Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 29 February 2020

“Foreign Hostile Forces”

“Foreign Hostile Forces”

The Human Rights Dimension of China’s Cyber Campaigns

Chapter:
(p.260) Chapter 11 “Foreign Hostile Forces”
Source:
China and Cybersecurity
Author(s):

Sarah McKune

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190201265.003.0011

This chapter examines China’s activity in and policies concerning cyberspace from a human rights-based perspective. The Chinese Communist Party considers the propagation or assertion of “Western” ideologies and “universal” values, including human rights principles, in China as a calculated effort of “foreign hostile forces” and “internal dissidents” to challenge its authority. With respect to cyberspace, this reality has translated into robust online content control measures in the domestic space, measures to limit foreign influence through digital means in China, and negative impacts on the security of the international cyber environment as a whole.

Keywords:   human rights, cybersecurity, China, foreign hostile forces, cyber exploitation, propaganda, Internet control, Internet politics, international norms

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .