{"id":129510,"date":"2025-05-25T02:14:08","date_gmt":"2025-05-25T02:14:08","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/129510\/"},"modified":"2025-05-25T02:14:08","modified_gmt":"2025-05-25T02:14:08","slug":"how-beijings-digital-strategy-is-reshaping-global-rules-and-what-europe-should-do-about-it","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/129510\/","title":{"rendered":"How Beijing\u2019s Digital Strategy Is Reshaping Global Rules &#8211; And What Europe Should Do About It"},"content":{"rendered":"<p><strong>Abstract:<\/strong> China\u2019s digital rise is more than a domestic modernization effort. It is a geopolitical strategy aimed at reshaping global norms, standards, and governance models. Central to this is the concept of Digital China (Digital Zhongguo, \u6570\u5b57\u4e2d\u56fd), a policy blueprint embedded in the 14th Five-Year Plan, aimed at building a \u201ccyber superpower\u201d (wangluo qiangguo, \u7f51\u7edc\u5f3a\u56fd). Framed by the Chinese Communist Party\u2019s (CCP) vision of \u201cgreat changes unseen in a century,\u201d the concept of Digital China fuses internal infrastructure development with an assertive normative and discursive strategy abroad. For Europe, which has advanced its own digital sovereignty model based on openness and rights, Beijing\u2019s state-driven techno-political paradigm presents both a challenge and a call to action.<\/p>\n<p>***<\/p>\n<p><strong>Framing Digital China: The \u201cGreat Changes\u201d Paradigm<\/strong><\/p>\n<p>Under President Xi Jinping, digital technologies are positioned as pillars of national power and ideological legitimacy. The concept of Digital China<a href=\"#_ftn1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a> is articulated not merely as a modernization pathway but as a vehicle for national rejuvenation and international norm-setting.<\/p>\n<p>President Xi Jinping\u2019s rhetoric of \u201cgreat changes unseen in a century\u201d recontextualizes digital technologies as central to national rejuvenation and geopolitical leverage. <a href=\"#_ftn2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><\/p>\n<p>China\u2019s international digital strategy is built upon the cultivation of discourse power (huayu quan, \u8bdd\u8bed\u6743)\u2014the ability to shape global narratives, norms, and policy preferences.<\/p>\n<p>Defensively, state media such as CGTN and Xinhua reframe international criticism\u2014such as restrictions on Huawei\u2014as economically motivated rather than grounded in normative concerns. These outlets reject terms like \u201cdigital authoritarianism\u201d and present China\u2019s regulatory framework as rational and sovereign. <a href=\"#_ftn3\" target=\"_blank\" rel=\"noreferrer noopener\">[3]<\/a><\/p>\n<p>Offensively, China promotes its techno-political model as a viable alternative to liberal digital governance. Smart city solutions and surveillance infrastructures are exported to governments prioritizing stability and control, from Latin America to Sub-Saharan Africa. <a href=\"#_ftn4\" target=\"_blank\" rel=\"noreferrer noopener\">[4]<\/a> These efforts reinforce a vision of techno-statism in which state control of digital ecosystems is not only normalized but valorized.<\/p>\n<p>Beijing\u2019s advocacy for internet sovereignty challenges the liberal, multi-stakeholder internet model. Legislation such as the Data Security Law institutionalizes state oversight over data flows, consolidating CCP authority over cyberspace.<\/p>\n<p>In just four years, China has built one of the world\u2019s most extensive and fast-evolving data governance regimes. While often compared to the EU\u2019s GDPR, the reality is more complex\u2014and more strategic. China\u2019s laws are not merely about privacy. They\u2019re about sovereignty, national security, and global power.<\/p>\n<p>At the core of this legal architecture are three foundational laws: the Cybersecurity Law (CSL), the Data Security Law (DSL), and the Personal Information Protection Law (PIPL). <a href=\"#_ftn5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a> The PIPL, enacted in November 2021, is China\u2019s first comprehensive personal data law. It regulates both domestic data activities and, critically, applies extraterritorially to foreign companies handling Chinese citizens\u2019 data. <a href=\"#_ftn6\" target=\"_blank\" rel=\"noreferrer noopener\">[6]<\/a><\/p>\n<p>But China didn\u2019t stop there. Since 2021, it has issued over a dozen additional regulations and technical guidelines\u2014from mandatory security assessments for cross-border transfers<a href=\"#_ftn7\" target=\"_blank\" rel=\"noreferrer noopener\">[7]<\/a> to binding \u201cstandard contracts\u201d governing how firms export data. <a href=\"#_ftn8\" target=\"_blank\" rel=\"noreferrer noopener\">[8]<\/a> A new regulation effective this January, the Network Data Security Management Regulation, further consolidates government control over all forms of \u201cimportant data.\u201d <a href=\"#_ftn9\" target=\"_blank\" rel=\"noreferrer noopener\">[9]<\/a><\/p>\n<p>The framework is hybrid: hard law, soft law, and policy tools working in tandem. While technical guidelines like the Personal Information Security Specification aren\u2019t legally binding, they are de facto compliance standards.<a href=\"#_ftn10\" target=\"_blank\" rel=\"noreferrer noopener\">[10]<\/a> Others, like the 2012 \u201cDecision\u201d on online data protection, have the same force as law. <a href=\"#_ftn11\" target=\"_blank\" rel=\"noreferrer noopener\">[11]<\/a><\/p>\n<p>China\u2019s Civil Code now formally recognizes a right toy [12], but enforcement and interpretation remain state-led. In contrast to the EU, where independent regulators act as watchdogs, China\u2019s data regime serves broader state interests\u2014economic, ideological, and geopolitical.<\/p>\n<p>For European companies and regulators, the implications are serious. Beijing\u2019s rules affect any firm targeting Chinese consumers, even from abroad. And as local authorities experiment with provincial data laws\u2014some stricter than national standards\u2014the compliance map gets even more fragmented. <a href=\"#_ftn13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a><\/p>\n<p>As the EU finalizes its own health and digital sovereignty frameworks\u2014from EHDS<a href=\"#_ftn14\" target=\"_blank\" rel=\"noreferrer noopener\">[14]<\/a> to AI regulation\u2014it should study China\u2019s playbook carefully. Not to copy, but to prepare. China is not just regulating data. It is rewriting the geopolitics of information.<\/p>\n<p>As the United States and the European Union recalibrate their global digital strategies, China has quietly but decisively internationalized its digital model. At the core of this strategy is the Digital Silk Road (DSR)\u2014a geopolitical initiative that advances China\u2019s technological footprint across Asia, Africa, Latin America, and the Middle East. Far from being limited to infrastructure development, the DSR serves as a strategic vehicle to diffuse governance norms, assert control over data flows, and lock partner states into asymmetrical digital dependencies. Three corporate champions\u2014Huawei, Alibaba, and ByteDance\u2014serve not only as engines of economic growth but as instruments of China\u2019s strategic outreach.<\/p>\n<p>Huawei Technologies Co., long a flashpoint in global tech rivalry, is central to China\u2019s digital infrastructure push. <a href=\"#_ftn15\" target=\"_blank\" rel=\"noreferrer noopener\">[15]<\/a> It builds 5G networks, undersea cables, smart city systems, and surveillance platforms across more than 80 countries. <a href=\"#_ftn16\" target=\"_blank\" rel=\"noreferrer noopener\">[16]<\/a> In Kenya, Laos, and the Solomon Islands, Huawei\u2019s \u201cturnkey\u201d approach delivers immediate digital capacity\u2014often bundled with training, hardware, and concessional finance\u2014but embeds long-term technical dependency and opaque data governance regimes. <a href=\"#_ftn17\" target=\"_blank\" rel=\"noreferrer noopener\">[17]<\/a><\/p>\n<p>Beyond technology, Huawei\u2019s model is underwritten by China\u2019s state banks, which extend loans on favorable terms. These arrangements create a debt-for-access ecosystem, where critical national infrastructure is governed, maintained, and sometimes owned by foreign entities.<\/p>\n<p>Alibaba Cloud, China\u2019s dominant cloud computing service, plays a similarly strategic role. <a href=\"#_ftn18\" target=\"_blank\" rel=\"noreferrer noopener\">[18]<\/a> Through digital free trade zones in Malaysia and Rwanda, Alibaba has exported full-stack digital infrastructure that supports customs, logistics, e-commerce, and cross-border payment systems. <a href=\"#_ftn19\" target=\"_blank\" rel=\"noreferrer noopener\">[19]<\/a> These are not just technology transfers\u2014they embed Chinese techno-legal norms into national systems, circumventing Western data protection regimes and introducing alternative templates for e-governance.<\/p>\n<p>Integration with Alipay and Alibaba logistics chains facilitates e-commerce growth but risks subordinating local businesses to Chinese digital ecosystems. This creates a paradox of digital empowerment through dependency.<\/p>\n<p>ByteDance, parent company of TikTok, represents a softer but highly influential form of strategic outreach. Its platforms dominate digital markets in Southeast Asia, Africa, and parts of Latin America, often leapfrogging domestic offerings. The underlying algorithms\u2014developed and fine-tuned in Beijing\u2014govern user attention, content visibility, and monetization opportunities.<\/p>\n<p>This algorithmic opacity fosters structural asymmetry. Host governments may regulate content at the margin, but they lack access to the source code or algorithmic logic. ByteDance maintains effective control over discourse, data extraction, and behavioral analytics, even when operating through locally registered subsidiaries.<\/p>\n<p>Together, these firms extend a model of digital neomercantilism\u2014one that combines commercial presence with geopolitical leverage. The Digital Silk Road does not just lay fiber-optic cables or erect data centers. It reconfigures governance logics in its recipient states:<\/p>\n<ul class=\"wp-block-list\">\n<li>Debt-for-data diplomacy: States unable to service Chinese loans may concede access to data or digital sovereignty.<\/li>\n<li>De facto standard-setting: Chinese platforms, once adopted, define how systems operate \u2013 regardless of alignment with GDPR or democratic norms.<\/li>\n<li>Normative diffusion: The technologies import implicit values\u2014surveillance acceptance, data centralization, and state-mediated governance\u2014altering the digital civic contract.<\/li>\n<\/ul>\n<p>China\u2019s model represents more than a contest of technological ecosystems\u2014it is a contest of governance visions. The Digital Silk Road asserts a sovereignty-centric, state-enabled digital order. Through it, infrastructure becomes not only a commercial tool but also a strategic weapon.<\/p>\n<p>The West\u2019s current approach\u2014sanctions, divestments, and investment screening\u2014remains largely defensive. To compete effectively, the EU and U.S. must offer positive alternatives: interoperable infrastructure, human-centric governance models, and robust digital development partnerships. Without this, the foundational code of the global digital order may increasingly be written in Beijing.<\/p>\n<p>China\u2019s governance model promotes state-centric internet sovereignty as an alternative to the liberal, open internet paradigm. The Data Security Law (2021) institutionalizes state oversight of data flows, reinforcing territorial jurisdiction over information infrastructures. <a href=\"#_ftn20\" target=\"_blank\" rel=\"noreferrer noopener\">[20]<\/a> The Cybersecurity Law (2017) integrates data management with counterintelligence efforts, making cyberspace an explicit extension of national security strategy. <a href=\"#_ftn21\" target=\"_blank\" rel=\"noreferrer noopener\">[21]<\/a><\/p>\n<p>Companies such as Huawei, Alibaba, and ByteDance serve not only as commercial actors but also as vectors of state strategy. Through the Digital Silk Road, China exports telecommunications infrastructure and digital platforms to the Global South, consolidating asymmetric technological dependencies. <a href=\"#_ftn22\" target=\"_blank\" rel=\"noreferrer noopener\">[22]<\/a> These efforts are underpinned by an ambition to dominate emerging technologies such as 5G, AI, and cloud computing, a vision codified in the 14th Five-Year Plan and related initiatives. <a href=\"#_ftn23\" target=\"_blank\" rel=\"noreferrer noopener\">[23]<\/a><\/p>\n<p>Cultural exports, such as TikTok, simultaneously disseminate Chinese interface norms and content globally, reshaping digital consumption while triggering scrutiny over data sovereignty and algorithmic influence. <a href=\"#_ftn24\" target=\"_blank\" rel=\"noreferrer noopener\">[24]<\/a><\/p>\n<p><strong>II. Global Reception: Divergent Contexts<\/strong><\/p>\n<p>The reception of China\u2019s digital strategy varies significantly across regions, reflecting local political economies and normative orientations.<\/p>\n<p>Within China, digital nationalism plays a pivotal role in reinforcing the legitimacy of the Chinese Communist Party (CCP). The regime has cultivated a robust techno-nationalist ethos, framing domestic technology firms not merely as engines of economic development but as embodiments of national pride, sovereignty, and civilizational resurgence. This state-endorsed narrative enjoys widespread resonance among the population, particularly amid geopolitical tensions, where technology becomes a proxy for national strength.<\/p>\n<p>Chinese companies such as Huawei, Tencent, and ByteDance are frequently cast as national champions in both official rhetoric and popular discourse. During periods of external pressure\u2014such as the U.S. sanctions against Huawei and the arrest of its CFO, Meng Wanzhou\u2014waves of online solidarity emerged across platforms like Weibo and WeChat. Netizens rallied behind Huawei, interpreting the event as an affront to China\u2019s dignity and a manifestation of Western attempts at technological containment.<a href=\"#_ftn25\" target=\"_blank\" rel=\"noreferrer noopener\">[25]<\/a> These expressions of support underscore the internalization of a discourse that ties technological advancement to patriotic duty.<\/p>\n<p>This digital nationalism, however, is not monolithic. Beneath the dominant narrative lies a spectrum of dissent. Reformist intellectuals, disillusioned tech workers, feminists, and ethnic minority activists have voiced criticism of the regime\u2019s tightening grip over the digital sphere. They challenge the expanding surveillance apparatus, the monopolization of narrative spaces, and the instrumentalization of cybersecurity to justify the curtailment of civil liberties. <a href=\"#_ftn26\" target=\"_blank\" rel=\"noreferrer noopener\">[26]<\/a> Yet, such dissent rarely permeates mainstream discourse, as it is systematically suppressed by sophisticated censorship technologies and an ever-evolving propaganda apparatus.<\/p>\n<p>Digital nationalism thus operates dually\u2014as both a grassroots phenomenon and a top-down political technology. It engenders emotional attachment to domestic innovation while narrowing the ideological bandwidth of acceptable digital futures. Alternative imaginaries -those rooted in individual rights, decentralized governance, or transnational solidarity \u2013 are frequently delegitimized or excluded altogether. As such, digital policy becomes a terrain of identity politics, where allegiance to the nation\u2019s technological trajectory is increasingly conflated with political loyalty to the regime.<\/p>\n<p>In the Global South, China\u2019s offering of low-cost, low-conditionality infrastructure resonates strongly, particularly where Western alternatives are scarce. For instance, Huawei supplies over 70% of Africa\u2019s 4G bases [27]. These projects often appeal to elites seeking development without governance conditionalities.<\/p>\n<p>In Eastern Europe, countries like Serbia have emerged as test cases for China\u2019s digital diplomacy within semi-authoritarian systems. Belgrade has deployed Huawei\u2019s Safe City surveillance systems under the banner of crime prevention, integrating facial recognition technologies and real-time data analytics. These systems were implemented without public consultation or strong data protection frameworks, raising concerns from civil society and international observers. <a href=\"#_ftn28\" target=\"_blank\" rel=\"noreferrer noopener\">[28]<\/a> Serbia\u2019s case illustrates how China\u2019s model finds traction in politically hybrid states seeking both economic modernization and regime security.<\/p>\n<p>In contrast, Europe and North America exhibit greater resistance, driven by public concern over surveillance, data protection, and incompatibility with democratic norms. The European Union has intensified scrutiny over Chinese technology platforms under the GDPR and the Digital Markets Act, while national security agencies cite risks of systemic infiltration. Institutional mechanisms such as CFIUS (U.S.) and ENISA (EU) actively monitor and restrict Chinese digital actors. <a href=\"#_ftn29\" target=\"_blank\" rel=\"noreferrer noopener\">[29]<\/a><\/p>\n<p><strong>III. Digital Sovereignty and Global Rulemaking<\/strong><\/p>\n<p>Digital sovereignty, as defined by China, involves both internal insulation and external projection. Domestically, the CCP maintains a tightly controlled digital sphere via the Great Firewall and national legislation. Internationally, China seeks to reshape the architecture of global digital governance by championing state-centric norms at international standard-setting bodies.<\/p>\n<p>At the International Telecommunication Union (ITU), China has proposed New IP, a more centralized internet protocol system. <a href=\"#_ftn30\" target=\"_blank\" rel=\"noreferrer noopener\">[30]<\/a> Concurrently, Chinese companies have increased their submissions to international standards bodies, with the China Standards 2035 strategy aiming to dominate future tech norms in fields like AI, IoT, and quantum computing. <a href=\"#_ftn31\" target=\"_blank\" rel=\"noreferrer noopener\">[31]<\/a><\/p>\n<p>Despite confident rhetoric around the \u201cEast rising, West declining,\u201d several internal challenges limit the coherence and efficacy of China\u2019s digital strategy.<\/p>\n<p>The crackdown on domestic tech firms\u2014including Ant Group<a href=\"#_ftn32\" target=\"_blank\" rel=\"noreferrer noopener\">[32]<\/a> and Didi [33]\u2014has introduced significant regulatory uncertainty, undermining innovation and private sector confidence. U.S. export bans on semiconductors and advanced chips have further exposed critical technological dependencies, despite government initiatives to localize production. <a href=\"#_ftn34\" target=\"_blank\" rel=\"noreferrer noopener\">[34]<\/a><\/p>\n<p>Elite dissatisfaction has also become visible, with leaked WeChat posts revealing unease over overregulation and its impact on long-term competitiveness.<\/p>\n<p>China\u2019s aging population and declining fertility present demographic constraints on its digital ambitions. <a href=\"#_ftn35\" target=\"_blank\" rel=\"noreferrer noopener\">[35]<\/a> Policymakers promote AI-based solutions for eldercare and healthcare, yet these narratives intersect with traditional gender roles and labor expectations. Feminist activists challenge techno-solutionism that reinforces unpaid care work, highlighting sociopolitical tensions often obscured by nationalistic tech narratives. <a href=\"#_ftn36\" target=\"_blank\" rel=\"noreferrer noopener\">[36]<\/a><\/p>\n<p><strong>IV. Digital Diplomacy: Strategic Options for Europe<\/strong><\/p>\n<p>China\u2019s digital diplomacy in the Global South is transactional and infrastructure-focused, emphasizing pragmatism over ideology. More than 80 countries have signed Digital Silk Road agreements, with major Chinese firms providing 5G infrastructure, cloud services, and digital financial platforms.<a href=\"#_ftn37\" target=\"_blank\" rel=\"noreferrer noopener\">[37]<\/a><\/p>\n<p>Examples include Kenya: Huawei-developed surveillance systems integrated into Nairobi\u2019s urbant [38]. Laos: National digital platforms hosted on Alibaba Cloud infrastructure; Latin America: Fintech collaborations that expand China\u2019s digital footprint and RMB-based payment ecosystems. These engagements often operate in regulatory vacuums, creating long-term technological dependencies and undermining local digital sovereignty.<\/p>\n<p>To respond effectively, European policymakers must offer value-based, inclusive alternatives:<\/p>\n<ul class=\"wp-block-list\">\n<li>Support open standards and ethical AI frameworks.<\/li>\n<li>Invest in regional capacity-building and data governance partnerships.<\/li>\n<li>Promote strategic initiatives such as Team Europe\u2019s 5G programs and the Global Gateway, leveraging instruments like the EU Cybersecurity Act and ENISA\u2019s outreach capabilities.<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><\/p>\n<p>China\u2019s politico-digital strategy operates across two interwoven dimensions: a confident projection of ascendancy and a reality of structural vulnerabilities and contested influence. While it successfully promotes a state-centric model of digital governance, its internal contradictions, external pushback, and demographic headwinds complicate long-term strategic coherence.<\/p>\n<p>The global digital order is undergoing a paradigmatic shift. Understanding China\u2019s approach in its full complexity\u2014its legislative designs, infrastructural exports, discourse strategies, and internal contradictions\u2014is essential for shaping a multipolar and rights-respecting digital future.<\/p>\n<p>This normative push demands a robust European counter-model that reaffirms open digital ecosystems while securing its own strategic autonomy. Europe must not simply protect its model but project it\u2014through partnerships, investment, and coherent vision. The global digital order is in flux, and the time for European leadership is now.<\/p>\n<p><a href=\"#_ftnref1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a> Digital China is underpinned by a suite of state plans:the 14th Five-Year Plan (2021\u20132025) dedicates a full chapter to \u201cAccelerating Digital Development,\u201d prioritizing national data infrastructure, blockchain, AI, and cloud capabilities; the Digital China Development Plan (2022) sets 2035 as the deadline for a unified digital ecosystem across government, industry, and urban management; the \u201cNew Infrastructure\u201d plan commits $1.4 trillion by 2025 to 5G, AI chips, smart grids, and industrial internet. These efforts are anchored in Xi Jinping\u2019s assertion that \u201ccyberspace is a key domain of national sovereignty.\u201d<\/p>\n<p><a href=\"#_ftnref2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a> \u201cGreat Changes Unseen in a Century\u201d\u2014the\u201d Center of Strategic Translation\u2014available at:<\/p>\n<p><a href=\"https:\/\/www.strategictranslation.org\/glossary\/great-changes-unseen-in-a-century\" target=\"_blank\" rel=\"noopener\">https:\/\/www.strategictranslation.org\/glossary\/great-changes-unseen-in-a-century<\/a><\/p>\n<p><a href=\"#_ftnref3\" target=\"_blank\" rel=\"noreferrer noopener\">[3]<\/a> Bandurski, David. \u201cChina\u2019s Global Media Offensive.\u201d China Media Project, 2022.<\/p>\n<p><a href=\"#_ftnref4\" target=\"_blank\" rel=\"noreferrer noopener\">[4]<\/a> Freedom House. Freedom on the Net 2021: China Country Report.<\/p>\n<p><a href=\"#_ftnref5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a> PIPL (2021), DSL (2021), CSL (2017). <a href=\"https:\/\/digichina.stanford.edu\/work\/translation-personal-information-protection-law-of-the-peoples-republic-of-china-effective-nov-1-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/digichina.stanford.edu\/work\/translation-personal-information-protection-law-of-the-peoples-republic-of-china-effective-nov-1-2021\/<\/a><\/p>\n<p><a href=\"#_ftnref6\" target=\"_blank\" rel=\"noreferrer noopener\">[6]<\/a> PIPL, Art. 3: Applies to overseas data processors offering products\/services to PRC residents or analyzing their behavior.<\/p>\n<p><a href=\"#_ftnref7\" target=\"_blank\" rel=\"noreferrer noopener\">[7]<\/a> Measures for Security Assessment of Outbound Data Transfers, effective 1 Sept 2022<\/p>\n<p><a href=\"#_ftnref8\" target=\"_blank\" rel=\"noreferrer noopener\">[8]<\/a> Standard Contract Measures, effective 1 June 2023.<\/p>\n<p><a href=\"#_ftnref9\" target=\"_blank\" rel=\"noreferrer noopener\">[9]<\/a> Network Data Security Management Regulation, effective 1 Jan 2025.<\/p>\n<p><a href=\"#_ftnref10\" target=\"_blank\" rel=\"noreferrer noopener\">[10]<\/a> Personal Information Security Specification, latest revision effective 1 Oct 2020.<\/p>\n<p><a href=\"#_ftnref11\" target=\"_blank\" rel=\"noreferrer noopener\">[11]<\/a> Decision on Strengthening Online Information Protection, effective 28 Dec 2012. Information available at https:\/\/www.bestao-consulting.com\/detail?id=1266&amp;status=bestao_library&amp;utm_source=chatgpt.com<\/p>\n<p><a href=\"#_ftnref12\" target=\"_blank\" rel=\"noreferrer noopener\">[12]<\/a> PRC Civil Code, effective 1 Jan 2021, Articles 1032\u20131039. Information available at: <a href=\"https:\/\/www.globalprivacyblog.com\/2013\/01\/chinas-legislature-adopts-decision-on-strengthening-the-protection-of-online-information\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.globalprivacyblog.com\/2013\/01\/chinas-legislature-adopts-decision-on-strengthening-the-protection-of-online-information\/?utm_source=chatgpt.com<\/a><\/p>\n<p><a href=\"#_ftnref13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a> For example, Guangdong-Hong Kong-Macao data flow rules effective 10 Dec 2023, information available at: <a href=\"https:\/\/www.digitalpolicy.gov.hk\/en\/our_work\/digital_infrastructure\/mainland\/gbacbdf\/cross-boundary_data_flow\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.digitalpolicy.gov.hk\/en\/our_work\/digital_infrastructure\/mainland\/gbacbdf\/cross-boundary_data_flow\/index.html<\/a><\/p>\n<p><a href=\"#_ftnref14\" target=\"_blank\" rel=\"noreferrer noopener\">[14]<\/a> On 5th March 2025, the\u00a0<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L_202500327\" target=\"_blank\" rel=\"noreferrer noopener\">European Health Data Space Regulation<\/a>\u00a0was officially published in the Official Journal of the European Union.\u00a0<\/p>\n<p><a href=\"#_ftnref16\" target=\"_blank\" rel=\"noreferrer noopener\">[16]<\/a> GSMA Intelligence. 5G New Calling: Revolutionising the Communication Services Landscape, 2023, at: <a href=\"https:\/\/www.gsma.com\/solutions-and-impact\/technologies\/networks\/wp-content\/uploads\/2023\/10\/GSMA-Foundry-5G-New-Calling-Revolutionising-the-Communications-Services-Landscape.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.gsma.com\/solutions-and-impact\/technologies\/networks\/wp<\/a><\/p>\n<p><a href=\"#_ftnref17\" target=\"_blank\" rel=\"noreferrer noopener\">[17]<\/a> Carnegie Endowment for International Peace. Huawei\u2019s Smart City Projects and Authoritarian Outcomes, 2021 <a href=\"https:\/\/www.ned.org\/data-centric-authoritarianism-how-chinas-development-of-frontier-technologies-could-globalize-repression-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ned.org\/data-centric-authoritarianism-how-chinas-development-of-frontier-technologies-could-globalize-repression-2\/<\/a><\/p>\n<p><a href=\"#_ftnref18\" target=\"_blank\" rel=\"noreferrer noopener\">[18]<\/a> Alibaba Cloud: The Silent Giant of Cloud Computing, March 2025,<\/p>\n<p><a href=\"https:\/\/www.bixbetech.com\/post\/alibaba-cloud-the-silent-giant-of-cloud-computing\" target=\"_blank\" rel=\"noopener\">https:\/\/www.bixbetech.com\/post\/alibaba-cloud-the-silent-giant-of-cloud-computing<\/a><\/p>\n<p><a href=\"#_ftnref19\" target=\"_blank\" rel=\"noreferrer noopener\">[19]<\/a> UNCTAD. eTrade for All: Alibaba\u2019s Digital Free Trade Zones, 2020, information available at: <a href=\"https:\/\/unctad.org\/topic\/ecommerce-and-digital-economy\/etrade-for-all\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/unctad.org\/topic\/ecommerce-and-digital-economy\/etrade-for<\/a><\/p>\n<p><a href=\"#_ftnref20\" target=\"_blank\" rel=\"noreferrer noopener\">[20]<\/a> Cyberspace Administration of China, Data Security Law (2021).<\/p>\n<p><a href=\"#_ftnref21\" target=\"_blank\" rel=\"noreferrer noopener\">[21]<\/a> Ministry of Industry and Information Technology (MIIT), Cybersecurity Law of the PRC (2017).<\/p>\n<p><a href=\"#_ftnref22\" target=\"_blank\" rel=\"noreferrer noopener\">[22]<\/a> Hillman, Jonathan. The Digital Silk Road. Harper Business, 2021.<\/p>\n<p><a href=\"#_ftnref23\" target=\"_blank\" rel=\"noreferrer noopener\">[23]<\/a> Kania, Elsa. \u201cChina\u2019s AI Ambitions.\u201d Center for a New American Security (CNAS), 2019.<\/p>\n<p><a href=\"#_ftnref24\" target=\"_blank\" rel=\"noreferrer noopener\">[24]<\/a> Feldstein, Steven. \u201cThe Global Expansion of AI Surveillance.\u201d Carnegie Endowment for International Peace, 2019.<\/p>\n<p><a href=\"#_ftnref25\" target=\"_blank\" rel=\"noreferrer noopener\">[25]<\/a> For an overview of online mobilization in support of Huawei during the Meng Wanzhou case, see Florian Schneider, China\u2019s Digital Nationalism (Oxford: Oxford University Press, 2018), chap. 6; and Jinghan Zeng, \u201cHuawei\u2019s Crisis and China\u2019s Techno-Nationalist Narrative,\u201d Journal of Contemporary China, vol. 30, no. 129 (2021): 84\u2013100.<\/p>\n<p><a href=\"#_ftnref26\" target=\"_blank\" rel=\"noreferrer noopener\">[26]<\/a> See Guobin Yang, \u201cThe Politics of Visibility in the Digital Age: The Case of Feminist Activism in China,\u201d Global Media and China 4, no. 4 (2019): 345\u2013359; and Lotus Ruan et al., \u201cCensorship and Surveillance in China\u2019s Digital Space,\u201d Citizen Lab Research Briefs, University of Toronto, 2020.<\/p>\n<p><a href=\"#_ftnref27\" target=\"_blank\" rel=\"noreferrer noopener\">[27]<\/a> Momoko Kidera, \u201cHuawei\u2019s deep roots put Africa beyond reach of US crackdown, Chinese telecom gear features in 5G networks in South Africa and Uganda,\u201d 2020<\/p>\n<p><a href=\"https:\/\/asia.nikkei.com\/Spotlight\/Huawei-crackdown\/Huawei-s-deep-roots-put-Africa-beyond-reach-of-US-crackdown\" target=\"_blank\" rel=\"noopener\">https:\/\/asia.nikkei.com\/Spotlight\/Huawei-crackdown\/Huawei-s-deep-roots-put-Africa-beyond-reach-of-US-crackdown<\/a><\/p>\n<p><a href=\"#_ftnref28\" target=\"_blank\" rel=\"noreferrer noopener\">[28]<\/a> Human Rights Watch. \u201cSerbia: Police Surveillance Technology Raises Concerns.\u201d 2020.<\/p>\n<p><a href=\"#_ftnref29\" target=\"_blank\" rel=\"noreferrer noopener\">[29]<\/a> European Union Agency for Cybersecurity (ENISA), Threat Landscape Reports, 2022.<\/p>\n<p><a href=\"#_ftnref30\" target=\"_blank\" rel=\"noreferrer noopener\">[30]<\/a> ITU Contributions, \u201cProposal for New IP,\u201d China Telecommunications Standardization Association, 2020.<\/p>\n<p><a href=\"#_ftnref31\" target=\"_blank\" rel=\"noreferrer noopener\">[31]<\/a> Jeffrey Ding, \u201cDeciphering China\u2019s AI Dream.\u201d Future of Humanity Institute, Oxford, 2018.<\/p>\n<p><a href=\"#_ftnref32\" target=\"_blank\" rel=\"noreferrer noopener\">[32]<\/a> Megha Shrivastava, \u201cThe Continuing Saga of China\u2019s Ant Group\u201d in the Diplomat, 2023, available at: <a href=\"https:\/\/thediplomat.com\/2023\/01\/the-continuing-saga-of-chinas-ant-group\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/thediplomat.com\/2023\/01\/the-continuing-saga-of-chinas-ant-group\/<\/a><\/p>\n<p><a href=\"#_ftnref33\" target=\"_blank\" rel=\"noreferrer noopener\">[33]<\/a> Raymond Zhong and Li Yuan, \u201cThe Rise and Fall of the World\u2019s Ride-Hailing Giant,\u201d 2021 in New York Times available at: <a href=\"https:\/\/www.nytimes.com\/2021\/08\/27\/technology\/china-didi-crackdown.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.nytimes.com\/2021\/08\/27\/technology\/china-didi-crackdown.html<\/a><\/p>\n<p><a href=\"#_ftnref34\" target=\"_blank\" rel=\"noreferrer noopener\">[34]<\/a> \u201cGlobal Supply Chain Report.\u201d 2023 at https:\/\/2023.tr-ebrd.com\/global-supply-chains-and-the-green-transition\/<\/p>\n<p><a href=\"#_ftnref35\" target=\"_blank\" rel=\"noreferrer noopener\">[35]<\/a> National Bureau of Statistics of China, \u201cDemographic Report,\u201d 2024.<\/p>\n<p><a href=\"#_ftnref36\" target=\"_blank\" rel=\"noreferrer noopener\">[36]<\/a> Yang, Y., &amp; Liu, X. (2023). \u201cSmart Aging: The Use of AI in Chinese Elder Care Policy.\u201d Journal of Gerontechnology, 22(3), 155\u2013<\/p>\n<p><a href=\"#_ftnref37\" target=\"_blank\" rel=\"noreferrer noopener\">[37]<\/a> MOFCOM, \u201cDigital Silk Road Agreements,\u201d 2023 Summary.<\/p>\n<p><a href=\"#_ftnref38\" target=\"_blank\" rel=\"noreferrer noopener\">[38]<\/a> Wired. \u201cThe Safe Cities of Tomorrow: China\u2019s Surveillance Push in Kenya.\u201d 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"Abstract: China\u2019s digital rise is more than a domestic modernization effort. It is a geopolitical strategy aimed at&hellip;\n","protected":false},"author":2,"featured_media":129511,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5174],"tags":[1942,1395,10443,3647,2000,299,5187,1123,6218],"class_list":{"0":"post-129510","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-eu","8":"tag-artificial-intelligence","9":"tag-china","10":"tag-digital-transformation","11":"tag-economics","12":"tag-eu","13":"tag-europe","14":"tag-european","15":"tag-featured","16":"tag-geopolitics"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114566061287735822","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/129510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=129510"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/129510\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/129511"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=129510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=129510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=129510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}