2021
DOI: 10.5204/ijcjsd.1908
|View full text |Cite
|
Sign up to set email alerts
|

Transnational State-Corporate Symbiosis of Public Security: China’s Exports of Surveillance Technologies

Abstract: Over the last two decades, the emerging Chinese Party-state has used commercial ties with North American and European providers of surveillance technologies to grow national prowess of public security, fostering a transnational state-corporate symbiosis. The exports of surveillance technologies from the Global North to China started in the late 1970s, and now Chinese technology companies are competing with and replacing those suppliers in the globalized neoliberal market. This research explores the two-way dyn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 22 publications
(35 reference statements)
0
2
0
Order By: Relevance
“…The AUKUS and EU examples show that TikTok raises similar national security, foreign interference, and privacy concerns in each jurisdiction we consider in this article. Since 2020, TikTok's representatives have evoked the language of "technological neutrality" and in doing so attempted to evade transparent communication about TikTok's data collection, access and use, a tactic that has historically been used by both Chinese and non-Chinese technology companies (Bernot, 2022). Tik-Tok's reluctance to provide transparent answers about data governance has not been well received due to China's authoritarian nature, and the absence of trust, particularly among Australia, the UK, and the US, which stems from broader and historical geopolitical tensions.…”
Section: Discussion and Implications: Politicisation Or Protection?mentioning
confidence: 99%
See 1 more Smart Citation
“…The AUKUS and EU examples show that TikTok raises similar national security, foreign interference, and privacy concerns in each jurisdiction we consider in this article. Since 2020, TikTok's representatives have evoked the language of "technological neutrality" and in doing so attempted to evade transparent communication about TikTok's data collection, access and use, a tactic that has historically been used by both Chinese and non-Chinese technology companies (Bernot, 2022). Tik-Tok's reluctance to provide transparent answers about data governance has not been well received due to China's authoritarian nature, and the absence of trust, particularly among Australia, the UK, and the US, which stems from broader and historical geopolitical tensions.…”
Section: Discussion and Implications: Politicisation Or Protection?mentioning
confidence: 99%
“…Chinese companies that internationalise often face dual pressure to comply with Chinese regulations domestically and national data protection scrutiny in other countries (Jia & Ruan, 2020). However, the growth of Chinese companies internationally is often linked with national security risks that can also mask national economic interests, especially when they challenge US hegemony with geopolitical consequences (Bernot, 2022;Gray, 2021). The surveillance capabilities of Chinese technologies and service providers have contributed to the complexity of this dynamic.…”
Section: Tiktok: Corporate Structure Data Security and Political Infl...mentioning
confidence: 99%
“…It is only now that Chinese technology companies are found competing with and replacing those suppliers in a globalised market. 67 The current status of FRT developed in China with known human rights and privacy violations is not adequately restricted by regulatory frameworks in Europe and the United States. 68 To better disentangle use-cases requires not only a more through mapping of globally entangled and technical supply-chains, whether through critical research or in the building of oversight capabilities such as independent risk assessments, compliance audits, or technical red-teaming in the light of such swiftly evolving material properties.…”
Section: Dynamic Matching Strategies In Frt Extend Beyond Recognising...mentioning
confidence: 99%