Skip to main content Accessibility help
×
Hostname: page-component-68c7f8b79f-7wx25 Total loading time: 0 Render date: 2025-12-19T03:59:54.267Z Has data issue: false hasContentIssue false

12 - The Domestication of Cybersecurity in Authoritarian Regimes

China’s Media Narrative on Cybersecurity and Its Challenge to Democracy

from Part II - Case Studies

Published online by Cambridge University Press:  aN Invalid Date NaN

Scott J. Shackelford
Affiliation:
Indiana University, Bloomington
Frédérick Douzet
Affiliation:
Paris 8 University
Christopher Ankersen
Affiliation:
New York University

Summary

This chapter examines the narrative of cybersecurity in China’s mass media, with a focus on the domestication of cybersecurity and its subsequent challenge to democracy. While much ink has been spilled over cybersecurity in (Western) democracies, less is known about the narrative and discourse of cybersecurity in an authoritarian context and its implications for global Internet governance and security. This chapter fills this gap by exploring news narratives on cybersecurity in China’s domestic mass media after the enactment of the Cybersecurity Law of the People’s Republic of China in 2017. Drawing on computer-assisted semantic network analysis of 9,094 news articles and commentaries, this chapter uncovers how the Chinese regime is adopting a discourse of cybersecurity to legitimize and consolidate its control over the Internet and to counter the challenges of global Internet connection. This domestication discourse is further utilized to place blame on the West for cyber threats. This chapter concludes with thoughts on the domestication of cybersecurity by authoritarian regimes like China and the challenge of defending cybersecurity.

Information

Type
Chapter
Information
Securing Democracies
Defending Against Cyber Attacks and Disinformation in the Digital Age
, pp. 273 - 292
Publisher: Cambridge University Press
Print publication year: 2026
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This content is Open Access and distributed under the terms of the Creative Commons Attribution licence CC-BY-NC-ND 4.0 https://creativecommons.org/cclicenses/

12 The Domestication of Cybersecurity in Authoritarian Regimes China’s Media Narrative on Cybersecurity and Its Challenge to Democracy

Cyber Threats and Authoritarian Regimes: Challenges to Defending Cybersecurity

The disruptive and damaging cyber threats and attacks carried out by authoritarian regimes and their proxies toward both domestic and international entities is a long-standing issue, although one that has become increasingly prominent in recent years (e.g., Bradshaw & Howard, Reference Bradshaw and Howard2019; Morgan, Reference Morgan2018; Schünemann, Reference Schünemann, Cavelty and Wenger2022; Woolley & Howard, Reference Woolley and Howard2017). Scholars have examined diverse cyber threats and attacks ranging from, for instance, internet shutdowns (e.g., Majeed, Reference Majeed2022; Mare, Reference Mare2020) to opinion manipulation (e.g., Alyukov, Reference Alyukov2022; Bradshaw & Howard, Reference Woolley and Howard2017; King, Pan, & Roberts, Reference King, Pan and Roberts2017), from content blockage and filtering (e.g., Greitens, Reference Greitens2013; Roberts, Reference Roberts2018; Ververis, Marguel, & Fabian, Reference Ververis, Marguel and Fabian2020) to fake news and disinformation campaigns (e.g., Abrahams & Leber, Reference Abrahams and Leber2021; Jones, Reference Jones2022). As authoritarian regimes are actively shaping cyberspace at home and on the global stage to their own strategic advantage, understanding their cyber threats not only explains their resilience but, more importantly, monitors their capacity for resurgence (Deibert, Reference Deibert2015, p. 64, emphasis as in original) and subsequent challenges to cybersecurity.

Among authoritarian countries, China’s cyber or internet policies and threats have attracted significant attention, especially in recent years (e.g., Hung & Hung, Reference Hung and Hung2022; Lindsay, Cheung, & Reveron, Reference Lindsay, Cheung and Reveron2015; Myers & Mozur, Reference Myers and Mozur2019; Shackelford et al., Reference Shackelford, Raymond, Stemler and Loyle2020). Without denying their contributions, extant scholarship still has not captured the full gamut of cyber policies and politics that could generate threats to democracies. More specifically, existing studies have either presented the overall picture of internet governance and policies in China (e.g., Miao, Jiang, & Pang, Reference Miao, Jiang and Pang2021; F. Yang & Mueller, Reference Yang and Mueller2014) or elaborated on individual policies and regulations that cater to specific subject matter (e.g., Lindsay, Cheung, & Reveron, Reference Lindsay, Cheung and Reveron2015; Qi, Shao, & Zheng, Reference Qi, Shao and Zheng2018). Few studies, however, have analyzed the media narratives and discourses of those policies and regulations that cater to specific subject matter and that bring about a broader influence on society beyond the policy domain. To fill this gap, this chapter tracks the media narrative and discourse centered on the term “cybersecurity” to uncover how China, “a latecomer on the global cybersecurity scene” (Qi, Shao, & Zheng, Reference Qi, Shao and Zheng2018, p. 1343), has oriented the domestic discursive constructions of cybersecurity toward the perceived national context of the audience.

In the following sections, I first present a general review of studies on China’s internet policies. Second, I explain “domestication” (Clausen, Reference Clausen2004) as the theoretical framework to scrutinize the media narrative of cybersecurity in China’s internet policy. The third section presents the method for data collection and computer-assisted semantic network analysis as the analytical strategy. In the fourth section, the analysis and discussion explain how the discourse on cybersecurity in media coverage legitimizes the regime’s role in enacting internet policy, including its control over the free flow of information, while accusing democracies of cyberattacks. The chapter concludes with implications for the domestication of cybersecurity and challenges to cybersecurity.

Literature Review

Since China established its connection to the internet in 1994, internet policies have become one of the key topics in the debate on the transformation created by the internet to (the authoritarian) China (e.g., Taubman, Reference Taubman1998; Wu, Reference Wu1996). Despite the then popular utopian vision of the internet (or cyberspace) as a facilitator of a radically democratic form of participation from its inception (Barlow, Reference Barlow2019), several scholars remind us that from the beginning of its connection with the internet, the party-state in China was engaged in “a multipronged effort” (Taubman, Reference Taubman1998, p. 267) with resources and regulations to prevent the internet from being “a disruptive force in the domestic area” (Taubman, Reference Taubman1998, p. 268), with the mostly well-known tactic being to build a self-contained intranet national network with a firewall (Barme & Ye, Reference Barme and Ye1997; Griffiths, Reference Griffiths2021).

Generally speaking, extant scholarship has investigated China’s internet policies and politics from both a top-down and a bottom-up approach. The top-down approach encompasses macro-level policy, as well as the legal and technological aspects of internet control, surveillance, and censorship (e.g., Deibert, Reference Deibert2002; MacKinnon, Reference MacKinnon2009; Roberts, Reference Roberts2018; Xiaoming, Zhang, & Yu, Reference Xiaoming, Zhang and Yu1996). For instance, some studies have scrutinized regulatory control (e.g., Esarey & Kluver, Reference Esarey and Kluver2014; MacKinnon, Reference MacKinnon2008, Reference MacKinnon2009; Pan, Reference Pan2017), while others have looked at the technical infrastructure of the “Great Firewall of China” (Barme & Ye, Reference Barme and Ye1997), such as techniques of filtering, domain name system poisoning, and virtual private network blocking (e.g., Clayton, Murdoch, & Watson, Reference Clayton, Murdoch and Watson2007; Deibert et al., Reference Deibert, Palfrey, Rohozinski and Zittrain2008; Lowe, Winters, & Marcus, Reference Lowe, Winters and Marcus2007; for a review, see, e.g., Keremoğlu & Weidmann, Reference Keremoğlu and Weidmann2020). Some, like Pan (Reference Pan2017), have revealed how the dominance of domestic internet platforms that “comply with China’s censorship requirements” in the market allows “the Chinese regime to engage in content censorship that quickly removes online content pertaining to collective action while retaining a great deal of information, including criticisms of the government, online” (p. 182; see also, e.g., Weber & Jia, Reference Weber and Jia2007). Others, such as Liang and Lu (Reference Liang and Lu2010), with their term “multidimensional regulatory system,” have offered a holistic view to describe multiple agencies with various laws and regulations to establish comprehensive control over the infrastructure and commercial and social use of the internet in China.

The bottom-up approach, which can mostly be seen in studies on internet control and censorship, involves understanding the mechanisms behind censorship by analyzing which elements are censored or not (e.g., Bamman, O’Connor, & Smith, Reference Bamman, O’Connor and Smith2012; Crandall et al., Reference Crandall, Crete-Nishihata, Knockel, McKune, Senft and Tseng2013; King, Pan, & Roberts, Reference King, Pan and Roberts2013, Reference King, Pan and Roberts2017; Liu & Zhao, Reference Liu and Zhao2021; Qin, Strömberg, & Wu, Reference Qin, Strömberg and Wu2017). In bottom-up studies, large-scale datasets are harvested through application programming interfaces and analyzed via complex computational and statistical approaches to depict nuanced pictures of how the control, surveillance, manipulation, and censorship program is implemented on the ground (e.g., King, Pan, & Roberts, Reference King, Pan and Roberts2013, Reference King, Pan and Roberts2017; Liu & Zhao, Reference Liu and Zhao2021; Lu & Pan, Reference Lu and Pan2021; Roberts, Reference Roberts2018). Yet, without denying its significance, the bottom-up approach suffers from the lack of a holistic view of policies, as well as the discourse and narratives revolving around these policies, that would better draw a full picture of the evolving internet politics in China.

In recent years, more and more studies have looked beyond policy as relatively stable to track a combination of policy change and policy stability in the internet policies, given the complexity of “allowing access and giving a fair amount of freedom to non-political and less-political information exchange in this country … [while] resisting with firewall solutions and regulations” (Zhang, Reference Zhang2006, p. 285) in China. F. Yang and Mueller (Reference Yang and Mueller2014), for example, used the content analysis approach with the laws and regulations on internet governance between 1994 and 2012 to track how these policies changed over time, identify different policymaking agencies, and ascertain various scopes of application and topical focuses for these policies. Among the many issues and themes, content regulation and cybersecurity have occupied significant and substantial parts of internet policies (57 percent and 41 percent, respectively, see F. Yang & Mueller, Reference Yang and Mueller2014, p. 458). Similarly, the study by Miao, Jiang, and Pang (Reference Miao, Jiang and Pang2021, p. 2021) on Chinese internet policies issued between 1994 and 2017 uncovered the paramount concern over cybersecurity that exemplifies the state’s “deep-seated insecurity over regime stability” in numerous internet regulations. Still, in comparison to the extensive scholarship on content regulation and moderation in China, as discussed earlier, the topic of cybersecurity seems to be relatively understudied, despite its emerging visibility in recent years (but see Lindsay, Cheung, & Reveron, Reference Lindsay, Cheung and Reveron2015; Mueller, Reference Mueller, Deibert, Palfrey, Rohozinski and Zittrain2011). This chapter aims to enrich the discussion with the concept of “domestication.”

Domestication: National Lens on Cross-border Events and Beyond

A key concept in journalistic practice, domestication (Gurevitch, Levy, & Roeh, Reference Gurevitch, Levy, Roeh, Dahlgren and Sparks1993) refers to the framing of foreign or international events to render them comprehensible, compatible, appealing, and relevant to national or local audiences (e.g., Alasuutari, Qadir, & Creutz, Reference Alasuutari, Qadir and Creutz2013; Clausen, Reference Clausen2004; Huiberts & Joye, Reference Huiberts and Joye2018). The fundamental idea, as Gurevitch, Levy, and Roeh (Reference Gurevitch, Levy, Roeh, Dahlgren and Sparks1993) explain, is that “the ‘same’ events are told in divergent ways, geared to the social and political frameworks and sensibilities of diverse domestic audiences” (p. 217, emphasis added). A substantial amount of work has been conducted to interrogate different discursively adaptive ways in which cross-border news is domesticated to make it suited for different audiences nationally and locally (e.g., Clausen, Reference Clausen2004; Joye, Reference Joye2015; Lee, Chan, & Zhou, Reference Lee, Chan and Zhou2011). Olausson (Reference Olausson2014) further differentiates three discursive modes of domestication: “(1) introverted domestication, which disconnects the domestic from the global; (2) extroverted domestication, which interconnects the domestic and the global; and (3) counter-domestication, a de-territorialized mode of reporting that lacks any domestic epicenter” (p. 715). In short, domestication entails a deliberate choice in how one talks about and understands the world.

The research on domestication beyond cross-border events has been expanded by a growing body of studies. Domestication as the process of discursive appropriation and transformation occurs not only in the genre of cross-border news, which has been extensively studied, but also in other genres, such as entertainment (Adamu, Reference Adamu2010), technology (Matassi, Boczkowski, & Mitchelstein, Reference Matassi, Boczkowski and Mitchelstein2019), education (Alasuutari & Alasuutari, Reference Alasuutari and Alasuutari2012), popular culture (H. Fu, Li, & Lee, Reference Fu, Li and Lee2023), and the implementation of exogenous policy (Alasuutari, Reference Alasuutari2009). H. Fu, Li, and Lee (Reference Fu, Li and Lee2023), for instance, expand the term to examine the process “in which a non-native cultural artifact or practice becomes embedded in and tamed by a techno-cultural arena in a receiver country” (p. 77). In other words, broadly speaking, domestication research should pay attention to the strategies that could generate resonance with national or local audiences and contexts beyond the genre of foreign news. By doing so, domestication not only makes events and artifacts meaningful for the domestic audience but it could also be utilized by various actors to reinforce “nation-state discourse and identity” (Olausson, Reference Olausson2014, p. 711).

Following this argument, in this study, we ask the following research question: How does news coverage domesticate “cybersecurity” in internet regulations and policies in China?

Methods

To answer the research question, this study explored the semantic meaning in media narratives and frames as units of analysis. Gamson and Modigliani (Reference Gamson and Modigliani1989) refer to such narratives and frames as “media packages” – that is, as “interpretive packages that give meaning to an issue” (p. 3). Media frames denote structured semantic representations of associated contextual and cultural information (Werner & Cornelissen, Reference Werner and Cornelissen2014). Examining media frames detects the background structure of a shared reality and identifies “the role of political culture and practices in stabilizing particular imaginaries” (Jasanoff & Kim, Reference Jasanoff and Kim2009, p. 121). Given the idea of “associative framing” (Ruigrok & van Atteveldt, Reference Ruigrok and van Atteveldt2007, p. 72), this study operationalizes media narratives and frames as complex patterns of associations between different concepts, with the main associations in a message being its “central organizing idea” (Gamson & Modigliani, Reference Gamson and Modigliani1989, p. 3). In other words, media narratives and frames involve not only the selection of concepts but also their mutual associations that stand for schemata of interpretation. Such associative framings and narratives – recognized as domestication, or discursive appropriation and transformation to local context – are therefore examined through semantic networks derived from the occurrences and co-occurrences of concepts.

Semantic Network Analysis

This study employed computer-assisted semantic network analysis to explore media narratives and frames of cybersecurity in news coverage in the Chinese mainland. With its origin in cognitive science, semantic network analysis argues that human memory contains a structural meaning system (Collins & Quillian, Reference Collins, Quillian, Tulving and Donaldson1972). Semantic network studies have thus suggested that the frequency, co-occurrence, and distances among words and concepts allow researchers to explore a text’s embedded meaning (Danowski, Reference Danowski1993; Doerfel, Reference Doerfel1998). This study adopted the word association (concept co-occurrence) method, which maps the relationships among words by indexing pairs of concepts. Extending beyond the standard content analysis of texts and frequencies of concepts, semantic network analysis reveals the manifest meaning structure of the text and thus indirectly represents the discursive appropriation among the text’s creators (Danowski, Reference Danowski1993). The analysis, with second-hand data from news sources, followed the research question proposed earlier.

Data Collection

To identify and collect data, we first performed an extensive search of news coverage in the Chinese mainland. Before 2017, China enacted several laws and regulations in response to cybersecurity problems (Miao, Jiang, & Pang, Reference Miao, Jiang and Pang2021, p. 2004). These laws and regulations were nevertheless insufficient in dealing with the increasing challenges facing cyberspace. Against this backdrop, China formally introduced the Cybersecurity Law of the People’s Republic of China (“the Cybersecurity Law” in short), which came into effect on June 1, 2017. Accordingly, the time span for the data search and collection was set after June 1, 2017, the date of the enactment of the Cybersecurity Law, until May 1, 2023. We used the keyword-screening method in the Huike News Database (WiseNews, http://wisesearch.wisers.net.cn/), the most professional Chinese media content database. The keywords “网络安全 (cybersecurity)” and “互联网安全 (internet security)” were used in all fields to locate news articles covering issues related to cybersecurity, which yielded a total of 6,362 news articles and commentaries (1,268 pieces in 2017; 1,196 in 2018; 1,056 in 2019; 814 in 2020; 962 in 2021; 748 in 2022; and 318 in 2023 through the end of April).

Data Cleaning and Analysis

The next step was to conduct semantic network analysis and explore the discursive network of cybersecurity in news coverage through the following four steps.

  • The corpus of 6,362 news articles and commentaries was first preprocessed and cleaned. Raw texts were segmented into words using the Chinese lexical analyzer Jieba. Punctuation, numbers, common Chinese stop words, and nonwords were then filtered.

  • Second, the corpus consisting of space-spliced words was submitted to a Python script that counted the frequency of each word and the co-occurrence of word pairs. Word pairs with a raw co-occurrence frequency higher than five were retained for further analysis, following the suggestion of Church and Hanks (Reference Church and Hanks1990), who noted that the mutual information score becomes unstable and meaningless when the count is smaller than five.

  • Third, the semantic network of news coverage on cybersecurity was visualized using Gephi (https://gephi.org/). The ego-network of the terms “cybersecurity” and “internet security” were identified and extracted, given that we focused on the semantic meaning and narrative strategies of the term “cybersecurity.”

  • Fourth, the modularity partition algorithm in Gephi (Newman, Reference Newman2006) was employed to detect concept communities for the semantic networks. The generated semantic network identified cybersecurity-related concepts in the text data as nodes linked together by the frequencies with which each concept co-occurred with other concepts.

Mapping Out Semantic Networks about “Cybersecurity” in News Narratives

There are 41,053 words and 578,008 edges in the whole news articles’ semantic network. The semantic networks for Chinese news articles were visualized using Gephi (Bastian, Heymann, & Jacomy, Reference Bastian, Heymann and Jacomy2009). We then filtered the ego-network for the term “cybersecurity” that consists of 990 words (2.4 percent of the total number of words) and 84,801 edges (14.7 percent of the total number of edges) (Figure 12.1). We ran the average degree to calculate the node strength for each word, which is determined as the number of edges that are incident on that node; the average degree (85.658) refers to the average number of edges per node. Each node represents a word, and the size of the label indicates the node strength, which is calculated by summing the weights of the edges belonging to the node. Edges are undirected and weighted. The modularity partition algorithm suggested that the network could be divided into eight communities, with a modularity score of 0.231.

A semantic network visualization with Chinese words and their translations, for the top cybersecurity themes. Themes in decreasing order of ranking include cybersecurity, security, nation, development, network, and technology.

Figure 12.1 Ego-network of cybersecurity in news coverage in the Chinese mainland, 2017–2023

We identified topics for each word community by their top words and inductively summarized those topics into different themes. Six main clusters could be identified from the semantic network, in ranking order: control and contestation, development and collaboration, personal information, infrastructure, governing actors, and mass media. Figure 12.1 presents the themes and top words for the semantic networks.

Control and contestation (Figure 12.2) is the largest cluster (283 nodes, or 28.6 percent of the total words) in the semantic network. Within the cluster, the word “cybersecurity (网络安全)” is associated with “中国 (China),” “国家nation(al),” “安全 (security),” and “主权 (sovereignty).” Terms such as “党 (the CPC, i.e., the Communist Party of China),” “习近平(Xi Jinping),” “法治 (rule of law),” “领导 (leadership),” “统一 (unity),” “意识形态 (ideology),” and “防火墙 (firewall)” encapsulate control over cybersecurity. The contestation of the term “cybersecurity” is specifically delineated through the use of words such as “保障 (safeguard),” “风险 (risk),” “维护 (maintain),” “防控 (prevention and control),” “挑战 (challenge),” “破坏(undermine),” and “威胁 (threat).” Threats to cybersecurity are epitomized through specific terms such as “恐怖主义 (terrorism),” “反恐 (anti-terrorism),” and “反间谍(counterintelligence).” Notably, this cluster is the only one that includes foreign entities, such as “美国 (the USA),” “欧盟 (European Union),” “美方 (the US),” “英国 (Britain),” “俄罗斯 (Russia),” and “乌克兰 (Ukraine).”

A word cluster with words in varying sizes in Chinese and their English translations presented within parentheses. The translations include Cybersecurity and security, nation and China, Problem, and U S A in decreasing order of their sizes.

Figure 12.2 Control and contestation cluster

The second largest cluster, development and collaboration (Figure 12.3), involves 258 nodes (or 26.1 percent of the total words) that address cybersecurity in concert with economic development, technological innovation, and international collaboration. This cluster involves key terms related to the theme of development, such as “发展 (development),” “加强 (strengthen),” “创新 (innovation),” “推进 (improve),” and “完善 (enhancement),” while specifying different “domains (领域),” including “经济 (economy),” “科技 (technology),” “产业 (industry),” “政策 (policy),” and “战略 (strategy).” It also contains words describing the scope of “collaboration (合作)” in cybersecurity, such as “国际 (international),” “全球 (global),” “世界 (world),” “各国 (different countries),” “地区 (regional),” and “双方 (bilateral).”

A word cluster with words in varying sizes in Chinese and their English translations presented within parentheses. The translations include development, promote, society, collaboration, and technology in decreasing order of their sizes.

Figure 12.3 Development and collaboration cluster

Next is the personal information cluster (Figure 12.4), with 246 nodes (or 24.8 percent of the total words), which in essence discusses issues related to personal “data (数据)” in business. Terms such as “企业 (enterprise),” “平台 (platform),” “政府 (government),” “法律 (law),” “用户 (user),” “行业 (industry),” “公司 (company),” “未成年人 (juvenile),” “个人 (individual),” and “消费者 (consumer)” allude to various actors involved in the processes of, for instance, “管理 (manag[ing]),” “保护 (protect[ing]),” “规范 (standardiz[ing]),” and “监管 (supervis[ing]).”

A word cluster with words in varying sizes in Chinese and their English translations presented within parentheses. The words with the largest size include network, information, data, company, and protection.

Figure 12.4 Personal information cluster

Following the personal information cluster, the infrastructure cluster (Figure 12.5), with 109 nodes (16.5 percent of the total words), addresses aspects of technological and infrastructural applications in cybersecurity with keywords such as “建设 (construction),” “服务 (service),” “技术 (technology),” “系统 (system),” “人工智能 (AI),” “智能 (intelligence),” “基础设置 (infrastructure),” and “智慧 (smart).”

A word cluster with words in varying sizes in Chinese and their English translations presented within parentheses. The translations include construction, technology, service, intelligence, and smart in decreasing order of their sizes.

Figure 12.5 Infrastructure cluster

The governing actors cluster (Figure 12.6) consists of fifty-five nodes (5.6 percent of the total words) that allow us to pin down concrete agencies involved in cybersecurity issues. More specifically, the included words identify the national- and local-level actors and agencies that handle cybersecurity, including, for instance, “中央 (central government)”; different levels of “人民政府 (people’s government[s]),” “有限公司 (Company Limited),” “公安部 (Ministry of Public Security),” and “网信(办) ([office of ] Cyberspace Affairs Commission)”; municipal- and provincial-level public security bureau such as the “北京市公安局 (Beijing public security bureau)” and “信息化(办) ([office of] informationalization)”; and public health agencies (“卫生 [public health]” and “健康 [health]”). Most importantly, a critical group of governing actors are the various levels and divisions of party organizations, such as the “省委 (provincial CPC committee),” “市委 (municipal CPC committee),” “书记 (party secretary),” and “宣传部 (propaganda department),” to mention just a few. In other words, these terms signify the essential role of the CPC as well as its in-depth, multidimensional control in the governing of cybersecurity.

A word cluster with words in varying sizes in Chinese and their English translations presented within parentheses. The translations include office, the C P C, company limited, Beijing, and administration bureau in decreasing order of their sizes.

Figure 12.6 Governing actors cluster

The three remaining clusters (Figure 12.7), with a total of thirty-seven nodes (3.7 percent of words), involve words that narrate the relationship between news industries and cybersecurity, as demonstrated in terms such as “媒体 (media),” “要闻 (hard news),” and the names of news organizations, including “新华社 (Xinhua News Agency),” “人民日报 (People’s Daily),” “新京报 (Beijing News),” “环球时报 (Global Times),” and “南方都市报 (Southern Metropolis Daily).”

A word cluster with words in varying sizes in Chinese and their English translations presented within parentheses. The translations include journalist, media, People's Daily, article, institute, and endanger in decreasing order of their sizes.

Figure 12.7 Mass media cluster

Domesticating Cybersecurity

Although extant scholarship has presented an overall picture of internet governance and policies in China (e.g., Miao, Jiang, & Pang, Reference Miao, Jiang and Pang2021; F. Yang & Mueller, Reference Yang and Mueller2014), few studies have yet analyzed how those policies and regulations that cater to specific subject matter have been constructed and appropriated for the national context of the audience – that is, the domestication that this study examines. In particular, our research reveals that the domestication of cybersecurity in mainland China highlights the CPC’s pivotal role in controlling, safeguarding, and advancing cybersecurity measures against the supposedly malicious cyber activities of the democracies. Such domestication not only reinforces the CPC’s comprehensive control over cybersecurity but also frames democracies as the source of unfounded cyber threats to China’s national and societal well-being. By doing so, we recognize the cultural construction of cybersecurity “through which common sense understandings are constructed and the foundations are laid” (Bernal, Reference Bernal2021, p. 612) for national consciousness of cybersecurity. This study, for the first time, fills the gap by tracking the narrative and discourse on “cybersecurity” in news coverage in the Chinese mainland since the enactment of the Cybersecurity Law in 2017.

Similar to the contested discourse on cybersecurity elsewhere – for instance, the discourse in the United States uses metaphors of cybersecurity as a war and makes analogies to the Cold War between the United States and China (e.g., Bernal, Reference Bernal2021; Lawson, Reference Lawson2012; also see the Swedish case in Boholm, Reference Boholm2021) – the media narrative and frame in the Chinese mainland underlines contestations between China and the democracies – that is, the United States and beyond – as a key part of domestication. The most striking feature is that the domestication of cybersecurity in the Chinese context reiterates the CPC’s domination at the heart of the management, operationalization, and development of cybersecurity and, further, national security. By domesticating cybersecurity to the leadership of the CPC and ascribing cyber threats involving cyberattack and cyberterrorism to democracies, the Chinese regime not only legitimizes and consolidates its control over cyberspace but also utilizes cybersecurity to place blame on the democracies.

Our question asks how news coverage domesticates “cybersecurity” in the Chinese mainland. The findings revealed four features. The first, and most prominent one, is the political imperative of highlighting, ensuring, and protecting the dominant role of the CPC in decision-making, developing, maintaining, and executing cybersecurity issues. As illustrated in the analysis, two of the six clusters, or themes – the control and contestation and the governing actors’ clusters – highlighted the hegemonic role of the CPC in cybersecurity. More specifically, in the control and contestation cluster, the CPC, together with the names of the leadership like President Xi Jinping, are articulated as the pivotal actor(s) in safeguarding national sovereignty, societal security, and rule of law and in countering cyber threats from the West. Terms such as “保障 (safeguard),” “强化 (reinforce),” “维护 (maintain),” and “统一 (unit)” further legitimize the hegemonic role of the CPC in cybersecurity through the evaluation of government policies dealing with cyber threats and challenges.

While the CPC’s domination stays as the foundation of cybersecurity in China (as articulated in the control and contestation theme), the governing actors theme adds nuance to the multiplicity of agencies involved in the operationalization of cybersecurity issues. Here, the complexity has a two-fold meaning. For one thing, it refers to the engagement of multisectoral, or what Liang and Lu (Reference Liang and Lu2010) describe as the “multidimensional regulatory system” – that is, multiple government departments and agencies, such as public security, public health, Cyberspace Affairs Commission, but also the businesses (as illustrated in “有限公司 [Company Limited]”) that establish comprehensive control over the commercial, public interest, and social dimensions of cybersecurity in China. For another thing, and more importantly, multiplicity indicates the essential involvement of the CPC organizations at all levels – from central to municipality and provincial and from the CPC committee to its propaganda department – in the management of cybersecurity.

Second, as signified in the control and contestation theme, the domestication of cybersecurity capitalizes on blaming cyber challenges and threats on democracies, including the United States, the European Union, and Japan, among others, to promote antagonism toward these countries. As shown in the control and contestation theme, the use of terms such as “terrorism,” “counterterrorism,” and “counterintelligence” is quite common in the narrative of cybersecurity. Moreover, the term “force (势力)” – quite often being adopted together with “foreign (境外)” and “hostile (敌对)” to launch allegations of foreign interference – has frequently been used by domestic media as flag-waving, despite the lack of real instances of external meddling. In other words, the use of cyber threat-related terms, alongside vague references to democratic countries such as the United States and Japan, indicates that a narrative of foreign interference has become a regular feature of cybersecurity in the media discourse, with a wide range of (unspecified) individuals, groups, and countries denounced as counterparts to underscore the tensions between China and the democracies and to facilitate antidemocracy sentiment and assertive nationalism, both online and offline (e.g., Lehman-Ludwig et al., Reference Lehman-Ludwig, Burke, Ambler and Schroeder2023).

The first two features encapsulate what scholars observe as the reemergence of ideology (which is also a keyword in the control and contestation theme) in China’s development and outreach, which has dramatically shaped its internet policy. Ideology is, as Pieke (Reference Pieke2012) points out, “an indispensable aspect in the creation of regime support, no longer intending to generate ‘belief’ in the party, but to cultivate responsible, trusting, and ‘high-quality’ citizens who inhabit an active, autonomous, and governable society” (p. 150). The ideological turn and its further “marriage” with digital technologies exemplify not only the effort expended “on channeling and containing Internet expression through ideological work and cultural governance more broadly” (G. Yang, Reference Yang and Mueller2014, p. 112), as we can observe in other initiatives, such as “Telling China’s Story” to shape global narratives (Huang & Wang, Reference Huang and Wang2019). It further involves “an increasingly visible ideological thread vying to give coherence to an expanding system of Internet control” (G. Yang, Reference Yang and Mueller2014, p. 109), which promotes domestic ideology on a global scale via the internet (Martin, Reference Martin2021) and drives nationalistic sentiments, including a “wolf-warrior diplomacy” that seeks to aggressively defend China’s national interests (Zhu, Reference Zhu2020) and a series of nationalistic portrayals in Chinese cinema to convey the ideologies of the Chinese government and epitomize the state’s changing foreign policies (X. Yang, Reference Yang2023). In the case of cybersecurity and politics, the reemergence of ideology, with the risk of overreaction and arbitrariness, serves as a strategy to defend the CPC’s hold on power and overarching rule, leading to a state of hypervigilance with wide-reaching effects on China’s domestic and, especially, international policies. Such a reemergence is further illustrated in, for instance, China being a major advocate for cyber sovereignty in recent years (e.g., Hong & Goodnight, Reference Hong and Goodnight2020; Zeng, Stevens, & Chen, Reference Zeng, Stevens and Chen2017).

Third, the domestication of cybersecurity also points to both the global development of and international collaboration on cybersecurity issues (the development and collaboration cluster) and personal data security, mostly in business but also beyond it (the personal information cluster) (see similar discussions in Kuner et al., Reference Kuner, Svantesson, Cate, Lynskey and Millard2017). Nevertheless, both narratives – through the keywords identified in the semantic network – remain general (but vague) and thereby have not made their way into the dominant discourse of the domestication of cybersecurity. For instance, despite the emphasis on strengthening international collaboration on cybersecurity, no specific country or international organization was named in the development and collaboration cluster, which implies that this initiative might be more of a political slogan than evidence-based policymaking.

Fourth, although the narrative of cybersecurity further includes topics such as technological and infrastructural applications (the infrastructure cluster) and media relationships, these topics that are crucial to cybersecurity elsewhere (e.g., Haber & Zarsky, Reference Haber and Zarsky2016) occupy rather marginal positions in the semantic network and thus in the domestication of cybersecurity in the Chinese mainland, as displayed in the number of words in the cybersecurity’s ego-network.

In summary, our analysis brings to the forefront the discursive strategies used in news coverage related to the domestication of cybersecurity in mainland China, which seek to validate and strengthen the CPC’s authority and control over cybersecurity. This narrative often portrays Western democracies as the culprits behind cyberattacks, posing a significant threat to China’s national and societal security. Consequently, our analysis underscores the importance of understanding the regime’s cyber policies, going beyond the call to dismantle the Great Firewall or circumvent censorship. It highlights the unique role of mass media in shaping the domestication of cyber policies within the broader context of national discourse and identity.

Conclusion

This chapter enriches extant scholarship on internet governance and policies by focusing on media narratives on cybersecurity in authoritarian China. It delineates the specific way in which the term cybersecurity has been implicated and domesticated in local politics since the enactment of the Cybersecurity Law in 2017. The findings indicate that, although China was initially “a latecomer on the global cybersecurity scene” (Qi, Shao, & Zheng, Reference Qi, Shao and Zheng2018, p. 1343), the regime has strategically crafted and propagated cybersecurity narratives to resonate ideologically with the domestic audience, notably by portraying democracies as sources of cyber threats, including cyberterrorism. This domestic framing of cybersecurity serves to reinforce the CPC’s control over the internet and engenders anti-Western and anti-democratic sentiment. This study highlights at least two further implications. First, the concept of domestication could reconcile the false binary between inward- and outward-focused internet policies (e.g., X. Fu, Woo, & Hou, Reference Fu, Woo and Hou2016), recognizing their interdependent nature as shaped by domestic narratives. Second, this lens reveals a significant shift in discourse over a decade, from sporadic mentions of cyber warfare (Cai & Dati, Reference Cai and Dati2015) to positioning cybersecurity as a critical issue that, if mismanaged, poses a threat to both national security and internal stability, including terrorism and territorial disputes in domestic Chinese politics. Recognizing this evolution is essential for a comprehensive understanding of China’s ascent and its approach to global cyber governance.

Footnotes

The author wishes to thank Nian Liu for assistance with data collection. Additionally, the author is grateful for the comments and feedback received at the colloquium on September 14, 2023, particularly from Scott Shackelford, Julia R. Fox, and Simon Chieh-Jan Sun. This work was supported by the Independent Research Fund Denmark – Sapere Aude Starting Grant “To Use or Not to Use? A Relational Approach to Information and Communication Technologies as Repertoire of Contention” (1055-00011B).

References

Abrahams, A., & Leber, A. (2021). Comparative approaches to mis/disinformation | Electronic armies or cyber knights? The sources of pro-authoritarian discourse on Middle East Twitter. International Journal of Communication, 15, 11731199.Google Scholar
Adamu, A. U. (2010). The muse’s journey: Transcultural translators and the domestication of Hindi music in Hausa Popular Culture. Journal of African Cultural Studies, 22(1), 4156.10.1080/13696810903488579CrossRefGoogle Scholar
Alasuutari, P. (2009). The domestication of worldwide policy models. Ethnologia Europaea, 39(1), 6671. https://doi.org/10.16995/ee.1046CrossRefGoogle Scholar
Alasuutari, P., & Alasuutari, M. (2012). The domestication of early childhood education plans in Finland. Global Social Policy, 12(2), 129148. https://doi.org/10.1177/1468018112443684CrossRefGoogle Scholar
Alasuutari, P., Qadir, A., & Creutz, K. (2013). The domestication of foreign news: News stories related to the 2011 Egyptian Revolution in British, Finnish and Pakistani newspapers. Media, Culture & Society, 35(6), 692707. https://doi.org/10.1177/0163443713491299CrossRefGoogle Scholar
Alyukov, M. (2022). Propaganda, authoritarianism and Russia’s invasion of Ukraine. Nature Human Behaviour, 6(6), 763765.10.1038/s41562-022-01375-xCrossRefGoogle ScholarPubMed
Bamman, D., O’Connor, B., & Smith, N. A. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3–5). https://doi.org/10.5210/fm.v17i3.3943Google Scholar
Barlow, J. P. (2019). A declaration of the independence of cyberspace. Duke Law & Technology Review, 18, 57.Google Scholar
Barme, G. R., & Ye, S. (1997, June 1). The great firewall of China. Wired. https://wired.com/1997/06/china-3Google Scholar
Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. ICWSM, 8(2009), 361362.10.1609/icwsm.v3i1.13937CrossRefGoogle Scholar
Bernal, V. (2021). The cultural construction of cybersecurity: Digital threats and dangerous rhetoric. Anthropological Quarterly, 94(4), 611638.10.1353/anq.2021.0037CrossRefGoogle Scholar
Boholm, M. (2021). Twenty-five years of cyber threats in the news: A study of Swedish newspaper coverage (1995–2019). Journal of Cybersecurity, 7(1), tyab016.CrossRefGoogle Scholar
Bradshaw, S., & Howard, P. (2017). Troops, trolls and troublemakers: A global inventory of organized social media manipulation. Computational Propaganda Research Project. https://ora.ox.ac.uk/objects/uuid:cef7e8d9-27bf-4ea5-9fd6-855209b3e1f6/files/m3ca8c455852611e82d0fb182445a471fGoogle Scholar
Bradshaw, S., & Howard, P. N. (2019). The global disinformation order: 2019 global inventory of organised social media manipulation [White Paper]. Working Paper 2019.2. Oxford Project on Computational Propaganda.Google Scholar
Cai, C., & Dati, D. (2015). Words mightier than hacks: Narratives of cyberwar in the United States and China. Asian Perspective, 39(3), 541553.10.1353/apr.2015.0023CrossRefGoogle Scholar
Church, K., & Hanks, P. (1990). Word association norms, mutual information, and lexicography. Computational Linguistics, 16(1), 2229.Google Scholar
Clausen, L. (2004). Localizing the global: ‘Domestication’ processes in international news production. Media, Culture & Society, 26(1), 2544.10.1177/0163443704038203CrossRefGoogle Scholar
Clayton, R., Murdoch, S. J., & Watson, R. N. (2007). Ignoring the great firewall of China. I/S: A Journal of Law and Policy, 3(2), 271296.Google Scholar
Collins, A. M., & Quillian, M. R. (1972). How to make a language user. In Tulving, E. & Donaldson, W. (Eds.), Organization of memory (pp. 310351). Academic Press.Google Scholar
Crandall, J. R., Crete-Nishihata, M., Knockel, J., McKune, S., Senft, A., Tseng, D., et al. (2013). Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday, 18(7). https://doi.org/10.5210/fm.v18i7.4628Google Scholar
Danowski, J. A. (1993). Network analysis of message content. Progress in Communication Sciences, 12, 198221.Google Scholar
Deibert, R. J. (2002). Dark guests and great firewalls: The Internet and Chinese security policy. Journal of Social Issues, 58(1), 143159.10.1111/1540-4560.00253CrossRefGoogle Scholar
Deibert, R. J. (2015). Authoritarianism goes global: Cyberspace under siege. Journal of Democracy, 26(3), 6478.10.1353/jod.2015.0051CrossRefGoogle Scholar
Deibert, R. J., Palfrey, J. G., Rohozinski, R., & Zittrain, J. (2008). Access denied: The practice and policy of global Internet filtering. The MIT Press.10.7551/mitpress/7617.001.0001CrossRefGoogle Scholar
Doerfel, M. L. (1998). What constitutes semantic network analysis? A comparison of research and methodologies. Connections, 21(2), 1626.Google Scholar
Esarey, A., & Kluver, R. (Eds.). (2014). The Internet in China: Cultural, political and social dimensions (1980–2000s). Berkshire Publishing Group.Google Scholar
Fu, H., Li, Y., & Lee, F. L. (2023). Techno-cultural domestication of online Tarot reading in contemporary China. Media, Culture & Society, 45(1), 7491.10.1177/01634437221104700CrossRefGoogle Scholar
Fu, X., Woo, W. T., & Hou, J. (2016). Technological innovation policy in China: The lessons, and the necessary changes ahead. Economic Change and Restructuring, 49, 139157.10.1007/s10644-016-9186-xCrossRefGoogle Scholar
Gamson, W. A., & Modigliani, A. (1989). Media discourse and public opinion on nuclear power: A constructionist approach. American Journal of Sociology, 95(1), 137.10.1086/229213CrossRefGoogle Scholar
Greitens, S. C. (2013). Authoritarianism Online: What can we learn from Internet data in nondemocracies? PS: Political Science & Politics, 46(2), 262270.Google Scholar
Griffiths, J. (2021). The great firewall of China: How to build and control an alternative version of the Internet. Bloomsbury.10.5040/9781350257948CrossRefGoogle Scholar
Gurevitch, M., Levy, M. R., & Roeh, l. (1993). The global newsroom: Convergences and diversities in the globalization of television news. In Dahlgren, P. & Sparks, C. (Eds.), Communication and citizenship (pp. 195216). Routledge.Google Scholar
Haber, E., & Zarsky, T. (2016). Cybersecurity for infrastructure: A critical analysis. Florida State University Law Review, 44, 515.Google Scholar
Hong, Y., & Goodnight, G. T. (2020). How to think about cyber sovereignty: The case of China. Chinese Journal of Communication, 13(1), 826.10.1080/17544750.2019.1687536CrossRefGoogle Scholar
Huang, Z. A., & Wang, R. (2019). Building a network to “tell China stories well”: Chinese diplomatic communication strategies on Twitter. International Journal of Communication, 13, 29843007.Google Scholar
Huiberts, E., & Joye, S. (2018). Close, but not close enough? Audience’s reactions to domesticated distant suffering in international news coverage. Media, Culture & Society, 40(3), 333347.10.1177/0163443717707342CrossRefGoogle Scholar
Hung, T.-C., & Hung, T.-W. (2022). How China’s cognitive warfare works: A frontline perspective of Taiwan’s anti-disinformation wars. Journal of Global Security Studies, 7(4), ogac016.10.1093/jogss/ogac016CrossRefGoogle Scholar
Jasanoff, S., & Kim, S.-H. (2009). Containing the atom: Sociotechnical imaginaries and nuclear power in the United States and South Korea. Minerva, 47(2), 119.10.1007/s11024-009-9124-4CrossRefGoogle Scholar
Jones, M. O. (2022). Digital authoritarianism in the Middle East: Deception, disinformation and social media. Hurst.CrossRefGoogle Scholar
Joye, S. (2015). Domesticating distant suffering: How can news media discursively invite the audience to care? International Communication Gazette, 77(7), 682694.10.1177/1748048515601560CrossRefGoogle Scholar
Keremoğlu, E., & Weidmann, N. B. (2020). How dictators control the Internet: A review essay. Comparative Political Studies, 53(10–11), 16901703. https://doi.org/10.1177/0010414020912278CrossRefGoogle Scholar
King, G., Pan, J., & Roberts, M. E. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 107(2), 326343.10.1017/S0003055413000014CrossRefGoogle Scholar
King, G., Pan, J., & Roberts, M. E. (2017). How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American Political Science Review, 111(3), 484501.10.1017/S0003055417000144CrossRefGoogle Scholar
Kuner, C., Svantesson, D. J. B., Cate, F. H., Lynskey, O., & Millard, C. (2017). The rise of cybersecurity and its impact on data protection. International Data Privacy Law, 7(2), 7375.10.1093/idpl/ipx009CrossRefGoogle Scholar
Lawson, S. (2012). Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States. First Monday, 17(2). https://doi.org/10.5210/fm.v17i7.3848Google Scholar
Lee, F. L., Chan, J. M., & Zhou, B. (2011). National lenses on a global news event: Determinants of the politicization and domestication of the prelude to the Beijing Olympics. Chinese Journal of Communication, 4(3), 274292.10.1080/17544750.2011.594554CrossRefGoogle Scholar
Lehman-Ludwig, A., Burke, A., Ambler, D., & Schroeder, R. (2023). Chinese anti-Westernism on social media. Global Media and China, 8(2), 119–137. https://doi.org/10.1177/20594364231166541CrossRefGoogle Scholar
Liang, B., & Lu, H. (2010). Internet development, censorship, and cyber crimes in China. Journal of Contemporary Criminal Justice, 26(1), 103120.10.1177/1043986209350437CrossRefGoogle Scholar
Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (2015). China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford University Press.10.1093/acprof:oso/9780190201265.001.0001CrossRefGoogle Scholar
Liu, J., & Zhao, J. (2021). More than plain text: Censorship deletion in the Chinese social media. Journal of the Association for Information Science and Technology, 72(1), 1831.10.1002/asi.24390CrossRefGoogle Scholar
Lowe, G., Winters, P., & Marcus, M. L. (2007). The great DNS wall of China. https://censorbib.nymity.ch/pdf/Lowe2007a.pdfGoogle Scholar
Lu, Y., & Pan, J. (2021). Capturing clicks: How the Chinese government uses clickbait to compete for visibility. Political Communication, 38(1–2), 2354.10.1080/10584609.2020.1765914CrossRefGoogle Scholar
MacKinnon, R. (2008). Flatter world and thicker walls? Blogs, censorship and civic discourse in China. Public Choice, 134, 3146.10.1007/s11127-007-9199-0CrossRefGoogle Scholar
MacKinnon, R. (2009). China’s censorship 2.0: How companies censor bloggers. First Monday, 14(2). https://doi.org/10.5210/fm.v14i2.2378Google Scholar
Majeed, T. (2022). Embedded authoritarianism: The politics of poor press freedom in Indian Kashmir. Media, Culture & Society, 44(3), 613624.10.1177/01634437211069973CrossRefGoogle Scholar
Mare, A. (2020). Internet shutdowns in Africa| state-ordered Internet shutdowns and digital authoritarianism in Zimbabwe. International Journal of Communication, 14, 20.Google Scholar
Martin, P. (2021). China’s civilian army: The making of wolf warrior diplomacy. Oxford University Press.10.1093/oso/9780197513705.001.0001CrossRefGoogle Scholar
Matassi, M., Boczkowski, P. J., & Mitchelstein, E. (2019). Domesticating WhatsApp: Family, friends, work, and study in everyday communication. New Media & Society, 21(10), 21832200.10.1177/1461444819841890CrossRefGoogle Scholar
Miao, W., Jiang, M., & Pang, Y. (2021). Historicizing Internet regulation in China: A meta-analysis of Chinese Internet policies (1994–2017). International Journal of Communication, 15, 24.Google Scholar
Morgan, S. (2018). Fake news, disinformation, manipulation and online tactics to undermine democracy. Journal of Cyber Policy, 3(1), 3943.10.1080/23738871.2018.1462395CrossRefGoogle Scholar
Mueller, M. L. (2011). China and global Internet governance: A tiger by the tail. In Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. L. (Eds.), Access contested: Security, identity, and resistance in Asian cyberspace (pp. 177194). The MIT Press.10.7551/mitpress/9780262016780.003.0013CrossRefGoogle Scholar
Myers, S. L., & Mozur, P. (2019, August 13). China is waging a disinformation war against Hong Kong protesters. The New York Times. https://nytimes.com/2019/08/13/world/asia/hong-kong-protests-china.htmlGoogle Scholar
Newman, M. E. (2006). Modularity and community structure in networks. Proceedings of the National Academy of Sciences, 103(23), 85778582.10.1073/pnas.0601602103CrossRefGoogle ScholarPubMed
Olausson, U. (2014). The diversified nature of “domesticated” news discourse: The case of climate change in national news media. Journalism Studies, 15(6), 711725.10.1080/1461670X.2013.837253CrossRefGoogle Scholar
Pan, J. (2017). How market dynamics of domestic and foreign social media firms shape strategies of Internet censorship. Problems of Post-Communism, 64(3–), 167188.10.1080/10758216.2016.1181525CrossRefGoogle Scholar
Pieke, F. N. (2012). The Communist Party and social management in China. China Information, 26(2), 149165.10.1177/0920203X12442864CrossRefGoogle Scholar
Qi, A., Shao, G., & Zheng, W. (2018). Assessing China’s cybersecurity law. Computer Law & Security Review, 34(6), 13421354.10.1016/j.clsr.2018.08.007CrossRefGoogle Scholar
Qin, B., Strömberg, D., & Wu, Y. (2017). Why does China allow freer social media? Protests versus surveillance and propaganda. Journal of Economic Perspectives, 31(1), 117140.10.1257/jep.31.1.117CrossRefGoogle Scholar
Roberts, M. E. (2018). Censored: Distraction and diversion inside China’s great firewall. Princeton University Press.Google Scholar
Ruigrok, N., & van Atteveldt, W. (2007). Global angling with a local angle: How US, British, and Dutch newspapers frame global and local terrorist attacks. Harvard International Journal of Press/Politics, 12(1), 6890.10.1177/1081180X06297436CrossRefGoogle Scholar
Schünemann, W. J. (2022). A threat to democracies? An overview of theoretical approaches and empirical measurements for studying the effects of disinformation. In Cavelty, M. D. & Wenger, A. (Eds.), Cyber security politics (pp. 3247). Routledge.10.4324/9781003110224-4CrossRefGoogle Scholar
Shackelford, S. J., Raymond, A., Stemler, A., & Loyle, C. (2020). Defending democracy: Taking stock of the global fight against digital repression, disinformation, and election insecurity. Washington and Lee Law Review, 77, 1747.Google Scholar
Taubman, G. (1998). A not-so World Wide Web: The Internet, China, and the challenges to nondemocratic rule. Political Communication, 15(2), 255272.10.1080/10584609809342369CrossRefGoogle Scholar
Ververis, V., Marguel, S., & Fabian, B. (2020). Cross‐country comparison of Internet censorship: A literature review. Policy & Internet, 12(4), 450473.10.1002/poi3.228CrossRefGoogle Scholar
Weber, I., & Jia, L. (2007). Internet and self-regulation in China: The cultural logic of controlled commodification. Media, Culture & Society, 29(5), 772789.10.1177/0163443707080536CrossRefGoogle Scholar
Werner, M. D., & Cornelissen, J. P. (2014). Framing the change: Switching and blending frames and their role in instigating institutional change. Organization Studies, 35(10), 14491472.10.1177/0170840614539314CrossRefGoogle Scholar
Woolley, S. C., & Howard, P. (2017). Computational propaganda worldwide: Executive summary. Oxford Internet Institute.Google Scholar
Wu, W. (1996). Great leap or long march: Some policy issues of the development of the Internet in China. Telecommunications Policy, 20(9), 699711.10.1016/S0308-5961(96)00050-XCrossRefGoogle Scholar
Xiaoming, H., Zhang, K., & Yu, H. (1996). The Internet and information control: The case of China. Javnost-the Public, 3(1), 117130.10.1080/13183222.1996.11008619CrossRefGoogle Scholar
Yang, F., & Mueller, M. L. (2014). Internet governance in China: A content analysis. Chinese Journal of Communication, 7(4), 446465.10.1080/17544750.2014.936954CrossRefGoogle Scholar
Yang, G. (2014). The return of ideology and the future of Chinese Internet policy. Critical Studies in Media Communication, 31(2), 109113.10.1080/15295036.2014.913803CrossRefGoogle Scholar
Yang, X. (2023). The “wolf warrior cycle”: Chinese blockbusters in the age of the belt and road initiative. The China Quarterly, 2003, 115. https://doi.org/10.1017/S0305741023000693Google Scholar
Zeng, J., Stevens, T., & Chen, Y. (2017). China’s solution to global cyber governance: Unpacking the domestic discourse of “Internet sovereignty”. Politics & Policy, 45(3), 432464.10.1111/polp.12202CrossRefGoogle Scholar
Zhang, L. L. (2006). Behind the ‘great firewall’ decoding China’s Internet media policies from the inside. Convergence, 12(3), 271291.10.1177/1354856506067201CrossRefGoogle Scholar
Zhu, Z. (2020). Interpreting China’s ‘wolf-warrior diplomacy’. The Diplomat, 15(5), 2020.Google Scholar
Figure 0

Figure 12.1 Ego-network of cybersecurity in news coverage in the Chinese mainland, 2017–2023

Figure 1

Figure 12.2 Control and contestation cluster

Figure 2

Figure 12.3 Development and collaboration cluster

Figure 3

Figure 12.4 Personal information cluster

Figure 4

Figure 12.5 Infrastructure cluster

Figure 5

Figure 12.6 Governing actors cluster

Figure 6

Figure 12.7 Mass media cluster

Accessibility standard: WCAG 2.2 AAA

Why this information is here

This section outlines the accessibility features of this content - including support for screen readers, full keyboard navigation and high-contrast display options. This may not be relevant for you.

Accessibility Information

The HTML of this book complies with version 2.2 of the Web Content Accessibility Guidelines (WCAG), offering more comprehensive accessibility measures for a broad range of users and attains the highest (AAA) level of WCAG compliance, optimising the user experience by meeting the most extensive accessibility guidelines.

Content Navigation

Table of contents navigation
Allows you to navigate directly to chapters, sections, or non‐text items through a linked table of contents, reducing the need for extensive scrolling.
Index navigation
Provides an interactive index, letting you go straight to where a term or subject appears in the text without manual searching.

Reading Order & Textual Equivalents

Single logical reading order
You will encounter all content (including footnotes, captions, etc.) in a clear, sequential flow, making it easier to follow with assistive tools like screen readers.
Short alternative textual descriptions
You get concise descriptions (for images, charts, or media clips), ensuring you do not miss crucial information when visual or audio elements are not accessible.
Full alternative textual descriptions
You get more than just short alt text: you have comprehensive text equivalents, transcripts, captions, or audio descriptions for substantial non‐text content, which is especially helpful for complex visuals or multimedia.
Visualised data also available as non-graphical data
You can access graphs or charts in a text or tabular format, so you are not excluded if you cannot process visual displays.

Visual Accessibility

Use of colour is not sole means of conveying information
You will still understand key ideas or prompts without relying solely on colour, which is especially helpful if you have colour vision deficiencies.
Use of high contrast between text and background colour
You benefit from high‐contrast text, which improves legibility if you have low vision or if you are reading in less‐than‐ideal lighting conditions.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×