Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Knowledge is Power: Investigating China’s ICT Power to reshape
Global Internet Governance
Frederic Augustin
S2569310
03 July 2020
MA Thesis Global Political Economy (5184VGP01Y)
Word Count (incl. bibliography): 14848
Supervisor:
Dr. Rizal Shidiq
Student number: S2569310
Contents
1. Chapter: Introduction ............................................................................................................. 3
2. Chapter: Background: China’s Emerging ICT Capabilities .................................................. 5
3. Chapter: Methodology .......................................................................................................... 9
3.1. Analytical framework: Knowledge Structures ................................................................ 9
3.2 Empirical Strategy: Content & Discourse Analysis....................................................... 12
4. Chapter: Empirical Analysis ................................................................................................ 17
4.1. Analytical Baseline: Chinese Cyber Norms & ICT strategy ........................................ 17
4.1.1. Normative Priorities .............................................................................................. 17
4.1.2. National ICT Strategy ........................................................................................... 19
4.2. Knowledge-Legitimation: China & Norms in Global Internet Governance ................. 21
4.2.1. Norms in Global Cyberspace up until 2017 ........................................................... 21
4.2.2. Norms in Global Cyberspace after 2017 ................................................................ 22
4.3. Knowledge Regulation: China & Institutionalized Power over Knowledge in Global
Internet Governance ............................................................................................................. 25
4.4. China & Benefits from Rules and Definitions in Global Internet Governance ............ 28
5. Chapter: Conclusion............................................................................................................. 31
Bibliography ............................................................................................................................ 33
Student number: S2569310
1. Chapter: Introduction
The rising power of the Chinese state is almost a truism in modern-day public debate. In 2018,
the Vice President of the United States, Mike Pence declared China’s rising power as one of
the main threats to the United States of America (US)1. Goldman Sachs and the Economist
have both predicted that China will surpass the US economically by 20252. Furthermore, the
narrative of “China buying the world”, has become extremely popular in western media,
especially with regards to the Information and Communications Technology (‘ICT’) sector3.
Fittingly, the Chairman of the Chinese Communist Party (CCP), Xi Jinping has outlined that
China’s international policy goal should be to reshape international institutions towards
Chinese values and priorities4. However, a growing body of international relations and Area
Studies literature on China have empirically questioned China’s ability to influence the global
political economy 5 . This conundrum begs the question as to whether Chinese economic
capabilities, whatever they may be, necessarily translate into actual power. What kind of power
allows an actor to reshape global structures and how can economic capabilities influence it?
One of the sectors in which such questions may find answers is global internet
governance. The internet and its governance structures have only recently emerged in the
modern world. On an institutional level it is therefore highly susceptible to influence—as the
emergence of new global governing institutions between 2016 and 2017 has emphasized6.
Beijing also sees an enormous potential in internet governance as well as the ICT sector.
Through national ICT strategies like the Digital Silk Road and Internet Plus, it seeks to
accelerate the “promotion of China’s global discourse power and rule-making in cyberspace",
with the goal of becoming a cyber superpower (wangluo qiangguo)7. Therefore, this paper
investigates whether China’s use of its ICT capabilities has allowed it to reshape the
configuration of global internet governance in pursuance of its overarching national goal of
reshaping the global political economy.
Present academic literature on the matter so far has discussed this question to a limited
extent and application. While authorities on the matter like Adam Segal and Nigel Inkster, have
1 Pence, 2018 2 Nuruzzaman, 2016, 193 3 Shen, 2017, 4 4 Huang et. al, E.d. 5 Ferchen, 2016a; Ferchen, 2016b; Ferchen, 2018; Goh, 2015; Scobell and Nathan, 2014; Chung, 2018; Goh,
2014; Fitriani, 2018; Friedberg, 2018; Oh, 2018 6 Soesanto & D'Incau, 2017; Robinson, 2016 7 Kania, Sacks, Triolo & Webster, 2017
Student number: S2569310
outlined their respective definitions of cyber power and the degree to which China possesses
it, they restrict themself to a simply descriptive historical analysis of ICT capabilities and
China’s internet governance approach as opposed to a causative one8. A similar picture has
also been presented in the broader literature on China’s rise and influence in the global political
economy. Although the implications and evidence for China’s rise find considerable academic
attention9, there is little empirical evidence in these discussions that may suggest that the
Chinese rise has any actual effect on Beijing’s power. This paper therefore adds necessary
empirical insights to a growing body of literature that operates at the academic forefront of
understanding China in international relations.
In order to the answer the research question at hand, Chapter 2 firstly provides a
historical background reflecting on China’s ICT capabilities. Chapter 3 then introduces the
theory of knowledge structures by Blayne Haggart to offer insight into the concept of power in
international relations that theorises both capabilities and influence10. The theory is translated
into three sub-questions establishing the link between China’s ICT capabilities and their
influence on its ability to reshape global internet governance. The sub-questions cover China’s
ability to reshape what is firstly regarded as important in cyberspace governance, secondly,
how the global internet is regulated, and thirdly, whether China benefits from the outcomes of
the structures of global cyberspace. Finally, Chapter 4 offers an empirical analysis of the causal
effect between Chinese ICT capabilities and China’s ability to reshape global internet
governance by conducting a content and discourse analysis of the United Nations Group of
Governmental Experts (UNGGE) and Internet Corporation for Assigned Names and Numbers
(ICANN)—which is to say, global internet-governing institutions that recently went through a
transition phase.
8 Segal, 2017, Inkster, 2015 9 Breslin, 2008; Blackwill & Harris, 2016; Cardenal & Araujo, 2013; Jacques, 2012; Subramanian, 2012 10 See Haggart, 2017, and Haggart, 2019
Student number: S2569310
2. Chapter: Background: China’s Emerging ICT Capabilities
Information and Communications Technologies (ICT) broadly include companies that produce
and sell computers, communication equipment, consumer electronics and other electronic
equipment. Some of the most prominent examples of ICT companies include the US-American
GAFA companies (Google, Apple, Facebook, Amazon)11 and the Chinese equivalent BATX
(Baidu, Alibaba, Tencent, Xiaomi). As in any other sector, the global economic strength of the
Chinese ICT sector can be measured by standard benchmarks such as foreign direct
investments (FDI), mergers and acquisitions (M&A), and its research and development (R&D)
capabilities. Advancements in new technology, which in this case include ventures such as
artificial intelligence (AI), fifth generation technology standards for cellular networks (5G),
and the Internet of Things (IoT), are further indicators for the emerging strength and
capabilities of the sector. This chapter provides insights into China’s international ranking in
the above mentioned benchmarks, allowing for an analytical estimate as to whether Chinese
ICT capabilities should even be considered important enough for a study of their potential
impacts on global structures.
Since the ‘going out strategy’ in the early 2000s, China’s ICT sector has grown from
one competitor among many to a dominating global presence. Along with the United States,
China today hosts the largest number of web users and competitive technology companies12.
In terms of e-commerce capabilities, China has increased its share of global transactions from
0.6% in 2005 to 42% in 2016, making its market greater than that of the US, Japan, France,
Germany, and the United Kingdom combined. While American mobile payments accounted
for $112 billion US-Dollars (USD) in 2016, China has been transitioning towards a cashless
economy for the past decade, leading up to $9 trillion USD in transactions13. Moreover, with
the value of ICT goods exported by China reaching $500bn USD in 2015—making up for 55%
of total ICT exports—China has emerged as the leading ICT exporter14. This is in line with the
2015 World Investment Report, indicating a stark rise in outward FDI stock from 2000 to
2014—surging from $27 billion to $729 billion USD15 . This has ranked China’s overall
outward FDI in 2014 to be the third largest in the world after the US and Japan16. In terms of
11 Sometimes also referred to as FANG, i.e. Facebook, Amazon, Netflix, and Google 12 Segal, 2017, 40 13 IISS, 2018 14 OECD, 2017a 15 UNCTAD, 2015, A8 16 Ibid
Student number: S2569310
trend prediction, the report also estimated that China would shift from overall net FDI recipient
to net FDI supplier over the next few years17. Nevertheless, China still experiences large
dependencies on foreign technology. ICT imports in value terms from China have increased by
60% from 2008 to 2015, while overall OECD (Organization for Economic Cooperation and
Development) imports remained relatively stable18. The danger in such an exponential rise lies
in unexpected cut offs and disruptions from imports—as has already happened in the cases of
ZTE or Huawei. When the access to chips or other high-tech ICT components from abroad
suddenly experiences a cut, China’s ICT companies struggle to maintain their production
levels19.
Chinese ICT companies are also in the spotlight for their advances in Western states.
The European Commission, out of fear that Chinese ICT companies might acquire too many
strategically relevant European companies, have undercut Chinese investments into region as
well as abroad20. The Mercator Institute for China Studies (MERICS) finds that due to this
increased scrutiny, there has been a clear trend towards an overall decrease in Chinese
investments since 201621. Despite this decline, Chinese ICT in Europe maintained itself as the
top investment sector as of 2019, in terms of single transactions—constituting 20% of all
transactions—placing second in terms of investment volume at an evaluation of €2.4 billion
Euros22. This persistence of ICT as a top target for Chinese investment shows the Chinese firms’
continued interest in European technology companies and know-how.
Hong Shen finds that ICT plays a similarly important role in the United States. More
than half of China’s FDI to the US in 2014 was poured into the ICT sector23. Large-scale
Chinese overseas acquisitions through ICT firms have become more frequent with companies
like Tencent, Alibaba or Baidu investing hundreds of millions into acquisitions24. Uber, one of
the largest multinational ride-hailing companies, for example, received a $600 million USD
investment from Baidu in 2014—a sum not easily spent, even for technology companies25.
These continued investments show not only a commitment for expansion, but also that Chinese
ICT companies, as they have accumulated large amounts of capital, seek profitable outlets for
reinvestment outside of China.
17 UNCTAD, 2014, 47. 18 OECD, 2017a, 57 19 See Davies, 2019, 39; and Mengting & Lee, 2019 20 The Economist, 2018; The Economist, 2020 21 Hanemann, Huotari, & Kratz, 2020, 3 22 Ibid, 13 23 Shen, 2017, 131 24 Shen, 2017, 26 25 Ibid
Student number: S2569310
This is also why China has shown interest in developing markets that host large
consumer bases and newly developing structures. The ASEAN Investment Report in 2018
shows China ranking third in ICT Greenfield FDIs—investments into new environments
without pre-existing systems—between the years of 2013 and 2017, with especially
competitive investments into mobile phone manufacturing operations 26 . Notable Chinese
investments in ASEAN ICT firms include a $1.1 billion USD investment by Alibaba in the
Indonesian online marketplace Tokopedia, as well as its purchase of the controlling stake in
Southeast Asia’s largest e-commerce operator Lazada27. In several African countries ‘Made in
China’ technology from Huawei, ZTE and China Telecom serve as the backbone of local
network infrastructure28. ZTE and Huawei, for example, secured a $1.6 billion USD deal with
Ethiopia in 2013 to expand mobile phone infrastructure, introducing a high-speed 4G
broadband network in its capital Addis Ababa and rolling out a 3G service across the rest of
the country29. As a young and growing consumer base the targeted early investment is predicted
to make the African market as a whole one of the most dynamic ones in the decades to come30,
with Chinese ownership of over half of Africa’s smartphone market providing a competitive
advantage to Chinese ICT companies31.
On top of its investment efforts, China consistently works towards becoming the
world’s key ICT innovator. It is the world’s most specialized economy for ICT products, with
ICT-related goods accounting for over 60% of its patent portfolio32. In the field of artificial
intelligence, China is the second largest producer of scientific documents on machine learning
behind the United States33. A recent 2020 study by Macro Polo suggests that Chinese AI talent,
although mostly working in the United States, makes up for the second largest talent pool in
the world.34 Chinese AI capabilities are therefore well positioned to make a difference not only
in AI labs at Google or Stanford University, but also in the Chinese market. Moreover, Daniel
Nepelski and Giuditta De Prato find that “Chinese [ICT] companies frequently seek R&D
opportunities overseas”, placing China 5th globally in terms of interlinkages between national
innovation networks35.
26 ASEAN Secretariat and UNCTAD, 2018 27 Shen, 2017, 177 28 Chimbelu, May 3, 2015 29 Olander, January 20, 2019 30 The Economist, 2015 31 Telecomlead, 2020 32 OECD, 2017b 33 OEDC, 2017a, 20 34 Macro Polo, E.d., a 35 Nepelski & De Prato, 2018, 950
Student number: S2569310
China’s drive for innovation may have also led the country to dominate in 5G and IoT
technology. Spearheaded by Huawei, which launched its commercial services in 2019, Chinese
companies hold “one-third of the worldwide 5G-related Standard Essential Patents” 36 ,
engaging in 80 telecommunications projects worldwide37. This is also why Henry Farrell and
Abraham Newman argue that the United States, challenged in its dominance of global
communications networks, banned Huawei from selling 5G equipment to US technology
companies38. As China also accounts for 44% of worldwide machine-to-machine (M2M) sim
card subscriptions—three times the share of the United States—it is furthermore put at an
advantage for emerging IoT technology39. IoT development and international cross-sector
partnerships are generally seen as much more feasible in China, leading to many observers to
conclude it will enable China to engage much faster in the mass commercialization of IoT
technology through reaching scale. The experience of catering to the world’s largest domestic
market for IoT-enabled services therefore works in an effective combination with a uniquely
favorable policy environment for ICT growth. The question now is, do these apparent
capabilities translate into power?
36 IPlytics, 2019; McGregor, 2019, also see Kim, Lee & Kwak, 2020, 1 37 Adee, 2019 38 Farrell & Newman, 2019 39 OECD, 2017a, 19
Student number: S2569310
3. Chapter: Methodology
3.1. Analytical framework: Knowledge Structures
Before exploring a suitable theory that can lead us to an empirical understanding of China’s
actual power through its ICT capabilities, we must look at the concept of power itself. In
international relations power is often seen as the ability of one actor to modify another actor’s
behaviour despite their opposition40. Although power is often treated as an exclusively realist
concept41, international relations thinkers have recognized the need to conceptualize different
forms of power. This includes the Gramscian notion of military power, economic power42, soft
power43, as well as normative power, often connected to the European Union44. As this array
of definitions, however, only describe aspects, types, or tools of power—the United States, for
example might have both normative and military power—they, however, do not provide an
answer to what some international relations scholars have termed the ‘paradoxes of power’45.
This idea suggests that capabilities such as the number of tanks, diplomatic or cultural
institutions are often falsely assumed to be synonymous to power. Capabilities, no matter their
nature, must be employed in the form of influence with an actual effect on the actor’s behavior
to truly qualify as power. Influence, not capabilities, counts as power.
The essence of what provides actors with power in international relations have
furthermore shifted. Since the millennium, the control over information has moved to the
forefront of states’ ambitions to increase their power. “’Unprecedented transnational
communication capacities’”46, driven by the exponential growth in collection, processing, and
storage of digitized information47, point towards a trend in shifting global priorities to the
possession of data as a strategic resource48. Other than oil or cheap labour, intellectual property
(IP) and consumer data function outside the laws of comparative advantage. The collection of
IPs comes at minimum cost to overall market power. That is why technology companies like
40 Building on Weber and Cox et. al, 1973 41 Carr, 1964, in Barnett & Duvall, 2004, 40 42 Hill, 2016 43 Ikenberry & Nye, 2004 44 Manners, 2002 45 Baldwin, 1989; Maoz, 1990 46 Comor, 1996, 1 47 See Valenduc & Vendramin, 2017, 124 for the effects Big Data and Cloud Computing had on the production
and possession of data, 48 Valenduc & Vendramin, 2017, 122-124; also see Brynjolfsson & McAfee, 2015; Cardon, 2015; Escande and
Cassini, 2015
Student number: S2569310
Uber can afford to run at an overall loss—they bet to win a near monopoly position in their
market by building business models around network effects and acquiring strategic consumer
data49. This is also why international trade agreements since the 1990s focus strongly on
intellectual property goods like copyrights, patents, and trademarks50. The more strategic data
or information a company or country possesses, the better—there is no upper limit.
In light of these structural changes through new technologies, several International
Political Economy (IPE) scholars have argued for new ways to theorize international relations
incorporating a more structural, constructivist angle to the study of power in international
relations51. Moreover, unlike other definitions of power, structural power also offers a direct
link between capabilities and outcomes, as it means controlling sources, mediums, or
institutions that allow any actor to hold power to begin with. Structural power means defining
the rulebook by which everyone else plays and thus having influence—or power—over the
system itself.
This paper, therefore, uses Haggart’s (2019) adapted version of Susan Strange’s
definition of power over knowledge structures. Under this definition, power means holding the
key to what information is collected, communicated, used, and accepted as true. It allows its
holder to perpetuate, (in-) formally institutionalize, and legitimize asymmetries of power in the
global political economy52. Through its focus on the structurally underlying dynamics, power
over knowledge structures therefore precedes and pre-determines all other sources of power
and should be given ontological primacy53. From a policy perspective, it is also highly suitable
as a similar idea of ‘discourse power’ (huayuquan) is commonly used in the Chinese foreign
policy lingua. For the CCP “enhancing its discourse power internationally” means elevating
China’s ability to influence global governance and values54.
The power over knowledge structures allow an actor to structurally control knowledge
through the legitimation and regulation of knowledge55. On the one hand, the knowledge-
legitimation aspect governs which truths are accepted as known56. What counts as legitimate
and acceptable knowledge shapes how we interact with the world around us. It shapes who and
what is prone to have advantages and disadvantages in any given structural relationship,
49 Cardon and Casilli, 2015; Huws, 2013 50 Halbert, 2016; Halbert, 2017; Haggart & Jablonski, 2017 51 Constantinou, Richmond & Watson, 2008, 7; Haggart, 2017 52 Holzscheiter, 2013, 150, essentializing one tenet of Foucaultian thought on power, for further reference see
Foucault, 1970, 1972, and 1990 53 Langley, 2009, 131 54 Kania, 2018 55 Haggart, 2019, 26 56 Ibid
Student number: S2569310
because it shapes reality according to whoever determines what counts and does not count as
accepted truth57. Traces of this aspect are found in actors’ expressions of priorities, norms, and
moral benchmarks that they intend to achieve with their actions. If their comprehension of truth
is found legitimate by other actors, these traces may also express a relationship of influence.
On the other hand, the regulatory aspect governs how, to whom, and on what terms
knowledge is created, communicated, and used58. As there are many different beliefs and ideas
that could potentially develop into accepted knowledge, there is a constant ontological and
epistemological contestation between them59. Regulating or governing knowledge, therefore,
means having the power to decide these contestations. Naturally, the regulatory aspect of
knowledge structures often expresses itself in the setup and acceptance of (in-)formal rules.
Laws, regulations, and (in-)formal networks that are linked to the creation, dissemination or
use of knowledge, can thus be measurable traces of the power over knowledge structures.
Underlying the idea of knowledge structures is furthermore the concept of knowledge.
While there is considerable philosophical debate about the nature of knowledge60, this paper
defines it as a socially constructed “approximation of an underlying reality—or phenomena—
that we can think of as information” 61 . As this information must always be collected,
communicated, or used by social actors, it can never be fully objective—or in other words,
“’raw data is an oxymoron’: it is knowledge, not information”62. This nature of knowledge
itself not only explains the underlying link between power and knowledge, but it also indicates
another important consideration for an effective research framework of power over knowledge
structures. It suggests that any research conducted around knowledge structures will always be
to some extent interpretive in nature. Therefore, research applying knowledge structures must
recognize that we live in a ‘world of our making’63 , always constrained by the double-
hermeneutics of social science research64 . Only through acceptance of this reality, future
research may be able to build on this research’s findings without falling for its (hopefully
minimal) interpretive biases.
Lastly, as Haggart definition builds on Susan Strange’s theory, the relation between
knowledge structures and other structural powers requires definition. While Strange regards
57 Ibid 58 Ibid, 32 59 See Strange, 2016 60 One of questions that remain unresolved is the Gettier problem challenging the notion of knowledge as
justified true belief, see for example Turri, 2012 61 Haggart, 2019, 27 62 Gitelman and Jackson, 2013 63 Onuf, 1989 64 See Flyvbjerg, 2001
Student number: S2569310
knowledge structures as one of four sources of structural power—with the others including
finance, production, and security structures—Haggart shows how the power over knowledge
structures fundamentally determines the strength of all other structural powers. The power over
production structures, for example, encapsulates the idea that power is gained through
controlling “what is produced, by whom, for whom and on what terms”65. Whoever defines
what is accepted as valuable to produce, however, also controls what is ultimately produced.
Transitionally the same logic applies to the power over security and finance structures.
Therefore, all structural sources of power as outlined by Strange are necessarily dependent on
knowledge structures.
Tying all these aspects of knowledge structures together, three observable implications
showcasing power can be measured66. If China has used its ICT capabilities to reshape the
configuration of global internet governance, we would see that China:
1. ... defines what knowledge is important in global internet governance—despite
facing considerable definitional contestation. (knowledge-legitimation aspect);
2. ... has (in-)formally institutionalized power over the creation, communication, and
use of knowledge in global internet governance. (regulatory aspect); and
3. ... asymmetrically benefits from these rules and definitions in global internet
governance.
3.2 Empirical Strategy: Content & Discourse Analysis
In order to offer a suitable method for both the nature of the research question and the
theoretical framework of power, this paper principally combines conventional content analysis
with document analysis. As knowledge is often expressed through language, ideas, and framing
of the world, tracing it requires a flexible and interpretive, yet precise approach to measuring
it. As content analysis combines inductive categorization to the discursive comprehension of
power expressed through linguistic means, the tandem of these two methods is highly suitable
to operationalize an answer to this paper’s research question.
As the overarching research goal is to measure the effect of Chinese ICT capabilities
on China’s ability to reshape global internet governance, the empirical chapter firstly provides
65 May, 1996, 179 66 Quoting & paraphrasing Haggart, 2019, 35, 42
Student number: S2569310
a content analysis of China’s internet governance priorities and national ICT strategies.
Thereby an analytical base line of categories such as the employed framing and set policy
priorities is established. As China has one of the most extensive governance regimes for
cyberspace and ICT, emphasis is put on the Cybersecurity Law (CSL) which functions as the
corner stones of Chinese cyber space jurisdiction67. For a holistic picture of China’s ICT
strategy, the paper analyzes Made in China 2025, Internet Plus, Digital Silk Road, the 13th
Five-Year Plan for National Informatization, and the 2017 State Council’s New Generation
Artificial Intelligence Development Plan. To allow for a conclusive, triangulated picture, the
findings are then cross-referenced with area studies specific secondary literature on the history
and culture around Chinese internet governance.
Content analysis, following Hsieh and Shannon’s definition, principally relies on an
inductive approach 68 . “Translation device[s]” such as ideas, expressions, framings, and
concepts are directly derived from the data to codify them into categories69 . These build
relational center points for consecutive information, antecedents, and concurrences. Content
analysis therefore goes beyond simple categorization strategies of counting words, but
explicitly considers inferred communication to gain a contextual understanding of the analyzed
material70. This type of analysis is especially useful in fields where existing research is limited
and many, potentially messy data points are available. Due to its relatively recent emergence
and the therefore limited existing research available, an inductive approach to Chinese
influence on global internet governance is therefore highly suitable. Moreover, it prevents
preconceived notions and biases to interfere with research outcomes. Through a process of
breaking data points down into smaller, comprehendible categories based on apparent patterns,
it ultimately allows for the consideration of findings in a more holistic manner, also including
data points that might otherwise be overlooked71.
After establishing the analytical baseline, a discourse analysis of the effect of Chinese
ICT capabilities on the three aspects of power over knowledge structures is conducted. Firstly,
to measure the knowledge-legitimation aspect, the paper compares the analytical base line to
the norms and preferences of states in two separate time periods—pre-2017 and post-2017.
This separation is due to the 2017 collapse of the governing body of the global internet since
67 Sacks, E.d. 68 Hsieh & Shannon, 2005, 1279; see also Kondracki & Wellman, 2002 69 Poole & Folger, 1981, in Hsieh & Shannon, 2005, 1285 70 Hsieh & Shannon, 2005 71 Ibid
Student number: S2569310
2004, the United Nations Group of Governmental Experts on Information Security (UNGGE)72.
Although it was re-established in 2018, it now runs in parallel to a second body, the Open-
Ended Working Group on Developments in the Field of ICTs in the Context of International
Security (OEWG). The difference between the two institutions is twofold. Firstly, the UNGGE
only allows for 25 selected experts, the OEWG includes all UN member states. Secondly, the
OEWG looks to be broader in scope, looking into “existing and potential threats; international
law; rules, norms and principles; regular institutional dialogue; confidence building measures;
and capacity building”73.
The pre-2017 documents are accessed through the Carnegie’s Cyber Norms Index
(CCNI), which offers a collection of all UNGGE and all related multilateral documents
between 2007 and 201774. The post-2017 documents are accessed through the United Nations
Library and the OEWG website75. They include a total number of 12 documents from the
UNGGE, OWEG, and the UN General Assembly 76 . All findings are consistently cross-
referenced with the Digital Deciders Data (DDD) by New America and secondary area studies
specific literature to allow for a more conclusive and holistic understanding of the results77.
The DDD, in particular, offers additional empirical insights into individual states’ position on
global cyber norms beyond multilateral forums. The consultation of this additional literature
and data therefore allows for an effective triangulation of the findings on three levels of
governance, i.e. on a global, inter-state, and state level.
The paper’s choice for a discourse analysis is justified in that it allows the research to
engage with "intersubjective meaning and the linguistic and communicative processes through
which social reality is constructed" 78 . This interpretive method "broadly understood as
'meaning in use'79 or 'talk and text in context'80 is particularly useful to comprehend power
expressed through linguistic means because it uncovers the context in which language finds
social meaning. For discourse to become dominant, Hajer describes two different stages it
needs to attain, the discourse structuration stage and discourse institutionalization stage81.
72 Osula, Rõigas 2016, 13; Soesanto & D'Incau, 2017 73 DWO, E.d. 74 CNNI, E.d. 75 OEWG, E.d. 76 It is important to note however, that the OEWG’s mandate only began in 2019 with results being expected at
the end of 2020. Analyzed OEWG documents will thus only include drafts and are not final 77 Morgus, Woolbright, & Sherman, 2018 78 Holzscheiter, 2013, 144 79 Wiener, 2009 80 van Dijk, 1997, 3; Holzscheiter, 2013, 143 81 Hajer, 1993; Hajer, 2006
Student number: S2569310
Discourse structuration entails the idea that important actors begin to accept the discourse in
question and use it for the conceptualization of the world around them. The more important
actors rely on the same discourse, the more meaningful and thus powerful it becomes.
Discourse institutionalization occurs when the discourse in question is actively used in the
policy process. If a certain idea, image, or framing is apparent within policy documents or even
statues and institutional trainings, it may therefore constitute as powerful, dominant discourse82.
Secondly, to measure the knowledge regulation aspect, the paper conducts a discourse
analysis of the Internet Corporation for Assigned Names and Numbers (ICANN) transition
process. Founded in 1998, ICANN has since overseen the root zone of the internet (IANA) and
the Domain Name System (DNS) that allows for a globally connected internet83. The United
States government announced in 2014 that IANA and ICANN at large should be transformed.
Many states had issued their concerns over ICANN’s relations to the US department of
Commerce, to which it was technically accountable84. One of the states strongly advocating for
an overhaul towards a more state-centric institution was China. Officials in Beijing saw too
much power in the hands of the United States and even left the institution out of protest in 2001,
only joining again in 200985.
Following Haggart’s definition of the regulatory aspect of knowledge, the structural
importance of ICANN as a network governing the root administrative system of the global
internet is not to be understated. It governs the system that allows for the global internet to
function—for example, it administrates the Internet Protocol address spaces (IP addresses) and
the allocation of addresses to regional internet registries. Whoever controls ICANN, regulates
the technical root core of the internet, and can perpetuate their conception of how the internet
is supposed to run on a foundational level. The ICANN transition process between 2014 to
2016 is therefore an ideal proxy for an analysis of the relation between Chinese ICT capabilities
and China’s ability to shape knowledge regulation in global internet governance.
The data analyzed comes from three different sources: official ICANN transition
documents and Governmental Advisory Committee (GAC) meetings between 2014 to 2016.
The first allows for a discursive look into the outcomes of the transition, while the later gives
insights into the language used throughout the transition process. The GAC, while only giving
non-binding advice to the ICANN board86, is the only body in ICANN’s structure that is
82 Ibid, 71 83 Liu, 2012, 47 84 Ibid; Robinson, 2016, 198, 201 85 Creemers, 2020, Liu, 2012, 51 86 ICANN, E.d.
Student number: S2569310
intergovernmental. Therefore it was also the forum in which states would state their interests
about the transition process most openly. In total, three IANA transition documents and a dozen
GAC documents from nine international ICANN events have been accessed—all through the
ICANN website, which makes all its meeting notes and results openly available87. Additionally,
as in the sections beforehand, secondary literature offering further insights through interviews
and area specific expertise is consulted to allow for a more conclusive picture of the power
realities throughout ICANN’s transition process.
Lastly, to finish the empirical chapter, the paper analytically weighs whether China
benefits from the outcomes of knowledge structures in global internet governance. Power over
knowledge-legitimation and knowledge regulation are to an extent only useful if they produce
outcomes that are beneficial for the actor that controls them. In reverse, actors do not
necessarily need to have direct influence over structures if the outcomes from those structures
benefit them. Therefore, if actors gain from the outcomes of knowledge structures, they do not
need to actively change them, giving them a third alley of power over knowledge structures.
The last part of the analytical chapter thus offers insights into the outcomes of global internet
governance norms and the ICANN transition process and whether they benefit China. As the
paper follows an inductive analytical approach, the results are taken from preceding chapters
and triangulated with secondary literature evaluating if China benefits from knowledge
structures in global internet governance.
87 ICANN meetings accessed through https://meetings.icann.org/en/calendar
Student number: S2569310
4. Chapter: Empirical Analysis
4.1. Analytical Baseline: Chinese Cyber Norms & ICT strategy
4.1.1. Normative Priorities
China governs cyber space through six regulations, of which the Cyber Security Law (CSL)
lays out the core normative foundation88. Several institutions utilise these legislative documents
in order to function as regulatory bodies. Three are particularly relevant: The Cyberspace
Administration of China (CAC)—the central institution for internet governance—; the
Ministry of Industry and Information Technology (MIIT), which has significant partaking in
the elaboration of ICT strategies89; as well as the Central Commission for cybersecurity and
Informatization which is chaired by Xi Jinping himself90.
Conducting a content analysis of the CSL as well as cross-referencing the material with
secondary academic sources, a clear normative emphasis on public security and sovereignty in
cyber space can be detected. When the CSL addresses data protection, for example, it
emphasises the importance of public security over other ideas such as personal privacy91. This
is meant to foster consumer trust in the digital economy while ensuring central governmental
control of cyber space92. Secondary literature suggests that this is due to the idea of privacy
having taken significantly longer to develop in China than in “the West”. Local communities
and the adherence to “strict moral and behavioral social norms” have created an unfavorable
environment for privacy protection to emerge93. While Western societies democratized after
World War II by balancing power-dynamics between states and individuals, political
circumstances in China hindered such developments. Data protection only became relevant
when a vast problem of online fraud lead to a public outcry in 201694. Nevertheless, Chinese
88 Triolo, Sacks, Webster & Creemers, 2017; Creemers, Triolo & Webster, 2018 89 Triolo, Sacks, Webster & Creemers, 2017 90 Creemers, 2020 91 Creemers, Triolo & Webster, 2018, Art. 8, 14, 28; Wang Han & Munir, 2018, 535; Sacks, 2018 92 Creemers, Triolo & Webster, 2018, Art. 16; Sacks, 2018; 11, 34-35 93 Pernot-Leplay, 2020, 65 94 After a college student died in 2016 as a consequence of being a victim to online fraud, the Chinese public
vocally expressed their anger about the rampant problem. Chinese consumers were at the time estimated to have
lost 1.5 billion USD in the timespan between 2011 and 2014 from online fraud already; on this also see Inkster,
2015, 42; Pernot-Leplay, 2020, 110; Wang Han & Munir, 2018, 535
Student number: S2569310
data protection laws are built around norms of public security, reinforcing traditional Chinese
policy priorities95.
A second idea that is prevalent in the CSL is that of cyber sovereignty (wangluo
zhuquan). Mentioned in Art. 1, cyber sovereignty is understood as the application of the
classical 1648 Peace of Westphalia idea of sovereignty to cyber space 96 . Although the
document leaves definitional room for interpretation, it suggests that states, as much as they
have exclusive authority within their territory, also have such rights within their cyber territory.
In the words of Xi Jinping, states should therefore refrain from “interfering in other countries’
internal affairs, and engaging in, tolerating or supporting online activities harming the national
security of other countries”97. Rogier Creemers finds that reference to the term first appeared
in a 2010 national White Paper98, then in 2011 and 2015 in the United Nations99, at the 2012
Budapest Conference on Cyberspace100, at China’s World Internet Conference in 2014101, as
well as in China’s international cyber strategy102. This wide use of the term highlights its central
importance in China’s priorities for cyber governance.
Although Chinese regulatory documents make no direct reference to the reasons
underlying the employment of this term, Chinese lingua suggests a defensive purpose, referred
to as information security. Since the historic imperialist invasion of the China in the 18th
century, Chinese officials have long feared foreign interference and have thus been inclined to
securitize cyber space103. Rogier Creemers underlines this idea, suggesting that China employs
cyber sovereignty as a defensive mechanism against US cyber hegemony (wangluo baquan)104.
When the Snowden revelations (lengjingmen) and the United States’ ban of Huawei and ZTE
revealed vulnerability towards US technology, cyber sovereignty became a normative tool to
advocate for national security in cyber space105. Despite this framing, it is also often regarded
as a way for Beijing to justify a controlling government censoring domestic and international
95 Pernot-Leplay, 2020 96 Triolo, Sacks, Webster & Creemers, 2017 97 Xi, 2015 98 SCIO, 2010 99 UN, 2011; UN, 2015 100 Creemers, 2020 101 Ibid 102 Ibid 103 Schell and Delury, 2014 104 Harold, Libicki & Cevallos, 2016, 8-9 105 Creemers, 2020; Shen Yi, 2016; Inkster, 2015, 129-130; Shen, 2016, 91
Student number: S2569310
cyber content. Through the Great Firewall of China, for example, “internet architecture, content,
and data flows” in China are systematically isolated from international cyberspace106.
4.1.2. National ICT Strategy
Five national ICT strategies lay the foundation for China’s approach towards becoming a cyber
superpower. The Made in China 2025 strategy seeks to engineer a shift for China from being
a low-end manufacturer to becoming a high-end producer of goods107. The goal is to tap into
its increasingly wealthy domestic consumer base as well as the value-added global sourcing
segment. This requires a transitioning of the country’s existing manufacturing infrastructure
and labour market towards producing more specialized output—with targeted investments in
research and development and an emphasis on technological innovation. Among its various
goals, the program seeks to raise the domestic content of core components and materials to 40%
by 2020 and 70% by 2025. The plan explicitly refers to how much of China’s technology
market should be controlled by Chinese companies and how many component parts in different
products need to be ‘Made in China’. These goals could be summarized as fostering indigenous
production without foreign interference and promoting investments abroad.
The former is also present in the Internet Plus initiative108. In July 2015, the State
Council released the ‘Guiding Opinions on Actively Promoting the Internet Plus Action Plan’,
strongly advocating for Chinese Internet firms to join traditional industries, such as
manufacturing and finance, in their overseas expansion109. It also encouraged those firms to
build globally competitive application platforms to offer Internet service such as cloud
computing and big data analysis, to both Chinese and global businesses. Moreover, Hong Shen
explains that a growing and complex alliance has been formed between the state and its
homegrown Internet companies in building a Digital Silk Road. It has the multifaceted aim to
mitigate industrial overcapacity, facilitate corporate China’s global expansion, support the
internationalization of the renminbi, construct a China-centred transnational network
infrastructure, and promote an Internet-enabled inclusive globalization110. In combination with
targeted ICT investments, for example, in internet infrastructure in Africa, the Digital Silk
106 The Great Firewall is a reference to the Great Wall of China and effectively stops foreign online traffic to
Chinese cyberspace; see Creemers, Triolo & Webster, 2018 107Zenglein & Holzmann, 2019 108 Xinhua News Agency, 2015 109 Shen, 2017, 129; State Council, 2015 110 Shen, 2018
Student number: S2569310
Road has therefore allowed for a framework in which Chinese companies have had an easy
time flourishing and expanding to new countries111.
In 2016, the Chinese State Council published the 13th Five-Year Plan for National
Informatization, devoting a specific section to the construction of an ‘Online Silk Road’ and
encouraging the full participation of Chinese Internet companies112. In the plan the Chinese
government explains the importance of the internet in chapter 6 which is called “Broaden the
Internet’s economic space”113. It states that the overall goal is to “constantly have a firm grip
on the developments within the change of IT; realize the strategy of becoming a strong internet
power; speed up the instalment of Digital China; further push the fusion of IT and economic
and social development; and speed up the push for robust IT economic development”114. The
chapter further recognizes four key areas of attention, being: Establishing an extensive network
of high-efficiency IT, developing a modern internet industrial system, implementing a national
big data strategy, and strengthening assurance of cyber sovereignty as well as information
security. Given the wording, this strategy is the closest and most explicit about Chinese cyber
norms, thus showing how the growth of ICT capabilities and the achievement of norms like
cyber sovereignty are seen as part of the same overarching strategy.
Lastly, in the 2017 State Council’s New Generation Artificial Intelligence Development
Plan, the CCP formulated its intention to turn China into “the world’s primary AI innovation
centre” by 2030115. While Macro Polo points out the lack of a clear roadmap towards the
achievement of this goal, they also highlight the signalling function that statements like these
often have for Chinese domestic politics. It functions as a “high-profile signal to local
government officials—mayors, university presidents, and provincial transportation chiefs—
that they would be rewarded for promoting AI in their jurisdiction” 116 . Similar to other
strategies, there is thus a dual goal with China’s AI strategy. On the one hand, it seeks to foster
indigenous growth by creating strong economic and structural incentives. On the other hand, it
employs the growing ICT capabilities to expand abroad.
Taken all strategies together, two analytical reference points can be drawn. Firstly, and
most importantly, as China ties its ICT strategies closely to its cyber norms, any reference of
norms such as (cyber) sovereignty, national security, public security or public order, and
111 Ibid 112 State Council, 2016 113 Ibid 114 State Council, 2016 115 Macro Polo, E.d., b 116 Macro Polo, E.d. a
Student number: S2569310
information security should be considered as potential traces of China’s influence. Secondly,
China ties its norm promotion to economic incentives at large. Access to digital infrastructure
and new technologies like cloud computing are specifically promoted and offered as an
incentive for other states to consider. China also emphasises indigenous growth, which
necessarily includes the exclusion of foreign interference in its national markets. Therefore, if
other actors’ reference any of these economic reasons for their choices, this paper regards them
as an indicators for potential influence of Chinese ICT capabilities.
4.2. Knowledge-Legitimation: China & Norms in Global Internet Governance
4.2.1. Norms in Global Cyberspace up until 2017
The discursive analysis of Carnegie’s Cyber Norm Index (2007-2017) indicates an
international divide along the spectrum of two opposing fronts on norms for cyberspace. On
the one hand, China and Russia can be categorized as advocates for an internet that balances
the rights of individuals with the sovereignty of states as well as the need of states to be able to
defend themselves against the US in cyber space. Firstly, on the idea of balance, Chinese and
Russian documents frame the idea of national security as one fundamentally is trade-off to the
adherence to human rights117. They officially agree to the importance of human rights in
general but state that they must be in accordance with a states’ national law, as well as their
means to protect them and national security. Secondly, on the defensive needs with regards to
US power in cyber space, China and Russia reference the Snowden revelations and emphasise
the threat of mass surveillance through cyber space118. However, there is no further reference
by other states or international bodies to these norms. This indicates an unsuccessful discourse
structuration.
On the other hand, states closely associated with the EU, the US and “the West”
advocate for human rights norms. They structure their framing around the universality of
human rights and the obligatory nature of international resolutions that make human rights an
international norm. Firstly, on the universality of human rights, the EU-US Cyber Dialogues,
conducted annually between 2014 and 2016, put repeating emphasis on human rights norms.
In nearly the exact same wording they conclude after each dialogue that the “same rights people
117 CEI, 2017i; CEI, 2017f; CEI, 2017j; CEI, 2017k; CEI, 2017h 118 CEI, 2017g; CEI, 2017a
Student number: S2569310
have offline must also be protected online”119. This framing also appears nearly word-for-word
in the Group of Seven (G7) and the BRICS (Brazil, Russia, India, China, South Africa),
indicating the emergence of discourse structuration120.
Secondly, on the obligatory nature of international resolutions, the EU-US Cyber
Dialogue references the freedom of expression online as well as individual privacy rights as
agreed upon norms for international cyber space. They uphold the Human Rights Council
resolutions in particular. Other states again show signs of discourse structuration, by repeating
this codification of norms into their official statements. As human rights norms are already
noted as obligatory under international resolutions as well as accepted by other states, there is
even indication for an institutionalization of the discourse around human rights norms. While
human rights might not be fully acted upon, they can therefore be regarded as legitimate
knowledge, that is accepted as truth in global internet governance. This also indicates that the
EU and the US—the core advocates for these norms—are at an advantage when it comes to
internet governance. Any other actor can be hold to these standards, giving the EU and the US
power over knowledge structures—at least up until 2017.
Cross-referencing these findings with the Digital Deciders Data by New America, a
similar picture emerges, although with the additional emergence of a third group. The DDD’s
Internet Value Score categorises states on a scale from authoritarian to free and open in attitude
towards internet governance. Results match the CCNI in that China, Russia, and states like
Egypt and Turkey categorize as authoritarian, while Western countries, including the EU and
the US are found on the free and open side of the spectrum121. However, the data also indicates
that approximately 50 states—including states like India and Brazil—are undecided, siding
somewhere in between the two extremes. This group is coined the digital deciders. Following
the DDD’s semantic emphasis, it is this group that is the most important for the future of global
internet governance.
4.2.2. Norms in Global Cyberspace after 2017
The discursive analysis of the UN OEWG and General Assembly (GA) indicate that human
rights norms are still institutionalized, but that Chinese norms of information security and cyber
sovereignty have become more prominent. Firstly, regarding the human rights norm, all three
119 CEI, 2017b; CEI, 2017c; CEI, 2017d 120 CEI, 2017e; CEI, 2017a; CEI, 2017f 121 Morgus, Woolbright & Sherman, 2018, 20-21
Student number: S2569310
officially published drafts of the OEWG show a clear “commitment to promote respect for
human rights and fundamental freedoms”122. The GA further reaffirms this by employing the
same framing around offline-online rights that the EU and the US had used before 2017123. As
this discourse was already institutionalized before 2017 and continues to be prevalent in the
documents published by all UN member states, one can conclude that this norm remains
institutionalized.
Secondly, regarding Chinese norms for cyber space, there is greater mention of the
norms by actors other than China, Russia, and their associated allies. The OEWG has a separate
agenda point on information security124 . The pre-draft further outlines the importance of
preserving states ability to act as sovereigns, however, also emphasizing the need to uphold
fundamental human rights (point 23, 27)125. This dual stance is underlined in the second pre-
draft and in some of the comments by states commonly associated as digital deciders such as
Ecuador 126 . In terms of the General Assembly, particularly the documents A/73/505 and
A/73/505 stand out127. They emphasis the need to “continue to study, with a view to promoting
common understandings, existing and potential threats in the sphere of information security”128.
However, closer inspection of the context in which it is used indicate that while states begin to
see information security as relevant, they do not conclude national measures are necessarily
the best way to ensure it. To protect critical infrastructure, countries like India or Canada see
international cooperation as a better choice instead129. Therefore, states generally call for more
action to ensure and study measures for information security130, but refrain from following
Chinese norms. France even explicitly states that as an advocate for freedom of expression
online, it “first [wishes] to reiterate that it does not use the term ‘information security’’,
preferring other terms instead131. Information security is thus moving up the agenda, but not
fully according to the Chinese definition.
The clearest trace of Chinese norms however can be found in a 2018 Chinese and
Russian-led GA resolution on Countering the Use of Information and Communication
122 OEWG, 2020c, 1; OEWG, 2020b, OEWG, 2020a 123 GA, 2019c, 3, a similar commitment can be found in GA, 2019d 124 GA, 2019b 125 OEWG, 2020c 126 GA, 2017 127 GA, 2019c; GA, 2019e 128 GA, 2019c 129 OEWG, 2020b, 4; GA, 2018c 130 GA, 2019a, 2 131 Ibid
Student number: S2569310
Technologies for Criminal Purposes132. It highlights both the right of states to be the sovereign
of their cyberspace and the public security norm. While this emphasis is most often present in
Chinese and Russian resolutions, this time, the resolution found additional support and was
eventually adopted. Some of the digital deciders—for example, India, Brazil, Nigeria, and
states in China’s neighborhood—backed the resolution. In total half of the digital deciders
votes yes133.
Secondary literature also suggests that sovereignty finds more frequent mention in the
EU’s regulatory context of data protection regulation. Internet governance conferences, as well
as policy proposals, and even speeches of EU country leaders refer to the need to regain
sovereignty as states in cyberspace134. Since the formulation of the European Union’s General
Data Protection Regulation (GDPR), stronger restrictions on the free flow of data have been
imposed in Europe. They de facto operate through a localization requirement, usually
associated with controlled and sovereign norms for cyberspace135. Occasionally, European
officials even mention the need to protect against US power in cyberspace136. However, the
term employed in the European context is not cyber sovereignty, but digital sovereignty, which
describes the ability for both individuals and states to stay self-determined in cyberspace137.
France’s answer to the report of the UN Secretary General working on cybersecurity highlights
this in particular. Although the country states that “sovereignty applies to cyberspace”, it does
not refer to cyber sovereignty, but specifically differentiates it as digital sovereignty 138 .
Following Hajer’s definition for dominant discourse, this indicates that Chinese discourse
around sovereignty and national security has reached the discourse structuration phase but has
yet to institutionalize its position. Important actors, such as the digital deciders and European
states, traditionally opposed to Chinese norms, are more prone to use China’s discourse, but
they are yet to reach its full acceptance.
Finally, when it comes to the second indicator showing influence of Chinese ICT’s
economic incentives, states generally tend to be vaguely responsive. India, the Netherlands,
Germany, Argentina, Columbia the United Kingdom all recognize that critical infrastructure is
connected to reaping the economic benefits from information and communications
132 Sherman & Morgus, 2018 133 see GA, 2018a, and GA, 2018b 134 IGF, 2019a; IGF, 2019b; IGF, 2019c; IGF, 2019d; EIT, 2020; Creemers, 2020 135 Daskal, & Sherman, 2020, 3 136 Segal, 2017, 21-22 137 IGF, 2019a 138 GA, 2019a
Student number: S2569310
technologies139. Infrastructure should therefore be protected, in particular from cybercrimes
and malicious intent. The UK even states that national security is necessarily linked to
economic prosperity. However, there is never a direct reference to any particular ICT
technology or the need to indigenize ICT production. Moreover, all countries state their explicit
unwillingness to compromise on individual freedoms. Sometimes they state this in the same
sentence in which they refer to economic benefits, other times, as in the case of France, they
explicitly state that it is part of a broader goal in which protectionism is not an option—there
has to be a balance between security, economic growth, and individual freedoms140. Adding
these findings to the results on cyber norms, ICT capabilities can only be considered partially
impactful for China’s power over knowledge-legitimation. While norms like information
security and sovereignty have in part reached the discourse structuration stage, economic
incentives do not leave any empirical traces. China thus only partially or even minimally
defines what knowledge is important in global internet governance.
4.3. Knowledge Regulation: China & Institutionalized Power over Knowledge in Global
Internet Governance
As in the previous section, Chinese norms for cyberspace and expressed economic incentives
are traced throughout a variety of documents from the ICANN transition process. Adding to
the framings established in the content analysis in section 4.1., the inductive research of
Carnegie’s Cyber Norms Index has shown that Chinese officials also employ the notions of
balance as well as the need to defend against an hegemonic US power in cyber space. Moreover,
it introduced the notions of a free and open internet adhering to human rights as a framing
employed by states that sided with “the West” on internet governance.
Against this backdrop, the IANA and GAC documents suggest moderate to low
influence of Chinese ICT capabilities on China’s ability to shape the ICANN transition process.
Although secondary literature highlights Chinese officials openly advocating for a more state-
centric, sovereign version of ICANN under UN oversight since 2003, there is limited trace of
this affecting other states141. Firstly, considering the linguistic representation of Chinese norms
for cyberspace, only few norms find relevant mention. Although, national security is one of the
139 Ibid, 2-11, GA, 2017, 12, 18, 25 140 GA, 2019a 141 Ibid, 51; Creemers, 2020
Student number: S2569310
most important concepts in the Chinese understanding of global cyberspace142, there is no
direct mention of the term. Public order and information security are also left unmentioned.
The only reference point that indicates direct concern about these norms can be found in a GAC
High Level Governmental Meeting in Marrakech (2016). Russia, a close ally to China, as the
research into Carnegie’s Cyber Norms Index has shown, issued its doubts over whether the
United States was truthful in its promises to aid the transition process away from ICANN’s
relation to the US government. For evidence, they pointed towards a letter by Ted Cruz, a US
Senator, warning of giving away the internet to the Chinese143.
Another important Chinese norm often promoted through Chinese officials and ICT
companies is the idea of (cyber) sovereignty. Although, the Chinese government again showed
the intention to make it an absolute priority in the ICANN transition process, it only finds direct
mention in one of the GAC meetings and in none of the IANA documents. After the Chinese
official mentions the issue at the beginning of the meeting, Iran, a Chinese ally in cyberspace
governance, as well as Peru and representatives of .AFRICA, an independent non-governmental
regional organization speaking on behalf of the interest of African internet consumers, voiced
their desire to have sovereignty be regarded in the ICANN transition process144. While this
does indicate that sovereignty plays an important part in the discourse employed by the actors
involved in the transition process, the single mention of the issue also shows that the notion did
not persist throughout the entire transition process. Moreover, the fact that other states only
mentioned it once it was raised by a Chinese official in the same meeting first, indicates that
ICT capabilities probably played less of a role in the behavior of other states. Instead, they are
likely to have been more concerned about immediate reference points raised in the meeting.
Economic incentives also play a marginal role in the considerations of states in the GAC
and the final IANA documents. There is no mention of the economic role in the IANA final
documents and only two countries mention economic incentives in the GAC meeting in
Marrakech in 2016. While Canada refers to the economic benefits a multi-stakeholder model
would hold, Indonesia highlights that the development of the internet should be connected to a
beneficial environment for internet-related technologies145. The latter is a linguistic trace that
one might expect if there was any influence of Chinese ICT capabilities. However, Indonesia
is the only country to mention these intentions this explicitly and it formulates them vaguely
142 Creemers, 2020, Liu, 2012 143 GAC, 2016, 34-35 144 GAC, 2016, 86, 95, 106, 143, 167 145 Ibid, 19, 100
Student number: S2569310
around the term of international cooperation leading to the development of local internet-
related technology146. Therefore, the language used in the analyzed documents suggests that
economic incentives paly a marginal role in other states’ considerations.
The notions that do stand out consistently in all documents, however, are the notions of
balance as well as the “western” notion of a free and open internet. The IANA Stewardship
Transition Proposal—notably just the initial proposal and under heavy international
scrutiny147—already stated the need “to find the right balance across the stakeholder equities
and operational requirements”148. In fact, the same proposal made direct reference to the need
to limit the power of the United States outlining that no single interested should be able to
capture IANA stewardship149. Several states participating in the GAC forum made similar
claims. Sometimes such balance is seen as a balance between the power of developed and
developing states, sometimes it is referenced as checks and balances that are fair for every actor
involved. Overall, the notion of balance appears to be an important notion throughout the
transition process, mentioned from actors on the entire spectrum from allies to China, to allies
to “the West”, and even the CEO of ICANN himself150.
Norms promoting a free and open internet structure are explicitly present in the IANA
transition documents. The IANA transition proposal, that outlines the United States’ idea as to
how the transition was supposed to function, states that “the transition proposal should
contribute to an open and interoperable internet”151. This clear promotion of the free and open
norms for cyberspace can also be traced in the IANA transition assessment report. There it
specifically refers to the new model being one representing a “neutral and judgement-free
administration of the technical DNS and IANA functions”, which will lead to a technical
structure that does not limit “free expression or the free flow of information”152. According to
the report, this is also in large parts due to the Obama Administration committing to the
preservation of a free and open global internet153. Given these open expressions of support
through a US administrative body, it is therefore likely that not China but in fact the United
States were able to influence the transition process to their liking. Following Hajer’s
146 Ibid 147 Robinson, 2016, 203 148 ICG, 2016a, 30 149 Ibid, 25 150 GAC, 2016, 15, 32, 91; GAC, 2015, 19, GAC, 2014, 45 151 ICG, 2016a, 87 152 ICG, 2016b, 7 153 Ibid, 25-26
Student number: S2569310
conceptualization, this does therefore indicate institutionalized discourse, thus leading to a
dominant discourse in cyberspace along the free and open internet norms.
Taking all documents into consideration, China’s ICT capabilities can therefore be
identified as far from the discourse institutionalization that is required to qualify Chinese
discourse as dominant discourse. Moreover, they do not reach the discourse structuration level
either, indicating the lack of influence of Chinese ICT capabilities altogether. In fact,
considering the extent to which documents mention Chinese norms in comparison for China’s
vocal advocacy of the same norms in the early 2000s, there appears to be a gradual decline in
Chinese advocacy efforts. Two non-mutually exclusive explanations for this development
appear likely. Firstly, China accepted its low likelihood of success within the international
discourse that was already strongly influenced by the free and open idea of internet governance
for ICANN. Secondly, Chinese officials realized that the multi-stakeholder model without
direct US control over ICANN would achieve its goals of limiting US power without the
necessity for strong Chinese advocacy. Despite initial opposition to the multi-stakeholder
model in the early 2000s154, Gianluigi Negro finds that Chinese officials began to familiarize
themselves with the benefits of the multi-stakeholder model throughout the transition
process155. This ultimately led to their acceptance of the model and the consequent halt to its
advocacy efforts. Combining these alternative explanations with the discursive findings,
Chinese ICT capabilities can thus be considered non-influential towards China’s ability to
shape knowledge regulation in global internet governance. China does not possess
(in-)formally institutionalized power over the creation, communication, and use of knowledge
in global internet governance.
4.4. China & Benefits from Rules and Definitions in Global Internet Governance
Although the previous two sections have shown China to have limited power over the
knowledge-legitimation and knowledge regulation aspects of the power over knowledge
structures, the outcomes from knowledge structures in global internet governance show a trend
that is overall beneficial to China. In light of the analysis already provided in this chapter, two
aspects stand out specifically. Firstly, protectionism and national sovereignty is shifting
towards center stage in the discussion around how to govern global cyberspace. In particular
154 Creemers, 2020, also see ICANN, 2014, for access to Lu Wei’s speech 155 Ibid
Student number: S2569310
the emergence of data protection legislation has played a large role in shifting states’ attention
towards more protection of their own cyberspaces. Despite considerable differences between
Europe’s definition of sovereignty as digital sovereignty and the Chinese idea of cyber
sovereignty, sovereignty, and data localization policies are in the minds of policy makers
around the world156.
This development is also in part due to the “the West” realizing the need to ensure
information security in cyberspace. As the Russian hack of the United States Democratic party
in 2016 and the Cambridge Analytica scandal have demonstrated the great impact cyberspace
can have on social, political and economic processes, policy makers have found social divisions,
fake news and filter bubbles to be of great concern157. States like China and Russia have long
seen information security as a policy priority, pushing for its consideration in the global
governance of cyberspace. As the issue becomes more important overall, Chinese, and Russian
arguments also gain attention that thus increasingly has the potential to shape the governance
of cyberspace. China therefore not only gains future potential to influence what is defined as
important knowledge (knowledge-legitimation aspect), but it is also more likely to find
acceptance for its protectionist cyberspace policies. The Great Firewall, for example, is less
likely to find international opposition. Although it is highly protectionist in nature and speaks
against free and open internet norms, officials in Beijing often argue that it hinders harmful
information from entering China, thus effectively providing information security. If
information security gains more acceptance, Beijing’s framing of the Great Firewall has a
greater potential to do so as well.
Moreover, as section 4.3. of this paper has argued that the multi-stakeholder model
benefits China in terms of outcomes. Although it does not have a direct say over the root zone
structure of the internet, one of its main policy goals has effectively been achieved through the
ICANN transition. The United States, the supposed cyber hegemon (wangluo baquan)158, no
longer has direct influence over the root zone system. Instead, the system is now accountable
to many different, non-state actors. Therefore, the Chinese fear of US interference through
ICANN has been drastically diminished. If considering these outcomes, China has therefore
gained from the development of knowledge structure in international cyberspace.
156 For more detail on the global trend towards what the authors call ‘data nationalism’ see Daskal & Sherman,
2020 157 Cadwalladr & Graham-Harrison, 2018 158 Harold, Libicki & Cevallos, 2016, 8-9
Student number: S2569310
The question remains however, to what extent these outcomes are necessarily
interlinked with Chinese ICT capabilities. Although some indicators in section 4.2. and 4.3.
suggest that Chinese ICT capabilities played a measurable role, it is unclear whether they were
the determining factor leading to the outcomes discussed. In fact, given the limited appearance
of the economic incentive within the discourse analyzed, it appears likely that Chinese ICT
capabilities were only partly influential in an already broader global trend of changing internet
structures. The Snowden revelations, for example, appear to have played a much more
significant role in reshaping global discussion than Chinese active use of its ICT capabilities,
as they made states in Europe aware of the need to protect against foreign interference and an
independent root file system (ICANN). Therefore, this section concludes that Chinese ICT
capabilities partially to minimally influenced beneficial outcomes for China. Beijing also only
partially and not asymmetrically benefits from the rules and definitions in global internet
governance. Given the trend, however, it remains to be seen if China can gain more from
knowledge structures in global cyberspace in the years to come.
Student number: S2569310
5. Chapter: Conclusion
The influence of China in the global political economy has emerged as a hot topic in recent
years. Despite considerable amount of research, limited empirical studies on the interlinkage
between Chinese economic capabilities and its international influence have been conducted. In
light of this lack of literature, this paper has contributed to the academic debate on China’s rise
by analysing whether China’s ICT capabilities have allowed Beijing to reshape the
configuration of global internet governance—an emerging field of international governance
and one of Beijing prioritized sectors. Through a discursive analysis of global internet
governance documents and the conceptualization of power in international relations as power
over knowledge structures, the paper has found that China’s ICT capabilities do not possess
empirically provable influence on China’s ability to reshape global internet governance. On all
three analysed levels—what knowledge is defined as important, who regulates knowledge
structures, and who benefits from knowledge structures—China did either only partially gain
the power to reshape global internet governance, or none at all. As research sometimes falls
into the trap of confirmation bias, this paper is evidence for the need of an open-minded
approach to research. If a question of influence is asked, it must also be possible for the research
to conclude with finding a non-relation between the different variables studied.
Nonetheless, the paper also finds that certain values advocated by China on an
international stage find greater acceptance than in previous years. In particular, information
security and in part sovereignty play a greater role in the governance of global internet norms
and structures. The analysis of UN General Assembly documents, for example, clearly
highlights that information security and sovereignty are increasingly relevant in normative
discussions on an international stage. While this does not mean that states are willing to
sacrifice the norms around a free and open internet, which operates as institutionalized
discourse, these traditionally associated Chinese norms are entering centre stage in global
discussions. The analysis of the transition process of Internet Corporation for Assigned Names
and Numbers (ICANN) furthermore shows that the internet is moving away from US-centric
governance and towards a more globally accountable internet structure. While China had
limited influence on this transition, the multi-stakeholder model that ICANN transitioned
towards benefits Chinese interests more than officials in Beijing initially expected. Overall,
China is better positioned than ever to influence and benefit from global internet structures, but
it remains to be seen if this can translate into greater Chinese influence.
Student number: S2569310
As the Open-ended Working Group (OEWG) is set to finish its consultations in 2020,
further research could be conducted into whether the findings in this paper are also reflected
within the final conclusions of the working group. A particular focus should thereby be put on
the norms that are prevalent and whether Chinese norms of information security and
sovereignty are present. The research might also be able to reiterate this paper’s findings on
the influence of Chinese ICT capabilities by employing the framework provided in this paper.
The second alley of future research that could shed more light into the workings of China’s
ability to shape global internet governance might furthermore be found in an analysis of China
as an actor itself. Some observers have stated that China does not always act monolithic and is
even currently in the process of investigating its norms on data protection due to internal
pressures within China159. Such an approach may give deeper insights into who and what
controls the norms and structures of cyber governance within China and how these translate
into China’s overall international policy.
China’s economic capabilities, whether in information and communications
technologies, or other sectors of the economy, are undoubtedly rising. Its influence in global
internet governance, although only partially and to a limited extent, is rising as well. We should
not underestimate the power in international relations that may come as a result of Chinese
rising economic capabilities, but we should also remain nuanced in academic and public
discussions. Capability does not necessarily translate into power—China’s star is rising, but it
has yet to reach the overtly powerful position at the top.
159 Webster & Creemers, 2020
Student number: S2569310
Bibliography
Adee, S. (2019). “The global internet is disintegrating. What comes next?”, BBC Future. Last
Accessed July 5, 2020, https://www.bbc.com/future/article/20190514-the-global-
internet-is-disintegrating-what-comes-next
ASEAN Secretariat and UNCTAD. (2018). “ASEAN Investment Report 2018 – Foreign
Direct Investment and the Digital Economy in ASEAN, Last Accessed July 5, 2020,
https://asean.org/storage/2018/11/ASEAN-Investment-Report-2018-for-Website.pdf
Baldwin, D. A. (1989). Paradoxes of power. London: Basil Blackwell.
Barnett, M., & Duvall, R. (2004). Power in global governance. Power in Global Governance,
1–32.
Blackwill, R. D., & Harris, J. M. (2016). War by Other Means. Harvard University Press.
Breslin, S. (2008). Towards a Sino-centric regional order? Empowering China and
constructing regional order (s). China, Japan and Regional Leadership in East Asia,
131-155.
Bryan, D., Rafferty, M., & Wigan, D. (2017). Capital unchained: finance, intangible assets
and the double life of capital in the offshore world. Review of International Political
Economy, 24(1), 56–86.
Brynjolfsson, E., & McAfee, A. (2015). Le deuxième âge de la machine: travail et prospérité
à l’heure de la révolution technologique. Odile Jacob.
Cardenal, J. P., Araujo Heriberto, & Mansfield, C. (2013). Chinas silent army: the pioneers,
traders, fixers, and workers who are remaking the world in Beijings image. New
York: Crown Publishers.
Cardon, D. (2015). A quoi rêvent les algorithmes. Nos vies à l'heure: Nos vies à l’heure des
big data. Le Seuil.
Cadwalladr, C. & Graham-Harrison, E. (2018). “Revealed: 50 million Facebook profiles
harvested for Cambridge Analytica in major data breach”, The Guardian. Last
Accessed July 5, 2020, https://www.theguardian.com/news/2018/mar/17/cambridge-
analytica-facebook-influence-us-election
Carnegie Endowment for International Peace [CNNI] (E.d). “Cyber Norms Index”, Last
Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Student number: S2569310
Chimbelu, C. (May 3, 2015). “Investing in Africa's tech infrastructure. Has China won
already?,” DW. Last Accessed July 5, 2020, https://p.dw.com/p/3Hfa6.
Chung, C. P. (2018). What are the strategic and economic implications for South Asia of
China's Maritime Silk Road initiative?. The Pacific Review, 31(3), 315-332.
Comor, E. A. (1996). The global political economy of communication: hegemony,
telecommunication and the information economy. Basingstoke: Macmillan.
Constantinou, C. M., Richmond, O. P., & Watson, A. M. (2008). International relations and
the challenges of global communication. Review of International Studies, 34(S1), 5-
19.
Cox, R. W., & Jacobson, H. K. (1973). The anatomy of influence; decision making in
international organization. New Haven: Yale University Press.
Creemers, R. (2020). China's Conception of Cyber Sovereignty: Rhetoric and Realization.
SSRN Electronic Journal.
Creemers, R., Triolo, P., & Webster, G. (2018). “Translation: Cybersecurity Law of the
People’s Republic of China (Effective June 1, 2017)”, New America. Last Accessed
July 5, 2020, https://www.newamerica.org/cybersecurity-
initiative/digichina/blog/translation-cybersecurity-law-peoples-republic-china/
Daskal, J., & Sherman, J. (2020). Data Nationalism on the Rise. Data Analyst. Last Accessed
5 July, 2020, https://datacatalyst.org/wp-content/uploads/2020/06/Data-Nationalism-
on-the-Rise.pdf
Davies, G. (2019). Talking (Up) Power. In Power: China Story Yearbook. ANU Press.
Escande, P., & Cassini, S. (2015). Bienvenue dans le capitalisme 3.0. Albin Michel.
European Institute of Innovation & Technology [EIT] (2020). “New report on European
digital infrastructure and data sovereignty”, New America. Last Accessed June 19,
2020. https://eit.europa.eu/news-events/news/new-report-european-digital-
infrastructure-and-data-sovereignty
Farrell, H., & Newman, A. (2019). Weaponized Globalization: Huawei and the Emerging
Battle over 5G Networks. Global Asia, 14(3), 8-12.
Ferchen, M. (2016a). “China, Economic Development and Global Security: Bridging the
Gap”, Carnegie-Tsinghua Center for Global Policy. Last Accessed July 5, 2020,
https://carnegietsinghua.org/2016/12/09/china-economic-development-and-global-
securitybridging-gaps-pub-66397gaps-pub-66397
Ferchen, M. (2016b). “How New and Crafty is China’s ‘New Economic Statecraft’?”,
Carnegie-Tsinghua Center for Global Policy. Last Accessed July 5, 2020,
Student number: S2569310
https://carnegieendowment.org/files/How_New_and_How_Crafty_is_Chinas_New_E
conomic_Statecraft_CTC_Web_Version.rd2.pdf
Ferchen, M. (2018). China, Venezuela and the Illusion of Debt-Trap Diplomacy, Asia Global
Online. Last Accessed July 5, 2020, https://www.asiaglobalonline.hku.hk/china-
venezuela-debt-trapdiplomacy/
Fitriani, E. (2018). Indonesian perceptions of the rise of China: dare you, dare you not. The
Pacific Review, 31(3), 391-405.
Flyvbjerg, B. (2001). Is Theory Possible in Social Science?, in Making Social Science
Matter: Why Social Inquiry Fails and how it can Succeed Again. Cambridge:
Cambridge University Press, pp. 25-38.
Friedberg, A. L. (2018). Globalisation and Chinese grand strategy. Survival, 60(1), 7-40.
Foucault, M. (1970). The order of things an archaeology of the humain sciences. London:
Tavistock.
Foucault, M. (1972). The archaeology of knowledge: Michel Foucault. New York: Pantheon
Books.
Foucault, M. (1990). The history of sexuality. Volume I, An introduction. New York: Vintage
Books.
Geneva Internet Platform Digital Watch Observatory [DWO] (E.d.). The UN GGE and
OEWG. Last Accessed July 5, 2020, https://dig.watch/processes/un-gge#view-7541-3
Gitelman, L., & Jackson, V. (2013). Introduction. "Raw Data" Is an Oxymoron, 1–14.
Goh, E. (2014). The Modes of China’s Influence. Asian Survey, 54(5), 825–848.
Goh, E. (2015). The struggle for order hegemony, hierarchy, and transition in post-Cold War
East Asia. Oxford: Oxford University Press.
Hajer, M.A. (1993), Discourse coalitions and the institutionalisation of practice: The case of
acid rain in Britain. In: F. Fisher & J. Forester, eds., The argumentative turn in policy
analysis and planning. Durham: Duke University Press.
Hajer, M. (2006). Chapter 4: Doing discourse analysis: coalitions, practices, meaning. In M.
Van den Brink and T. Metze (eds). Words Matter in Policy and Planning: Discourse
Theory and Method in the Social Sciences. Utrecht: NGS/KNAG/Nethur
Haggart. (2017). Introduction to the Special Issue: Rise of the “Knowledge Structure”:
Implications for the Exercise of Power in the Global Political Economy. Journal of
Information Policy, 7, 164–175.
Student number: S2569310
Haggart, B. (2019). Taking Knowledge Seriously: Towards an International Political
Economy Theory of Knowledge Governance. Information, Technology and Control in
a Changing World International Political Economy Series, 25–51.
Haggart, B., & Jablonski, M. (2017). Internet freedom and copyright maximalism:
Contradictory hypocrisy or complementary policies? The Information Society, 33(3),
103–118.
Halbert. (2017). The Curious Case of Monopoly Rights as Free Trade: The TPP and
Intellectual Property and Why It Still Matters. Journal of Information Policy, 7, 204–
227.
Halbert, D. (2016). Intellectual property theft and national security: Agendas and
assumptions. The Information Society, 32(4), 256–268.
Hanemann, T., Huotari, M., & Kratz, A. (2020). Chinese FDI in Europe 2019 Update. Special
Topic: Research Collaborations. MERICS Papers on China, MERICS and Rhodium
Group, Berlin.
Harold, S. W., Libicki, M. C., & Cevallos, A. S. (2016). Getting to yes with China in
cyberspace. Rand Corporation.
Hill, C. (2016). Foreign policy in the twenty-first century. London: Macmillan Education.
Holzscheiter, A. (2013). Between Communicative Interaction and Structures of Signification:
Discourse Theory and Analysis in International Relations. International Studies
Perspectives, 15(2), 142–162.
Hsieh, H-F. and Shannon, S. (2005). Three Approached to Qualitative Content Analysis.
Qualitative Health Research, 15 (9). 1177-1288.
Huang, Y., Kurlantzick, J., O'Neil, S. K., Van Buren, A., West, J., & Moffett, C. (E.d.).
“China’s Approach to Global Governance”. Council on Foreign Relations. Last
Accessed July 5, 2020, https://www.cfr.org/china-global-
governance/?utm_medium=social_share&utm_source=tw
Huws, U. (2013). Working online, living offline: Labour in the Internet age. Work
organisation, labour and globalisation, 7(1), 1-11.
Internet Corporation for Assigned Names and Numbers [ICANN] (2014). “ICANN50 in
London: Lu Wei, Minister of Cyberspace Affairs Administration of China”. Last
Accessed July 5, 2020, https://www.icann.org/news/multimedia/301
Internet Corporation for Assigned Names and Numbers [ICANN] (E.d.). “Bylaws for Internet
Corporation for Assigned Names and Numbers”, Last Accessed July 5, 2020,
https://www.icann.org/resources/pages/governance/bylaws-en
Student number: S2569310
Internet Governance Forum [IGF] (2019a). “German Chancellor's Remarks to the IGF 2019”.
Last Accessed June 19, 2020.
https://www.intgovforum.org/multilingual/content/german-chancellors-remarks-to-
the-igf-2019
Internet Governance Forum [IGF] (2019b). “WS #59 Digital Sovereignty and Internet
Fragmentation”. Last Accessed June 19, 2020.
https://www.intgovforum.org/multilingual/content/igf-2019-%E2%80%93-day-
2-%E2%80%93-saal-europa-%E2%80%93-ws-59-digital-sovereignty-and-internet-
fragmentation-0
Internet Governance Forum [IGF] (2019c). “NRI Collaborative Session On Data Protection
Resolution”. Last Accessed June 19, 2020.
https://www.intgovforum.org/multilingual/content/igf-2019-%E2%80%93-day-
2-%E2%80%93-estrel-saal-c-%E2%80%93-nri-collaborative-session-on-data-
protection-resolution
Internet Governance Forum [IGF] (2019d). “WS #236 A universal personal data protection
framework? How to make it work?”. Last Accessed June 19, 2020.
https://www.intgovforum.org/multilingual/content/igf-2019-%E2%80%93-day-
2-%E2%80%93-raum-i-%E2%80%93-ws-236-a-universal-personal-data-protection-
framework-how-to
Ikenberry, G. J., & Nye, J. S. (2004). Soft Power: The Means to Success in World
Politics. Foreign Affairs, 83(3), 136.
Inkster, N. (2015). Evolution of the Chinese Internet: Freedom and Control. Adelphi
Series, 55(456), 19-50.
IPlytics (2019). Who is leading the 5G patent race?: A patent landscape analysis on declared
5G patents and 5G standards contributions. IPlytics November 2019.
Jacques, M. (2012). When China rules the world: the rise of the middle kingdom and the end
of the Western world. London: Penguin.
Kania, E. (2018). “The Right to Speak: Discourse and Chinese Power”, Center for Advanced
China Research. Last Accessed July 5, 2020, https://www.ccpwatch.org/single-
post/2018/11/27/The-Right-to-Speak-Discourse-and-Chinese-Power
Kania, E., Sacks, S., Triolo, P., & Webster, G. (2017). “China’s Strategic Thinking on
Building Power in Cyberspace”, New America. Last Accessed July 5, 2020,
https://www.newamerica.org/cybersecurity-initiative/blog/chinas-strategic-thinking-
building-power-cyberspace/
Student number: S2569310
Kim, M. J., Lee, H., & Kwak, J. (2020). The changing patterns of China’s international
standardization in ICT under techno-nationalism: A reflection through 5G
standardization. International Journal of Information Management, 54, 102-145.
Kondracki, N. L., & Wellman, N. S. (2002). Content analysis: Review of methods and their
applications in nutrition education. Journal of Nutrition Education and Behavior, 34,
224-230.
Langley, B. I. P. (2009). Power-knowledge estranged: from Susan Strange to
poststructuralism in British IPE. In Routledge Handbook of International Political
Economy (IPE) (pp. 136-149). Routledge.
Liu, Y. (2012). The Rise of China and Global Internet Governance. China Media
Research, 8(2).
Macro Polo (E.d., a). “The Global AI Talent Tracker”, Paulson Institute. Last Accessed July
5, 2020, https://macropolo.org/digital-projects/the-global-ai-talent-tracker/
Macro Polo (E.d., b). “Intro: China’s AI Dream”, Macro Polo. Last Accessed July 5, 2020,
https://macropolo.org/digital-projects/chinai/chinai-intro/
Manners, I. (2002). Normative Power Europe: A Contradiction in Terms? JCMS: Journal of
Common Market Studies, 40(2), 235–258.
Maoz, Z. (1990). Paradoxes of war: on the art of national self-entrapment. Boston: Unwin
Hyman.
May, C. (1996). Strange fruit: Susan Strange's theory of structural power in the international
political economy. Global Society: Journal of Interdisciplinary International
Relations, 10(2), 167-189.
McGregor, G. (2019). “China is launching its 5G network ahead of schedule and on a
Spectrum the U.S”, Fortune, Last Accessed July 5, 2020,
https://fortune.com/2019/10/31/china-5g-rollout-spectrum/
Mengting, L., & Lee, C. Y. (2019). “US Blacklist on Huawei: Leverage for the US-China
Trade Talks?”, Think Asia. Last Accessed July 5, 2020, https://think-
asia.org/handle/11540/10383
Morgus, R., Woolbright, J., & Sherman, J. (2018). “The Digital Deciders”, New America.
Last Accessed June 19, 2020. https://www.newamerica.org/cybersecurity-
initiative/reports/digital-deciders/
Nathan, A. J., & Scobell, A. (2014). Chinas search for security. New York: Columbia
University Press.
Student number: S2569310
Negro, G. (2020). A history of Chinese global Internet governance and its relations with ITU
and ICANN. Chinese Journal of Communication, 13(1), 104-121.
Nepelski, D., & De Prato, G. (2018). The structure and evolution of ICT global innovation
network. Industry and Innovation, 25(10), 940-965.
Nuruzzaman, M. (2016). China’s rise, the USA and global order: Contested perspectives and
an alternative approach. International Area Studies Review, 19(2), 177-194.
Organization for Economic Co-operation and Development [OECD] (2017a). OECD Science,
Technology and Industry Scoreboard 2017: The digital transformation. OECD
Publishing, Paris.
Organization for Economic Co-operation and Development [OECD] (2017b). “Intellectual
property (IP) statistics and analysis”, Intellectual Property Database. Last Accessed
July 5, 2020, http://www.oecd.org/sti/intellectual-property-statistics-and-analysis.htm
Oh, Y. A. (2018). Power asymmetry and threat points: negotiating China's infrastructure
development in Southeast Asia. Review of International Political Economy, 25(4),
530-552.
Olander, E. (January 20, 2019). “The Rise of Chinese Tech in Africa is Both Feared and
Embraced,” The China Africa Project. Last Accessed July 5, 2020,
https://chinaafricaproject.com/podcasts/audio-the-rise-of-chinese-tech-in-africa-is-
both-feared-and-embraced/.
Onuf, N. (1989). World of our making: rules and rule in social theory and international
relations. University of South Carolina Press.
Open-ended Working Group [OEWG] (E.d.). “Open-ended Working Group”, United
Nations. Last Accessed July 5, 2020, https://www.un.org/disarmament/open-ended-
working-group/
Osula, A.M, Rõigas, H. (2016). International Cyber Norms: Legal, Policy & Industry
Perspectives. Tallinn: NATO CCD COE Publications.
Pence, M. (2018). Remarks by Vice President Pence on the Administration’s Policy Toward
China. The Hudson Institute, Washington, DC, 4.
Pernot-Leplay, E. (2020). China’s Approach on Data Privacy Law: A Third Way Between the
US and the EU?. Penn State Journal of Law & International Affairs, 8(1).
Poole, M. S., & Folger, J. P. (1981). Modes of observation and the validation of interaction
analysis schemes. Small Group Behavior, 12, 477-493.
Robinson, J. (2016). IANA transition. Journal of Cyber Policy, 1(2), 198-205.
Student number: S2569310
Sacks, S. (2018). Disruptors, Innovators, and Thieves: Assessing Innovation in China’s
Digital Economy (pp. 20-23, Rep.). Center for Strategic and International Studies
(CSIS).
Sacks, S. (E.d.). “China’s Emerging Cyber Governance System”, Center for Strategic &
International Studies. Last Accessed July 5, 2020, https://www.csis.org/chinas-
emerging-cyber-governance-system
Schell, O., & Delury, J. (2014). Wealth and power: China's long march to the twenty-first
century. Random House Trade Paperbacks.
SCIO (2010). “The Internet in China (White Paper)”, China Daily. Last Accessed July 5,
2020, http://www.chinadaily.com.cn/china/2010-06/08/content_9950198.htm
Segal, A. (2017). The hacked world order: how nations fight, trade, maneuver, and
manipulate in the digital age. New York: Public Affairs.
Shen, H. (2016). China and global internet governance: toward an alternative analytical
framework. Chinese Journal of Communication, 9(3), 304-324.
Shen, Yi (2016). Cyber sovereignty and the governance of global cyberspace. Chinese
Political Science Review, 1(1), 81-93.
Shen, H. (2017). Across the Great (fire) Wall: China and the global Internet (Doctoral
dissertation, University of Illinois at Urbana-Champaign).
Shen, H. (2018). Building a Digital Silk Road? Situating the Internet in China’s Belt and
Road Initiative. International Journal of Communication. 12(2018), 2683–2701.
Sherman, J. & Morgus, R. (2018). “Breaking Down the Vote on Russia's New Cybercrime
Resolution at the UN”, New America. Last Accessed July 5, 2020,
https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/breaking-down-
vote-russias-new-cybercrime-resolution-un/
State Council (2015). “Guiding Opinions on Actively Promoting the ‘Internet Plus’ Action
Plan,” Last Accessed July 5, 2020, http://www.gov.cn/zhengce/content/2015-
07/04/content_10002.htm.
State Council. (2016). “Shisanwu” guojia xinxihua guihua [13th Five-Year Plan for national
informatization], no. 73. Last Accessed July 5, 2020,
http://www.gov.cn/zhengce/content/2016-12/27/content_5153411.htm
Soesanto, S. & D'Incau, F. (2017). “The UN GGE is dead: Time to fall forward”, European
Council on Foreign Relations. Last Accessed July 5, 2020,
https://www.ecfr.eu/article/commentary_time_to_fall_forward_on_cyber_governance
Student number: S2569310
Strange, S. (2016). States and markets. Brantford, Ontario: W. Ross MacDonald School
Resource Services Library.
Strategic Survey 2018: The Annual Assessment of Geopolitics [IISS] (2018). “The Impact of
the ICT Revolution on International Relations”, ISSS. Last Accessed July 5,
https://www.iiss.org/publications/strategic-survey/strategic-survey-2018-the-annual-
assessment-of-geopolitics/ss18-04-strategic-policy-issues-2
Subramanian, A. (2012). Eclipse: living in the shadow of Chinas economic dominance. New
Delhi: Viva Books.
Telecomlead (2020). “Smartphone business leaders in Africa in 2019: IDC.” Telecomlead.
Last Accessed July 5, 2020, https://www.telecomlead.com/smart-phone/smartphone-
business-leaders-in-africa-in-2019-idc-94442
The Economist (2015). “The young continent”, The Economist. Last Accessed July 5, 2020,
https://www.economist.com/briefing/2015/12/12/the-young-continent
The Economist (2018). “Europeans fret that Chinese investment is a security risk”, The
Economist. Last Accessed July 5, 2020, https://www.economist.com/finance-and-
economics/2018/03/22/europeans-fret-that-chinese-investment-is-a-security-risk
The Economist (2020). “Europe’s “Sinatra doctrine” on China”, The Economist. Last
Accessed July 5, 2020, https://www.economist.com/europe/2020/06/11/europes-
sinatra-doctrine-on-china
Triolo, P., Sacks, S., Webster, G, & Creemers, R. (2017). “China’s Cybersecurity Law One
Year On”, New America. Last Accessed July 5, 2020,
https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinas-
cybersecurity-law-one-year/
Turri, J. (2012). Is knowledge justified true belief?. Synthese, 184(3), 247-259.
United Nations Conference on Trade and Development [UNCTAD] (2014). World
investment report 2015: Reforming international investment governance. United
Nations Publications.
United Nations Conference on Trade and Development [UNCTAD] (2015). World
investment report 2015: Reforming international investment governance. United
Nations Publications Customer Service, 253.
United Nations General Assembly [GA] (2011). International Code of Conduct for
Information Security. Item 93 of the provisional agenda, A/66/339. Last Accessed,
July 5, 2020,
Student number: S2569310
https://www.un.org/ga/search/view_doc.asp?symbol=A%2F66%2F359&Submit=Sear
ch&Lang=E
United Nations General Assembly [GA] (2015). International Code of Conduct for
Information Security. Agenda item 91, A/69/723. Last Accessed, July 5, 2020,
https://digitallibrary.un.org/record/786846/files/A_69_723-EN.pdf
Valenduc, G., & Vendramin, P. (2017). Digitalisation, between disruption and
evolution. Transfer: European Review of Labour and Research, 23(2), 121-134.
Van Dijk, T. (1997). Discourse as Structure and Process. London: Sage.
Wang, J. (2018). From aperture satellite to" Internet finance": Institutionalization of ICTs in
China's financial sector since 1991. Telecommunications Policy, 42(7), 566-574.
Wiener, A. (2009). Enacting Meaning-in-Use: Qualitative Research on Norms and
International Relations. Review of International Studies 35, 175-193.
Wang Han, S., & Munir, A. B. (2018). Information Security Technology-Personal
Information Security Specification: China's Version of the GDPR. Eur. Data Prot. L.
Rev., 4, 535.
Webster, G. & Creemers, R. (2020). “A Chinese Scholar Outlines Stakes for New 'Personal
Information' and 'Data Security' Laws (Translation)”, New America. Last Accessed
July 5, 2020, https://www.newamerica.org/cybersecurity-
initiative/digichina/blog/chinese-scholar-outlines-stakes-new-personal-information-
and-data-security-laws-translation/
Xi, Jinping (2015). “Speech at the 2nd World Internet Conference Opening Ceremony”,
China Copyright and Media. Last Accessed July 5, 2020,
https://chinacopyrightandmedia.wordpress.com/2015/12/16/speech-at-the-2ndworld-
internet-conference-opening-ceremony/
Xinhua News Agency (2015). “Internet Plus Set to Push China’s Economy to Higher Level,”
Xinhua Net. Last Accessed July 5, 2020, http://news.xinhuanet.com/english/2015-
03/15/c_134067831.htm
Zenglein, M. J., & Holzmann, A. (2019). Evolving Made in China 2025. Mercator Institute
for China Studies, 12.
Carnegie’s Cyber Norms Index (CCNI) Documents
Student number: S2569310
Cargenie Endowment for International Peace [CEI] (2017a). “VII BRICS Summit Ufa
Declaration”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017b). “Joint Elements from E.U.-U.S.
Cyber Dialogue, 23 December 2016”, Cyber Norms Index. Last Accessed July 5,
2020, http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017c). “Joint Elements from the U.S.-
EU Cyber Dialogue, 2015”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017d). “Joint Elements from the U.S.-
EU Cyber Dialogue, 2014”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017e). “G7 Principles and Actions on
Cyber”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017f). “Letter dated 9 January 2015
from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian
Federation, Tajikistan, and Uzbekistan to the United Nations addressed to the
Secretary General, A/69/723”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017g). “The 6th BRICS Summit:
Fortaleza Declaration (2014)”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017h). “Sino-Russian Cybersecurity
Agreement of 2015”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017i). “Draft Russian Convention on
International Information Security”, Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Cargenie Endowment for International Peace [CEI] (2017j). “Letter dated 12 September 2011
from the Permanent Representatives of China, the Russian Federation, Tajikistan, and
Uzbekistan to the United Nations addressed to the Secretary-General, A/66/359”,
Cyber Norms Index. Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
Student number: S2569310
Cargenie Endowment for International Peace [CEI] (2017k). “Agreement between the
Governments of the Member States of the Shanghai Cooperation Organization on
Cooperation in the Field of International Information Security”, Cyber Norms Index.
Last Accessed July 5, 2020,
http://carnegieendowment.org/publications/interactive/cybernorms.
UN GGE, OEWG & General Assembly Documents
Open-ended Working Group [OEWG] (2020a). Initial “Pre-draft” of the report of the OEWG
on developments in the field of information and telecommunications in the context of
international security. United Nations Office for Disarmament Affairs. Last Accessed
July 5, 2020, https://unoda-web.s3.amazonaws.com/wp-
content/uploads/2020/03/200311-Pre-Draft-OEWG-ICT.pdf
Open-ended Working Group [OEWG] (2020b). Non-paper listing specific language
proposals under agenda item “Rules, norms and principles” from written submissions
and comments on the initial pre-draft of the OEWG report. United Nations Office for
Disarmament Affairs. Last Accessed July 5, 2020, https://front.un-arm.org/wp-
content/uploads/2020/05/200527-oewg-ict-non-paper.pdf
Open-ended Working Group [OEWG] (2020c). Second “Pre-draft” of the report of the
OEWG on developments in the field of information and telecommunications in the
context of international security. United Nations Office for Disarmament Affairs. Last
Accessed July 5, 2020, https://front.un-arm.org/wp-content/uploads/2020/05/200527-
oewg-ict-revised-pre-draft.pdf
United Nations General Assembly [GA] (2017). Developments in the field of information
and telecommunications in the context of international security. Report of the
Secretary-General, A/72/315. Last Accessed, July 5, 2020,
https://undocs.org/A/72/315
United Nations General Assembly [GA] (2018a). Agenda item 74 (continued) Promotion and
protection of human rights. 56th plenary meeting, A/73/PV.56. Last Accessed, July 5,
2020, https://undocs.org/en/A/73/PV.56
United Nations General Assembly [GA] (2018b). Vote Name: A/C.3/73/L.9/rev.1.
Countering the Use of Information and Communication Technologies for Criminal
Student number: S2569310
Purposes. Third Committee: 73rd session. Last Accessed, July 5, 2020,
https://www.un.org/en/ga/third/73/docs/voting_sheets/L.9.Rev.1.pdf
United Nations General Assembly [GA] (2018c). Countering the Use of Information and
Communication Technologies for Criminal Purposes. Third Committee: 73rd session.
Last Accessed, July 5, 2020, https://undocs.org/A/C.3/73/L.9/Rev.1
United Nations General Assembly [GA] (2019a). Developments in the field of information
and telecommunications in the context of international security. Report of the
Secretary-General, A/74/120. Last Accessed, July 5, 2020,
https://undocs.org/A/74/120
United Nations General Assembly [GA] (2019b). Provisional agenda and annotations. Open-
ended working group on developments in the field of information and
telecommunications in the context of international security, A/AC.290/2019/1. Last
Accessed, July 5, 2020, https://undocs.org/A/AC.290/2019/1
United Nations General Assembly [GA] (2019c). Resolution adopted by the General
Assembly on 22 December 2018. Seventy-third session Agenda item 96,
A/RES/73/266. Last Accessed, July 5, 2020, https://undocs.org/en/A/RES/73/266
United Nations General Assembly [GA] (2019d). Resolution adopted by the General
Assembly on 17 December 2018. Seventy-third session Agenda item 109,
A/RES/73/187. Last Accessed, July 5, 2020, https://undocs.org/en/A/RES/73/187
United Nations General Assembly [GA] (2019e). Resolution adopted by the General
Assembly on 5 December 2018. Seventy-third session Agenda item 96, A/RES/73/27.
Last Accessed, July 5, 2020, https://undocs.org/en/A/RES/73/27
Governmental Advisory Committee (GAC) IANA Stewardship Transition Coordination
Group (ICG) Documents
Governmental Advisory Committee [GAC] (2014). GAC Meeting: Transition of US
Stewardship of IANA and Strengthening ICANN Accountability. ICANN51. Last
Accessed July 5, 2020,
https://archive.icann.org/meetings/losangeles2014/en/schedule/wed-gac-icg.html
Governmental Advisory Committee [GAC] (2015). Joint Meeting of the GAC and the
ICANN Board. ICANN53. Last Accessed July 5, 2020,
Student number: S2569310
https://archive.icann.org/meetings/buenosaires2015/en/schedule/thu-icg/transcript-
icg-18jun15-en.html
Governmental Advisory Committee [GAC] (2016). GAC High Level Governmental Meeting.
WET ICANN55. Last Accessed July 5, 2020,
https://meetings.icann.org/en/marrakech55/schedule/mon-gac-hlgm/transcript-gac-
hlgm-07mar16-en
IANA Stewardship Transition Coordination Group [ICG] (2016a). Proposal to Transition the
Stewardship of the Internet Assigned Numbers Authority (IANA) Functions. IANA
Stewardship Transition Paper Proposal. Last Accessed July 5, 2020,
https://www.icann.org/en/system/files/files/iana-stewardship-transition-proposal-
10mar16-en.pdf
IANA Stewardship Transition Coordination Group [ICG] (2016b). IANA Stewardship
Transition Proposal Assessment Report. National Telecommunications and
Information Administration. Last Accessed July 5, 2020,
https://www.icann.org/en/system/files/files/iana-stewardship-transition-proposal-
10mar16-en.pdf