The Chinese conception of cybersecurity : a conceptual, institutional, and regulatory genealogy
How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from...
Ausführliche Beschreibung
Autor*in: |
Creemers, Rogier - 1982- [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2024 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of contemporary China - London [u.a.] : Taylor & Francis Group, 1996, 33(2024), 146, Seite 173-188 |
---|---|
Übergeordnetes Werk: |
volume:33 ; year:2024 ; number:146 ; pages:173-188 |
Links: |
---|
DOI / URN: |
10.1080/10670564.2023.2196508 |
---|
Katalog-ID: |
188103111X |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | 188103111X | ||
003 | DE-627 | ||
005 | 20240314205706.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240216s2024 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/10670564.2023.2196508 |2 doi | |
035 | |a (DE-627)188103111X | ||
035 | |a (DE-599)KXP188103111X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a RI03.03 |2 fivr | ||
084 | |a SI02 |2 fivs | ||
100 | 1 | |a Creemers, Rogier |d 1982- |e verfasserin |0 (DE-588)1150271337 |0 (DE-627)1010467093 |0 (DE-576)455023360 |4 aut | |
245 | 1 | 4 | |a The Chinese conception of cybersecurity |b a conceptual, institutional, and regulatory genealogy |c Rogier Creemers |
264 | 1 | |c 2024 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) | ||
650 | 0 | 7 | |0 (DE-588)4026899-8 |0 (DE-627)104653795 |0 (DE-576)20896844X |a Information |2 gnd |
650 | 0 | 7 | |0 (DE-588)4054790-5 |0 (DE-627)106161075 |0 (DE-576)209110589 |a Sicherheit |2 gnd |
650 | 0 | 7 | |0 (DE-588)4113450-3 |0 (DE-627)105829390 |0 (DE-576)209476583 |a Entwicklung |2 gnd |
650 | 0 | 7 | |0 (DE-588)4184587-0 |0 (DE-627)105293962 |0 (DE-576)210026774 |a Technologiepolitik |2 gnd |
650 | 0 | 7 | |0 (DE-588)4062163-7 |0 (DE-627)106133349 |0 (DE-576)209142693 |a Ursache |2 gnd |
650 | 0 | 7 | |0 (DE-588)4031883-7 |0 (DE-627)10454869X |0 (DE-576)208994653 |a Kommunikation |2 gnd |
651 | 7 | |0 (DE-588)4009937-4 |0 (DE-627)104289031 |0 (DE-576)208885382 |a China |2 gnd | |
773 | 0 | 8 | |i Enthalten in |t Journal of contemporary China |d London [u.a.] : Taylor & Francis Group, 1996 |g 33(2024), 146, Seite 173-188 |h Online-Ressource |w (DE-627)320493571 |w (DE-600)2011311-0 |w (DE-576)098734873 |x 1469-9400 |7 nnns |
773 | 1 | 8 | |g volume:33 |g year:2024 |g number:146 |g pages:173-188 |
856 | 4 | 0 | |u https://doi.org/10.1080/10670564.2023.2196508 |x Resolving-System |z lizenzpflichtig |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ILN_2470 | ||
912 | |a ISIL_DE-615 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_647 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2031 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2038 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2056 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2088 | ||
912 | |a GBV_ILN_2093 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2113 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_2548 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4246 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
912 | |a GBV_ILN_2548 | ||
912 | |a ISIL_DE-H221 | ||
936 | f | i | |0 (DE-627)1756134200 |a RI03.03 |b Volksrepublik China |k Asien (ohne westliches Asien) |k Ostasien |k Volksrepublik China |2 fivr |
936 | f | i | |0 (DE-627)1756136351 |a SI02 |b Technologiepolitik |k Technik |k Technologiepolitik |2 fivs |
938 | 1 | 0 | |0 (DE-627)1756162107 |0 (DE-615)6602201 |a Volksrepublik China |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756235201 |0 (DE-615)6604688 |a Informationssicherheit |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756240043 |0 (DE-615)6604549 |a Entwicklung |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756207380 |0 (DE-615)6605201 |a Technologiepolitik |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756217750 |0 (DE-615)6600291 |a Bestimmungsfaktoren |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756167516 |0 (DE-615)6604347 |a Information und Kommunikation |2 fivt |
951 | |a AR | ||
952 | |d 33 |j 2024 |e 146 |h 173-188 | ||
980 | |2 2470 |1 01 |x DE-615 |b 4485831973 |c 00 |f --%%-- |d --%%-- |e --%%-- |j --%%-- |y l01 |z 16-02-24 | ||
980 | |2 2548 |1 01 |x DE-H221 |b 4486938801 |c 00 |f --%%-- |d --%%-- |e --%%-- |j l |y l01 |z 17-02-24 | ||
998 | |2 2470 |1 01 |x DE-615 |0 2024-02-21 |
author_variant |
r c rc |
---|---|
matchkey_str |
article:14699400:2024----::hcieeocpinfy |
hierarchy_sort_str |
2024 |
coordinates_geo2 |
Point ( +105.000000 +035.000000 ) |
publishDate |
2024 |
allfields |
10.1080/10670564.2023.2196508 doi (DE-627)188103111X (DE-599)KXP188103111X DE-627 ger DE-627 rda eng RI03.03 fivr SI02 fivs Creemers, Rogier 1982- verfasserin (DE-588)1150271337 (DE-627)1010467093 (DE-576)455023360 aut The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers 2024 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 Entwicklung gnd (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 Technologiepolitik gnd (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 Ursache gnd (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 Kommunikation gnd (DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 China gnd Enthalten in Journal of contemporary China London [u.a.] : Taylor & Francis Group, 1996 33(2024), 146, Seite 173-188 Online-Ressource (DE-627)320493571 (DE-600)2011311-0 (DE-576)098734873 1469-9400 nnns volume:33 year:2024 number:146 pages:173-188 https://doi.org/10.1080/10670564.2023.2196508 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2061 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2111 GBV_ILN_2113 GBV_ILN_2190 GBV_ILN_2336 GBV_ILN_2507 GBV_ILN_2548 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4125 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_2548 ISIL_DE-H221 (DE-627)1756134200 RI03.03 Volksrepublik China Asien (ohne westliches Asien) Ostasien Volksrepublik China fivr (DE-627)1756136351 SI02 Technologiepolitik Technik Technologiepolitik fivs (DE-627)1756162107 (DE-615)6602201 Volksrepublik China fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756240043 (DE-615)6604549 Entwicklung fivt (DE-627)1756207380 (DE-615)6605201 Technologiepolitik fivt (DE-627)1756217750 (DE-615)6600291 Bestimmungsfaktoren fivt (DE-627)1756167516 (DE-615)6604347 Information und Kommunikation fivt AR 33 2024 146 173-188 2470 01 DE-615 4485831973 00 --%%-- --%%-- --%%-- --%%-- l01 16-02-24 2548 01 DE-H221 4486938801 00 --%%-- --%%-- --%%-- l l01 17-02-24 2470 01 DE-615 2024-02-21 |
spelling |
10.1080/10670564.2023.2196508 doi (DE-627)188103111X (DE-599)KXP188103111X DE-627 ger DE-627 rda eng RI03.03 fivr SI02 fivs Creemers, Rogier 1982- verfasserin (DE-588)1150271337 (DE-627)1010467093 (DE-576)455023360 aut The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers 2024 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 Entwicklung gnd (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 Technologiepolitik gnd (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 Ursache gnd (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 Kommunikation gnd (DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 China gnd Enthalten in Journal of contemporary China London [u.a.] : Taylor & Francis Group, 1996 33(2024), 146, Seite 173-188 Online-Ressource (DE-627)320493571 (DE-600)2011311-0 (DE-576)098734873 1469-9400 nnns volume:33 year:2024 number:146 pages:173-188 https://doi.org/10.1080/10670564.2023.2196508 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2061 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2111 GBV_ILN_2113 GBV_ILN_2190 GBV_ILN_2336 GBV_ILN_2507 GBV_ILN_2548 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4125 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_2548 ISIL_DE-H221 (DE-627)1756134200 RI03.03 Volksrepublik China Asien (ohne westliches Asien) Ostasien Volksrepublik China fivr (DE-627)1756136351 SI02 Technologiepolitik Technik Technologiepolitik fivs (DE-627)1756162107 (DE-615)6602201 Volksrepublik China fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756240043 (DE-615)6604549 Entwicklung fivt (DE-627)1756207380 (DE-615)6605201 Technologiepolitik fivt (DE-627)1756217750 (DE-615)6600291 Bestimmungsfaktoren fivt (DE-627)1756167516 (DE-615)6604347 Information und Kommunikation fivt AR 33 2024 146 173-188 2470 01 DE-615 4485831973 00 --%%-- --%%-- --%%-- --%%-- l01 16-02-24 2548 01 DE-H221 4486938801 00 --%%-- --%%-- --%%-- l l01 17-02-24 2470 01 DE-615 2024-02-21 |
allfields_unstemmed |
10.1080/10670564.2023.2196508 doi (DE-627)188103111X (DE-599)KXP188103111X DE-627 ger DE-627 rda eng RI03.03 fivr SI02 fivs Creemers, Rogier 1982- verfasserin (DE-588)1150271337 (DE-627)1010467093 (DE-576)455023360 aut The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers 2024 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 Entwicklung gnd (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 Technologiepolitik gnd (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 Ursache gnd (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 Kommunikation gnd (DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 China gnd Enthalten in Journal of contemporary China London [u.a.] : Taylor & Francis Group, 1996 33(2024), 146, Seite 173-188 Online-Ressource (DE-627)320493571 (DE-600)2011311-0 (DE-576)098734873 1469-9400 nnns volume:33 year:2024 number:146 pages:173-188 https://doi.org/10.1080/10670564.2023.2196508 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2061 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2111 GBV_ILN_2113 GBV_ILN_2190 GBV_ILN_2336 GBV_ILN_2507 GBV_ILN_2548 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4125 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_2548 ISIL_DE-H221 (DE-627)1756134200 RI03.03 Volksrepublik China Asien (ohne westliches Asien) Ostasien Volksrepublik China fivr (DE-627)1756136351 SI02 Technologiepolitik Technik Technologiepolitik fivs (DE-627)1756162107 (DE-615)6602201 Volksrepublik China fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756240043 (DE-615)6604549 Entwicklung fivt (DE-627)1756207380 (DE-615)6605201 Technologiepolitik fivt (DE-627)1756217750 (DE-615)6600291 Bestimmungsfaktoren fivt (DE-627)1756167516 (DE-615)6604347 Information und Kommunikation fivt AR 33 2024 146 173-188 2470 01 DE-615 4485831973 00 --%%-- --%%-- --%%-- --%%-- l01 16-02-24 2548 01 DE-H221 4486938801 00 --%%-- --%%-- --%%-- l l01 17-02-24 2470 01 DE-615 2024-02-21 |
allfieldsGer |
10.1080/10670564.2023.2196508 doi (DE-627)188103111X (DE-599)KXP188103111X DE-627 ger DE-627 rda eng RI03.03 fivr SI02 fivs Creemers, Rogier 1982- verfasserin (DE-588)1150271337 (DE-627)1010467093 (DE-576)455023360 aut The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers 2024 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 Entwicklung gnd (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 Technologiepolitik gnd (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 Ursache gnd (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 Kommunikation gnd (DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 China gnd Enthalten in Journal of contemporary China London [u.a.] : Taylor & Francis Group, 1996 33(2024), 146, Seite 173-188 Online-Ressource (DE-627)320493571 (DE-600)2011311-0 (DE-576)098734873 1469-9400 nnns volume:33 year:2024 number:146 pages:173-188 https://doi.org/10.1080/10670564.2023.2196508 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2061 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2111 GBV_ILN_2113 GBV_ILN_2190 GBV_ILN_2336 GBV_ILN_2507 GBV_ILN_2548 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4125 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_2548 ISIL_DE-H221 (DE-627)1756134200 RI03.03 Volksrepublik China Asien (ohne westliches Asien) Ostasien Volksrepublik China fivr (DE-627)1756136351 SI02 Technologiepolitik Technik Technologiepolitik fivs (DE-627)1756162107 (DE-615)6602201 Volksrepublik China fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756240043 (DE-615)6604549 Entwicklung fivt (DE-627)1756207380 (DE-615)6605201 Technologiepolitik fivt (DE-627)1756217750 (DE-615)6600291 Bestimmungsfaktoren fivt (DE-627)1756167516 (DE-615)6604347 Information und Kommunikation fivt AR 33 2024 146 173-188 2470 01 DE-615 4485831973 00 --%%-- --%%-- --%%-- --%%-- l01 16-02-24 2548 01 DE-H221 4486938801 00 --%%-- --%%-- --%%-- l l01 17-02-24 2470 01 DE-615 2024-02-21 |
allfieldsSound |
10.1080/10670564.2023.2196508 doi (DE-627)188103111X (DE-599)KXP188103111X DE-627 ger DE-627 rda eng RI03.03 fivr SI02 fivs Creemers, Rogier 1982- verfasserin (DE-588)1150271337 (DE-627)1010467093 (DE-576)455023360 aut The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers 2024 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 Entwicklung gnd (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 Technologiepolitik gnd (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 Ursache gnd (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 Kommunikation gnd (DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 China gnd Enthalten in Journal of contemporary China London [u.a.] : Taylor & Francis Group, 1996 33(2024), 146, Seite 173-188 Online-Ressource (DE-627)320493571 (DE-600)2011311-0 (DE-576)098734873 1469-9400 nnns volume:33 year:2024 number:146 pages:173-188 https://doi.org/10.1080/10670564.2023.2196508 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2061 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2111 GBV_ILN_2113 GBV_ILN_2190 GBV_ILN_2336 GBV_ILN_2507 GBV_ILN_2548 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4125 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 GBV_ILN_2548 ISIL_DE-H221 (DE-627)1756134200 RI03.03 Volksrepublik China Asien (ohne westliches Asien) Ostasien Volksrepublik China fivr (DE-627)1756136351 SI02 Technologiepolitik Technik Technologiepolitik fivs (DE-627)1756162107 (DE-615)6602201 Volksrepublik China fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756240043 (DE-615)6604549 Entwicklung fivt (DE-627)1756207380 (DE-615)6605201 Technologiepolitik fivt (DE-627)1756217750 (DE-615)6600291 Bestimmungsfaktoren fivt (DE-627)1756167516 (DE-615)6604347 Information und Kommunikation fivt AR 33 2024 146 173-188 2470 01 DE-615 4485831973 00 --%%-- --%%-- --%%-- --%%-- l01 16-02-24 2548 01 DE-H221 4486938801 00 --%%-- --%%-- --%%-- l l01 17-02-24 2470 01 DE-615 2024-02-21 |
language |
English |
source |
Enthalten in Journal of contemporary China 33(2024), 146, Seite 173-188 volume:33 year:2024 number:146 pages:173-188 |
sourceStr |
Enthalten in Journal of contemporary China 33(2024), 146, Seite 173-188 volume:33 year:2024 number:146 pages:173-188 |
format_phy_str_mv |
Article |
building |
2470:0 2548:0 |
institution |
findex.gbv.de |
selectbib_iln_str_mv |
2470@01 2548@01 |
topic_facet |
Information Sicherheit Entwicklung Technologiepolitik Ursache Kommunikation |
geographic |
(DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 China gnd |
isfreeaccess_bool |
false |
container_title |
Journal of contemporary China |
authorswithroles_txt_mv |
Creemers, Rogier @@aut@@ |
publishDateDaySort_date |
2024-01-01T00:00:00Z |
hierarchy_top_id |
320493571 |
id |
188103111X |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">188103111X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240314205706.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240216s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1080/10670564.2023.2196508</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)188103111X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP188103111X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">RI03.03</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SI02</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Creemers, Rogier</subfield><subfield code="d">1982-</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1150271337</subfield><subfield code="0">(DE-627)1010467093</subfield><subfield code="0">(DE-576)455023360</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Chinese conception of cybersecurity</subfield><subfield code="b">a conceptual, institutional, and regulatory genealogy</subfield><subfield code="c">Rogier Creemers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2024</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4026899-8</subfield><subfield code="0">(DE-627)104653795</subfield><subfield code="0">(DE-576)20896844X</subfield><subfield code="a">Information</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4054790-5</subfield><subfield code="0">(DE-627)106161075</subfield><subfield code="0">(DE-576)209110589</subfield><subfield code="a">Sicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4113450-3</subfield><subfield code="0">(DE-627)105829390</subfield><subfield code="0">(DE-576)209476583</subfield><subfield code="a">Entwicklung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4184587-0</subfield><subfield code="0">(DE-627)105293962</subfield><subfield code="0">(DE-576)210026774</subfield><subfield code="a">Technologiepolitik</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4062163-7</subfield><subfield code="0">(DE-627)106133349</subfield><subfield code="0">(DE-576)209142693</subfield><subfield code="a">Ursache</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4031883-7</subfield><subfield code="0">(DE-627)10454869X</subfield><subfield code="0">(DE-576)208994653</subfield><subfield code="a">Kommunikation</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="0">(DE-588)4009937-4</subfield><subfield code="0">(DE-627)104289031</subfield><subfield code="0">(DE-576)208885382</subfield><subfield code="a">China</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of contemporary China</subfield><subfield code="d">London [u.a.] : Taylor & Francis Group, 1996</subfield><subfield code="g">33(2024), 146, Seite 173-188</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)320493571</subfield><subfield code="w">(DE-600)2011311-0</subfield><subfield code="w">(DE-576)098734873</subfield><subfield code="x">1469-9400</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:33</subfield><subfield code="g">year:2024</subfield><subfield code="g">number:146</subfield><subfield code="g">pages:173-188</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1080/10670564.2023.2196508</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">lizenzpflichtig</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-615</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-H221</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)1756134200</subfield><subfield code="a">RI03.03</subfield><subfield code="b">Volksrepublik China</subfield><subfield code="k">Asien (ohne westliches Asien)</subfield><subfield code="k">Ostasien</subfield><subfield code="k">Volksrepublik China</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)1756136351</subfield><subfield code="a">SI02</subfield><subfield code="b">Technologiepolitik</subfield><subfield code="k">Technik</subfield><subfield code="k">Technologiepolitik</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756162107</subfield><subfield code="0">(DE-615)6602201</subfield><subfield code="a">Volksrepublik China</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756235201</subfield><subfield code="0">(DE-615)6604688</subfield><subfield code="a">Informationssicherheit</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756240043</subfield><subfield code="0">(DE-615)6604549</subfield><subfield code="a">Entwicklung</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756207380</subfield><subfield code="0">(DE-615)6605201</subfield><subfield code="a">Technologiepolitik</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756217750</subfield><subfield code="0">(DE-615)6600291</subfield><subfield code="a">Bestimmungsfaktoren</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756167516</subfield><subfield code="0">(DE-615)6604347</subfield><subfield code="a">Information und Kommunikation</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">33</subfield><subfield code="j">2024</subfield><subfield code="e">146</subfield><subfield code="h">173-188</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="b">4485831973</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">--%%--</subfield><subfield code="y">l01</subfield><subfield code="z">16-02-24</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2548</subfield><subfield code="1">01</subfield><subfield code="x">DE-H221</subfield><subfield code="b">4486938801</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">l</subfield><subfield code="y">l01</subfield><subfield code="z">17-02-24</subfield></datafield><datafield tag="998" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="0">2024-02-21</subfield></datafield></record></collection>
|
standort_str_mv |
--%%-- |
standort_iln_str_mv |
2470:--%%-- DE-615:--%%-- 2548:--%%-- DE-H221:--%%-- |
author |
Creemers, Rogier 1982- |
spellingShingle |
Creemers, Rogier 1982- fivr RI03.03 fivs SI02 gnd Information gnd Sicherheit gnd Entwicklung gnd Technologiepolitik gnd Ursache gnd Kommunikation fivt Volksrepublik China fivt Informationssicherheit fivt Entwicklung fivt Technologiepolitik fivt Bestimmungsfaktoren fivt Information und Kommunikation The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy |
authorStr |
Creemers, Rogier 1982- |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)320493571 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
typewithnormlink_str_mv |
DifferentiatedPerson@(DE-588)1150271337 Person@(DE-588)1150271337 SubjectHeading@(DE-588)4026899-8 SubjectHeadingSensoStricto@(DE-588)4026899-8 SubjectHeadingSensoStricto@(DE-588)4054790-5 SubjectHeading@(DE-588)4054790-5 SubjectHeading@(DE-588)4113450-3 SubjectHeadingSensoStricto@(DE-588)4113450-3 SubjectHeadingSensoStricto@(DE-588)4184587-0 SubjectHeading@(DE-588)4184587-0 SubjectHeading@(DE-588)4062163-7 SubjectHeadingSensoStricto@(DE-588)4062163-7 SubjectHeadingSensoStricto@(DE-588)4031883-7 SubjectHeading@(DE-588)4031883-7 TerritorialCorporateBodyOrAdministrativeUnit@(DE-588)4009937-4 Country@(DE-588)4009937-4 PlaceOrGeographicName@(DE-588)4009937-4 |
collection |
KXP SWB GVK |
remote_str |
true |
last_changed_iln_str_mv |
2470@16-02-24 2548@17-02-24 |
illustrated |
Not Illustrated |
issn |
1469-9400 |
topic_title |
RI03.03 fivr SI02 fivs The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 Entwicklung gnd (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 Technologiepolitik gnd (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 Ursache gnd (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 Kommunikation gnd |
topic |
fivr RI03.03 fivs SI02 gnd Information gnd Sicherheit gnd Entwicklung gnd Technologiepolitik gnd Ursache gnd Kommunikation fivt Volksrepublik China fivt Informationssicherheit fivt Entwicklung fivt Technologiepolitik fivt Bestimmungsfaktoren fivt Information und Kommunikation |
topic_unstemmed |
fivr RI03.03 fivs SI02 gnd Information gnd Sicherheit gnd Entwicklung gnd Technologiepolitik gnd Ursache gnd Kommunikation fivt Volksrepublik China fivt Informationssicherheit fivt Entwicklung fivt Technologiepolitik fivt Bestimmungsfaktoren fivt Information und Kommunikation |
topic_browse |
fivr RI03.03 fivs SI02 gnd Information gnd Sicherheit gnd Entwicklung gnd Technologiepolitik gnd Ursache gnd Kommunikation fivt Volksrepublik China fivt Informationssicherheit fivt Entwicklung fivt Technologiepolitik fivt Bestimmungsfaktoren fivt Information und Kommunikation |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
standort_txtP_mv |
--%%-- |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Journal of contemporary China |
coordinates_geo |
Point ( +105.000000 +035.000000 ) |
normlinkwithtype_str_mv |
(DE-588)1150271337@DifferentiatedPerson (DE-588)1150271337@Person (DE-588)4026899-8@SubjectHeading (DE-588)4026899-8@SubjectHeadingSensoStricto (DE-588)4054790-5@SubjectHeadingSensoStricto (DE-588)4054790-5@SubjectHeading (DE-588)4113450-3@SubjectHeading (DE-588)4113450-3@SubjectHeadingSensoStricto (DE-588)4184587-0@SubjectHeadingSensoStricto (DE-588)4184587-0@SubjectHeading (DE-588)4062163-7@SubjectHeading (DE-588)4062163-7@SubjectHeadingSensoStricto (DE-588)4031883-7@SubjectHeadingSensoStricto (DE-588)4031883-7@SubjectHeading (DE-588)4009937-4@TerritorialCorporateBodyOrAdministrativeUnit (DE-588)4009937-4@Country (DE-588)4009937-4@PlaceOrGeographicName |
hierarchy_parent_id |
320493571 |
signature |
--%%-- |
signature_str_mv |
--%%-- |
hierarchy_top_title |
Journal of contemporary China |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)320493571 (DE-600)2011311-0 (DE-576)098734873 |
normlinkwithrole_str_mv |
(DE-588)1150271337@@aut@@ (DE-588)4026899-8@@650@@ (DE-588)4054790-5@@650@@ (DE-588)4113450-3@@650@@ (DE-588)4184587-0@@650@@ (DE-588)4062163-7@@650@@ (DE-588)4031883-7@@650@@ (DE-588)4009937-4@@651@@ |
title |
The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy |
ctrlnum |
(DE-627)188103111X (DE-599)KXP188103111X |
geographic_facet |
China |
title_full |
The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy Rogier Creemers |
author_sort |
Creemers, Rogier 1982- |
journal |
Journal of contemporary China |
journalStr |
Journal of contemporary China |
callnumber-first-code |
- |
lang_code |
eng |
selektneu_str_mv |
2470@2024-02-21 |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2024 |
contenttype_str_mv |
txt |
container_start_page |
173 |
class_local_iln |
fivr:RI03.03 fivs:SI02 |
author_browse |
Creemers, Rogier |
selectkey |
2470:l 2548:l |
container_volume |
33 |
class |
RI03.03 fivr SI02 fivs |
format_se |
Elektronische Aufsätze |
author-letter |
Creemers, Rogier |
title_sub |
a conceptual, institutional, and regulatory genealogy |
doi_str_mv |
10.1080/10670564.2023.2196508 |
normlink |
1150271337 1010467093 455023360 4026899-8 104653795 20896844X 4054790-5 106161075 209110589 4113450-3 105829390 209476583 4184587-0 105293962 210026774 4062163-7 106133349 209142693 4031883-7 10454869X 208994653 4009937-4 104289031 208885382 1756134200 1756136351 1756162107 6602201 1756235201 6604688 1756240043 6604549 1756207380 6605201 1756217750 6600291 1756167516 6604347 2024-02-21 |
normlink_prefix_str_mv |
(DE-588)1150271337 (DE-627)1010467093 (DE-576)455023360 (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 (DE-588)4113450-3 (DE-627)105829390 (DE-576)209476583 (DE-588)4184587-0 (DE-627)105293962 (DE-576)210026774 (DE-588)4062163-7 (DE-627)106133349 (DE-576)209142693 (DE-588)4031883-7 (DE-627)10454869X (DE-576)208994653 (DE-588)4009937-4 (DE-627)104289031 (DE-576)208885382 (DE-627)1756134200 (DE-627)1756136351 (DE-627)1756162107 (DE-615)6602201 (DE-627)1756235201 (DE-615)6604688 (DE-627)1756240043 (DE-615)6604549 (DE-627)1756207380 (DE-615)6605201 (DE-627)1756217750 (DE-615)6600291 (DE-627)1756167516 (DE-615)6604347 2024-02-21 |
title_sort |
chinese conception of cybersecuritya conceptual, institutional, and regulatory genealogy |
title_auth |
The Chinese conception of cybersecurity a conceptual, institutional, and regulatory genealogy |
abstract |
How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) |
abstractGer |
How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) |
abstract_unstemmed |
How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA) |
collection_details |
GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2057 GBV_ILN_2061 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2111 GBV_ILN_2113 GBV_ILN_2190 GBV_ILN_2336 GBV_ILN_2507 GBV_ILN_2548 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4125 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 ISIL_DE-H221 |
container_issue |
146 |
title_short |
The Chinese conception of cybersecurity |
url |
https://doi.org/10.1080/10670564.2023.2196508 |
ausleihindikator_str_mv |
2470:- 2548:- |
rolewithnormlink_str_mv |
@@aut@@(DE-588)1150271337 @@650@@(DE-588)4026899-8 @@650@@(DE-588)4054790-5 @@650@@(DE-588)4113450-3 @@650@@(DE-588)4184587-0 @@650@@(DE-588)4062163-7 @@650@@(DE-588)4031883-7 @@651@@(DE-588)4009937-4 |
remote_bool |
true |
ppnlink |
320493571 |
GND_str_mv |
Creemers, Rogier Informationswesen Information Sicherheit Entwicklungsstadium Ursprung <Entwicklung> Entwicklung Forschungs- und Technologiepolitik Technologieförderung Technikpolitik Technologieförderungspolitik Technologiepolitik Ursachen Ursache Kommunikationsprozess Informationsprozess Kommunikation Chung-hua-jen-min-kung-ho-kuo PRC (People's Republic of China) Chinese People’s Republic Zhonghua-minguo (1911-1949) KNR (Kytajsʹkaja Narodnaja Respublika) Zhongguo-Diguo Kaiserreich China China (Republic : 1912-1949) Kytajsʹkaja Narodnaja Respublika Volksrepublik China China (Diguo) Zhongguo (renmin gongheguo) China (Renmin-Gongheguo) Chung-kuo (Renmin-Gongheguo) République populaire de Chine Republic of China (1912-1949) Shinkoku People's Republic of China Rotchina Zhonghua-Renmin-Gongheguo Zhongguo (Diguo) Chung-kuo kuo min cheng fu Kaiserreich Zhongguo China (Volksrepublik) Zhong guo Zhongguo Chung-hua-min-kuo (1911-1949) Zhongguo (Renmin-Gongheguo) Zhonghua renmin gongheguo China (People's Republic) Zhonghua (Renmin-Gongheguo) 中华人民共和国 Chinese People's Republic Chung-hua min kuo (1912-1949) VR China Chine Chung-kuo Zhongguo (Volksrepublik) China |
GND_txt_mv |
Creemers, Rogier Informationswesen Information Sicherheit Entwicklungsstadium Ursprung <Entwicklung> Entwicklung Forschungs- und Technologiepolitik Technologieförderung Technikpolitik Technologieförderungspolitik Technologiepolitik Ursachen Ursache Kommunikationsprozess Informationsprozess Kommunikation Chung-hua-jen-min-kung-ho-kuo PRC (People's Republic of China) Chinese People’s Republic Zhonghua-minguo (1911-1949) KNR (Kytajsʹkaja Narodnaja Respublika) Zhongguo-Diguo Kaiserreich China China (Republic : 1912-1949) Kytajsʹkaja Narodnaja Respublika Volksrepublik China China (Diguo) Zhongguo (renmin gongheguo) China (Renmin-Gongheguo) Chung-kuo (Renmin-Gongheguo) République populaire de Chine Republic of China (1912-1949) Shinkoku People's Republic of China Rotchina Zhonghua-Renmin-Gongheguo Zhongguo (Diguo) Chung-kuo kuo min cheng fu Kaiserreich Zhongguo China (Volksrepublik) Zhong guo Zhongguo Chung-hua-min-kuo (1911-1949) Zhongguo (Renmin-Gongheguo) Zhonghua renmin gongheguo China (People's Republic) Zhonghua (Renmin-Gongheguo) 中华人民共和国 Chinese People's Republic Chung-hua min kuo (1912-1949) VR China Chine Chung-kuo Zhongguo (Volksrepublik) China |
GND_txtF_mv |
Creemers, Rogier Informationswesen Information Sicherheit Entwicklungsstadium Ursprung <Entwicklung> Entwicklung Forschungs- und Technologiepolitik Technologieförderung Technikpolitik Technologieförderungspolitik Technologiepolitik Ursachen Ursache Kommunikationsprozess Informationsprozess Kommunikation Chung-hua-jen-min-kung-ho-kuo PRC (People's Republic of China) Chinese People’s Republic Zhonghua-minguo (1911-1949) KNR (Kytajsʹkaja Narodnaja Respublika) Zhongguo-Diguo Kaiserreich China China (Republic : 1912-1949) Kytajsʹkaja Narodnaja Respublika Volksrepublik China China (Diguo) Zhongguo (renmin gongheguo) China (Renmin-Gongheguo) Chung-kuo (Renmin-Gongheguo) République populaire de Chine Republic of China (1912-1949) Shinkoku People's Republic of China Rotchina Zhonghua-Renmin-Gongheguo Zhongguo (Diguo) Chung-kuo kuo min cheng fu Kaiserreich Zhongguo China (Volksrepublik) Zhong guo Zhongguo Chung-hua-min-kuo (1911-1949) Zhongguo (Renmin-Gongheguo) Zhonghua renmin gongheguo China (People's Republic) Zhonghua (Renmin-Gongheguo) 中华人民共和国 Chinese People's Republic Chung-hua min kuo (1912-1949) VR China Chine Chung-kuo Zhongguo (Volksrepublik) China |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1080/10670564.2023.2196508 |
callnumber-a |
--%%-- |
up_date |
2024-07-04T13:05:10.733Z |
_version_ |
1803653806278311936 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">188103111X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240314205706.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240216s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1080/10670564.2023.2196508</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)188103111X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP188103111X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">RI03.03</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SI02</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Creemers, Rogier</subfield><subfield code="d">1982-</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1150271337</subfield><subfield code="0">(DE-627)1010467093</subfield><subfield code="0">(DE-576)455023360</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Chinese conception of cybersecurity</subfield><subfield code="b">a conceptual, institutional, and regulatory genealogy</subfield><subfield code="c">Rogier Creemers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2024</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How does the Chinese government define cybersecurity? Security in the digital realm has gained increasing prominence in recent years, both within China’s domestic policy landscape and in its participation with global digital governance. However, the Chinese conception of this term is different from the Western one, and is embedded within the country’s distinctive political, economic and technological context. Drawing on Chinese government documents, this paper will trace the evolution of how successive generations of Chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them. (J Contemp China / GIGA)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4026899-8</subfield><subfield code="0">(DE-627)104653795</subfield><subfield code="0">(DE-576)20896844X</subfield><subfield code="a">Information</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4054790-5</subfield><subfield code="0">(DE-627)106161075</subfield><subfield code="0">(DE-576)209110589</subfield><subfield code="a">Sicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4113450-3</subfield><subfield code="0">(DE-627)105829390</subfield><subfield code="0">(DE-576)209476583</subfield><subfield code="a">Entwicklung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4184587-0</subfield><subfield code="0">(DE-627)105293962</subfield><subfield code="0">(DE-576)210026774</subfield><subfield code="a">Technologiepolitik</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4062163-7</subfield><subfield code="0">(DE-627)106133349</subfield><subfield code="0">(DE-576)209142693</subfield><subfield code="a">Ursache</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4031883-7</subfield><subfield code="0">(DE-627)10454869X</subfield><subfield code="0">(DE-576)208994653</subfield><subfield code="a">Kommunikation</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="0">(DE-588)4009937-4</subfield><subfield code="0">(DE-627)104289031</subfield><subfield code="0">(DE-576)208885382</subfield><subfield code="a">China</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of contemporary China</subfield><subfield code="d">London [u.a.] : Taylor & Francis Group, 1996</subfield><subfield code="g">33(2024), 146, Seite 173-188</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)320493571</subfield><subfield code="w">(DE-600)2011311-0</subfield><subfield code="w">(DE-576)098734873</subfield><subfield code="x">1469-9400</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:33</subfield><subfield code="g">year:2024</subfield><subfield code="g">number:146</subfield><subfield code="g">pages:173-188</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1080/10670564.2023.2196508</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">lizenzpflichtig</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-615</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-H221</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)1756134200</subfield><subfield code="a">RI03.03</subfield><subfield code="b">Volksrepublik China</subfield><subfield code="k">Asien (ohne westliches Asien)</subfield><subfield code="k">Ostasien</subfield><subfield code="k">Volksrepublik China</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)1756136351</subfield><subfield code="a">SI02</subfield><subfield code="b">Technologiepolitik</subfield><subfield code="k">Technik</subfield><subfield code="k">Technologiepolitik</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756162107</subfield><subfield code="0">(DE-615)6602201</subfield><subfield code="a">Volksrepublik China</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756235201</subfield><subfield code="0">(DE-615)6604688</subfield><subfield code="a">Informationssicherheit</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756240043</subfield><subfield code="0">(DE-615)6604549</subfield><subfield code="a">Entwicklung</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756207380</subfield><subfield code="0">(DE-615)6605201</subfield><subfield code="a">Technologiepolitik</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756217750</subfield><subfield code="0">(DE-615)6600291</subfield><subfield code="a">Bestimmungsfaktoren</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756167516</subfield><subfield code="0">(DE-615)6604347</subfield><subfield code="a">Information und Kommunikation</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">33</subfield><subfield code="j">2024</subfield><subfield code="e">146</subfield><subfield code="h">173-188</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="b">4485831973</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">--%%--</subfield><subfield code="y">l01</subfield><subfield code="z">16-02-24</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2548</subfield><subfield code="1">01</subfield><subfield code="x">DE-H221</subfield><subfield code="b">4486938801</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">l</subfield><subfield code="y">l01</subfield><subfield code="z">17-02-24</subfield></datafield><datafield tag="998" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="0">2024-02-21</subfield></datafield></record></collection>
|
score |
7.398695 |