ebook img

Trafficking Data: How China Is Winning the Battle for Digital Sovereignty PDF

361 Pages·2022·18.769 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Trafficking Data: How China Is Winning the Battle for Digital Sovereignty

Trafficking Data Trafficking Data How China Is Winning the Battle for Digital Sovereignty AYNNE KOKAS Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and certain other countries. Published in the United States of America by Oxford University Press 198 Madison Avenue, New York, NY 10016, United States of America. © Aynne Kokas 2023 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by license, or under terms agreed with the appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above. You must not circulate this work in any other form and you must impose this same condition on any acquirer. CIP data is on file at the Library of Congress ISBN 978–0 – 19– 762050–2 DOI: 10.1093/ oso/ 9780197620502.001.0001 1 3 5 7 9 8 6 4 2 Printed by Sheridan Books, Inc., United States of America For Aynne Zazas, whose name I am honored to share Contents Acronyms ix Acknowledgments xi Preface xvii 1. The Data Trafficking Dilemma 1 2. What Happens in Vegas Stays in China: Fragmented US Tech Oversight 22 3. Becoming a Cyber Sovereign: China’s Politics of Data Governance 51 4. From Farms to Outer Space: How China Networks Sovereignty in the United States 76 5. Social Media: The Algorithm as National Security Asset 94 6. Gaming: The Porous Boundaries of Virtual Worlds 117 7. Money: The Risks of Data Trafficking for China 138 8. Health: Surveilling Borderless Biodata 150 9. Home: Data Through the Back Door 172 10. Toward Data Stabilization 188 E pilogue 207 English- Pinyin-C hinese Glossary 211 Notes 217 References 245 Index 307 Acronyms AI artificial intelligence ATM automated teller machine BGI Beijing Genomics Institute BRI Belt and Road Initiative CAC Cyberspace Administration of China CCP Chinese Communist Party CCPA California Consumer Privacy Act CDA 230 Communications Decency Act Section 230 CEIEC China National Electronics Import and Export Corporation CEO chief executive officer CES Consumer Electronics Show CFIUS Committee on Foreign Investment in the United States CIA Central Intelligence Agency CISA Cybersecurity and Infrastructure Security Agency CLIA Clinical Laboratory Improvement Amendments CMS Centers for Medicare and Medicaid COPPA Children’s Online Privacy Protection Act DHS Department of Homeland Security DJI SZ DJI Technology Co., Ltd. DNA deoxyribonucleic acid DoD Department of Defense DSR Digital Silk Road EDM electronic dance music ESG environmental, social, and corporate governance EU European Union FBI Federal Bureau of Investigation FCC Federal Communications Commission FCPA Foreign Corrupt Practices Act FDA Food and Drug Administration FHSS frequency-h opping spread spectrum FINSA Foreign Investment and National Security Act of 2007 FIRRMA Foreign Investment Risk Review Modernization Act FTC Federal Trade Commission GAN generative adversarial networks GDPR General Data Protection Regulation

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.