attempt to control access and limit content available to its citizens began shortly
after the Internet's introduction in China. The country's Golden Shield Project and the
Great Firewall are part of immense, multifaceted Internet surveillance and content
control system that is augmented by workers who delete and add posts to spin any
debate in favor of the government's stance. The goal of the Chinese government is to
block all content it deems undesirable, particularly news stories that are unfavorable to
China or its leaders, as well as references to infamous events, such as the 1989
Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic
sites, the Great Firewall stands at the international gateways, keeping out unwanted
foreign sites using a sophisticated and multitiered system. According to Simon Denyer,
the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge
one of the country's most fundamental contradictionsto have an economy intricately
connected to the outside world but a political culture closed off from such 'Western
values' as free speech and democracy."
Chinese Internet users have their own censored versions of popular services, including
Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook),
and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25
percent of all Internet sites, including the Chinese and English news websites of the
Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that
they are inaccessible in China.
Some Chinese Internet users are able to gain access to restricted content through the
use of virtual private networks (VPNs), which help users elude the restrictions of the
Great Firewall by changing the IP address on their computer, laptop, or mobile device
into one of many offered by the VPN provider. So, while a user may be accessing the
Internet from a city within China, the VPN makes it look like the user is in Japan or some
other country where Internet access is unrestricted. In addition, once users activate their
VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring
all of the data flowing back and forth between their device and the VPN server is private.
However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut
down at any time. Indeed, the government recently began blocking VPNs on which
thousands relied to circumvent the Great Firewall. Even with the option of using a VPN,
many Chinese are content to stay within the state-controlled version of the Internet. A
recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall
to browse the open Internet.
According to the nationalist state-owned Global Times newspaper, "It requires a
sophisticated capability to keep out harmful ideas without damaging the nation's global
connectivity. It enables China to communicate with the outside world, meanwhile,
Western opinion cannot easily penetrate as ideological tools."
Critical Thinking Questions
Some freedom of expression advocates is concerned that U.S.-based technology firms will do
whatever it takes to gain a foothold in the Chinese market, even going so far as to implement
surveillance and censorship measures in their products and services in order to meet the
demands of the Chinese government. How might global Internet users react to Facebook or
YouTube that censors its users' posts and monitors its users to comply with laws in China? What
ethical and economic factors should an information technology company weigh when considering
whether to enter the Chinese marketplace? MINIMUM 150 words.

More Related Content

Similar to Chinas Great FirewallChina has a population of over 14 bil.pdf

"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
Vadim Dryganov
 
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxCase Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
tidwellveronique
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentationguestfbc5d4
 
Google in China | Varun Daahal
Google in China | Varun DaahalGoogle in China | Varun Daahal
Google in China | Varun Daahal
Varun Daahal
 
Navigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaNavigating the Social Media Landscape In China
Navigating the Social Media Landscape In China
Gravity Media
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
Yokimura Dimaunahan
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
Policy primer
Policy primerPolicy primer
Policy primer
Michael Natoli
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
Msifry
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Divide
hmjchung
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divides
hmjchung
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
Charles Mok
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Tissue Chowtszyan
 
Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
Freedom House
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Alireza Ghahrood
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13
devy7
 

Similar to Chinas Great FirewallChina has a population of over 14 bil.pdf (20)

"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxCase Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentation
 
Google in China | Varun Daahal
Google in China | Varun DaahalGoogle in China | Varun Daahal
Google in China | Varun Daahal
 
Navigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaNavigating the Social Media Landscape In China
Navigating the Social Media Landscape In China
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Policy primer
Policy primerPolicy primer
Policy primer
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Divide
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divides
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
 
Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Pr chapter 13
Pr chapter 13Pr chapter 13
Pr chapter 13
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 

More from aghsports

Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdfClck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
aghsports
 
Classify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdfClassify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdf
aghsports
 
Class Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdfClass Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdf
aghsports
 
Class Buttercup public Buttercupint baddifs num_punc.pdf
Class Buttercup  public  Buttercupint baddifs  num_punc.pdfClass Buttercup  public  Buttercupint baddifs  num_punc.pdf
Class Buttercup public Buttercupint baddifs num_punc.pdf
aghsports
 
class People protected string name int age public XXX .pdf
class People  protected string name int age public XXX .pdfclass People  protected string name int age public XXX .pdf
class People protected string name int age public XXX .pdf
aghsports
 
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdfClasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
aghsports
 
Circuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdfCircuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdf
aghsports
 
Choose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdfChoose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdf
aghsports
 
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdfCisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
aghsports
 
CISC 341 Computer Architecture You must show your work to.pdf
CISC 341 Computer Architecture  You must show your work to.pdfCISC 341 Computer Architecture  You must show your work to.pdf
CISC 341 Computer Architecture You must show your work to.pdf
aghsports
 
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdfCinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
aghsports
 
CIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdfCIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdf
aghsports
 
Choose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdfChoose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdf
aghsports
 
Choose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdfChoose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdf
aghsports
 
Choose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdfChoose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdf
aghsports
 
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdfCHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
aghsports
 
Choose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdfChoose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdf
aghsports
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdf
aghsports
 
choose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdfchoose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdf
aghsports
 
Choose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdfChoose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdf
aghsports
 

More from aghsports (20)

Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdfClck the kon to view tre table A 147425 a H 425 H2lt4.pdf
Clck the kon to view tre table A 147425 a H 425 H2lt4.pdf
 
Classify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdfClassify the following data Indicate whether the data is qu.pdf
Classify the following data Indicate whether the data is qu.pdf
 
Class Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdfClass Activity Perform a group of 3 member Choose any of th.pdf
Class Activity Perform a group of 3 member Choose any of th.pdf
 
Class Buttercup public Buttercupint baddifs num_punc.pdf
Class Buttercup  public  Buttercupint baddifs  num_punc.pdfClass Buttercup  public  Buttercupint baddifs  num_punc.pdf
Class Buttercup public Buttercupint baddifs num_punc.pdf
 
class People protected string name int age public XXX .pdf
class People  protected string name int age public XXX .pdfclass People  protected string name int age public XXX .pdf
class People protected string name int age public XXX .pdf
 
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdfClasifique cada ejemplo o definicin segn se aplique al gen.pdf
Clasifique cada ejemplo o definicin segn se aplique al gen.pdf
 
Circuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdfCircuit diagram Please build the following circuit and test.pdf
Circuit diagram Please build the following circuit and test.pdf
 
Choose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdfChoose the incorrect statement below A X is an estimator .pdf
Choose the incorrect statement below A X is an estimator .pdf
 
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdfCisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
Cisconun Tedarik Zinciri Cisconun tedarik zinciri d kayna.pdf
 
CISC 341 Computer Architecture You must show your work to.pdf
CISC 341 Computer Architecture  You must show your work to.pdfCISC 341 Computer Architecture  You must show your work to.pdf
CISC 341 Computer Architecture You must show your work to.pdf
 
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdfCinematix se vuelve mvil  Cinematix Cinema ha revisado reci.pdf
Cinematix se vuelve mvil Cinematix Cinema ha revisado reci.pdf
 
CIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdfCIGS thinfilm solar modules are potentially competitive wit.pdf
CIGS thinfilm solar modules are potentially competitive wit.pdf
 
Choose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdfChoose the correct statement below A Estimators do not gen.pdf
Choose the correct statement below A Estimators do not gen.pdf
 
Choose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdfChoose the correct word to complete these descriptions of st.pdf
Choose the correct word to complete these descriptions of st.pdf
 
Choose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdfChoose one of these three options A IPC using FIFO B Shar.pdf
Choose one of these three options A IPC using FIFO B Shar.pdf
 
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdfCHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
CHOOSE ONLY ONE OF THE FOLLOWING 7 marks 1 Describe in .pdf
 
Choose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdfChoose the correct answer 1 The method _ is called by the .pdf
Choose the correct answer 1 The method _ is called by the .pdf
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdf
 
choose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdfchoose the correct answer 1 Water will flow into the beaker.pdf
choose the correct answer 1 Water will flow into the beaker.pdf
 
Choose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdfChoose the best description of a cDNA library a mixture o.pdf
Choose the best description of a cDNA library a mixture o.pdf
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Chinas Great FirewallChina has a population of over 14 bil.pdf

  • 1. China's Great Firewall China has a population of over 1.4 billion people, and more than 700 million of its citizens are Internet users. Given those statistics, it is perhaps not surprising that China is the world's leader in e-commerce, with 40 percent of global sales volumedouble that of the United States. China is also the home of 4 of the world's top 12 Internet companies ranked by market capitalization: e-commerce giant Alibaba, social-media and gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi. China has accomplished all this while implementing a system of Internet censorship and surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which are some of the strictest in the world. China's attempt to control access and limit content available to its citizens began shortly after the Internet's introduction in China. The country's Golden Shield Project and the Great Firewall are part of immense, multifaceted Internet surveillance and content control system that is augmented by workers who delete and add posts to spin any debate in favor of the government's stance. The goal of the Chinese government is to block all content it deems undesirable, particularly news stories that are unfavorable to China or its leaders, as well as references to infamous events, such as the 1989 Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic sites, the Great Firewall stands at the international gateways, keeping out unwanted foreign sites using a sophisticated and multitiered system. According to Simon Denyer, the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge one of the country's most fundamental contradictionsto have an economy intricately connected to the outside world but a political culture closed off from such 'Western values' as free speech and democracy." Chinese Internet users have their own censored versions of popular services, including Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook), and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25 percent of all Internet sites, including the Chinese and English news websites of the Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that they are inaccessible in China. Some Chinese Internet users are able to gain access to restricted content through the use of virtual private networks (VPNs), which help users elude the restrictions of the Great Firewall by changing the IP address on their computer, laptop, or mobile device into one of many offered by the VPN provider. So, while a user may be accessing the Internet from a city within China, the VPN makes it look like the user is in Japan or some other country where Internet access is unrestricted. In addition, once users activate their VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring all of the data flowing back and forth between their device and the VPN server is private. However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut down at any time. Indeed, the government recently began blocking VPNs on which thousands relied to circumvent the Great Firewall. Even with the option of using a VPN, many Chinese are content to stay within the state-controlled version of the Internet. A
  • 2. recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall to browse the open Internet. According to the nationalist state-owned Global Times newspaper, "It requires a sophisticated capability to keep out harmful ideas without damaging the nation's global connectivity. It enables China to communicate with the outside world, meanwhile, Western opinion cannot easily penetrate as ideological tools." Critical Thinking Questions Some freedom of expression advocates is concerned that U.S.-based technology firms will do whatever it takes to gain a foothold in the Chinese market, even going so far as to implement surveillance and censorship measures in their products and services in order to meet the demands of the Chinese government. How might global Internet users react to Facebook or YouTube that censors its users' posts and monitors its users to comply with laws in China? What ethical and economic factors should an information technology company weigh when considering whether to enter the Chinese marketplace? MINIMUM 150 words. China's Great Firewall China has a population of over 1.4 billion people, and more than 700 million of its citizens are Internet users. Given those statistics, it is perhaps not surprising that China is the world's leader in e-commerce, with 40 percent of global sales volumedouble that of the United States. China is also the home of 4 of the world's top 12 Internet companies ranked by market capitalization: e-commerce giant Alibaba, social-media and gaming company Tencent, search specialist Baidu, and smartphone maker Xiaomi. China has accomplished all this while implementing a system of Internet censorship and surveillance measures, dubbed the Golden Shield Project and the Great Firewall, which are some of the strictest in the world. China's attempt to control access and limit content available to its citizens began shortly after the Internet's introduction in China. The country's Golden Shield Project and the Great Firewall are part of immense, multifaceted Internet surveillance and content control system that is augmented by workers who delete and add posts to spin any debate in favor of the government's stance. The goal of the Chinese government is to block all content it deems undesirable, particularly news stories that are unfavorable to China or its leaders, as well as references to infamous events, such as the 1989 Tiananmen Square Massacre. While the Golden Shield Project is focused on domestic sites, the Great Firewall stands at the international gateways, keeping out unwanted foreign sites using a sophisticated and multitiered system. According to Simon Denyer, the Washington Post's bureau chief in China, "The Great Firewall is an attempt to bridge one of the country's most fundamental contradictionsto have an economy intricately connected to the outside world but a political culture closed off from such 'Western values' as free speech and democracy."
  • 3. Chinese Internet users have their own censored versions of popular services, including Baidu (instead of Google), Weibo (instead of Twitter), WeChat (instead of Facebook), and Youku (instead of YouTube). In addition, the Great Firewall blocks roughly 25 percent of all Internet sites, including the Chinese and English news websites of the Reuters news agency, Bloomberg LP, the Guardian, and the New York Times so that they are inaccessible in China. Some Chinese Internet users are able to gain access to restricted content through the use of virtual private networks (VPNs), which help users elude the restrictions of the Great Firewall by changing the IP address on their computer, laptop, or mobile device into one of many offered by the VPN provider. So, while a user may be accessing the Internet from a city within China, the VPN makes it look like the user is in Japan or some other country where Internet access is unrestricted. In addition, once users activate their VPN, they are connected to one of its servers via a dedicated, encrypted link, ensuring all of the data flowing back and forth between their device and the VPN server is private. However, VPNs exist at the pleasure of the Chinese Communist Party and can be shut down at any time. Indeed, the government recently began blocking VPNs on which thousands relied to circumvent the Great Firewall. Even with the option of using a VPN, many Chinese are content to stay within the state-controlled version of the Internet. A recent study indicated that less than 3 percent of Chinese try to jump the Great Firewall to browse the open Internet. According to the nationalist state-owned Global Times newspaper, "It requires a sophisticated capability to keep out harmful ideas without damaging the nation's global connectivity. It enables China to communicate with the outside world, meanwhile, Western opinion cannot easily penetrate as ideological tools." Critical Thinking Questions Some freedom of expression advocates is concerned that U.S.-based technology firms will do whatever it takes to gain a foothold in the Chinese market, even going so far as to implement surveillance and censorship measures in their products and services in order to meet the demands of the Chinese government. How might global Internet users react to Facebook or YouTube that censors its users' posts and monitors its users to comply with laws in China? What ethical and economic factors should an information technology company weigh when considering whether to enter the Chinese marketplace? MINIMUM 150 words.