Untitled - socium.ge
Untitled - socium.ge Untitled - socium.ge
The Internet in China 123jianguanzhongdian),” Beijing: Telecommunication Information (tongxinxinxibao).February 19, p. 1.Lohr, Steve (2002) “Microsoft to Give Governments Access to Code,” New York Times,January 15, p. C10.Ma, Laurence and Cartier, Carolyn (eds) (2003) The Chinese Diaspora: Space, Place,Mobility, and Identity. Lanham, MA: Rowman and Littlefield.Mueller, Milton and Lovelock, Peter (2000) “The WTO and China’s Ban on ForeignInvestment in Telecommunication Services: A Game-theoretic Analysis,”Telecommunications Policy 24 (8/9): 731–59.—— and Tan, Zixiang (1997) China in the Information Age: Telecommunications and theDilemma of Reform. Westport, CT: Praeger.Murphy, David (2003) “He’s No Techno Geek,” Far Eastern Economic Review 166 (8)(February 27), 8.Murray, Brendan (2003) “Policymaking for Internet Cafés in China,” paper presented atthe conference “China and the Internet: Technology, Economy, and Society inTransition,” Los Angeles, May 30–31.Needham, Joseph (1981) Science in Traditional China. Cambridge, MA: HarvardUniversity Press.Oi, Jean C. (1995) “The Role of the Local State in China’s Transitional Economy,” TheChina Quarterly 144: 1132–49.Olds, Kris and Yeung, Henry W-C. (1999) “Reshaping ‘Chinese’ Business Networks in aGlobalising Era,” Environment and Planning D: Society and Space 17: 535–55.Pool, Ithiel D. S. (1983) Technologies of Freedom. Cambridge, MA: Harvard UniversityPress.Qian, Tianbai (1996) “The Development of the Internet in China (Internet zai zhongguode fazhan),” Beijing: Computer World (jishuanji shijie) (June 17): 131–3.Qiu, Jack L. (1999) “Virtual Censorship in China: Keeping the Gates between the Cyberspaces,”The International Journal of Communications Law and Policy 4 (Winter):1–25.—— (2001a) “Chinese Opinions Collide Online: Civil Discussions Following theUS–China Plane Collision,” Online Journalism Review (April 12) (available atwww.ojr.org./ojr/technology).—— (2001b) “Online Nationalism in China: An Odd Myth with Normalcy,” paperpresented at the Annual Convention of National Communication. Atlanta, November1–4.—— (2002a) “Coming to Terms with Informational Stratification in the People’sRepublic of China,” Cardozo Arts and Entertainment Law Journal 20 (1): 157–80.—— (2002b) “Chinese Hackerism in Retrospect: The Legend of a New RevolutionaryArmy,” MFC Insight (September 17) (available at www.mfcinsight.com).—— (2003) “(Dis)connecting the Pearl River Delta: History of a RegionalTelecommunications Infrastructure, 1978–2002,” paper presented at the InternationalCommunication Association Annual Conference, San Diego, May 23–27.Saxenian, Anna Lee (2002) “Brain Circulation,” The Brookings Review 20 (1): 28–31.Shapiro, Judith (2001) Mao’s War Against Nature. Cambridge: Cambridge UniversityPress.Sheff, David (2002) China Dawn: The Story of a Technology and Business Revolution.New York: HarperCollins.Smith, Craig S. (2001) “First World Hacker War,” New York Times, May 13, p. 4.2.Tan, Zixiang (1999) “Regulating China’s Internet: Convergence toward a CoherentRegulatory Regime,” Telecommunications Policy 23 (3): 261–76.
124 Jack Linchuan QiuWalton, Greg (2001) China’s Golden Shield. International Centre for Human Rightsand Democratic Development (available at www.ichrdd.ca).Wang, Ching-ning (2003) “The Formation of Tongzhi: Internet, Civil Society, andInformation Economy in China,” paper presented at the conference “China and theInternet: Technology, Economy, and Society in Transition,” Los Angeles, May30–31.Wei, Yingqi, Liu, Xiaming, Parker, David, and Vaidya, Kirit (1999) “The RegionalDistribution of Foreign Direct Investment in China,” Regional Studies 33 (9):857–67.Weidendaum, Murray and Hughes, Samuel (1996) The Bamboo Network. New York:The Free Press.Wong, Bobson (2002a) “Many Western Media Web Sites Now Accessible in China,”Digital Freedom Network, May 20 (available at http://dfn.org/news/china/banlifted.htm).—— (2002b) “China’s Ban on Google Web Search Engine Lifted,” Digital FreedomNetwork, September 12 (available at http://www.dfn.org/news/china/google2.htm).Wu, Fulong (2000) “The Global and Local Dimensions of Place-making: RemakingShanghai as a World City,” Urban Studies 37 (8): 1359–78.Yan, Xu and Pitt, Douglas (2002) Chinese Telecommunications Policy. Norwood, MA:Artech House.Yang, Dali (1998) Calamity and Reform in China. Stanford, CA: Stanford UniversityPress.Yu, Peter (2000) “From Pirates to Partners: Protecting Intellectual Property in China inthe Twenty-first Century,” American University Law Review 50: 131–243.—— (2001) “Piracy, Prejudice, and Perspectives: An Attempt to Use Shakespeare toReconfigure the US–China Intellectual Property Debate,” Boston UniversityInternational Law Journal 19: 1–56.Yueng, Henry W-C. (1999) “The Internationalization of Ethnic Chinese Business Firmsfrom Southeast Asia,” International Journal of Urban and Regional Research 23(1): 103–27.Zhang, Weidong (2003) “Displaying Culture, Voicing Identity: A Study of theManchurian Web Site ‘Eight Banners Descendant’,” paper presented at the conference“China and the Internet: Technology, Economy, and Society in Transition,”Los Angeles, May 30–31.Zhao, Yuezhi (1998) Media, Market, and Democracy in China: Between the Party Lineand the Bottom Line. Champaign, IL: University of Illinois Press.—— (2000) “Caught in the Web: The Public Interest and the Battle for Control ofChina’s Information Superhighway,” Info 2 (1): 41–65.–— (2004) “Falun Gong, Identity, and the Struggle over Meaning Inside and OutsideChina,” in Nick Couldry and James Curran (eds), Contesting Media Power, pp.209–224. Lanham, MA: Rowman and Littlefield.—— and Schiller, Daniel (2001) “A Dance with Wolves? China’s Integration intoDigital Capitalism,” Info 3 (2): 137–51.Zittrain, Jonathan and Edelman, Benjamin (2002) Empirical Analysis of InternetFiltering in China. Cambridge, MA: Berkeman Center for Internet and Society,Harvard Law School (available at cyber.law.harvard.edu).
- Page 94 and 95: Silicon Valley and Finland 73risk i
- Page 96 and 97: Silicon Valley and Finland 75respec
- Page 98 and 99: Silicon Valley and Finland 77esting
- Page 100 and 101: Silicon Valley and Finland 79100090
- Page 102 and 103: Silicon Valley and Finland 81the Fi
- Page 104 and 105: Silicon Valley and Finland 83——
- Page 106 and 107: The Russian network society 85but s
- Page 108 and 109: The Russian network society 87All t
- Page 110 and 111: The Russian network society 89inequ
- Page 112 and 113: The Russian network society 91estim
- Page 114 and 115: The Russian network society 93expre
- Page 116 and 117: The Russian network society 95in st
- Page 118 and 119: The Russian network society 97actio
- Page 120 and 121: 4. The Internet in China: technolog
- Page 122 and 123: The Internet in China 101power of t
- Page 124 and 125: The Internet in China 103cially tho
- Page 126 and 127: The Internet in China 1057060504030
- Page 128 and 129: The Internet in China 107(Baum, 199
- Page 130 and 131: The Internet in China 109native-pla
- Page 132 and 133: The Internet in China 111“network
- Page 134 and 135: The Internet in China 113Usually on
- Page 136 and 137: The Internet in China 115lifestyle
- Page 138 and 139: The Internet in China 117To borrow
- Page 140 and 141: The Internet in China 119Cartier, a
- Page 142 and 143: The Internet in China 121Bu, Wei (2
- Page 146 and 147: 5. Reflexive Internet? The Britishe
- Page 148 and 149: Reflexive Internet? The British exp
- Page 150 and 151: Reflexive Internet? The British exp
- Page 152 and 153: Reflexive Internet? The British exp
- Page 154 and 155: Reflexive Internet? The British exp
- Page 156 and 157: Reflexive Internet? The British exp
- Page 158 and 159: Reflexive Internet? The British exp
- Page 160 and 161: Reflexive Internet? The British exp
- Page 162 and 163: Reflexive Internet? The British exp
- Page 164: PART IIIThe Network Economy
- Page 167 and 168: 146 Marshall Van Alstyne and Nathan
- Page 169 and 170: 148 Marshall Van Alstyne and Nathan
- Page 171 and 172: 150 Marshall Van Alstyne and Nathan
- Page 173 and 174: 152 Marshall Van Alstyne and Nathan
- Page 175 and 176: 154 Marshall Van Alstyne and Nathan
- Page 177 and 178: 156 Marshall Van Alstyne and Nathan
- Page 179 and 180: 158 Marshall Van Alstyne and Nathan
- Page 181 and 182: 160 Marshall Van Alstyne and Nathan
- Page 183 and 184: 162 Marshall Van Alstyne and Nathan
- Page 185 and 186: 164 Marshall Van Alstyne and Nathan
- Page 187 and 188: 166 Marshall Van Alstyne and Nathan
- Page 189 and 190: 168 Marshall Van Alstyne and Nathan
- Page 191 and 192: 170 Marshall Van Alstyne and Nathan
- Page 193 and 194: 172 Marshall Van Alstyne and Nathan
The Internet in China 123jianguanzhongdian),” Beijing: Telecommunication Information (tongxinxinxibao).February 19, p. 1.Lohr, Steve (2002) “Microsoft to Give Governments Access to Code,” New York Times,January 15, p. C10.Ma, Laurence and Cartier, Carolyn (eds) (2003) The Chinese Diaspora: Space, Place,Mobility, and Identity. Lanham, MA: Rowman and Littlefield.Mueller, Milton and Lovelock, Peter (2000) “The WTO and China’s Ban on ForeignInvestment in Telecommunication Services: A Game-theoretic Analysis,”Telecommunications Policy 24 (8/9): 731–59.—— and Tan, Zixiang (1997) China in the Information A<strong>ge</strong>: Telecommunications and theDilemma of Reform. Westport, CT: Prae<strong>ge</strong>r.Murphy, David (2003) “He’s No Techno Geek,” Far Eastern Economic Review 166 (8)(February 27), 8.Murray, Brendan (2003) “Policymaking for Internet Cafés in China,” paper presented atthe conference “China and the Internet: Technology, Economy, and Society inTransition,” Los An<strong>ge</strong>les, May 30–31.Needham, Joseph (1981) Science in Traditional China. Cambrid<strong>ge</strong>, MA: HarvardUniversity Press.Oi, Jean C. (1995) “The Role of the Local State in China’s Transitional Economy,” TheChina Quarterly 144: 1132–49.Olds, Kris and Yeung, Henry W-C. (1999) “Reshaping ‘Chinese’ Business Networks in aGlobalising Era,” Environment and Planning D: Society and Space 17: 535–55.Pool, Ithiel D. S. (1983) Technologies of Freedom. Cambrid<strong>ge</strong>, MA: Harvard UniversityPress.Qian, Tianbai (1996) “The Development of the Internet in China (Internet zai zhongguode fazhan),” Beijing: Computer World (jishuanji shijie) (June 17): 131–3.Qiu, Jack L. (1999) “Virtual Censorship in China: Keeping the Gates between the Cyberspaces,”The International Journal of Communications Law and Policy 4 (Winter):1–25.—— (2001a) “Chinese Opinions Collide Online: Civil Discussions Following theUS–China Plane Collision,” Online Journalism Review (April 12) (available atwww.ojr.org./ojr/technology).—— (2001b) “Online Nationalism in China: An Odd Myth with Normalcy,” paperpresented at the Annual Convention of National Communication. Atlanta, November1–4.—— (2002a) “Coming to Terms with Informational Stratification in the People’sRepublic of China,” Cardozo Arts and Entertainment Law Journal 20 (1): 157–80.—— (2002b) “Chinese Hackerism in Retrospect: The Le<strong>ge</strong>nd of a New RevolutionaryArmy,” MFC Insight (September 17) (available at www.mfcinsight.com).—— (2003) “(Dis)connecting the Pearl River Delta: History of a RegionalTelecommunications Infrastructure, 1978–2002,” paper presented at the InternationalCommunication Association Annual Conference, San Diego, May 23–27.Saxenian, Anna Lee (2002) “Brain Circulation,” The Brookings Review 20 (1): 28–31.Shapiro, Judith (2001) Mao’s War Against Nature. Cambrid<strong>ge</strong>: Cambrid<strong>ge</strong> UniversityPress.Sheff, David (2002) China Dawn: The Story of a Technology and Business Revolution.New York: HarperCollins.Smith, Craig S. (2001) “First World Hacker War,” New York Times, May 13, p. 4.2.Tan, Zixiang (1999) “Regulating China’s Internet: Conver<strong>ge</strong>nce toward a CoherentRegulatory Regime,” Telecommunications Policy 23 (3): 261–76.