Listen to the 2nd part of our podcast series on the Chinese cybersecurity regime, hosted by Marcel Britsch.
It is about Chinese online content management (censorship).
Chinese Industry 4.0
DESIGNING HIGH-TECH SOLUTIONS UNDER THE CYBERSECURITY REGIME OF THE PEOPLE'S REPUBLIC OF CHINA
Fully accessible e-book with 1000 working links and 56 figures and tables
The links to online sources are stable. If available, the endnotes include DOIs, and almost all of the other sources were downloaded to online archives. Regardless of whether a website and related downloads have been archived, the book directs its readers directly to websites that show consistency in URL management. However, readers need to keep in mind that accessing Chinese websites often requires turning off VPN protection.
In the downloadable sample on Apple Books, the footnote links do not work. However, they work after downloading the entire book.
The author examines China’s cybersecurity regime from economic, political, and historical perspectives, providing valuable insights for every individual and organization affected by the peculiarities of the Chinese cyber ecology. He covers the latest developments in cybersecurity compliance and offers useful recommendations for high-tech companies operating in China. The impact of cyber-related rules and regulations on online users, businesses, and government institutions has grown in parallel with the increased commercial exploitation of big data, artificial intelligence, and the internet of things (IoT). Over the past decade, the rising prevalence of these and other emerging technologies has opened the gates to a new era of industrialization, widely referred to as Industry 4.0. In this unfolding era, China’s cybersecurity regime increasingly has become the central instrument to maintain state authority over political, economic, cultural, and technological activities within and beyond the borders of the People’s Republic. Therefore, the book’s findings are relevant to the entire global internet population.
Beyond interpreting cyber-related laws, administrative regulations, and standards, the author carefully analyzes the influence of China’s distinctive path to industrialization, unique cultural characteristics, and authoritarian one-party rule on domestic and worldwide cyber governance structures. He does not omit sensitive topics, such as self-censorship, the limitations of China’s Social Credit System, market-access restrictions, institutional wrangling, the structural imbalances in the Chinese economy, and the discrepancies between the Chinese and Western approaches to the rule of law.
ABOUT THE AUTHOR
Dr. Michael D. Frick has more than fifteen years of experience in international business development and strategy for corporations operating in China’s IT and machine-building sectors. He holds an economics doctorate in the field of operations management from Mannheim University. Dr. Frick is also a Sinologist with a master’s degree from the University of Heidelberg.
RECOMMEND THIS BOOK