Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-x24gv Total loading time: 0 Render date: 2024-05-01T19:04:30.612Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  16 December 2021

Max Parasol
Affiliation:
RMIT Blockchain Innovation Hub
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Primary Sources

Abadi, Martin et al, ‘Deep Learning with Differential Privacy’ (2016) <https://arxiv.org/abs/1607.00133>>Google Scholar
Abrami, Regina M, Kirby, William C and McFarlan, F Warren, ‘Why China Can’t Innovate’ (March 2014) Harvard Business Review <https://hbr.org/2014/03/why-china-cant-innovate>>Google Scholar
Adee, Sally, ‘Will AI’s Bubble Pop?’ (2016) 231(3082) New Scientist (16 July 2016)Google Scholar
Ahlstrom, David, Bruton, Garry D and Yeh, Kuang S, ‘Venture Capital in China: Past, Present, and Future’ (2007) 24(3) Asia Pacific Journal of Management 247CrossRefGoogle Scholar
Ahmed, Shazeda and Weber, Steven, ‘China’s Long Game in Techno-Nationalism’ (2018) 23(5) First Monday <https://firstmonday.org/ojs/index.php/fm/article/view/8085/7209>Google Scholar
Amirahmadi, Hooshang and Saff, Grant, ‘Science Parks: A Critical Assessment’ (1993) 8(2) Journal of Planning Literature 107Google Scholar
Ananny, Mike and Crawford, Kate, ‘Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability’ (2016) 20(1) New Media and Society 88Google Scholar
Arora, Ashish, Ceccagnoli, Marco and Cohen, Wesley M, ‘R&D and the Patent Premium’ (2008) 26(5) International Journal of Industrial Organization 1153CrossRefGoogle Scholar
Baumol, William J, ‘Entrepreneurship: Productive, Unproductive, and Destructive’ (1990) 98(5) Journal of Political Economy 893Google Scholar
Borg, Scott, ‘Economically Complex Cyberattacks’ (2003) 3(6) IEEE Security and Privacy Magazine 64Google Scholar
Braman, Sandra, ‘Privacy by Design: Networked Computing, 1969–1979’ (2012) 14(5) New Media and Society 798CrossRefGoogle Scholar
Cai, Dingjian, ‘Development of the Chinese Legal System since 1979 and Its Current Crisis and Transformation’, trans S Farhad (1999) 11(2) Cultural Dynamics 135Google Scholar
Cao, Cong, ‘Zhongguancun and China’s High-Tech Parks in Transition: “Growing Pains” or “Premature Senility?”’ (2004) 44(5) Asian Survey 647Google Scholar
Cao, Cong, ‘Zhongguancun: China’s Silicon Valley’ (2001) 28(3) China Business Review 38Google Scholar
Chander, Anupam and Le, Uyen P, ‘Data Nationalism’ (2015) 64(3) Emory Law Journal 679Google Scholar
Chang, Chen-Yu and Chen, Shi, ‘Transitional Public–Private Partnership Model in China: Contracting with Little Recourse to Contracts’ (2016) 142(10) Journal of Construction Engineering and Management 7Google Scholar
Chaudhri, Javade, ‘Chinese Industrial Policies: Indigenous Innovation, Intellectual Property Rights, and the Trade Issues of the Next Decade’ (2011) 34(1) Thomas Jefferson Law Review 1Google Scholar
Chen, Jia, ‘China’s Venture Capital Guiding Funds: Policies and Practice’ (2010) 2(3) Journal of Chinese Entrepreneurship 292CrossRefGoogle Scholar
Chen, Tain-Jy and Ying-Hua, Ku, ‘Rent Seeking and Entrepreneurship: Internet Startups in China’ (2016) 36(3) Cato Journal 659Google Scholar
Chen, Yu-Jie, Lin, Ching-Fu and Liu, Han-Wei, ‘“Rule of Trust”: The Power and Perils of China’s Social Credit Megaproject’ (2018) 32(1) Columbia Journal of Asian Law 1Google Scholar
Coe, Neil M et al, ‘“Globalizing” Regional Development: A Global Production Networks Perspective’ (2004) 29(4) Transactions of the Institute of British Geographers 468Google Scholar
Creemers, Rogier, ‘Cyber China: Updating Propaganda, Public Opinion Work and Social Management for the 21st Century’ (2017) 26(103) Journal of Contemporary China 85Google Scholar
Deng, Jinting and Liu, Pinxin, ‘Consultative Authoritarianism: The Drafting of China’s Internet Security Law and E-Commerce Law’ (2018) 26(107) Journal of Contemporary China 1Google Scholar
Evans, Peter, ‘Development as Institutional Change: The Pitfalls of Monocropping and the Potentials of Deliberation’ (2004) 38(4) Studies in Comparative International Development 30Google Scholar
Fagerholm, Fabian et al, ‘Onboarding in Open Source Projects’ (2014) 31(6) IEEE Software 54Google Scholar
Feng, Yang, ‘The Future of China’s Personal Data Protection Law: Challenges and Prospects’ (2019) 27(1) Asia Pacific Law Review 1Google Scholar
Feng, Zhu and Iansiti, Marco, ‘Entry into Platform-Based Markets’ (2012) 33(1) Strategic Management Journal 88Google Scholar
Fishman, William L, ‘Introduction to Transborder Data Flows’ (1980) 16(1) Stanford Journal of International Law 1Google Scholar
Forte, Andrea and Lampe, Cliff, ‘Defining, Understanding, and Supporting Open Collaboration: Lessons from the Literature’ (2013) 57(5) American Behavioral Scientist 535CrossRefGoogle Scholar
Fraser, Erica, ‘Data Localisation and the Balkanisation of the Internet’ (2016) 13(3) SCRIPTed – A Journal of Law, Technology and Society 359Google Scholar
Friedewald, Michael et al, ‘Privacy, Data Protection and Emerging Sciences and Technologies: Towards a Common Framework’ (2010) 23(1) European Journal of Social Science Research 61CrossRefGoogle Scholar
Fung, KC and Aminian, Nathalie, ‘Silicon Valley, France and China: A Comparative Study of Innovation Systems and Policies’ (2017) Journal of Chinese Economic and Foreign Trade Studies 10(3) 194Google Scholar
Ganz, Frieder, Puschmann, Daniel and Barnaghi, Payam, ‘A Practical Evaluation of Information Processing and Abstraction Techniques for the Internet of Things’ (2015) 2(4) IEEE Internet of Things Journal 340Google Scholar
Gao, Zhicun and Tisdell, Clem, ‘China’s Reformed Science and Technology System: An Overview and Assessment’ (2004) 22(3) Prometheus: Critical Studies in Innovation 311Google Scholar
Goldsmith, Jack L, ‘Against Cyberanarchy’ (1998) 65(4) University of Chicago Law Review 1199Google Scholar
Greenleaf, Graham and Livingston, Scott, ‘PRC’s New Data Export Rules: “Adequacy with Chinese Characteristics”?’ (2017) 147 Privacy Laws & Business International Report 9Google Scholar
Hanna, Nagy K and Qiang, Christine Zhen-Wei, ‘China’s Emerging Informatization Strategy’ (2010) 1(2) Journal of the Knowledge Economy 128Google Scholar
Harwit, Eric, ‘The Rise and Influence of Weibo (Microblogs) in China’ (2014) 54(6) Asian Survey 1059CrossRefGoogle Scholar
Hawes, Colin, Lau, Alex K L and Young, Angus, ‘The Chinese “Oppression” Remedy: Creative Interpretations of Company Law by Chinese Courts’ (2015) 63(2) American Journal of Comparative Law 17Google Scholar
Hawkins, Jeff and Ahmad, Subutai, ‘Why Neurons Have Thousands of Synapses: A Theory of Sequence Memory in Neocortex’ (2016) 10 Frontiers in Neural Circuits 1Google Scholar
Heilmann, Sebastian, ‘From Local Experiments to National Policy: The Origins of China’s Distinctive Policy Process’ (2008) 59 China Journal 1CrossRefGoogle Scholar
Hemphill, Thomas A and White, George O III, ‘China’s National Champions: The Evolution of a National Industrial Policy – Or a New Era of Economic Protectionism?’ (2013) 55(2) Thunderbird International Business Review 193Google Scholar
Hill, Jonah Force, ‘A Balkanized Internet? The Uncertain Future of Global Internet Standards?’ (2012) Georgetown Journal of International Affairs 49 <https://www.jstor.org/stable/43134338>>Google Scholar
Hsu, Carolyn, ‘Cadres, Getihu, and Good Businesspeople: Making Sense of Entrepreneurs in Early Post-Socialist China’ (2006) 35(1) Urban Anthropology and Studies of Cultural Systems and World Economic Development 1Google Scholar
Huang, Hui (Robin), Zhang, Wei and Lee, Kelvin Siu Cheung, ‘The (Re)introduction of Dual-Class Share Structures in Hong Kong: A Historical and Comparative Analysis’, Journal of Corporate Law Studies (24 December 2019), <https://ssrn.com/abstract=3245885>>Google Scholar
Hubbert, Jennifer, ‘Better City, Better Life? Urban Modernity at the Shanghai Expo’ (2019) 17(4) Asia-Pacific Journal 1Google Scholar
Hurwitz, Roger, ‘Depleted Trust in the Cyber Commons’ (2012) 6(3) Strategic Studies Quarterly 20Google Scholar
Janssen, Marijn and van den Hoven, Jeroen, ‘Big and Open Linked Data (BOLD) in Government: A Challenge to Transparency and Privacy?’ (2015) 32(4) Government Information Quarterly 363Google Scholar
Johnson, David R and Post, David, ‘Law and Borders: The Rise of Law in Cyberspace’ (1996) 48(5) Stanford Law Review 1367CrossRefGoogle Scholar
Johnson, Kaitlyn, ‘Variable Interest Entities: Alibaba’s Regulatory Work-Around to China’s Foreign Investment Restrictions’ (2015) 12 Loyola University Chicago International Law Review 249Google Scholar
Junio, Timothy J, ‘How Probable Is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate’ (2013) 36(1) Journal of Strategic Studies 125CrossRefGoogle Scholar
Kania, Elsa B, ‘Technological Entanglement? Artificial Intelligence in the US–China Relationship’ (2017) 17(17) China Brief 11 <https://jamestown.org/program/technological-entanglement-artificial-intelligence-u-s-china-relationship>Google Scholar
Kapoor, Rahul and Lee, Joon Mahn, ‘Coordinating and Competing in Ecosystems: How Organizational Forms Shape New Technology Investments’ (2012) 34(3) Strategic Management Journal 274Google Scholar
Karolyi, G Andrew, ‘The Role of American Depositary Receipts in the Development of Emerging Equity Markets’ (2004) 86(3) Review of Economics and Statistics 670Google Scholar
Khan, Lina M, ‘Amazon’s Antitrust Paradox’ (2016) 126(3) Yale Law Journal 710Google Scholar
Komaitis, Konstantinos, ‘The “Wicked Problem” of Data Localisation’ (2017) 2(3) Journal of Cyber Policy 355Google Scholar
Kong, Lingjie, ‘Data Protection and Transborder Data Flow in the European and Global Context’ (2010) 21(2) European Journal of International Law 441Google Scholar
Krizhevsky, Alex, Sutskever, Ilya and Hinton, Geoffrey E, ‘ImageNet Classification with Deep Convolutional Neural Networks’ (2012) 25(2) Advances in Neural Information Processing Systems 1Google Scholar
Kuner, Christopher, ‘Data Nationalism and Its Discontents’ (2015) 64 Emory Law Journal 2089Google Scholar
Landset, Sara et al, ‘A Survey of Open Source Tools for Machine Learning with Big Data in the Hadoop Ecosystem’ (2015) 2(1) Journal of Big Data 1Google Scholar
Lee, Jyh-An and Liu, Ching-Yi, ‘Real-Name Registration Rules and the Fading Digital Anonymity in China’ (2016) 25 Washington International Law Journal 1Google Scholar
Lerner, Josh and Tirole, Jean, ‘The Scope of Open Source Licensing’ (2005) 21(1) Journal of Law, Economics, and Organization 20Google Scholar
Li, Guo, ‘Chinese Style VIEs: Continuing to Sneak under Smog?’ (2014) 47 Cornell International Law Journal 572.Google Scholar
Liao, Debbie and Sohmen, Philip, ‘The Development of Modern Entrepreneurship in China’ (2010) 1 Stanford Journal of East Asian Affairs 27Google Scholar
Lin, Liwen and Milhaupt, Curtis, ‘We Are the (National) Champions’ (2013) 65(4) Stanford Law Review 697Google Scholar
Lin, Yu-Hsin and Mehaffy, Thomas, ‘Open Sesame: The Myth of Alibaba’s Extreme Corporate Governance and Control’ (2016) 10(2) Brooklyn Journal of Corporate, Financial & Commercial Law 437Google Scholar
Lindman, Juho and Nyman, Linus, ‘Code Forking, Governance, and Sustainability in Open Source Software’ (2013) 3(1) Technology Innovation Management Review 7Google Scholar
Lindman, Juho and Nyman, Linus, ‘The Businesses of Open Data and Open Source: Some Key Similarities and Differences’ (2014) 4(1) Technology Innovation Management Review 12CrossRefGoogle Scholar
Lindsay, Jon R, ‘The Impact of China on Cybersecurity’ (2014) 39(3) International Security 7Google Scholar
Liu, Wei et al, ‘The Development Evaluation of Economic Zones in China’ (2018) 15(1) International Journal of Environmental Research and Public Health 1Google Scholar
Livingston, Scott and Greenleaf, Graham, ‘Data Localisation in China and Other APEC Jurisdictions’ (2016) 143 Privacy Laws & Business International Report 22Google Scholar
Mackenzie, Adrian, ‘From API to AI: Platforms and Their Opacities’ (2018) 22(13) Information, Communication & Society 1Google Scholar
Man, Thomas Y, ‘Policy Above Law: VIE and Foreign Investment Regulation in China’ (2015) 3(1) Peking University Transnational Law Review 217Google Scholar
Mishra, Neha, ‘Building Bridges: International Trade Law, Internet Governance, and the Regulation of Data Flows’ (2019) 52 Vanderbilt Journal of Transnational Law 463Google Scholar
Mitchell, Andrew and Mishra, Neha, ‘Data at the Docks: Modernizing International Trade Law for the Digital Economy’ (2018) 20(4) Vanderbilt Journal of Entertainment and Technology Law 1073Google Scholar
Nguyen, Giang, Dlugolinsky, Stefan and Bobák, Martin, ‘Machine Learning and Deep Learning Frameworks and Libraries for Large-Scale Data Mining: A Survey’ (2019) 51(1) Artificial Intelligence Review 77Google Scholar
Nye, Joseph S Jr, ‘Nuclear Lessons for Cyber Security?’ (2011) 5(4) Strategic Studies Quarterly 18Google Scholar
Oreg, Shaul and Nov, Oded, ‘Exploring Motivations for Contributing to Open Source Initiatives: The Roles of Contribution Context and Personal Values’ (2008) 24(5) Computers in Human Behaviour 2055Google Scholar
Parker, Geoffrey, Van Alstyne, Marshall and Jiang, Xiaoyue, ‘Platform Ecosystems: How Developers Invert the Firm’ (2017) 41(1) MIS Quarterly 255Google Scholar
Pelkola, David, ‘A Framework for Managing Privacy-Enhancing Technology’ (2012) 29(3) IEEE Software 45Google Scholar
Perez, Oren, ‘Fuzzy Law: A Theory of Quasi-Legal Systems’ (2015) 28 Canadian Journal of Law and Jurisprudence 343Google Scholar
Peterson, Dale, ‘Offensive Cyber Weapons: Construction, Development, and Employment’ (2013) 36(1) Journal of Strategic Studies 120Google Scholar
Phelps, Edmund S, ‘The Dynamism of Nations: Toward a Theory of Indigenous Innovation’ (2017) (12)1 Capitalism and Society 1Google Scholar
Posner, Eric A and Weyl, E Glen, ‘Property Is Only Another Name for Monopoly’ (2017) 9(1) Journal of Legal Analysis 51Google Scholar
Post, David G, ‘Against “Against Cyberanarchy”’ (2002) 17(4) Berkeley Technology Law Journal 1365Google Scholar
Rubinstein, Ira S, ‘Regulating Privacy by Design’ (2011) 26(3) Berkeley Technology Law Journal 1409Google Scholar
Rubinstein, Ira S and Good, Nathaniel, ‘Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents’ (2013) 28(2) Berkeley Technology Law Journal 1333Google Scholar
Ryan, Patrick S, Sarah, Falvey and Merchant, Ronak, ‘When the Cloud Goes Local: The Global Problem with Data Localization’ (2013) 46(12) Computer 54Google Scholar
Sargsyan, Tatevik, ‘Data Localisation and the Role of Infrastructure for Surveillance, Privacy and Security’ (2016) 10 International Journal of Communication 2221Google Scholar
Selby, John, ‘Data Localization Laws: Trade Barriers or Legitimate Responses to Cybersecurity Risks, or Both?’ (2017) 25(3) International Journal of Law and Information Technology 213Google Scholar
Shi, Serena Y, ‘Dragon’s House of Cards: Perils of Investing in Variable Interest Entities Domiciled in the People’s Republic of China and Listed in the United States’ (2014) 37 Fordham International Law Journal 1278Google Scholar
Song, Peijian et al, ‘The Ecosystem of Software Platform: A Study of Asymmetric Cross-Side Network Effects and Platform Governance’ (2018) 42(1) MIS Quarterly 121Google Scholar
Sum, Ngai-Ling, ‘The Intertwined Geopolitics and Geoeconomics of Hopes/Fears: China’s Triple Economic Bubbles and the “One Belt One Road” Imaginary’ (2018) Territory, Politics, Governance <https://doi.org/10.1080/21622671.2018.1523746>>Google Scholar
Tikkinen-Piri, Christina, Rohunen, Anna and Markkula, Jouni, ‘EU General Data Protection Regulation: Changes and Implications for Personal Data Collecting Companies’ (2018) 34(1) Computer Law & Security Review 134Google Scholar
Von Krogh, Georg and von Hippel, Eric, ‘Editorial: Special Issue on Open Source Software Development’ (2003) 32(7) Research Policy 1149Google Scholar
Von Krogh, Georg, Haefliger, Stefan and Spaeth, Sebastian, ‘Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development’ (2012) 36(2) MIS Quarterly 649Google Scholar
Wang, Cassandra C, Lin, George C S and Li, Guicai, ‘Industrial Clustering and Technological Innovation in China: New Evidence from the ICT Industry in Shenzhen’ (2010) 42(8) Environment and Planning 1987Google Scholar
Wu, Guohua et al, ‘The Return of VIE-Structured Enterprise to China’s Domestic Capital Market: A Brief Legal Analysis and Other Factors to Be Considered’ (2015) 3(1) Peking University Transnational Law Review 211Google Scholar
Xing, Yijun, Liu, Yipeng and Sir Cooper, Cary L, ‘Local Government as Institutional Entrepreneur: Public–Private Collaborative Partnerships in Fostering Regional Entrepreneurship’ (2008) 29(4) British Journal of Management 670 <https://doi.org/10.1111/1467-8551.12282>CrossRefGoogle Scholar
Yoo, Youngjin, Henfridsson, Ola and Lyytinen, Kalle, ‘Research Commentary: The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research’ (2010) 21(4) Information Systems Research 724Google Scholar
Yoo, Youngjin et al, ‘Organizing for Innovation in the Digitized World23(5) (2012) Organization Science 1398Google Scholar
Zadeh, Lotfi A, Outline of a New Approach to the Analysis of Complex Systems and Decision Processes (1973) 3(1) IEEE Transactions on Systems, Man and Cybernetics 28Google Scholar
Zdziarski, Jonathan, ‘Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices’ (2014) 11(1) Digital Investigation 3CrossRefGoogle Scholar
Zeng, Jinghan, Stevens, Tim and Chen, Yaru, ‘China’s Solution to Global Cyber Governance: Unpacking the Domestic Discourse of “Internet Sovereignty”’ (2017) 45(3) Politics & Policy 432Google Scholar
Zhao, Hui and Dong, Haoxin, ‘Research on Personal Privacy Protection of China in the Era of Big Data’ (2017) 5 Open Journal of Social Sciences 139Google Scholar
Zhou, Minghui and Mockus, Audris, ‘Who Will Stay in the FLOSS Community? Modelling Participant’s Initial Behaviour’ (2015) 41(1) IEEE Transactions on Software Engineering 82Google Scholar
Zhou, Tianshu and Siems, Mathias, ‘Contentious Modes of Understanding Chinese Commercial Law’ (2015) 6 George Mason Journal of International Commercial Law 177Google Scholar
Zhu, Sheng and Shi, Yongjiang, ‘Shanzhai Manufacturing – An Alternative Innovation Phenomenon in China’ (2010) 1(1) Journal of Science and Technology Policy in China 29Google Scholar
Ziegler, Samuel Farrell, ‘China’s Variable Interest Entity Problem: How Americans Have Illegally Invested Billions in China and How to Fix It’ (2016) 84(2) George Washington Law Review 539Google Scholar
陈禹 [Yu, Chen] «小岗村 ‘生死契约’ 幕后» [The Story Behind the ‘Life and Death Contract’ in Xiaogang Village] 档案春秋 (2018) 1 Memories and Archives 10Google Scholar
何根源 [Genyuan, He] and 刘昱影 [Yuying, Liu], «微创新与突破性创新分类梳理» [Micro-Innovation and Breakthrough Innovation Classifications] 合作经济与科技 (2018) 12 Cooperative Economy and Technology 57Google Scholar
周汉华 [Hanhua, Zhou], «探索激励相容的个人数据治理之道: 中国个人信息保护法的立法方向» [Exploring Incentive-Compatible Personal Data Governance: The Legislative Direction of China’s Personal Information Protection Law] (2018) 2 Law Research 3Google Scholar
王冲鶄 [Chongyan, Wang] and 陈丝 [Si, Chen] «人工智能开源平台发展态势研究» [Researching the Development of AI Open Source Platforms] (2018) 8 ICT and Policy 56Google Scholar
谢 耘 [Wei, Xie], «中国企业技术产品创新中的 几个问题分析» [Analysis of Several Problems in the Innovation of Chinese Enterprise Technology Products] 中国计算机学会通讯 (2009) 5(4) China Computer Society Newsletter 60Google Scholar

Secondary Sources

Agrawal, Ajay, Joshua Gans and Avi Goldfarb, Prediction Machines: The Simple Economics of Artificial Intelligence (Harvard Business Review Press, 2018)Google Scholar
Armstrong-Taylor, Paul, Debt and Distortion: Risks and Reforms in the Chinese Financial System (Palgrave Macmillan, 2016)Google Scholar
Austin, Greg, Cyber Policy in China (Polity Press, 2014)Google Scholar
Bellman, Richard, An Introduction to Artificial Intelligence: Can Computers Think? (Boyd & Fraser, 1978)Google Scholar
Belohlavek, Radim, Kruse, Rudolf and Moewes, Christain, ‘Fuzzy Logic in Computer Science’ in Blum, Edward K and Aho, Alfred V (eds), Computer Science (Springer, 2011) 385Google Scholar
Brandt, Loren and Rawski, Thomas G, ‘China’s Great Economic Transformation’ in Brandt, Loren and Rawski, Thomas G (eds), China’s Great Economic Transformation (Cambridge University Press, 2008) 1Google Scholar
Brynjolfsson, Erik and McAfee, Andrew, The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies (WW Norton, 2014)Google Scholar
Bygrave, Lee A, Data Privacy Law: An International Perspective (Oxford University Press, 2014)Google Scholar
Chesbrough, Henry, Vanhaverbeke, Wim and West, Joel (eds), Open Innovation: Researching a New Paradigm (Oxford University Press, 2006)Google Scholar
Clark, Duncan, Alibaba: The House That Jack Built (HarperCollins, 2016)Google Scholar
Clarke, Donald, Murrell, Peter and Whiting, Susan, ‘The Role of Law in China’s Economic Development’ in Rawski, Thomas and Brandt, Loren (eds), China’s Great Economic Transformation (Cambridge University Press, 2008) 375Google Scholar
Clarke, Richard A and Knake, Robert K, Cyber War: The Next Threat to National Security and What to Do about It (Ecco, 2010)Google Scholar
DeNardis, Laura, Protocol Politics: The Globalisation of Internet Governance (MIT Press, 2009)Google Scholar
Dickson, Bruce J, Wealth into Power: The Communist Party’s Embrace of China’s Private Sector (Cambridge University Press, 2008)Google Scholar
Dunne, Michael, ‘The Dark Horse: Will China Win the Electric, Automated, Shared Mobility Race?’ in Sperling, Daniel (ed), Three Revolutions: Automated, Shared and Electric Vehicles, Steering Automated, Shared, and Electric Vehicles to a Better Future (Island Press, 2018) 176Google Scholar
Evans, Peter B, Embedded Autonomy: States and Industrial Transformation (Princeton University Press, 1995)Google Scholar
Fairbairn, John and Hall, T Mark, The Go Companion: Go in History and Culture Intelligence (Slate & Shell, 2009)Google Scholar
Freeman, Chris and Soete, Luc, The Economics of Industrial Innovation (MIT Press, 3rd ed, 1997)Google Scholar
Freeman, Christopher, Technology Policy and Economic Performance (Pinter, 1987)Google Scholar
Ge, Jiangqiu, A Comparative Analysis of Policing Consumer Contracts in China and the EU (Springer, 2019)Google Scholar
Gilpin, Robert, Global Political Economy (Princeton University Press, 2001)Google Scholar
Goertzel, Ben and Pennachin, Casio (eds), Artificial General Intelligence (Springer, 2007)Google Scholar
Goodfellow, Ian, Bengio, Yoshua and Courville, Aaron, Deep Learning (MIT Press, 2016)Google Scholar
Greenwald, Glenn, No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State (Metropolitan Books, 2014)Google Scholar
Gu, Xin, ‘The Paradox of Maker Movement in China’ in Hunsinger, Jeremy and Schrock, Andrew (eds), Making Our World: The Hacker and Maker Movements in Context (Peter Lang, 2019) 271Google Scholar
Hastie, Trevor, Tibshirani, Robert and Friedman, Jerome, The Elements of Statistical Learning (Springer Science & Business Media, 2013)Google Scholar
Hobsbawm, Eric J, Industry and Empire from 1750 to the Present Day (Penguin, 1969)Google Scholar
Hong, Yu, Networking China: The Digital Transformation of the Chinese Economy (University of Illinois Press, 2017)Google Scholar
Hsu, Stephen C, Understanding China’s Legal System (New York University Press, 2003)Google Scholar
Inkster, Nigel, China’s Cyber Power (Routledge, 2016)Google Scholar
Jovanovic, Boyan and Rousseau, Peter, ‘General Purpose Technologies’ in Aghion, Philippe and Durlauf, Steven N (eds), Handbook of Economic Growth (North-Holland, 2005) vol 1B, 1181Google Scholar
Kelly, Kevin, The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future (Penguin Books, 2017)Google Scholar
Lakhani, Karim R and Wolf, Robert G, ‘Perspectives on Free and Open Source Software’ in Feller, Joseph et al (eds), Perspectives on Free and Open Source Software (MIT Press, 2005) 1Google Scholar
Lee, Kai-Fu, AI Superpowers: China, Silicon Valley, and the New World Order (Houghton Mifflin Harcourt, 2018)Google Scholar
Lefebvre, Carol, Manheimer, Eric and Glanville, Julie, ‘Searching for Studies’ in Higgins, Julian and Green, Sally (eds), Cochrane Handbook for Systematic Reviews of Interventions (Wiley‐Blackwell, 2008) 106Google Scholar
Liebman, Benjamin and Milhaupt, Curtis (eds), Regulating the Visible Hand? The Institutional Implications of Chinese State Capitalism (Oxford University Press, 2015)Google Scholar
Liebman, Benjamin L, ‘China’s Law and Stability Paradox’ in DeLisle, Jacques and Goldstein, Avery (eds), China’s Challenges (University of Pennsylvania Press, 2015) 157Google Scholar
Lubman, Stanley (ed), China’s Legal Reforms (Oxford University Press, 1996)Google Scholar
Lubman, Stanley (ed), The Evolution of Chinese Law Reform: An Uncertain Path (Edward Elgar, 2012)Google Scholar
MacKinnon, Rebecca, Consent of the Networked: The Worldwide Struggle for Internet Freedom (Basic Books, 2013)Google Scholar
Mahony, Tarrant, Foreign Investment Law in China: Regulation, Practice and Context (Tsinghua University Press, 2015)Google Scholar
Mayer-Schönberger, Viktor and Cukier, Kenneth, Big Data: A Revolution That Will Transform How We Live, Work, and Think (John Murray, 2013)Google Scholar
McMahon, Dinny, China’s Great Wall of Debt: Shadow Banks, Ghost Cities, Massive Loans, and the End of the Chinese Miracle (Houghton Mifflin Harcourt, 2018)Google Scholar
Minzner, Carl, End of an Era: How China’s Authoritarian Revival Is Undermining Its Rise (Oxford University Press, 2018)Google Scholar
Naughton, Barry, Growing Out of the Plan: Chinese Economic Reform, 1978–1993 (Cambridge University Press, 1996)Google Scholar
Naughton, Barry, The Chinese Economy: Transitions and Growth (MIT Press, 2007)Google Scholar
Needham, Joseph (ed), Science and Civilisation in China (Cambridge University Press, 1954–2016) vols 1–7Google Scholar
North, Douglass C, Institutions, Institutional Change and Economic Performance (Cambridge University Press, 1990)Google Scholar
Peerenboom, Randall, China Modernizes (Oxford University Press, 2007)Google Scholar
Peerenboom, Randall, China’s Long March Toward Rule of Law (Cambridge University Press, 2002)Google Scholar
Perez, Oren, ‘Law in the Air: A Prologue to the World of Legal Paradoxes’ in Perez, Oren and Teubner, Gunther (eds), Paradoxes and Inconsistencies in the Law (Hart Publishing, 2005)Google Scholar
Phelps, Edmund S, Mass Flourishing: How Grassroots Innovation Created Jobs, Challenge, and Change (Princeton University Press, 2013)Google Scholar
Potter, Pitman B, The Chinese Legal System: Globalization and Local Legal Culture (Routledge, 2001)Google Scholar
Rattray, Gregory J, Strategic Warfare in Cyberspace (MIT Press, 2001)Google Scholar
Reinert, Eric, How Rich Countries Got Rich and Why Poor Countries Stay Poor (Constable & Robinson, 2007)Google Scholar
Russell, Stuart J and Norvig, Peter, Artificial Intelligence: A Modern Approach (Pearson, 2016)Google Scholar
Schumpeter, Joseph A, The Theory of Economic Development: An Inquiry into Profits, Capital, Credit, Interest, and the Business Cycle, trans Redvers Opie (Transaction Books, 1983) [trans of Theorie der wirtschaftlichen Entwicklung (1911)]Google Scholar
Seppänen, Samuli, Ideological Conflict and the Rule of Law in Contemporary China (Cambridge University Press, 2016)Google Scholar
Shalev-Shwartz, Shai and Ben-David, Shai, Understanding Machine Learning: From Theory to Algorithms (Cambridge University Press, 2014)Google Scholar
Shao, Guosong, Internet Law in China (Elsevier, 2012)Google Scholar
Sheng, Jin, China’s Listed Companies: Conflicts, Governance and Regulation (Kluwer Law International, 2015)Google Scholar
Simon, Denis F and Cao, Cong, China’s Emerging Technological Edge (Cambridge University Press, 2009)Google Scholar
Sperling, Daniel (ed), Three Revolutions: Automated, Shared and Electric Vehicles, Steering Automated, Shared, and Electric Vehicles to a Better Future (Island Press, 2018)Google Scholar
Spinello, Richard A, ‘Google in China: Corporate Responsibility on a Censored Internet’ in Dudley, Alfreda, Braman, James and Vincenti, Giovanni (eds), Investigating Cyber Law and Cyber Ethics Issues, Impacts and Practices (IGI Global 2011) 244Google Scholar
Townsend, Anthony M, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia (WW Norton, 2013)Google Scholar
Tse, Edward, China’s Disruptors: How Alibaba, Xiaomi, Tencent, and Other Companies Are Changing the Rules of Business (Penguin, 2015)Google Scholar
Ursic, Helena et al, ‘Data Localisation Measures and Their Impacts on Data Science’ in Mak, Vanessa, Tai, Eric Tjong Tjin and Berlee, Anna (eds), Research Handbook in Data Science and Law (Elgar, 2018) 322Google Scholar
Walcott, Susan M, Chinese Science and Technology Industrial Parks (Ashgate, 2003)Google Scholar
Walton, Douglas, Reed, Chris and Macagno, Fabrizio, Argumentation Schemes (Cambridge University Press, 2008)Google Scholar
Xiaobo, Wu, The Story of Tencent: Evolution of Chinese Internet Companies from 1998 to 2016 (Zhejiang University Press and China CITIC Press, 2017)Google Scholar
Yang, Guobin, The Power of the Internet in China: Citizen Activism Online (Columbia University Press, 2011)Google Scholar
Yang, Guobin, ‘Social Dynamics in the Evolution of China’s Internet Content Control Regime’ in Price, Monroe E, Verhulst, Stefaan and Morgan, Libby (eds), Handbook of Media Law (Routledge, 2012) 293Google Scholar
Yau, Nathan, ‘Seeing Life in Your Data’ in Segaran, Toby and Hammerbacher, Jeff (eds), Beautiful Data: The Stories behind Elegant Data Solutions (O’Reilly, 2009) 3Google Scholar
Yip, GS and McKern, B, China’s Next Strategic Advantage: From Imitation to Innovation (MIT Press, 2016)Google Scholar
Zhang, Lin, China’s Venture Capital Market: Current Legal Problems and Prospective Reforms (Elsevier, 2015)Google Scholar
Zhou, Yu, The Inside Story of China’s High-Tech Industry: Making ‘Silicon Valley’ in Beijing (Rowman & Littlefield, 2008)Google Scholar
Zhou, Yu, Lazonick, William and Sun, Yifei (eds), China as an Innovation Nation (Oxford University Press, 2016)Google Scholar
«App 个人信息泄露情况调查报告» [App Personal Information Disclosure Report] (Chinese Consumer’s Association, 29 August 2018) <http://www.cca.org.cn/jmxf/detail/28180.html>>Google Scholar
«报告 2017 凯度中国社交媒体影响报告» [2017 Kantar China Social Media Impact Report] (Kantar Research, 6 June 2017) <https://cn.kantar.com/媒体动态/社交/2017/2017 凯度中国社交媒体影响报告>>Google Scholar
Atha, Katherine et al, China’s Smart Cities Development (US–China Economic and Security Review Commission, 20 January 2020) <https://www.uscc.gov/sites/default/files/2020-04/China_Smart_Cities_Development.pdf>Google Scholar
Bauer, Matthias et al, Data Localization in Russia: A Self-Imposed Sanction (ECIPE Policy Brief No 6/2015) <http://www.ecipe.org/app/uploads/2015/06/Policy-Brief-062015_Fixed.pdf>>Google Scholar
Bauer, Matthias et al, The Costs of Data Localization: Friendly Fire on Economic Recovery (ECIPE Occasional Paper No 3/2014) <http://www.ecipe.org/app/uploads/2014/12/OCC32014__1.pdf>>Google Scholar
Bauer, Matthias, Unleashing Internal Data Flows in the EU: An Economic Assessment of Data Localisation Measures in the EU Member States (ECIPE Policy Brief No 3/2016)Google Scholar
Beraja, Martin, Yang, David Y and Yuchtman, Noam, ‘Data-Intensive Innovation and the State: Evidence from AI Firms in China’ (NBER Working Paper No. w27723, 21 January 2021), <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3679716>>Google Scholar
Blackman, Colin and Forge, Simon, Data Flows – Future Scenarios: In-Depth Analysis for the ITRE Committee (European Parliament, November 2017) <http://www.europarl.europa.eu/RegData/etudes/IDAN/2017/607362/IPOL_IDA%282017%29607362_EN.pdf>>Google Scholar
Castro, Daniel, The False Promise of Data Nationalism (ITIF, 1 December 2013) <http://www2.itif.org/2013-false-promise-data-nationalism.pdf>Google Scholar
Cory, Nigel, Cross-Border Data Flows: Where Are the Barriers, and What Do They Cost? (Information Technology and Innovation Foundation, May 2017) <http://www2.itif.org/2017-cross-border-data-flows.pdf>Google Scholar
Du, Shanshan, China Integrated Circuit Ecosystem Report (SEMI Industry Research and Statistics, October 2018) <http://www1.semi.org/en/china-ic-ecosystem-report>Google Scholar
European Chamber of Commerce in China, China Manufacturing 2025: Putting Industrial Policy Ahead of Market Forces (March 2017)Google Scholar
Ezell, Stephen and Atkinson, Robert, The Good, the Bad, the Ugly, and the Self-Destructive of Innovation Policy (ITIF, October 2010) <http://www.itif.org/files/2010-good-bad-ugly.pdf>Google Scholar
Ezell, Stephen et al, Localization Barriers to Global Trade: Threat to the Global Economy (ITIF, 2013) <http://www.itif.org/publications/localization-barriers-trade-threat-global-innovation-economy>Google Scholar
Future of Humanity Institute et al, The Malicious Use of Artificial Intelligence Forecasting, Prevention, and Mitigation (Research Report, February 2018) <https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf>>Google Scholar
Global Artificial Intelligence Software Market Research Report 2017, IT Intelligence MarketsGoogle Scholar
Hannebauer, Cristoph and Gruhn, Volker, ‘Motivation of Newcomers to FLOSS Projects’ (12th International Symposium on Open Collaboration, 2016)Google Scholar
IETF, ‘A Survey of Worldwide Censorship Techniques’ (IETF, 22 October 2018) <https://tools.ietf.org/id/draft-hall-censorship-tech-06.html>>Google Scholar
Lee, John, The Connection of Everything: China and the Internet of Things (Report, China Monitor, 24 June 2021) <https://merics.org/en/report/connection-everything-china-and-internet-things>>Google Scholar
Maisog, Manuel E, Making the Case against Data Localization in China (IAPP, 20 April 2015)Google Scholar
McKinsey Global Institute, Global Flows in a Digital Age (April 2014) <http://www.mckinsey.com/insights/globalization/global_flows_in_a_digital_age>>Google Scholar
National Science and Technology Council, Networking and Information Technology Research and Development Subcommittee, The National Artificial Intelligence Research and Development Strategic Plan (Report, October 2016) <https://www.nitrd.gov/PUBS/national_ai_rd_strategic_plan.pdf>>Google Scholar
Navigant, Navigant Research Leaderboard: Automated Driving Vehicles (Report, January 2018) <https://www.navigantresearch.com/reports/navigant-research-leaderboard-automated-driving-vehicles>>Google Scholar
Sacks, Samm, China’s Emerging Data Privacy System and GDPR (CSIS, 9 March 2018) <https://www.csis.org/analysis/chinas-emerging-data-privacy-system-and-gdpr>Google Scholar
Sacks, Samm and Li, Manyi Kathy, How Chinese Cybersecurity Standards Impact Doing Business in China (Report, CSIS Briefs, 2 August 2018) <https://www.csis.org/analysis/how-chinese-cybersecurity-standards-impact-doing-business-china>>Google Scholar
Sacks, Samm and O’Brien, Robert, What to Make of the Newly Established CyberSecurity Association of China (CSIS, 25 May 2016) <https://www.csis.org/analysis/what-make-newly-established-cybersecurity-association-china>Google Scholar
UNCTAD, Information Economy Report 2013: The Cloud Economy and Developing Countries (3 December 2013) <http://unctad.org/en/PublicationsLibrary/ier2013_en.pdf>>Google Scholar
UNCTAD, World Investment Report 2013: Global Value Chains: Investment and Trade for Development (2013) <https://unctad.org/en/PublicationsLibrary/wir2013_en.pdf>>Google Scholar
US Congressional Committee, Encryption Working Group Year-End Report (20 December 2016) <https://judiciary.house.gov/wp-content/uploads/2016/12/20161220EWGFINALReport.pdf> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
Wu, Tim, The Curse of Bigness: Antitrust in the New Gilded Age (Columbia Global Reports, 2018)Google Scholar
Xiaomeng, Lu, Manyi, Li and Sacks, Samm, What the Facebook Scandal Means in a Land without Facebook: A Look at China’s Burgeoning Data Protection Regime (CSIS, 25 April 2018) <https://www.csis.org/analysis/what-facebook-scandal-means-land-without-facebook-look-chinas-burgeoning-data-protection>Google Scholar
Yang, Kelly, Clery, Aideen and Di Liello, Domenico, Sector Report: Smart Cities in China (EU SME Centre and China–British Business Council, 2016) <http://ccilc.pt/wp-content/uploads/2017/07/eu_sme_centre_report_-_smart_cities_in_china_i_edit_-_jan_2016_1_1.pdf>Google Scholar
王刚 [Gang, Wang], «BAT, 科大讯飞, 商汤等 5 大 AI 国家队的一次 ‘集体工作汇报» [A ‘Collective Work Report’ of the Five Major ‘National Team’ Members – BAT, iFlytek, and Sensetime] (Leiphone, 11 May 2019) <https://mp.weixin.qq.com/s/ksJm980HsmfUEhI5U6UQlg?fbclid=IwAR3BGbjFtiz1UFtMRWvYPjkfWDfGf3KgsIWJtVKn_UwXjAdGyC3wE_cnZ-I>>Google Scholar
‘The 2020 State of Octoverse’ (GitHub Octoverse, 2021) <https://octoverse.github.com/>>Google Scholar
‘26 Organizations Join the Linux Foundation to Support Open Source Communities with Infrastructure and Resources’ (Linux Foundation, 23 May 2018) <https://www.prnewswire.com/news-releases/26-organizations-join-the-linux-foundation-to-support-open-source-communities-with-infrastructure-and-resources-300653177.htmlGoogle Scholar
‘4Paradigm (第四范式) national team’ (Tech in Asia website) <https://www.techinasia.com/companies/4paradigm>>Google Scholar
‘Accenture Forms Strategic Alliance, Invests in Chinese AI Start-up Malong Technologies’ (Businesswire, 13 August 2018) <https://www.businesswire.com/news/home/20180812005014/en/Accenture-Forms-Strategic-Alliance-Invests-Chinese-AI>>Google Scholar
‘Airbnb Tells China Users’ Personal Data to Be Stored Locally’ (Reuters, 1 November 2016) <http://www.reuters.com/article/us-airbnb-china/airbnb-tells-china-users-personal-data-to-be-stored-locally-idUSKBN12W3V6>>Google Scholar
‘Alibaba’s September Cloud Computing Conference’ (Alibaba website, September 2018) <https://www.alibabacloud.com/the-computing-conference-2018>>Google Scholar
‘Amazon Launches Another Innovation Center in China’ (Xinhua, 24 May 2018) <http://www.xinhuanet.com/english/2018-05/24/c_137203869.htm>>Google Scholar
‘Another Chinese City Admits Releasing “Fake” Economic Data’ (South China Morning Post, 17 January 2018) <https://www.scmp.com/news/china/economy/article/2128629/another-chinese-city-admits-releasing-fake-economic-data>>Google Scholar
‘Application Proof of Ant Group Co, LTD Technology Limited’ «螞蟻科技集團股份有限公司» (Stock Exchange of Hong Kong Limited, 27 October 2020)<https://www1.hkexnews.hk/listedco/listconews/sehk/2020/1026/2020102600165.pdf>>Google Scholar
‘Apollo Data Sharing’ (Apollo website) <http://apollo.auto/docs/promise.html>>Google Scholar
‘Apollo Governance’ (Apollo website) <http://apollo.auto/docs/manifesto.html>>Google Scholar
‘Bytedance Partners with Berkeley Artificial Intelligence Research Lab to Foster Future AI Innovators and Entrepreneurs’ (PR Newswire, 3 April 2018) <https://www.prnewswire.com/news-releases/bytedance-partners-with-berkeley-artificial-intelligence-research-lab-to-foster-future-ai-innovators-and-entrepreneurs-300623346.html>>Google Scholar
‘Can China Innovate? McKinsey on China (Podcast, McKinsey & Co, 28 November 2011) <https://podcasts.apple.com/us/podcast/can-china-innovate/id409735817?i=1000226536419>>Google Scholar
‘CBS News Poll: Americans Split on Unlocking San Bernardino Shooter’s iPhone’ (CBS News, 18 March 2016) <http://www.cbsnews.com/news/cbs-news-poll-americans-split-on-unlocking-san-bernardino-shooters-iphone>>Google Scholar
‘China Delays Data-Onshoring Rules until after US Trade Talks (Regulation Asia, 23 April 2019) <https://www.regulationasia.com/china-delays-data-onshoring-rules-until-after-us-trade-talks>>Google Scholar
‘China Headlines: China Unveils “Internet Plus” Action Plan to Fuel Growth’ (State Council of the People’s Republic of China, 4 July 2015) <http://english.gov.cn/policies/latest_releases/2015/07/04/content_281475140165588.htm>>Google Scholar
‘China Money Network’s China Unicorn Ranking’ (China Money Network, July 2018) <https://www.chinamoneynetwork.com/china-unicorn-ranking>>Google Scholar
‘China Outnumbers Other Countries in Smart City Pilots’ (Xinhua, 16 September 2018) <http://www.xinhuanet.com/english/2018-02/20/c_136987058.htm>>Google Scholar
‘China Releases First Strategy on Cyberspace Cooperation’ (Xinhua, 1 March 2017) <http://news.xinhuanet.com/english/2017-03/01/c_136094734.htm>>Google Scholar
‘China’s AI Business Ready to Lead the World’ (China Daily, 1 June 2017) <http://www.chinadaily.com.cn/business/tech/2017-06/01/content_29576692.htm>>Google Scholar
‘China’s Biggest User Data Theft Exposes 3 Billion Traces of Online Data into the Wrong Hands’ (Yicai Global, 21 August 2018) <https://www.yicaiglobal.com/news/china-biggest-user-data-theft-case-exposes-3-billion-traces-of-online-life-in-wrong-hands>>Google Scholar
‘China’s Cybersecurity Law Enacted’ (ChinaTechNews, 7 November 2016) <https://www.chinatechnews.com/2016/11/07/24439-chinas-cybersecurity-law-enacted>>Google Scholar
‘China’s Social Media App WeChat Demands More Info from Users’ (Radio Free Asia, 14 June 2018) <https://www.rfa.org/english/news/demands-06142018124702.html>>Google Scholar
‘Chinese Company Apologizes over Flight Passenger Data Leaks’ (Ecns.cn, 13 June 2018) <http://www.ecns.cn/news/society/2018-06-13/detail-ifyvfaqz8675561.shtml>>Google Scholar
‘CNNIC Hosts “Promote Internet Development through Technology and Standards” Session of WIC Wuzhen Summit’ China Internet Network Information Center, 2 February 2016 <https://cnnic.com.cn/IC/Events/201602/t20160204_53402.htm> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
‘Crunchbase: “Megvii” (Crunchbase)’ <https://www.crunchbase.com/organization/megvii-technology/company_financials/>>Google Scholar
‘Declassified: Apartheid Profits – China’s Support for Apartheid Revealed’ (News24, 31 October 2017) <https://www.dailymaverick.co.za/article/2017-10-31-declassified-apartheid-profits-chinas-support-for-apartheid-revealed>>Google Scholar
‘DEF CON China 2.0 Is Cancelled’ (DEF CON Organisation) <https://www.defcon.org/html/defcon-china-2/dc-cn-2-index.html>>Google Scholar
‘Draft Law Strengthens China’s Cyber Security Legislature’ (Tech 2, 27 June 2016) <http://tech.firstpost.com/news-analysis/draft-law-strengthens-chinas-cyber-security-legislature-322671.html>>Google Scholar
‘Driverless Street Sweepers Employed for Trial Run in Shanghai’ (Xinhua, 13 June 2019) <http://www.xinhuanet.com/english/2018-04/18/c_137120453.htm>>Google Scholar
Editorial, ‘Delay to Ant IPO Shows Beijing’s Desire to Get the Rules Right’ (South China Morning Post, 10 November 2020) <https://www.scmp.com/comment/opinion/article/3109261/delay-ant-ipo-small-price-pay-getting-new-rules-right>>Google Scholar
‘Evernote Will Set Up a Data Centre in China’ (BBC, 7 May 2012) <http://www.bbc.com/news/technology-17981737>>Google Scholar
‘EZDL Custom Sound Recognition’ (Baidu AI website) <http://ai.baidu.com/ezdl/sound>>Google Scholar
‘Facebook Sets Up Subsidiary in China According to Filing’ (CNBC, 25 July 2018) <https://www.cnbc.com/2018/07/24/facebook-sets-up-subsidiary-in-china-according-to-filing.html> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
‘Full Text: Special Address by Chinese President Xi Jinping at the World Economic Forum Virtual Event of the Davos Agenda’ (Xinhua, 25 January 2021) <http://www.xinhuanet.com/english/2021-01/25/c_139696610.htm>>Google Scholar
‘GitHub and Export Controls’ (GitHub Help, May 2019) <https://help.github.com/en/articles/github-and-export-controls>>Google Scholar
‘Hikvision Launches Source Code Transparency Center’ (Ciston PR Newswire, 8 March 2018) <https://www.prnewswire.com/news-releases/hikvision-launches-source-code-transparency-center-300610397.html>>Google Scholar
‘Home’ (NDRC website) <http://en.ndrc.gov.cn>>Google Scholar
‘Huawei Enterprise – Big Data’ (Huawei website) <https://e.huawei.com/au/solutions/cloud-computing/big-data>>Google Scholar
‘iFLYOS Open Source’ (GitHub) <https://github.com/iFLYOS-OPEN>>Google Scholar
‘ISC 360’ (ISC website) <http://isc.360.cn/2018/en/index.html> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
‘Israeli Firm “Helped FBI Crack San Bernardino Gunman’s Cell Phone without Apple’s Help”’ (Daily Mail, 30 March 2016) <http://www.dailymail.co.uk/news/article-3514875/Israeli-firm-helped-FBI-crack-San-Bernardino-gunman-s-cellphone-without-Apple-s-help.html>>Google Scholar
‘Japan, US and Europe Push Back on China’s Data Controls’ (Nikkei Asian Review, 13 December 2017) <https://asia.nikkei.com/Politics-Economy/International-Relations/Japan-US-and-Europe-push-back-on-China-s-data-controls>>Google Scholar
‘The Keys to Data Protection’ (Privacy International, August 2018) <https://privacyinternational.org/sites/default/files/2018-09/Data%20Protection%20COMPLETE.pdf> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
‘Lawmakers Weigh China’s Draft Anti-Terrorism Law’ (China Daily, 25 February 2015) <http://www.chinadaily.com.cn/china/2015-02/25/content_19653472.htm>>Google Scholar
‘Lincoln MKZ Platform’ (AutonomouStuff website) <https://autonomoustuff.com/>>Google Scholar
‘Linux Foundation Members’ (Linux Foundation) <https://www.linuxfoundation.org/join/members/>>Google Scholar
‘A Look Back at KubeCon + CloudNativeCon Shanghai 2018’ (Cloud Native Computing Foundation, 5 December 2018) <https://www.cncf.io/blog/2018/12/05/a-look-back-at-kubecon-cloudnativecon-shanghai-2018>>Google Scholar
‘The March toward Data Localization’ (Endgame, 10 January 2018) <https://www.endgame.com/blog/technical-blog/march-toward-data-localization>>Google Scholar
‘MIT and SenseTime Announce Effort to Advance Artificial Intelligence Research’ (MIT News, 28 February 2018) <http://news.mit.edu/2018/mit-sensetime-announce-effort-advance-artificial-intelligence-research-0228>>Google Scholar
‘More High-Tech Zones in China’ (Xinhua, 27 March 2017) <http://www.chinadaily.com.cn/china/2017-03/27/content_28692439.htm>>Google Scholar
‘The New War over Open Source Licensing’ (Angel List, 21 February 2019) <https://angel.co/newsletters/the-new-war-over-open-source-licensing-131>>Google Scholar
‘North Korean Hackers behind Global Cyberattack?’ (CBS News, 16 May 2017) <http://www.cbsnews.com/news/cyberattack-wannacry-ransomware-north-korea-hackers-lazarus-group>>Google Scholar
‘OpenAtom Project List’ (OpenAtom Foundation)<https://www.openatom.org/#/projectList>>Google Scholar
‘RISC-V Foundation’ (RISC-V website) <https://riscv.org/risc-v-foundation>>Google Scholar
‘Renault–Nissan–Mitsubishi and WeRide.ai to Increase Presence in Chinese Autonomous Vehicle Services’ (PR Newswire, 19 October 2018) <https://www.prnewswire.com/news-releases/alliance-ventures-leads-strategic-investment-in-weride-ai-864897996.html>>Google Scholar
‘Robert Bosch Venture Capital Backs the Evolution of Automated Driving with Investment in UISEE’ (Bosch Media Services Press Release, 26 February 2020) <https://www.bosch-presse.de/pressportal/de/en/robert-bosch-venture-capital-backs-the-evolution-of-automated-driving-with-investment-in-uisee-208768.html>>Google Scholar
‘Seizing Opportunity through License Compliance’, BSA Global Software Survey, May 2016 <http://www.bsa.org/~/media/Files/StudiesDownload/BSA_GSS_US.pdf> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
‘Siemens Inks Deal with Alibaba to Launch Digital Products in China’ (Reuters, 9 July 2018) <https://www.reuters.com/article/us-siemens-alibaba/siemens-inks-deal-with-alibaba-to-launch-digital-products-in-china-idUSKBN1JZ22U>>Google Scholar
‘Sinovation Ventures’ (Sinovation website) <https://www.sinovationventures.com/>>Google Scholar
‘Sizing the Prize: What’s the Real Value of AI for Your Business and How Can You Capitalise?’ (PWC, June 2017) <http://www.pwc.com/gx/en/issues/analytics/assets/pwc-ai-analysis-sizing-the-prize-report.pdf>>Google Scholar
‘Strategic Emerging Industries Likely to Contribute 8% of GDP by 2015’ (People’s Daily, 19 October 2010) <http://en.people.cn/90001/90778/90862/7170816.html>>Google Scholar
‘Strengthening AI R&D among China’s 2018 Innovation Goals’ (Synced, 7 March 2018) <https://medium.com/@Synced/strengthening-ai-r-d-among-chinas-2018-innovation-goals-dee468e95abb>>Google Scholar
‘Student Suffers Fatal Cardiac Arrest after Telephone Scam’ (China Daily, 25 August 2016) <http://www.chinadaily.com.cn/china/2016-08/25/content_26591216.htm>>Google Scholar
‘Tencent and Why Open Source Is about to Explode in China’ (Linux Foundation, 19 February 2016) <https://www.linuxfoundation.org/blog/2016/02/tencent-and-why-open-source-is-about-to-explode-in-china>>Google Scholar
‘Tencent Open Source’ (Tencent Open Source) <https://opensource.tencent.com>>Google Scholar
‘Toyota Created a Robot That Shoots Hoops Better than the Pros’ (CNBC, 15 March 2018) <https://www.cnbc.com/video/2018/03/15/toyota-created-a-robot-that-shoots-basketball-better-than-the-pros.html>>Google Scholar
‘Trio of China’s Big State Banks Invest in 4Paradigm AI’ (Synced, 20 January 2018) <https://medium.com/@Synced/trio-of-chinas-big-state-banks-invest-in-4paradigm-ai-72f444ad5e8b>>Google Scholar
‘UPS Invests in Autonomous Trucking Company, Tests Self-Driving Tractor Trailers’ (UPS Pressroom, 16 August 2019) <https://www.pressroom.ups.com/pressroom/ContentDetailsViewer.page?ConceptType=PressReleases&id=1565871221437-794>>Google Scholar
‘Welcome to Apollo’ (Apollo website) <http://apollo.auto>>Google Scholar
‘Westpac Partners with Surf Life Saving Australia to Put More Eyes in the Sky over Aussie Coastline This Summer’ (Surf Life Saving, 17 December 2018) <https://sls.com.au/westpac-life-saver-drones-program-launches>>Google Scholar
‘What is CNCF?’ (Cloud Native Computing Foundation website) <https://www.cncf.io>>Google Scholar
‘What Is “Fuzzy Logic”? Are There Computers That Are Inherently Fuzzy and Do Not Apply the Usual Binary Logic?’ (Scientific American, 21 October 1999) <https://www.scientificamerican.com/article/what-is-fuzzy-logic-are-t>>Google Scholar
‘What You Need to Know About Baidu’s Apollo Go Robotaxi in Beijing’ (ApolloAuto Medium Page, 28 October 2020) <https://techcrunch.com/2020/12/02/self-driving-trucks-startup-tusimple-raises-350m-from-u-s-rail-retail-and-freight-giants/>>Google Scholar
‘Why Are Standards Important for Artificial Intelligence?’ (JTC1, 30 May 2018) <https://jtc1info.org/jtc1-press-committee-info-about-jtc-1-sc-42>>Google Scholar
‘Why China Keeps Bailing Out Ailing Heavy Industries’ (South China Morning Post, 25 January 2017) <https://www.scmp.com/news/china/economy/article/2065332/why-china-keeps-bailing-out-ailing-heavy-industries>>Google Scholar
‘World Intelligence Congress Gathers Discussion on AI’ (Xinhua, 17 May 2018) <http://www.xinhuanet.com/english/2018-05/17/c_137184327.htm>>Google Scholar
‘Xilinx Announces the Acquisition of DeePhi Tech’ (Xilinx, 17 July 2018) <https://www.xilinx.com/news/press/2018/xilinx-announces-the-acquisition-of-deephi-tech.html>>Google Scholar
‘Yitu Technology Opens AI R&D Centre in Singapore; To Add Some 70 Staff over 3 Years’ (Straights Times, 31 January 2019) <https://www.straitstimes.com/business/companies-markets/yitu-technology-opens-ai-rd-centre-in-singapore-to-add-some-70-staff-over>>Google Scholar
‘Yutong’ (Yutong Website) < https://en.yutong.com/>>Google Scholar
Allen, Gregory C, ‘Understanding China’s AI Strategy’ (Center for a New American Security, 6 February 2019) <https://www.cnas.org/publications/reports/understanding-chinas-ai-strategy>>Google Scholar
Amadeo, Ron, ‘Huawei’s HarmonyOS: “Fake It till You Make It” Meets OS Development’ (ArsTechnica, 2 March 2021) <https://arstechnica.com/gadgets/2021/02/harmonyos-hands-on-huaweis-android-killer-is-just-android/>>Google Scholar
Andelman, David A, ‘How China Out-Innovates: A Chat with Alibaba’s Strategy Chief Ming Zeng’ (Forbes, 25 July 2018) <https://www.forbes.com/sites/forbesasia/2018/07/25/how-china-out-innovates-a-chat-with-alibabas-strategy-chief-ming-zeng/#73ab38221a90>>Google Scholar
Arkenberg, Chris, ‘China Inside: Chinese Semiconductors Will Power Artificial Intelligence’ (Deloitte Insights, 11 December 2018) <https://www2.deloitte.com/insights/us/en/industry/technology/technology-media-and-telecom-predictions/chinese-semiconductor-industry.html>>Google Scholar
Asay, Matt, ‘MongoDB’s New License Won’t Solve Its China Problem’ (Techworld, 19 October 2018) <https://www.techworld.com.au/article/648494/mongodb-new-license-won-t-solve-its-china-problem/?fp=16&fpid=1>>Google Scholar
Asay, Matt, ‘Why China Is the Next Proving Ground for Open Source Software’ (Tech Republic, 20 September 2016) <https://www.techrepublic.com/article/why-china-is-the-next-proving-ground-for-open-source-software>>Google Scholar
Asay, Matt, ‘Why Critics Who Bash Musk’s Open Source Tesla Security Project Are Wrong’ (Tech Republic, 14 August 2018) <https://www.techrepublic.com/article/why-critics-who-bash-musks-open-source-tesla-security-project-are-wrong>>Google Scholar
Au, Lavender, ‘China’s New Encryption Law Takes Effect’ (TechNode, 2 January 2020) <https://technode.com/2020/01/02/chinas-new-encryption-law-takes-effect/>>Google Scholar
Banjo, Shelly and Bergen, Mark, ‘The Trade War Didn’t Stop a Google and Huawei AI Collaboration’ (Bloomberg, 1 April 2019) <https://www.bloomberg.com/news/articles/2019-04-01/the-trade-war-didn-t-stop-a-google-and-huawei-ai-collaboration>>Google Scholar
Battelle, John, ‘How GDPR Kills the Innovation Economy’ (New Co Shift, 25 May 2018) <https://shift.newco.co/how-gdpr-kills-the-innovation-economy-844570b70a7a>>Google Scholar
Beattie, Alan, ‘Data Protectionism: The Growing Menace to International Business’ (Financial Times, 13 May 2018) <https://www.ft.com/content/6f0f41e4-47de-11e8-8ee8-cae73aab7ccb>>Google Scholar
Beavis, Gareth, ‘Huawei Ban: The Global Fallout Explained’ (Techradar, 28 May 2019) <https://www.techradar.com/au/news/googles-huawei-android-restrictions-heres-what-it-means-for-you>>Google Scholar
Beddor, Christopher, ‘The Alibaba IPO and How Chinese Companies Bypass Foreign Investments Restrictions’ (CKGSB Knowledge, 1 September 2014) <http://knowledge.ckgsb.edu.cn/2014/09/01/china/the-alibaba-ipo-and-how-chinese-companies-bypass-foreign-investment-restrictions>>Google Scholar
Bell, Ganesh, ‘Why Countries Need to Work Together on AI’ (World Economic Forum, 16 September 2018) <https://www.weforum.org/agenda/2018/09/learning-from-one-another-a-look-at-national-ai-policy-frameworks>>Google Scholar
Bhargava, Yuthika, ‘No Right Answer Yet to “Privacy vs Security” Parley’ (The Hindu, 10 December 2017) <http://www.thehindu.com/opinion/interview/no-right-answer-yet-to-privacy-vs-security-parley/article21386236.ece>>Google Scholar
Bishop, Todd, ‘Chinese Tech Powerhouse Baidu Opens Seattle-Area Office, Expanding Its Reach in AI and the Cloud’ (Geek Wire, 9 October 2017) <https://www.geekwire.com/2017/chinese-tech-powerhouse-baidu-opens-seattle-area-office-expanding-reach-ai-cloud>>Google Scholar
Borak, Masha, ‘China’s AIChain is Decentralizing Artificial Intelligence’ (Technode, 29 June 2018) <https://technode.com/2018/06/29/aichain-artificial-intelligence-blockchain>>Google Scholar
Borak, Masha, ‘Chinese Developers Fear Losing Open Source Tech to Trade War’ (Abacus [South China Morning Post], 25 May 2019) <https://www.abacusnews.com/digital-life/chinese-developers-fear-losing-open-source-tech-trade-war/article/3011463>>Google Scholar
Borak, Masha, ‘Chinese Hackers Are Selling Personal Information for as Little as $0.01’ (TechNode, 22 December 2017) <https://technode.com/2017/12/22/chinese-hackers-selling-personal-information-little-0-01>>Google Scholar
Borak, Masha, ‘Meituan Dianping Launches Autonomous Food Delivery System’ (Technode, 26 July 2018) <https://technode.com/2018/07/26/meituan-dianping-autonomous-delivery>>Google Scholar
Borak, Masha, ‘Qualcomm Opening an AI Lab in Beijing, Joining Hands with Baidu’s PaddlePaddle’ (Technode, 24 May 2018) <https://technode.com/2018/05/24/qualcomm-ai-lab-china-baidu-paddlepaddle>>Google Scholar
Borak, Masha, ‘We Went to Suzhou to Find AI’s Biggest Breakthroughs and Bottlenecks’ (Technode, 12 May 2018). <https://technode.com/2018/05/12/suzhou-global-ai-product-application-expo>>Google Scholar
Borak, Masha, ‘WeChat Denies Reading Users’ Private Messages to Train Its AI’ (TechNode, 2 January 2018) <https://technode.com/2018/01/02/wechat-denies-reading-users-private-messages-train-ai>>Google Scholar
Bradford, Laurence, ‘How Open-Source Development Is Democratizing the Tech Industry’ (Forbes, 26 March 2018) <https://www.forbes.com/sites/laurencebradford/2018/03/26/how-open-source-development-is-democratizing-the-tech-industry/#7bce96c13bb6>>Google Scholar
Bradley, Joseph, Barbier, Joel and Handler, Doug, ‘Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion’ (Cisco White Paper, 2013) <http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoE_Economy.pdf>>Google Scholar
Brokaw, Alex, ‘This Startup Uses Machine Learning and Satellite Imagery to Predict Crop Yields’ (The Verge, 4 August 2016) <https://www.theverge.com/2016/8/4/12369494/descartes-artificial-intelligence-crop-predictions-usda>>Google Scholar
Brooks, Rodney, ‘The Seven Deadly Sins of AI Predictions’ (MIT Technology Review, 6 October 2017) <https://www.technologyreview.com/s/609048/the-seven-deadly-sins-of-ai-predictions>>Google Scholar
Busvine, Douglas, ‘Exclusive: China’s Huawei Opens Up to German Scrutiny Ahead of 5G Auctions’ (Reuters, 23 October 2018) <https://www.reuters.com/article/us-germany-telecoms-huawei-exclusive/exclusive-chinas-huawei-opens-up-to-german-scrutiny-ahead-of-5g-auctions-idUSKCN1MX1VB>>Google Scholar
Byford, Sam, ‘How China’s ByteDance Became the World’s Most Valuable Startup’ (The Verge, 30 November 2018) <https://www.theverge.com/2018/11/30/18107732/bytedance-valuation-tiktok-china-startup>>Google Scholar
Caiyu, Liu, ‘China Eyes New Cyber Security Watchdog’ (Global Times, 2 February 2017) <http://www.globaltimes.cn/content/1031517.shtml>>Google Scholar
Caiyu, Liu, ‘China Sets Cross-Border Data Flow Rules’ (Global Times, 13 June 2019) <http://www.globaltimes.cn/content/1154091.shtml>>Google Scholar
Caiyu, Liu, ‘Companies Collect Personal Info, Sell Data Despite China’s New Cyber Security Law’ (Global Times, 24 December 2017) <http://www.globaltimes.cn/content/1081849.shtml>>Google Scholar
Campanella, Edoardo, ‘The Real Payoff from Artificial Intelligence Is Still a Decade Off’ (Foreign Policy, 9 August 2018) <https://foreignpolicy.com/2018/08/09/the-solution-to-the-productivity-puzzle-is-simple-robots-ai>>Google Scholar
Campbell, Charlie, ‘Baidu’s Robin Li is Helping China Win the 21st Century’ (Time, 18 January 2018) <http://time.com/5107485/baidus-robin-li-helping-china-win-21st-century>>Google Scholar
Cao, Yin, ‘Rule to Protect Security “On the Way This Year”’ (China Daily, 22 January 2015) <http://www.chinadaily.com.cn/china/2015-01/22/content_19373572.htm>>Google Scholar
Carrington, Daisy, ‘Yinchuan: The Smart City Where Your Face Is Your Credit Card’ (CNN, 11 October 2016) <http://edition.cnn.com/2016/10/10/asia/yinchuan-smart-city-future/index.html>>Google Scholar
Chan, Tara Francis, ‘The Chinese Government Confirmed That It Can Access Deleted WeChat Conversations – and People Are Terrified’ (Business Insider, 1 May 2018) <https://www.businessinsider.com.au/chinese-government-accessed-deleted-wechat-messages-2018-5?r=US&IR=T>>Google Scholar
Chen, Celia and Tao, Li, ‘Tencent CEO Pony Ma Says China Risks Falling Behind without Strong Base in Scientific Research’ (South China Morning Post, 28 May 2018) <http://www.scmp.com/tech/tech-leaders-and-founders/article/2148112/tencent-ceo-pony-ma-says-china-risks-falling-behind#FDgmYwXu4Vh04pcB.99>>Google Scholar
Chen, Celia, ‘Huawei Aims to Deploy Harmony OS on 400 Million Devices in 2021, Going beyond Smartphones to Reach Many IoT gadgets’ (South China Morning Post, 13 January 2021) <https://www.scmp.com/tech/article/3117573/huawei-aims-deploy-harmony-os-400-million-devices-2021-going-beyond>>Google Scholar
Chen, George, ‘Can Li Keqiang’s Internet Plus Strategy Really Save China?’ (South China Morning Post, 8 March 2015) <http://www.scmp.com/business/china-business/article/1732704/can-li-keqiangs-internet-plus-strategy-really-save-china>>Google Scholar
Chen, Laurie, ‘Why China’s Tech-Savvy Millennials Are Quitting WeChat’ (South China Morning Post, 22 July 2018) <https://www.scmp.com/news/china/society/article/2156297/how-growing-privacy-fears-china-are-driving-wechat-users-away>>Google Scholar
Chen, Lulu Yilun, ‘Tencent-Backed Internet Giant Probes Massive User-Data Leak’ (Bloomberg, 3 May 2018) <https://www.bloomberg.com/news/articles/2018-05-03/tencent-backed-meituan-will-probe-reports-of-huge-user-data-leak>>Google Scholar
Chen, Qiheng, ‘China’s New Data Protection Scheme’ (The Diplomat, 2 July 2019) <https://thediplomat.com/2019/07/chinas-new-data-protection-scheme>>Google Scholar
Chen, Stephen, ‘Elderly Chinese Toilet Paper Thieves Face Up to Their Crimes’ (South China Morning Post, 19 March 2017) <http://www.scmp.com/news/china/society/article/2080272/elderly-chinese-toilet-paper-thieves-face-their-crimes>>Google Scholar
Chin, Charlene, ‘South Korea to Build Smart Highways for Driverless Cars’ (GovInsider, 2 September 2016 <https://govinsider.asia/smart-gov/south-korea-to-build-smart-highways-for-driverless-cars>>Google Scholar
Chin, Josh and Lin, Liza, ‘China’s All-Seeing Surveillance State Is Reading Its Citizens’ Faces’ (Wall Street Journal, 26 June 2017) <https://www.wsj.com/articles/the-all-seeing-surveillance-state-feared-in-the-west-is-a-reality-in-china-1498493020>>Google Scholar
Chow, Stacey, ‘How Will China’s Innovation Change the World?’ (World Economic Forum, 16 July 2015) <https://www.weforum.org/agenda/2015/07/how-will-chinas-innovation-change-the-world>>Google Scholar
Clover, Charles, ‘China Impedes Foreign Carmakers’ Autonomous Tests’ (Financial Times, 14 December 2017) <https://www.ft.com/content/2ba4366c-e08c-11e7-a8a4-0a1e63a52f9c>>Google Scholar
Creemers, Rogier (ed), ‘Outline of the National Informatisation Development Strategy’ (China Copyright and Media, 30 July 2016) <https://chinacopyrightandmedia.wordpress.com/2016/07/27/outline-of-the-national-informatization-development-strategy>>Google Scholar
Cushman & Wakefield (law firm), ‘Data Centre Risk Index 2013’ <http://www.cushmanwakefield.com/~/media/global-reports/data-centre-risk-index-2013.pdf>>Google Scholar
Custer, C, ‘State IDs of China’s Rich and Powerful, Including Jack Ma, Leaked in Apparent Privacy Protest’ (Tech in Asia, 12 May 2016) <https://www.techinasia.com/state-id-numbers-chinas-rich-powerful-including-jack-ma-fang-binxing-leaked-apparent-privacy-protest>>Google Scholar
Dai, Sarah, ‘China Adds Huawei, Hikvision to Expanded “National Team” Spearheading Country’s AI Efforts’ (South China Morning Post, 29 August 2019) <https://www.scmp.com/tech/big-tech/article/3024966/china-adds-huawei-hikvision-expanded-national-team-spearheading>>Google Scholar
Dai, Sarah, ‘China’s National AI Champion Baidu to Test Driverless Delivery Vans in US with Udelv for Walmart’ (South China Morning Post, 9 January 2019) <https://www.scmp.com/tech/big-tech/article/2181214/chinas-national-ai-champion-baidu-test-driverless-delivery-vans-us>>Google Scholar
Dai, Sarah, ‘Didi Rocked by Second Passenger Killing in Three Months Despite Additional Security Measures’ (South China Morning Post, 25 August 2018) <https://www.scmp.com/tech/article/2161341/didi-rocked-second-passenger-killing-three-months-despite-additional-security>>Google Scholar
Dai, Sarah, ‘One of the World’s Top Coders, Known as Godfather, Is Backing a Chinese Self-Driving Car Start-Up’ (South China Morning Post, 7 February 2018) <https://www.scmp.com/tech/start-ups/article/2132420/one-worlds-top-coders-known-godfather-backing-chinese-self-driving>>Google Scholar
Dai, Sarah, ‘This Beijing Hub Is Home to 10 Major AI Labs Driving China’s Tech Ambitions’ (South China Morning Post, 8 February 2019) <https://www.scmp.com/tech/big-tech/article/2184987/beijing-hub-home-10-major-ai-labs-driving-chinas-tech-ambitions>>Google Scholar
Dean, Jeff and Monga, Rojat, ‘TensorFlow: Google’s Latest Machine Learning System, Open Sourced for Everyone’ (Google AI Blog, 9 November 2015) <https://ai.googleblog.com/2015/11/tensorflow-googles-latest-machine.html>>Google Scholar
Dean, Sam, ‘Open Source AI for Everyone: Three Projects to Know’ (Linux Foundation, 10 May 2018) <https://www.linuxfoundation.org/blog/2018/05/open-source-ai-for-everyone-three-projects-to-know>>Google Scholar
Dedrick, Jason and Kraemer, Kenneth L, ‘Intangible Assets and Value Capture in Global Value Chains: The Smartphone Industry’ (World Intellectual Property Organization Working Paper, November 2017) <https://www.wipo.int/edocs/pubdocs/en/wipo_pub_econstat_wp_41.pdf>>Google Scholar
Del Bello, Lou, ‘Scientists Are Closer to Making Artificial Brains That Operate Like Ours Do’ (Futurism, 28 January 2018) <https://futurism.com/artificial-brains-operate-like-humans-close>>Google Scholar
Delaney, Robert, ‘Encouraging Signs for US–China Business Ties in Cloud Computing Access Talks’ (South China Morning Post, 12 April 2019) <https://www.scmp.com/news/china/diplomacy/article/3005809/encouraging-signs-us-china-business-ties-cloud-computing>>Google Scholar
Delval, Galaad, ‘Old Rules, New Specification for Data Protection in Mainland China’ (International Association of Privacy Professionals, 3 May 2018) <https://iapp.org/news/a/old-rules-new-specification-for-data-protection-in-mainland-china>>Google Scholar
Deng, Iris, ‘Tencent Releases Open Platform to Help Drive AI Projects at Other Companies’ (South China Morning Post, 19 September 2018) <https://www.scmp.com/tech/big-tech/article/2164765/tencent-releases-open-platform-help-drive-ai-projects-other-companies>>Google Scholar
Denlinger, Paul, ‘What Will Data Rights for the Individual Look Like in China?’ (Pandaily, 10 September 2018) <https://pandaily.com/what-will-data-rights-for-the-individual-look-like-in-china>>Google Scholar
Dickinson, Steve, ‘China’s New Cryptography Law: Still No Place to Hide’ (Harris Bricken (law firm)), 7 November 2019) <https://harrisbricken.com/chinalawblog/chinas-new-cryptography-law-still-no-place-to-hide/>>Google Scholar
Dickinson, Steve, ‘China VIEs are Dead. Done. Over. Stick a Fork in Them’ (China Law Blog, 22 January 2015) <http://www.chinalawblog.com/2015/01/china-vies-are-dead-done-over-stick-a-fork-in-them.html>>Google Scholar
Dickinson, Steve, ‘SaaS in China: The 101’ (China Law Blog, 10 October 2016) <https://www.chinalawblog.com/2016/10/saas-in-china-the-101.html>>Google Scholar
Dickinson, Steve and Yang, Grace, ‘China’s Cybersecurity Law and Employee Personal Information’ (China Law Blog, 8 January 2017) <http://www.chinalawblog.com/2017/01/chinas-cybersecurity-law-and-employee-personal-information.html>>Google Scholar
Dou, Eva, ‘Global Tech Companies Call on China to Delay Cybersecurity Law’ (Wall Street Journal, 15 May 2017) <https://www.wsj.com/articles/global-tech-companies-call-on-china-to-delay-cybersecurity-law-1494837117>>Google Scholar
Dou, Eva, ‘Microsoft, Intel, IBM Push Back on China Cybersecurity Rules’ (Wall Street Journal, 1 December 2016) <http://www.wsj.com/articles/microsoft-intel-ibm-push-back-on-china-cybersecurity-rules-1480587542>>Google Scholar
Dou, Eva and King, Rachel, ‘China Sets New Tone in Drafting Cybersecurity Rules’ (Wall Street Journal, 26 August 2016) <http://www.wsj.com/articles/china-moves-to-ease-foreign-concerns-on-cybersecurity-controls-1472132575>>Google Scholar
Duhigg, Charles, ‘The Case against Google’ (New York Times, 20 February 2018) <www.nytimes.com/2018/02/20/magazine/the-case-against-google.html>>Google Scholar
Dwyer, Colin, ‘“Like A God” Google AI Beats Human Champ of Notoriously Complex Go Game’ (NPR, 23 May 2017) <https://www.npr.org/sections/thetwo-way/2017/05/23/529673475/like-a-god-google-a-i-beats-human-champ-of-notoriously-complex-go-game>>Google Scholar
Evangelho, Jason, ‘Amazon Alexa and Huawei Team Up for AI Cube Smart Speaker + 4G Router’ (Forbes, 31 August 2018) <https://www.forbes.com/sites/jasonevangelho/2018/08/31/amazon-alexa-and-huawei-team-up-for-ai-cube-smart-speaker-4g-router/#2095d09cba73>>Google Scholar
Farrell, Nick, ‘US Might Have Control of Open Source’ (Fudzilla, 28 May 2019) <https://www.fudzilla.com/news/48769-us-might-have-control-of-open-source>>Google Scholar
Feng, Venus, ‘World’s Most Valuable Startup Is Home to a Complex Fortune’ (Bloomberg, 24 March 2018) <https://www.bloomberg.com/news/articles/2019-03-24/the-complex-fortune-growing-inside-world-s-most-valuable-startup>>Google Scholar
Finley, Klint, ‘How GitHub Is Helping Overworked Chinese Programmers’ (Wired, 4 April 2019) <https://www.wired.com/story/how-github-helping-overworked-chinese-programmers>>Google Scholar
Finley, Klint, ‘What Exactly Is GitHub Anyway?’ (TechCrunch, 14 July 2012) <https://techcrunch.com/2012/07/14/what-exactly-is-github-anyway>>Google Scholar
Fish, Tom, ‘AI to Bring “Mankind to Edge of APOCALYPSE” – With Robots a Bigger Risk than NUKES’ (Daily Star, 15 July 2018) <https://www.dailystar.co.uk/news/latest-news/716305/ai-artificial-intelligence-autonomous-weaponry-arms-race>>Google Scholar
Freund, Karl, ‘Is NVIDIA Unstoppable in AI?’ (Forbes, 14 May 2018) <https://www.forbes.com/sites/moorinsights/2018/05/14/is-nvidia-unstoppable-in-ai/#357f711a759e>>Google Scholar
Gan, Nectar, ‘Father of China’s Great Firewall to Lead New Cybersecurity Association’ (South China Morning Post, 26 March 2016) <https://www.scmp.com/news/china/policies-politics/article/1930959/father-chinas-great-firewall-lead-new-cybersecurity>>Google Scholar
Gerbert, Philipp, Justus, Jan and Hecker, Martin, ‘Competing in the Age of Artificial Intelligence’ (BCG, 16 January 2017)Google Scholar
Gibbs, Samuel, ‘AlphaZero AI Beats Champion Chess Program after Teaching Itself in Four Hours’ (The Guardian, 7 December 2017) <https://www.theguardian.com/technology/2017/dec/07/alphazero-google-deepmind-ai-beats-champion-program-teaching-itself-to-play-four-hours>>Google Scholar
Groll, Elias, ‘Why Apple – and Not Google – Is in the FBI’s Crosshairs’ (Foreign Policy, 18 February 2016) <http://foreignpolicy.com/2016/02/18/why-apple-and-not-google-is-in-the-fbis-crosshairs>>Google Scholar
Hanley, Blair, ‘Baidu COO Says China’s Government Will Help the Country Dominate AI’ (Venturebeat, 9 January 2018) <https://venturebeat.com/2018/01/09/baidu-coo-says-chinas-government-will-help-the-country-dominate-ai>>Google Scholar
Hawkins, Andrew J., ‘Toyota Steers $400 Million to Self-Driving Startup Pony.ai’ (The Verge, 30 March 2020) <https://www.theverge.com/2020/2/25/21152817/toyota-pony-ai-self-driving-car-investment-valuation-china-silicon-valley>>Google Scholar
He, Laura, ‘Baidu’s Seismic Shift towards AI Must Start Delivering the Goods’ (South China Morning Post, 8 June 2017) <https://www.scmp.com/business/companies/article/2097495/baidus-seismic-shift-towards-ai-must-start-delivering-goods>>Google Scholar
He, Yujia, ‘How China Is Preparing for an AI-Powered Future’ (Wilson Briefs, 20 June 2017) <https://www.wilsoncenter.org/publication/how-china-preparing-for-ai-powered-future>>Google Scholar
Hempel, Jessi, ‘Facebook Launches M, Its Bold Answer to Siri and Cortana’ (Wired, 26 August 2015) <https://www.wired.com/2015/08/facebook-launches-m-new-kind-virtual-assistant>>Google Scholar
Hempel, Jessi, ‘Inside Baidu’s Bid to Lead the AI Revolution’ (Wired, 12 June 2017) <https://www.wired.com/story/inside-baidu-artificial-intelligence>>Google Scholar
Hersey, Frank, ‘Almost 80% of Chinese Concerned about AI Threat to Privacy, 32% Already Feel a Threat to Their Work’ (Technode, 2 March 2018) <https://technode.com/2018/03/02/almost-80-chinese-concerned-ai-threat-privacy-32-already-feel-threat-work>>Google Scholar
Hersey, Frank, ‘Baidu Launches Their Open Platform for Autonomous Cars – And We Got to Test It’ (Technode, 5 July 2017) <https://technode.com/2017/07/05/baidu-apollo-1-0-autonomous-cars-we-test-it>>Google Scholar
Hersey, Frank, ‘Pony.ai Q&A: Having a China Background Will Be Key to Autonomous Driving Success’ (TechNode, 26 April 2018) <https://technode.com/2018/04/26/pony-ai-autonomous-driving-success-needs-china>>Google Scholar
Hersey, Frank, ‘Qihoo 360 Shuts Down Surveillance Camera Live Streaming Platform’ (Technode, 20 December 2017) <https://technode.com/2017/12/20/shuidi-shutdown-qihoo-360>>Google Scholar
Hickert, Cameron and Ding, Jeffrey (trans), ‘Read What Top Chinese Officials Are Hearing about AI Competition and Policy’ (New America, 29 November 2018) <https://www.newamerica.org/cybersecurity-initiative/digichina/blog/read-what-top-chinese-officials-are-hearing-about-ai-competition-and-policy>>Google Scholar
Horwitz, Josh, ‘Analysis: China’s Would-Be Chip Darling Tsinghua Unigroup Bedevilled by Debt and Bad Bets’ (Reuters, 20 January 2021) <https://www.reuters.com/article/us-tsinghua-unigroup-strategy-analysis-idUKKBN29P0C2>>Google Scholar
Horwitz, Josh, ‘China Is Rapidly Making Robots That Will One Day Manufacture Everything You Buy’ (Quartz, 3 March 2017) <https://qz.com/922742/china-is-rapidly-making-robots-that-will-one-day-manufacture-everything-you-buy>>Google Scholar
Horwitz, Josh, ‘China’s Bewildering New Cybersecurity Law Is Keeping Foreign Tech Firms Out of the Country’ (Quartz, 7 November 2016) <http://qz.com/829248/chinas-new-cybersecurity-law-is-so-vague-that-its-keeping-foreign-tech-firms-out-of-the-country>>Google Scholar
Horwitz, Josh, ‘Why the Semiconductor Is Suddenly at the Heart of US–China Tech Tensions’ (Quartz, 25 July 2018) <https://qz.com/1335801/us-china-tech-why-the-semiconductor-is-suddenly-at-the-heart-of-us-china-tensions>>Google Scholar
Horwitz, Josh and Sonnad, Nikhil, ‘Meet Shadowsocks, the Underground Tool that China’s Coders Use to Blast through the Great Firewall’ (Quartz, 20 September 2017) <https://qz.com/1072701/meet-shadowsocks-the-underground-tool-that-chinas-coders-use-to-blast-through-the-great-firewall>>Google Scholar
Hua, Nan, ‘Roadstar.ai: A Promising Autonomous Driving Startup Wrecked by Infighting’ (CompassList, 25 July 2019) <https://www.compasslist.com/insights/roadstarai-a-promising-autonomous-driving-startup-wrecked-by-infighting>>Google Scholar
Huang, Echo, ‘China Keeps Finding Millions of People Who Never Officially Existed’ (Quartz, 27 March 2017) <https://qz.com/941240/china-keeps-finding-millions-of-people-who-never-officially-existed>>Google Scholar
Huang, Echo, ‘Taobao Is Banning Merchants from Selling Foreign Media in China – Even Media Approved by Censors’ (Quartz, 10 March 2017) <https://qz.com/929540/selling-foreign-media-in-china-even-media-approved-by-censors-is-being-banned-alibaba-baba-groups-online-shopping-platform-taobao>>Google Scholar
Huang, Kristin and Xin, Zhou, ‘Fake Data: The Disease Afflicting China’s Vaccine System’ (South China Morning Post, 30 July 2018) <https://www.scmp.com/news/china/policies-politics/article/2157341/fake-data-disease-afflicting-chinas-vaccine-system>>Google Scholar
Huang, Xuedong, ‘Microsoft Computational Network Toolkit Offers Most Efficient Distributed Deep Learning Computational Performance’ (Microsoft Research Blog, 7 December 2015) <https://www.microsoft.com/en-us/research/blog/microsoft-computational-network-toolkit-offers-most-efficient-distributed-deep-learning-computational-performance/>>Google Scholar
Huang, Zheping and Zhang, Jane, ‘200 Million Resumés of Chinese Jobseekers Leaked, Cybersecurity Researcher Says’ (South China Morning Post, 11 January 2019) <https://www.scmp.com/tech/big-tech/article/2181709/200-million-resumes-chinese-jobseekers-leaked-cybersecurity-researcher>>Google Scholar
Isbitski, David, ‘Introducing the Alexa Skills Kit, Enabling Developers to Create Entirely New Voice Driven Capabilities’ (Amazon Developer, 25 June 2015) <https://developer.amazon.com/blogs/post/Tx205N9U1UD338H/Introducing-the-Alexa-Skills-Kit-Enabling-Developers-to-Create-Entirely-New-Voic>>Google Scholar
Ives, Jaqueline and Holzmann, Anna, ‘Local Governments Power Up to Advance China’s National AI Agenda’ (MERICS, 26 April 2018) <https://www.merics.org/en/blog/local-governments-power-advance-chinas-national-ai-agenda>>Google Scholar
Jacobs, Harrison, ‘Chinese People Don’t Care about Privacy on the Internet – Here’s Why, According to a Top Professor in China’ (Business Insider, 27 June 2018) <https://www.businessinsider.com.au/why-china-chinese-people-dont-care-about-privacy-2018-6>>Google Scholar
Jing, Dong and Xiao, Liu, ‘Divided among Departments, Big Data Eludes Government’ (Caixin Global, 16 April 2018) <https://www.caixinglobal.com/2018-04-16/divided-among-departments-big-data-eludes-government-101235107.html>>Google Scholar
Jing, Meng and Dai, Sarah, ‘China Recruits Baidu, Alibaba and Tencent to AI “National Team”’ (South China Morning Post, 21 November 2017) <https://www.scmp.com/tech/china-tech/article/2120913/china-recruits-baidu-alibaba-and-tencent-ai-national-team>>Google Scholar
Jing, Ming, ‘China’s Cybersecurity Laws May Be Used to Block US Tech Firms on National Security Grounds, Says Expert’ (South China Morning Post, 24 May 2019) <https://www.scmp.com/tech/policy/article/3011655/chinas-cybersecurity-laws-may-be-used-block-us-tech-firms-national>>Google Scholar
Joffe, Benjamin, ‘What Sequoia’s Mike Moritz Doesn’t Understand about Startups in China’ (Venturebeat, 11 February 2018) <https://venturebeat.com/2018/02/11/what-sequoias-mike-moritz-doesnt-understand-about-startups-in-china>>Google Scholar
Johnson, Kahri, ‘How Federated Learning Could Shape the Future of AI in a Privacy-Obsessed World’ (Venture Beat, 3 June 2019) <https://venturebeat.com/2019/06/03/how-federated-learning-could-shape-the-future-of-ai-in-a-privacy-obsessed-world>>Google Scholar
Jordan, Michael I, ‘Artificial Intelligence: The Revolution Hasn’t Happened Yet’ (Medium, 19 April 2019) <https://medium.com/@mijordan3/artificial-intelligence-the-revolution-hasnt-happened-yet-5e1d5812e1e7>>Google Scholar
Kania, Elsa B, ‘Battlefield Singularity: Artificial Intelligence, Military Revolution, and China’s Future Military Power’ (Center for a New American Security, 28 November 2017) <https://www.cnas.org/publications/reports/battlefield-singularity-artificial-intelligence-military-revolution-and-chinas-future-military-power>>Google Scholar
Kania, Elsa B, ‘China May Become the World’s Leader in AI: But at What Cost?’ (China File, 30 July 2018) <http://www.chinafile.com/conversation/china-may-become-worlds-leader-ai-what-cost>>Google Scholar
Kharpal, Arjun, ‘Chinese Driverless Car Firm Pony.ai Valued at $5.3 Billion after New Cash Injection’ (CNBC, 6 November 2020) <https://www.cnbc.com/2020/11/06/china-driverless-car-firm-ponyai-valued-at-5point3-billion-after-funding.html>>Google Scholar
Knight, Will, ‘China and the US Are Bracing for an AI Showdown – In the Cloud’ (MIT Technology Review, 31 January 2018) <https://www.technologyreview.com/s/610140/china-and-the-us-are-bracing-for-an-ai-showdownin-the-cloud>>Google Scholar
Knight, Will, ‘Paying with Your Face: 10 Breakthrough Technologies 2017’ (MIT Technology Review, May 2017) <https://www.technologyreview.com/s/603494/10-breakthrough-technologies-2017-paying-with-your-face>>Google Scholar
Knockel, Jeffrey, McKune, Sarah and Senft, Adam, ‘Baidu’s and Don’ts: Privacy and Security Issues in Baidu Browser’ (Citizen Lab, 23 February 2016) <https://citizenlab.ca/2016/02/privacy-security-issues-baidu-browser/#analysis>>Google Scholar
Knockel, Jeffrey, Senft, Adam and Deibert, Ron, ‘Privacy and Security Issues in QQ Browser’ (Citizen Lab, 28 March 2016) <https://citizenlab.ca/2016/03/privacy-security-issues-qq-browser>>Google Scholar
Koetse, Manya, ‘Weibo’s Revival: Sina Weibo Is China’s Twitter, YouTube and InstaGram’ (What’s on Weibo, 20 November 2016) <http://www.whatsonweibo.com/weibos-revival-sina-weibo-chinas-twitteryoutubeinstagram>>Google Scholar
Korosec, Kirsten, ‘Autonomous Truck Startup TuSimple Hits Unicorn Status in Latest Round’ (TechCrunch, 13 February 2019) <https://techcrunch.com/2019/02/13/autonomous-truck-startup-tusimple-hits-unicorn-status-in-latest-round>>Google Scholar
Korosec, Kirsten, ‘Daimler Deepens Ties with China’s Baidu on Automated Driving’ (TechCrunch, 25 July 2018) <https://techcrunch.com/2018/07/25/daimler-chinas-baidu-automated-driving>>Google Scholar
Korosec, Kirsten, ‘Self-Driving Trucks Startup TuSimple Raises $350M from US Rail, Retail and Freight Giants’ (TechCrunch, 3 December 2020) <https://techcrunch.com/2020/12/02/self-driving-trucks-startup-tusimple-raises-350m-from-u-s-rail-retail-and-freight-giants/>>Google Scholar
Kovar, Joseph F, ‘Accenture Invests in China-Based AI Firm’ (CRN, 13 August 2018) <https://www.crn.com/news/channel-programs/accenture-invests-in-china-based-ai-firm?itc=refresh>>Google Scholar
Krazit, Tom, ‘AWS re:Invent 2018’ (Geek Wire, 21 November 2018) <https://www.geekwire.com/special-coverage/aws-reinvent-2018>>Google Scholar
Krazit, Tom, ‘Building a Wall around the Cloud: Why China Will Soon Be a Very Important Cloud Computing Market’ (Geek Wire, 13 January 2019) <https://www.geekwire.com/2019/building-wall-around-cloud-china-will-soon-important-cloud-computing-market>>Google Scholar
Lahiri, Tripti and Hui, Mary, ‘How Huawei Became America’s Tech Enemy No 1’ (Quartz, 28 May 2019) <https://qz.com/1627149/huaweis-journey-to-becoming-us-tech-enemy-no-1>>Google Scholar
Lau, Fiona and Zhu, Julie, ‘China’s Xiaomi Raises $4.72 Billion after Pricing HK IPO at Bottom of Range: Sources’ (Reuters, 29 June 2018) <https://www.reuters.com/article/us-xiaomi-ipo/chinas-xiaomi-raises-4-72-billion-after-pricing-hk-ipo-at-bottom-of-range-sources-idUSKBN1JP0EC>>Google Scholar
Lee, Amanda, ‘World Dominance in Three Steps: China Sets Out Road Map to Lead in Artificial Intelligence by 2030’ (South China Morning Post, 21 July 2017) <http://www.scmp.com/tech/enterprises/article/2103568/world-dominance-three-steps-china-sets-out-road-map-lead-artificial>>Google Scholar
Lee, Cyrus, ‘Daily Active Users for WeChat Exceeds 1 Billion’ (ZDNet, 9 January 2019) <https://www.zdnet.com/article/daily-active-user-of-messaging-app-wechat-exceeds-1-billion>>Google Scholar
Lee, Emma, ‘China Launches Mobile ID Authentication Chips to Rein in Personal Data Theft’ (TechNode, 17 April 2018) <https://technode.com/2018/04/17/id-authentication-chips-data-theft>>Google Scholar
Lee, Emma, ‘Sale of WeChat Accounts Prompts Concern over Fraud’ (TechNode, 16 January 2019) <https://technode.com/2019/01/16/wechat-accounts-sale-online-fraud/>>Google Scholar
Lee, Emma, ‘Updated: Toutiao and Intel Set Up Joint AI Lab’ (Technode, 22 August 2018) <https://technode.com/2018/08/22/bytedance-intel-ai-lab>>Google Scholar
Lee, Emma, ‘Updated: WeChat’s Privacy Policy Update Draws Attention to Information Shared with the Government’ (TechNode, 19 September 2017) <https://technode.com/2017/09/19/now-its-official-wechat-is-watching-you-1>>Google Scholar
Lee, Kai-Fu, ‘What China Can Teach the US about Artificial Intelligence’ (New York Times, 22 September 2018) <https://www.nytimes.com/2018/09/22/opinion/sunday/ai-china-united-states.html>>Google Scholar
Lee, Kai-fu and Sheehan, Matt, ‘China’s Rise in Artificial Intelligence: Ingredients and Economic Implications’ (Hoover Institute, 29 October 2018) <https://www.hoover.org/research/chinas-rise-artificial-intelligence-ingredients-and-economic-implications>>Google Scholar
Leng, Shujie, ‘Be in Love with Them, But Don’t Marry Them’ (Foreign Policy, 31 October 2014) <http://foreignpolicy.com/2014/10/31/be-in-love-with-them-but-dont-marry-them>>Google Scholar
Lennighan, Mary, ‘China to Have 10BN Connected Devices by 2020’ (Total Telecom, 24 February 2016) <https://www.totaltele.com/view.aspx?ID=492917>>Google Scholar
Lentino, Amanda, ‘This Chinese Facial Recognition Start-Up Can Identify a Person in Seconds’ (CNBC, 19 May 2019) <https://www.cnbc.com/2019/05/16/this-chinese-facial-recognition-start-up-can-id-a-person-in-seconds.html>>Google Scholar
Levine, Sergey et al, ‘Learning Hand-Eye Coordination for Robotic Grasping with Deep Learning and Large-Scale Data Collection’ (arXiv.org, 28 August 2016) <https://arxiv.org/pdf/1603.02199.pdf>>Google Scholar
Lew, Linda, ‘Airbnb China Notifies Hosts They May Begin Sharing Their Information with the Government’ (TechNode, 28 March 2018) <https://technode.com/2018/03/28/airbnb-china-host-data-privacy>>Google Scholar
Li, Gabriel, ‘Jack Ma Talks about Manufacturing Woes, Alibaba Cloud, and the DAMO Academy at the Computing Conference 2018’ (Pandaily, 20 September 2018) <https://pandaily.com/jack-ma-talks-about-manufacturing-woes-alibaba-cloud-and-the-damo-academy-at-the-computing-conference-2018>>Google Scholar
Li, Jane, ‘Chinese Citizens Are Racing against Censors to Preserve Coronavirus Memories on GitHub’ (Quartz, 3 March 2020) <https://qz.com/1811018/chinese-citizens-use-github-to-save-coronavirus-memories/>>Google Scholar
Li, Jane, ‘Chinese Internet Users Who Uploaded Coronavirus Memories to GitHub Have Been Arrested’ (Quartz, 27 April 2020) <https://qz.com/1846277/china-arrests-users-behind-github-coronavirus-memories-page/>>Google Scholar
Liao, Rita, ‘China Opens Nasdaq-style Board to Lure Tech Firms Back Home’ (TechCrunch, 13 June 2019) <https://techcrunch.com/2019/06/13/china-new-tech-board/>>Google Scholar
Liao, Rita, ‘Chinese Autonomous Driving Startup WeRide Bags $200M in Funding’ (TechCrunch, 23 December 2020) <https://techcrunch.com/2020/12/22/weride-200-million-funding/>>Google Scholar
Liao, Rita, ‘Horizon Robotics, a Chinese Rival to Nvidia, Seeks to Raise Over $700M’ (TechCrunch, 22 December 2020) <https://techcrunch.com/2020/12/21/horizon-robotics-700-million-funding/>>Google Scholar
Liao, Shannan, ‘Alibaba Made a Driverless Robot That Runs 9 mph to Deliver Packages’ (The Verge, 31 May 2018) <https://www.theverge.com/circuitbreaker/2018/5/31/17413836/alibaba-driverless-robot-deliver-packages-speed>>Google Scholar
Liping, Gu, ‘Didi Chuxing Refuses Data Supervision: Transport Official’ (Ecns.cn, 28 August 2018) <http://www.ecns.cn/news/cns-wire/2018-08-28/detail-ifyxikfc9645161.shtml>>Google Scholar
Lipton, Zachary C, ‘The AI Misinformation Epidemic’ (Approximately Correct, 28 March 2017) <http://approximatelycorrect.com/2017/03/28/the-ai-misinformation-epidemic>>Google Scholar
Lipton, Zachary C, ‘OpenAI Trains Language Model, Mass Hysteria Ensues’ (Approximately Correct, 17 February 2019) <http://approximatelycorrect.com/2019/02/17/openai-trains-language-model-mass-hysteria-ensues/#more-875>>Google Scholar
Liu, Coco, ‘My China Dream Is Moving to the United States: Chinese Chatbots Censored after Going Off Script’ (South China Morning Post, 3 August 2017) <http://www.scmp.com/week-asia/politics/article/2105338/my-china-dream-moving-united-states-chinese-chatbots-censored>>Google Scholar
Liu, Frank, ‘OpenStack Development Will Accelerate Rapidly in China Market in 2015’ (Forrester, 24 December 2014) <https://go.forrester.com/blogs/14-12-24-openstack_development_will_accelerate_rapidly_in_china_market_in_2015>>Google Scholar
Liu, Jack and Soo, Zen, ‘China’s Alibaba, Baidu and Tencent Join Hands to Promote “Internet Plus” Strategy’ (South China Morning Post, 16 December 2015) <http://www.scmp.com/news/china/policies-politics/article/1892180/chinas-alibaba-baidu-and-tencent-join-hands-promote>>Google Scholar
Liu, Jiefei, ‘Alipay Introduces New Feature Allowing Parents to Trace the Vaccines Their Children Are Receiving’ (TechNode, 24 July 2018) <https://technode.com/2018/07/24/alipay-introduces-new-feature-allowing-parents-to-trace-the-vaccines-their-children-are>>Google Scholar
Livingston, Scott, ‘Beijing Touts “Cyber-Sovereignty” in Internet Governance: Global Technology Firms Could Mine Silver Lining’ (China Law Blog, 19 February 2015) <http://www.chinalawblog.com/2015/02/beijing-touts-cyber-sovereignty-in-internet-governance-global-technology-firms-could-mine-silver-lining.html>>Google Scholar
Lohr, Steve, ‘Is There a Smarter Path to Artificial Intelligence? Some Experts Hope So’ (New York Times, 20 June 2018) <https://www.nytimes.com/2018/06/20/technology/deep-learning-artificial-intelligence.html>>Google Scholar
London, Ingrid, ‘China’s Pony.ai Nabs $102M at Nearly $1B Valuation to Take Its Self-Driving Platform Up Another Gear’ (TechCrunch, 11 July 2018) <https://techcrunch.com/2018/07/11/chinas-pony-ai-nabs-102m-at-nearly-1b-valuation-to-take-its-self-driving-platform-up-another-gear>>Google Scholar
Lu, Xiaomeng, ‘Is China Changing Its Thinking on Data Localization?’ (The Diplomat, 8 June 2020) <https://thediplomat.com/2020/06/is-china-changing-its-thinking-on-data-localization/>>Google Scholar
Lucas, Louise and Waters, Richard, ‘China and US Compete to Dominate Big Data’ (Financial Times, 1 May 2018) <https://www.ft.com/content/e33a6994-447e-11e8-93cf-67ac3a6482fd>>Google Scholar
Ludlow, Randy, ‘Ohio Tries to Pull Ahead in Transportation Tech Race’ (Government Technology, 19 January 2018) <https://www.govtech.com/fs/transportation/State-Creates-DriveOhio-to-Capture-Smart-Transportation-Research.html>>Google Scholar
Luo, Yan and Bradley-Schmieg, Phil, ‘China Issues New Personal Information Protection Standard’ (Inside Privacy, 25 January 2018) <https://www.insideprivacy.com/international/china/china-issues-new-personal-information-protection-standard>>Google Scholar
Mac, Ryan, ‘Alibaba Claims Title for Largest Global IPO Ever with Extra Share Sales’ (Forbes, 22 September 2014) <https://www.forbes.com/sites/ryanmac/2014/09/22/alibaba-claims-title-for-largest-global-ipo-ever-with-extra-share-sales/#548cc3518dcc>>Google Scholar
Marcus, Gary, ‘Deep Learning: A Critical Appraisal’ (arXiv.org, 19 April 2018) <https://arxiv.org/pdf/1801.00631.pdf>>Google Scholar
Markoff, John, ‘AI Reemerges from a Funding Desert’ (New York Times, 13 October 2005) <https://www.nytimes.com/2005/10/13/business/worldbusiness/ai-reemerges-from-a-funding-desert.html>>Google Scholar
Markoff, John and Rosenberg, Matthew, ‘China’s Intelligent Weaponry Gets Smarter’ (New York Times, 3 February 2017) <https://www.nytimes.com/2017/02/03/technology/artificial-intelligence-china-united-states.html>>Google Scholar
Marr, Bernard, ‘AI in China: How Uber Rival Didi Chuxing Uses Machine Learning to Revolutionize Transportation’ (Forbes, 26 November 2018) <https://www.forbes.com/sites/bernardmarr/2018/11/26/ai-in-china-how-uber-rival-didi-chuxing-uses-machine-learning-to-revolutionize-transportation/#11b7bc6f6732>>Google Scholar
Marri, Shridhar, ‘Can Super Intelligence and Emotional Intelligence Co-exist?’ (Forbes, 27 June 2017) <https://www.forbesindia.com/blog/technology/can-super-intelligence-and-emotional-intelligence-co-exist/>>Google Scholar
Marshall, Arian, ‘To Save the Most Lives, Deploy (Imperfect) Self-Driving Cars ASAP’ (Wired, 11 July 2018) <https://www.wired.com/story/self-driving-cars-rand-report>>Google Scholar
Martina, Michael and Cadell, Cate, ‘Amid Industry Pushback, China Offers Changes to Cyber Rules: Sources’ (Reuters, 19 May 2017) <http://www.reuters.com/article/us-china-cyber-law-idUSKCN18F1VZ>>Google Scholar
McCall, Rosie, ‘This App Can Detect Cancer Better than Doctors Can’ (IFLScience, 29 May 2018) <https://www.iflscience.com/health-and-medicine/artificial-intelligence-can-now-detect-skin-cancer-better-than-humans>>Google Scholar
McCarthy, John, ‘What Is Artificial Intelligence?’ (Formal Reasoning Group Stanford, revised 12 November 2007) <http://jmc.stanford.edu/articles/whatisai/whatisai.pdf>>Google Scholar
McDuling, John, ‘LinkedIn Is Doing What Facebook, Google, and Twitter Can’t: Expanding in China’ (Quartz, 24 February 2014) <https://qz.com/180755/linkedin-is-doing-what-facebook-google-and-twitter-cant-expanding-in-china>>Google Scholar
McMahan, H Brendan et al, ‘Communication-Efficient Learning of Deep Networks from Decentralized Data’ (arXiv, 28 February 2017) <https://arxiv.org/abs/1602.05629>>Google Scholar
Mengfan, Chen, Limin, An and Wei, Han, ‘Is WeChat Snooping on Your Chats?’ (Caixin Global, 4 January 2018) <https://www.caixinglobal.com/2018-01-04/is-wechat-snooping-on-your-chats-101193014.html>>Google Scholar
Metz, Cade, ‘A Mystery AI Just Crushed the Best Human Players at Poker’ (Wired, 31 January 2017) <https://www.wired.com/2017/01/mystery-ai-just-crushed-best-human-players-poker>>Google Scholar
Millman, Gregory J, ‘Alibaba’s IPO Puts VIE Structure in the Spotlight’ (Wall Street Journal, 2014) <https://blogs.wsj.com/riskandcompliance/2014/09/22/alibabas-ipo-puts-vie-structure-in-the-spotlight>>Google Scholar
Millward, Steven, ‘China Now Has 731 Million Internet Users, 95% Access from Their Phones’ (TechinAsia, 23 January 2017) <https://www.techinasia.com/china-731-million-internet-users-end-2016>>Google Scholar
Millward, Steven, ‘Seven Years of “China’s Twitter”’ (TechinAsia, 14 August 2016) <https://www.techinasia.com/7-years-of-weibo-china-social-media>>Google Scholar
Mishra, Neha, ‘Data Localization Laws in a Digital World: Data Protection or Data Protectionism?’ (Public Sphere, 2016) <http://publicspherejournal.com/wp-content/uploads/2016/02/06.data_protection.pdf> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
Mo, Zhou, ‘Baidu Expands Use of Its AI Tech in Traditional Industries’ (China Daily, 31 May 2018) <http://www.chinadaily.com.cn/a/201805/31/WS5b0fe579a31001b82571d7d6.html>>Google Scholar
Moritz, Michael, ‘Silicon Valley Would Be Wise to Follow China’s Lead’ (Financial Times, 18 January 2018) <https://www.ft.com/content/42daca9e-facc-11e7-9bfc-052cbba03425>>Google Scholar
Mozur, Paul, ‘China, Addicted to Bootleg Software, Reels from Ransomware Attack’ (New York Times, 15 May 2017) <https://www.nytimes.com/2017/05/15/business/china-ransomware-wannacry-hacking.html>>Google Scholar
Mozur, Paul, ‘China Said to Quickly Withdraw Approval for New Facebook Venture’ (New York Times, 25 July 2018) <https://www.nytimes.com/2018/07/25/business/facebook-china.html?emc=edit_mbau_20180725&nl=&nlid=8467969320180725&te=1>>Google Scholar
Mozur, Paul, ‘Internet Users in China Expect to Be Tracked. Now, They Want Privacy’ (New York Times, 4 January 2018) <https://www.nytimes.com/2018/01/04/business/china-alibaba-privacy.html>>Google Scholar
Mozur, Paul, ‘One Month, 500,000 Face Scans: How China Is Using AI to Profile a Minority’ (New York Times, 14 April 2019), <https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html>>Google Scholar
Murison, Malek, ‘JD.com Launches Robot Delivery in China’ (Internet of Business, 20 June 2017) <https://internetofbusiness.com/jd-com-robot-delivery-china>>Google Scholar
Nakanishi, Toyoki and Nakamura, Yu, ‘Google Seeks Better China Relations via Tencent Patent Deal’ (Nikkei Asian Review, 20 January 2018) <https://asia.nikkei.com/Business/Deals/Google-seeks-better-China-relations-via-Tencent-patent-deal>>Google Scholar
Niewenhuis, Lucas, ‘Didi Drops 20% after IPO as Beijing Tightens Data Security Review’ (SupChina, 6 July 2021) <https://supchina.com/2021/07/06/didi-drops-20-after-ipo-as-beijing-tightens-data-security-review/>>Google Scholar
Niewenhuis, Lucas, ‘Yet Another Vaccine Scandal Punctures Public Trust in Safety’ (SupChina, 23 July 2018) <https://supchina.com/2018/07/23/outrage-over-faulty-vaccines-again>>Google Scholar
Novet, Jordan, ‘Why Tech Companies Are Racing Each Other to Make Their Own Custom AI Chips’ (CNBC, 21 April 2018) <https://www.cnbc.com/2018/04/21/alibaba-joins-google-others-in-making-custom-ai-chips.html>>Google Scholar
OECD, OECD: Main Science and Technology Indicators <https://stats.oecd.org/Index.aspx?DataSetCode=MSTI_PUB>>Google Scholar
Ohnsman, Alan, ‘Baidu Aims for “Android” of Robocar Tech with Open-Source Apollo Platform’ (Forbes, 27 October 2017) <https://www.forbes.com/sites/alanohnsman/2017/10/27/baidu-aims-for-android-of-robocar-tech-with-open-source-apollo-platform/#2edbb5d0c799>>Google Scholar
Osborne, Charlie, ‘China Excludes Symantec, Kaspersky Lab from Approved Anti-Virus Vendors’ (ZDnet, 4 August 2014) <https://www.zdnet.com/article/china-excludes-symantec-kaspersky-lab-from-approved-anti-virus-vendors>>Google Scholar
Oshikiri, Tomoyoshi, ‘Toyota to Join Baidu’s Self-Driving Platform Apollo’ (Nikkei Asian Review, 28 June 2019) <https://asia.nikkei.com/Business/Companies/Toyota-to-join-Baidu-s-self-driving-platform-Apollo>>Google Scholar
Oster, Shai and Wan, Allen, ‘Chinese Gripe at Being Left Out of Alibaba IPO’ (Bloomberg, 15 September 2014) <https://www.bloomberg.com/news/articles/2014-09-14/chinese-gripe-at-being-left-out-of-alibaba-s-21-billion-ipo>>Google Scholar
Ouyang, Iris, ‘Pinduoduo, China’s Facebook-Groupon Mashup, Files for $1B US IPO’ (Pandaily, 1 July 2018) <https://pandaily.com/pinduoduo-chinas-facebook-groupon-mashup-files-for-1b-us-ipo>>Google Scholar
Pan, Che, ‘Baidu’s Apollo Gets Green Light to Test AD Cars in Beijing without On-board Safety Driver’ (South China Morning Post, 8 December 2020) <https://www.scmp.com/tech/innovation/article/3113029/baidus-apollo-gets-green-light-test-ad-cars-beijing-without-board>>Google Scholar
Pan, Yuanyuan, ‘The Long-Term Implications of Ant Group’s Delayed IPO’ (The Diplomat, 20 November 2020) <https://thediplomat.com/2020/11/the-long-term-implications-of-ant-groups-delayed-ipo/>>Google Scholar
Parmar, Tekendra, ‘China: Tech Giants Push Back against Beijing’s New Cyber Security Bill’ (Fortune, 2 December 2016) <https://fortune.com/2016/12/02/cyber-security-bill-source-code/>>Google Scholar
Patrizio, Andy, ‘Baidu Takes a Major Leap as an AI Player with New Chip, Intel Alliance’ (Network World, 11 July 2018) <https://www.networkworld.com/article/3289387/data-center/baidu-takes-a-major-leap-as-an-ai-player-with-new-chip-intel-alliance.html>>Google Scholar
Paul, Ryan, ‘Department of Defense Launches Open Source Site Forge.mil’ (Ars Technica, 2 April 2009) <https://arstechnica.com/information-technology/2009/02/department-of-defense-launches-open-source-site-forgemil2019>>Google Scholar
Peng, Tony, ‘Fei-Fei Li at Google I/O: Humans Overestimate AI in the Short-Term, Underestimate Its Long-Term Potential’ (Synced Review, 10 May 2018) <https://medium.com/syncedreview/fei-fei-li-at-google-i-o-humans-overestimate-ai-in-the-short-term-underestimate-its-long-term-f21d7a4a19a9>>Google Scholar
Perez, Bien, ‘China Taps Nation’s Who’s Who of Technology to Anchor Ownership Shakeup at Unicom’s Parent’ (South China Morning Post, 17 August 2017) <https://www.scmp.com/tech/article/2106982/unicom-shares-halted-speculation-mounts-new-investors-its-parent-company>>Google Scholar
Perez, Chris, ‘Creepy Facebook Bots Talked to Each Other in a Secret Language’ (New York Post, 1 August 2017) <https://nypost.com/2017/08/01/creepy-facebook-bots-talked-to-each-other-in-a-secret-language>>Google Scholar
Polk, Andrew, ‘China Is Quietly Setting Global Standards’ (Bloomberg, 7 May 2018) <https://www.bloomberg.com/opinion/articles/2018-05-06/china-is-quietly-setting-global-standards>>Google Scholar
Prinsloo, Loni, ‘Tencent’s 60,000% Runup Leads to One of the Biggest VC Payoffs Ever’ (Bloomberg, 22 March 2018) <https://www.bloomberg.com/news/articles/2018-03-22/naspers-sells-10-6-billion-of-tencent-to-fund-investments>>Google Scholar
Purtill, Corinne, ‘Your Phone Isn’t Really Spying on Your Conversations – The Truth Might Be Even Creepier’ (Quartz, 2 May 2018) <https://qz.com/1609356/your-phone-is-not-recording-your-conversations>>Google Scholar
Qi, Frida, ‘Tech Companies Prepare for Jumbo IPO Season in Hong Kong and Shanghai’ (SupChina, 15 January 2021) <https://supchina.com/2021/01/15/tech-companies-prepare-for-jumbo-ipo-season-in-hong-kong-and-shanghai/>>Google Scholar
Qiqing, Lin, ‘Outside the Green Bubble of China’s Super-App’ (Sixth Tone, 28 June 2018) <http://www.sixthtone.com/news/1002502/outside-the-green-bubble-of-chinas-super-app>>Google Scholar
Quakenbush, Casey, ‘Three Things to Know about China’s Kindergarten Abuse Scandal’ (Time, 27 November 2017) <http://time.com/5037556/china-beijing-kindergarten-abuse-scandal>>Google Scholar
Raby, Geoff, ‘Not All Successful Markets Are Free’ (Sydney Morning Herald, 7 August 2018) <https://www.smh.com.au/politics/federal/not-all-successful-markets-are-free-20180806-p4zvqt.html>>Google Scholar
Radinsky, Kira, ‘Data Monopolists Like Google Are Threatening the Economy’ (Harvard Business Review, 2 March 2015) <https://hbr.org/2015/03/data-monopolists-like-google-are-threatening-the-economy>>Google Scholar
Ramsey, Carly and Wootliff, Ben, ‘China’s Cyber Security Law: The Impossibility of Compliance?’ (Forbes, 29 May 2017) <https://www.forbes.com/sites/riskmap/2017/05/29/chinas-cyber-security-law-the-impossibility-of-compliance/#580961c7471c>>Google Scholar
Rayner, Tristan, ‘What China Is Doing to Create a Tech Edge over the US’ (Android Authority, 19 December 2017) <https://www.androidauthority.com/what-china-is-doing-to-create-a-tech-edge-over-the-us-823656>>Google Scholar
Redrup, Yolanda, ‘How Chinese e-Commerce Player JD.com Is Becoming an AI Powerhouse’ (Australian Financial Review, 21 July 2018) <https://www.afr.com/technology/how-chinese-ecommerce-player-jdcom-is-becoming-an-ai-powerhouse-20180719-h12vph>>Google Scholar
Reich, Robert, ‘Break Up Facebook (And While We’re at It, Google, Apple and Amazon)’ (The Guardian, 20 November 2018) <https://www.theguardian.com/commentisfree/2018/nov/20/facebook-google-antitrust-laws-gilded-age>>Google Scholar
Reisman, Dillon, ‘Where Is Your Data, Really? The Technical Case against Data Localization’ (Lawfare, 22 May 2017) <https://www.lawfareblog.com/where-your-data-really-technical-case-against-data-localization>>Google Scholar
Rivest, Ronald L, ‘The Case against Regulating Encryption Technology’ (Scientific American, October 1998) <https://people.csail.mit.edu/rivest/pubs/Riv98e.pdf>>Google Scholar
Rowley, Jason, ‘The Well-Funded Startups Driven to Own the Autonomous Vehicle Stack’ (TechCrunch, 27 May 2018) <https://techcrunch.com/2018/05/27/the-well-funded-startups-driven-to-own-the-autonomous-vehicle-stack>>Google Scholar
Rudder, Alana, ‘ML and AI Partner to Save Disaster Victims: How Aid Organizations Can Tap into Its Power’ (Towards Data Science, 5 April 2018) <https://towardsdatascience.com/ml-and-ai-partner-to-save-disaster-victims-how-aid-organizations-can-tap-into-its-power-b8de67e92a09>>Google Scholar
Russell, Chris, ‘Rules of the Game: Changes in China’s Foreign Investment Law’ (CKGSB Knowledge, 1 September 2014) <https://english.ckgsb.edu.cn/knowledges/rules-of-the-game-changes-in-chinas-foreign-investment-law/>>Google Scholar
Russell, Jon, ‘China Is Beating the US on AI, Says Noted Investor Kai-Fu Lee’ (TechCrunch, 7 September 2018) <https://techcrunch.com/2018/09/05/china-is-beating-the-us-on-ai-says-noted-investor-kaifu-lee>>Google Scholar
Russo, Bill, Tse, Edward and Chan, Alan, ‘Accelerating Innovation in China’s Automobility Sector’ (Gao Feng Advisory, April 2018) <http://www.edwardtseblog.com/view/accelerating-innovation-in-chinas-automobility-sector/>>Google Scholar
Saalman, Lora, ‘New Domains of Crossover and Concern in Cyberspace’ (Sipri.org, 26 July 2017) <https://www.sipri.org/commentary/topical-backgrounder/2017/new-domains-crossover-and-concern-cyberspace>>Google Scholar
Sacks, Samm, ‘Apple in China, Part I: What Does Beijing Actually Ask of Technology Companies?’ (Lawfare, 22 February 2016) <https://www.lawfareblog.com/apple-china-part-i-what-does-beijing-actually-ask-technology-companies>>Google Scholar
Sacks, Samm and Laskai, Lorand, ‘China’s Privacy Conundrum’ (Slate, 7 February 2019) <https://slate.com/technology/2019/02/china-consumer-data-protection-privacy-surveillance.html>>Google Scholar
Sacks, Samm and Li, Manyi Kathy, ‘How Chinese Cybersecurity Standards Impact Doing Business in China’ (CSIS, 2 August 2018) <https://www.csis.org/analysis/how-chinese-cybersecurity-standards-impact-doing-business-china>>Google Scholar
Sacks, Samm and O’Brien, Robert, ‘What to Make of the Newly Established CyberSecurity Association of China’ (CSIS, 25 May 2016) <https://www.csis.org/analysis/what-make-newly-established-cybersecurity-association-china>>Google Scholar
Sacks, Samm, Triolo, Paul and Webster, Graham, ‘Beyond the Worst-Case Assumptions on China’s Cybersecurity Law’ (New America, Blog Post, 13 October 2017) <https://www.newamerica.org/cybersecurity-initiative/blog/beyond-worst-case-assumptions-chinas-cybersecurity-law>>Google Scholar
Saran, Cliff, ‘Why AI Success Depends on IT Picking the Low-Hanging Fruit’ (Computer Weekly, 22 September 2017) <https://www.computerweekly.com/news/450426790/Why-AI-success-depends-on-IT-picking-the-low-hanging-fruit>>Google Scholar
Sawers, Paul, ‘Google and Huawei Partner to Bring RCS to Millions via Jibe and Android Messages App’ (Venture Beat, 18 January 2018) <https://venturebeat.com/2018/01/18/google-and-huawei-partner-to-bring-rcs-to-millions-via-jibe-and-android-messages-app>>Google Scholar
Schechner, Sam, MacMillan, Douglas and Lin, Liza, ‘US and Chinese Companies Race to Dominate AI’ (Wall Street Journal, 18 January 2018) <https://www.wsj.com/articles/why-u-s-companies-may-lose-the-ai-race-1516280677>>Google Scholar
Schneier, Bruce, ‘Should US Hackers Fix Cybersecurity Holes or Exploit Them?’ (The Atlantic, 19 May 2014) <https://www.theatlantic.com/technology/archive/2014/05/should-hackers-fix-cybersecurity-holes-or-exploit-them/371197>>Google Scholar
Schwartz, Oscar, ‘“The Discourse Is Unhinged”: How the Media Gets AI Alarmingly Wrong’ (The Guardian, 25 July 2018) <https://www.theguardian.com/technology/2018/jul/25/ai-artificial-intelligence-social-media-bots-wrong>>Google Scholar
Segal, Adam, ‘Beijing’s AI Strategy: Old-School Central Planning with a Futuristic Twist’ (Council on Foreign Relations, 9 August 2017) <https://www.cfr.org/blog/beijings-ai-strategy-old-school-central-planning-futuristic-twist>>Google Scholar
Sha, Liu, ‘Govt Takes Down Illegal Websites’ (Global Times, 14 January 2015) <http://www.globaltimes.cn/content/901784.shtml>>Google Scholar
Sha, Liu, ‘UISEE Finds a Short Cut for Driverless Cars’ (CKGSB Knowledge, 19 June 2017) <http://knowledge.ckgsb.edu.cn/2017/06/19/automobile-industry/uisee-technology-finds-shortcut-driverless-cars>>Google Scholar
Shafto, Patrick, ‘Why Big Tech Companies Are Open-Sourcing Their AI Systems’ (The Conversation, 16 February 2016) <https://theconversation.com/why-big-tech-companies-are-open-sourcing-their-ai-systems-54437>>Google Scholar
Shen, Jill, ‘Baidu Accelerating Automaker Deals for Car Software Deployment’ (Technode, 12 June 2019) <https://technode.com/2019/06/12/baidu-dueros-apollo-installment>>Google Scholar
Shen, Jill, ‘China Drafts Guidelines for AV Security, but Challenges Remain’ (Technode, 14 June 2019) <https://technode.com/2019/06/14/china-icv-policy-cesa-19>>Google Scholar
Shen, Samuel and Zhu, Julie, ‘Start-Ups Hopeful as China Readies Nasdaq-Style Tech Board’ (Reuters, 6 January 2019) <https://www.reuters.com/article/us-china-markets-exchange-tech/start-ups-hopeful-as-china-readies-nasdaq-style-tech-board-idUSKCN1P00PA>>Google Scholar
Shen, Timmy, ‘China’s Obsession with QR Codes’ (Technode, 16 February 2018) <https://technode.com/2018/02/16/photo-chinas-obsession-qr-codes>>Google Scholar
Shen, Xinmei, ‘Chinese Internet Users Criticize Baidu CEO for Saying People in China Are Willing to Give Up Data Privacy for Convenience’ (Abacus, 28 March 2018) <https://www.abacusnews.com/big-guns/chinese-internet-users-criticize-baidu-ceo-saying-people-china-are-willing-give-data-privacy/article/2139313>>Google Scholar
Shepherd, Christian, ‘China’s SenseTime Sells Out of Xinjiang Security Joint Venture’ (Financial Times, 15 April 2019) <https://www.ft.com/content/38aa038a-5f4f-11e9-b285-3acd5d43599e>>Google Scholar
Shi, Mingli, ‘Translation: Principles and Criteria from China’s Draft Privacy Impact Assessment Guide’ (New America, 13 September 2018) <https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-principles-and-criteria-from-chinas-draft-privacy-impact-assessment-guide>>Google Scholar
Shi, Mingli, ‘What China’s 2018 Internet Governance Tells Us about What’s Next’ (New America, 28 January 2019) <https://www.newamerica.org/cybersecurity-initiative/digichina/blog/what-chinas-2018-internet-governance-tells-us-about-whats-next>>Google Scholar
Shih, Gerry and Carsten, Paul, ‘Apple Begins Storing Users’ Personal Data on Servers in China’ (Reuters, 15 August 2014) <https://www.reuters.com/article/us-apple-data-china/apple-begins-storing-users-personal-data-on-servers-in-china-idUSKBN0GF0N720140815>>Google Scholar
Si, Ma, ‘China a Pioneer in AI Innovation’ (China Daily, 27 March 2018) <http://www.chinadaily.com.cn/a/201803/27/WS5ab9a24da3105cdcf65147e9.html>>Google Scholar
Simonite, Tom, ‘China Challenges Nvidia’s Hold on Artificial Intelligence Chips’ (Wired, 20 November 2017) <https://www.wired.com/story/china-challenges-nvidias-hold-on-artificial-intelligence-chips>>Google Scholar
Simonite, Tom, ‘How Health Care Data and Lax Rules Help China Prosper in AI’ (Wired, 8 January 2019) <https://www.wired.com/story/health-care-data-lax-rules-help-china-prosper-ai/>>Google Scholar
Soo, Zen, ‘Alibaba’s AutoNavi Becomes the First Chinese Maps Service to Navigate a Path to 100 Million Daily Users’ (South China Morning Post, 5 October 2018) <https://www.scmp.com/tech/enterprises/article/2167114/alibabas-autonavi-blazes-trail-first-chinese-maps-service-cross-100>>Google Scholar
Stevenson, Alexandra, ‘US Investor Tries to Shake Up Sina, a Pillar of China’s Internet’ (New York Times, 31 October 2017) <https://www.nytimes.com/2017/10/31/business/dealbook/china-sina-aristeia-proxy-fight.html>>Google Scholar
Stupp, Catherine, ‘Carmakers Fear EU Plans to Ease Data Flows Will Help Tech Rivals’ (Euractiv, 30 September 2016) <https://www.euractiv.com/section/transport/news/carmakers-fear-eus-plan-to-ease-data-flows-will-help-tech-rivals>>Google Scholar
Sun, Yiting, ‘China Wants to Make the Chips That Will Add AI to Any Gadget’ (MIT Technology Review, 24 January 2018) <https://www.technologyreview.com/2018/01/24/241365/china-wants-to-make-the-chips-that-will-add-ai-to-any-gadget/>>Google Scholar
Tai, Mariko, ‘Alibaba to Buy 33% of Spinoff Ant Financial’ (Nikkei Asia, 2 February 2018) <https://asia.nikkei.com/Asia300/Alibaba-to-buy-33-of-spinoff-Ant-Financial>>Google Scholar
Thompson, Nicholas and Bremmer, Ian, ‘The AI Cold War That Threatens Us All’ (Wired, 23 October 2018) <https://www.wired.com/story/ai-cold-war-china-could-doom-us-all>>Google Scholar
Thurm, Scott, ‘Chinese-American Elites Lament a Brewing Trade War’ (Wired, 6 May 2018) <https://www.wired.com/story/chinese-american-elites-lament-a-brewing-trade-war>>Google Scholar
Tobin, Meaghan, ‘China Wants to Build an Open Source Ecosystem to Rival GitHub (Rest of the World, 19 January 2021) <https://restofworld.org/2021/china-gitee-to-rival-github/>>Google Scholar
Triolo, Paul and Goodrich, Jimmy, ‘From Riding a Wave to Full Steam Ahead’ (New America, 28 February 2018) <https://www.newamerica.org/cybersecurity-initiative/digichina/blog/riding-wave-full-steam-ahead>>Google Scholar
Triolo, Paul and Scott, Matt, ‘China’s AI Trajectory Is Set by Entrepreneurs and International Collaboration, not by Government Edict’ (SupChina Project, 19 April 2019) <https://supchina.com/2019/04/19/chinas-ai-trajectory-is-set-by-entrepreneurs-and-international-collaboration-not-by-government-edict>>Google Scholar
Tse, Edward, ‘Don’t Belittle China’s Innovation Potential’ (Europe’s World, 14 February 2014) <https://www.friendsofeurope.org/insights/dont-belittle-chinas-innovation-potential>>Google Scholar
Udemans, Chris, ‘Chinese Care More about Data Privacy than You Think, but They Still Need Better Protection’ (TechNode, 15 May 2018) <https://technode.com/2018/05/15/data-privacy-china>>Google Scholar
Udemans, Chris, ‘Didi Launches Open Platform for Smart Transportation, AI Services’ (Technode, 9 May 2019) <https://technode.com/2019/05/10/didi-open-ai-transport>>Google Scholar
Udemans, Chris, ‘Second-Hand Mobile Phone User Data Is Being Sold in China for as Little as RMB 10’ (TechNode, 1 June 2018) <https://technode.com/2018/06/01/mobile-phone-user-data>>Google Scholar
Udemans, Chris, ‘Tencent Enforces Real-Name Verification in “Honor of Kings”’ (TechNode, 17 September 2018) <https://technode.com/2018/09/17/real-name-verification-honor-of-kings>>Google Scholar
US Information Technology Office, ‘TC260 Drafts New Standard for China’s Cloud Security Review Regime’ (USITO, 26 June 2015) <http://www.usito.org/news/tc260-drafts-new-standard-chinas-cloud-security-review-regime>>Google Scholar
Vincent, James, ‘AI Researchers Debate the Ethics of Sharing Potentially Harmful Programs’ (Verge, 21 February 2019) <https://www.theverge.com/2019/2/21/18234500/ai-ethics-debate-researchers-harmful-programs-openai>>Google Scholar
Jinping, Xi, ‘Remarks by HE Xi Jinping President of the People’s Republic of China at the Opening Ceremony of the Second World Internet Conference’ (Speech, Wuzhen, 16 December 2015) https://www.fmprc.gov.cn/mfa_eng/wjdt_665385/zyjh_665391/t1327570.shtmlGoogle Scholar
Wagner, Jack, ‘China’s Cybersecurity Law: What You Need to Know’ (The Diplomat, 1 June 2017) <https://thediplomat.com/2017/06/chinas-cybersecurity-law-what-you-need-to-know>>Google Scholar
Wang, Eudora, ‘Chinese AI Firm 4Paradigm Pockets $700m Led by Boyu, Primavera, Hopu’ (Deal Street Asia, 23 January 2021) <https://www.dealstreetasia.com/stories/4paradigm-funding-224587/>>Google Scholar
Wang, Ke, ‘Xiaogang Village, Birthplace of Rural Reform, Moves On’ (China.org.cn, undated) <http://www.china.org.cn/china/features/content_16955209.htm>>Google Scholar
Wang, Lianzhang, ‘Apps That “Unlock” Wi-Fi Investigated for Privacy Breaches’ (Sixth Tone, 4 April 2018) <https://www.sixthtone.com/news/1002042/apps-that-unlock-wi-fi-investigated-for-privacy-breaches>>Google Scholar
Wang, Serenitie and Shane, Daniel, ‘Jack Ma Endorses China’s Controversial 12 Hours a Day, 6 Days a Week Work Culture’ (CNN Business, 2 April 2019) <https://edition.cnn.com/2019/04/15/business/jack-ma-996-china/index.html>>Google Scholar
Waters, Richard, ‘Making It Big in China Requires a Large Measure of Localisation’ (Financial Times, 20 August 2015) <https://www.ft.com/content/0d472a74-4752-11e5-af2f-4d6e0e5eda22?mhq5j=e5>>Google Scholar
Webster, Graham and Triolo, Paul (trans), ‘Translation: China Proposes “Global Data Security Initiative”’ (New America, 7 September 2020) <https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-chinese-proposes-global-data-security-initiative/>>Google Scholar
Webster, Graham and Sacks, Samm, ‘Five Big Questions Raised by China’s New Draft Cross-Border Data Rules’ (New America, 13 June 2019) <https://www.newamerica.org/cybersecurity-initiative/digichina/blog/five-big-questions-raised-chinas-new-draft-cross-border-data-ruless>>Google Scholar
Webster, Graham et al., ‘China’s Plan to “Lead” in AI: Purpose, Prospects, and Problems’ (New America, 1 August 2017) <https://www.newamerica.org/cybersecurity-initiative/blog/chinas-plan-lead-ai-purpose-prospects-and-problems/>>Google Scholar
Wei, He, ‘Ma: Embrace AI Opportunities’ (China Daily, 21 September 2018) <http://www.chinadaily.com.cn/a/201809/21/WS5ba444dca310c4cc775e7726.html>>Google Scholar
Wei, Lu, ‘Cyber Sovereignty Must Rule Global Internet’ (Huffington Post, 15 December 2014) <https://www.huffingtonpost.com/lu-wei/china-cyber-sovereignty_b_6324060.html>>Google Scholar
Wertime, David, ‘It’s Official: China Is Becoming a New Innovation Powerhouse: The World’s Factory Is Turning into an R&D Machine – And Fast Catching Up with America’ (Foreign Policy, 7 February 2014) <https://foreignpolicy.com/2014/02/07/its-official-china-is-becoming-a-new-innovation-powerhouse>>Google Scholar
Wharton Business School, ‘“Land-Grab Mentality”: The Cutthroat Competition on China’s Internet’ (Knowledge @Wharton, 14 December 2010) <https://knowledge.wharton.upenn.edu/article/land-grab-mentality-the-cutthroat-competition-on-chinas-internet>>Google Scholar
Wheatley, Mike, ‘Huawei Open-sources AI Framework MindSpore to Rival Google’s TensorFlow’ (Silicon Angle, 30 March 2020) <https://siliconangle.com/2020/03/30/huawei-open-sourced-ai-framework-called-mindspore-rival-googles-tensorflow/>>Google Scholar
Wiggers, Kyle, ‘Baidu Launches EZDL, an AI Model Training Platform That Requires No Coding Experience’ (Venture Beat, 1 September 2018) <https://venturebeat.com/2018/09/01/baidu-launches-ezdl-an-ai-model-training-platform-that-requires-no-coding-experience>>Google Scholar
Wiggers, Kyle, ‘Baidu Releases Apollo 5.0 with Upgrades for “Complex” Road Scenarios’ (Venture Beat, 1 July 2019) <https://venturebeat.com/2019/07/01/baidu-releases-apollo-5-0-with-upgrades-for-complex-road-scenarios>>Google Scholar
Wildau, Gabriel and Jia, Yizhen, ‘Collapse of Chinese Peer-to-Peer Lenders Sparks Investor Panic’ (Financial Times, 22 July 2018) <https://www.ft.com/content/75e75628-8b27-11e8-bf9e-8771d5404543>>Google Scholar
Williams, Greg, ‘Why China Will Win the Global Race for Complete AI Dominance’ (Wired, 16 April 2018) <https://www.wired.co.uk/article/why-china-will-win-the-global-battle-for-ai-dominance>>Google Scholar
Wong, Sue-Lin, ‘China Court Ruling Could Threaten Foreign Investments in Country’ (New York Times, 19 June 2013) <https://cn.nytimes.com/business/20130619/c19vie/en-us>>Google Scholar
Xiang, Nina, ‘China’s AI Industry Has Given Birth to 14 Unicorns: Is It a Bubble Waiting to Burst?’ (Forbes, 5 October 2018) <https://www.forbes.com/sites/ninaxiang/2018/10/05/chinas-ai-industry-has-given-birth-to-14-unicorns-is-it-a-bubble-waiting-to-pop/#2b68965246c3>>Google Scholar
Xiaojing, Liu and Rongde, Li, ‘QQ Blocks Thousands of Accounts for Selling Private Information’ (Caixin Global, 21 February 2017) <https://www.caixinglobal.com/2017-02-21/qq-blocks-thousands-of-accounts-for-selling-private-information-101057642.html>>Google Scholar
Xu, Wei, ‘China to Further Promote Innovation and Entrepreneurship’ (State Council of the People’s Republic of China, 12 July 2017) <http://english.gov.cn/premier/news/2017/07/12/content_281475723086902.htm>>Google Scholar
Yang, Fan, ‘Tech Showcase: OpenPAI: Open Source Initiative for AI Platform in China’ (Microsoft.com, 2 August 2018) <https://www.microsoft.com/en-us/research/video/openpai-open-source-initiative-for-ai-platform-in-china>>Google Scholar
Yang, Hongquan, ‘China – the Privacy, Data Protection and Cybersecurity Law Review – Edition 6’ (The Law Reviews, October 2019) <https://thelawreviews.co.uk/edition/the-privacy-data-protection-and-cybersecurity-law-review-edition-6/1210009/china>>Google Scholar
Yang, Yuan, ‘China’s Data Privacy Outcry Fuels Case for Tighter Rules’ (Financial Times, 1 October 2018) <https://www.ft.com/content/fdeaf22a-c09a-11e8-95b1-d36dfef1b89a>>Google Scholar
Yang, Yuan, ‘China’s Tech Groups Bow to Beijing Censorship Demands’ (Financial Times, 29 June 2017) <https://www.ft.com/content/43def3ec-5c8f-11e7-9bc8-8055f264aa8b?mhq5j=e1>>Google Scholar
Yang, Yuan, ‘Chinese Hackers Defy Government Warnings at Beijing Def Con’ (Financial Times, 14 May 2018) <https://www.ft.com/content/f03995de-5711-11e8-bdb7-f6677d2e1ce8?desktop=true>>Google Scholar
Yanrong, Kang, Whyte, Jeanette and Hart, Thomas, ‘Comparative Study of Smart Cities in Europe and China’ (White Paper, EU–China Policy Dialogues Support Facility II (PDSF), March 2014) <http://euchina-ict.eu/wp-content/uploads/2015/01/Smart_City_report_draft-White-Paper-March-2014.pdf> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
Yasheng, Huang, ‘China’s Use of Big Data Might Actually Make It Less Big Brother-ish’ (MIT Technology Review, 22 August 2018) <https://www.technologyreview.com/s/611814/chinas-use-of-big-data-might-actually-make-it-less-big-brother-ish>>Google Scholar
Yeung, Karen and Ng, Eric, ‘China to Spearhead US$1 Trillion Autonomous Driving Revolution’ (South China Morning Post, 13 December 2017) <https://www.scmp.com/business/china-business/article/2124042/china-spearhead-us1-trillion-autonomous-driving-revolution>>Google Scholar
Yi, Ding, ‘Baidu Wins California Permit to Test Fully Driverless Vehicles’ (Caixin, 20 June 2021) <https://www.caixinglobal.com/2021-01-28/baidu-wins-california-permit-to-test-fully-driverless-vehicles-101657263.html>>Google Scholar
Yingqi, Li, ‘China Eyes Wider Application of AI Technologies’ (People’s Daily, 14 March 2018) <http://en.people.cn/n3/2018/0314/c90000-9437000.html>>Google Scholar
Yu, Eileen, ‘Alibaba’s Fiscal 2017 Revenue Climbs 56% on Cloud, Mobile Commerce Growth’ (ZDnet, 18 May 2017) <http://www.zdnet.com/article/alibabas-fiscal-2017-revenue-climbs-56-percent-on-cloud-mobile-commerce-growth>>Google Scholar
Yuan, Li, ‘China Is Losing to the US in High-Stakes Battle for Artificial Intelligence Talent’ (Wall Street Journal, 23 March 2017) <https://www.wsj.com/articles/baidus-loss-is-a-setback-for-ai-in-china-1490270411?mg=prod/accounts-wsj>>Google Scholar
Yuan, Li, ‘For China’s Business Elites, Staying Out of Politics Is No Longer an Option’ (New York Times, 6 July 2021) <https://www.nytimes.com/2021/07/06/technology/china-business-politics-didi.html>>Google Scholar
Yunxu, Qu, Caiping, Liu and Wei, Han, ‘Alibaba, JD.com on Fast Track for Homecoming’ (Caixin Global, 22 March 2018) <https://www.caixinglobal.com/2018-03-22/alibaba-jdcom-on-fast-track-for-homecoming-101224491.html>>Google Scholar
Yuzhe, Zhang and Xiao, Liu, ‘Alipay Racks Up More Penalties for Rule Violations’ (Caixin Global, 9 April 2018) <https://www.caixinglobal.com/2018-04-09/alipay-racks-up-more-penalties-for-rule-violations-101232168.html>>Google Scholar
Zaagman, Elliot, ‘Github Gives Chinese Developers Censor-Proof Forum’ (Technode, 16 April 2019) <https://technode.com/2019/04/16/github-gives-chinese-developers-censor-proof-forum>>Google Scholar
Zapotosky, Matt, ‘FBI Has Accessed San Bernardino Shooter’s Phone without Apple’s Help’ (Washington Post, 28 March 2016), <https://www.washingtonpost.com/world/national-security/fbi-has-accessed-san-bernardino-shooters-phone-without-apples-help/2016/03/28/e593a0e2-f52b-11e5-9804-537defcc3cf6_story.html>>Google Scholar
Zhang, Bonnie, ‘Tencent, Didi, Baidu among the Seven Companies Approved for Autonomous Car Road Tests in Beijing’ (Pandaily, 25 September 2018) <https://pandaily.com/tencent-didi-baidu-among-the-seven-companies-approved-for-autonomous-car-road-tests-in-beijing>>Google Scholar
Zhang, Sarah, ‘China’s Artificial-Intelligence Boom’ (The Atlantic, 16 February 2017) <https://www.theatlantic.com/technology/archive/2017/02/china-artificial-intelligence/516615>>Google Scholar
Zhang, Sarah, ‘Society Shanghai Begins Driverless Trains Trial Run on Metro Line’ (South China Morning Post, 1 April 2018) <http://www.scmp.com/news/china/society/article/2139814/shanghai-begins-driverless-trains-trial-run-metro-line>>Google Scholar
Zhang, Shidong, ‘China’s Regulator Quietly Removes Capital-Sapping CDRs as It Vows Reforms to Soothe Frayed Nerves’ (South China Morning Post, 9 August 2018) <https://www.scmp.com/business/china-business/article/2158953/chinas-regulator-quietly-removes-capital-sapping-cdrs-it>>Google Scholar
Zhang, Shidong, ‘US Semiconductor Makers Dwarf Chinese Peers in Market Valuation as China’s Chip Dream Remains Distant’ (South China Morning Post, 23 April 2018) <https://www.scmp.com/business/china-business/article/2142929/us-semiconductor-makers-dwarf-chinese-peers-market-valuation>>Google Scholar
Zhang, Yan, Ramli, David and Chen, Lulu, ‘Wanted in China: Detailed Maps for 30 Million Self-Driving Cars’ (Bloomberg, 22 August 2018) <https://www.bloomberg.com/news/articles/2018-08-22/wanted-in-china-detailed-maps-for-30-million-self-driving-cars>>Google Scholar
Zhang, Yunan, ‘China’s Autonomous Driving Startups Join the Billion-Dollar Club’ (The Information, 23 November 2018) <https://www.theinformation.com/articles/chinas-autonomous-driving-startups-join-the-billion-dollar-club>>Google Scholar
Zhao, Runhua, ‘China Looks to Private Capital, Open Source Technology for Global Tech Game Advantage’ (Technode, 20 December 2018) <https://technode.com/2018/12/20/china-global-tech-game-advantage>>Google Scholar
Zhou, Zunyou, ‘China’s Comprehensive Counter-Terrorism Law’ (The Diplomat, 23 January 2016) <https://thediplomat.com/2016/01/chinas-comprehensive-counter-terrorism-law>>Google Scholar
Zhou, Youyou, ‘Four of the Top 25 Github Projects Are Written in Chinese, Six Contain No Code’ (Quartz, 18 May 2018) <https://qz.com/1280215/four-of-the-top-25-github-projects-are-written-in-chinese-six-contain-no-code>>Google Scholar
Zhao, Runhua, ‘Microsoft to Set Up Asia AI Research Branch in Shanghai’ (Technode, 17 September 2018) <https://technode.com/2018/09/17/microsoft-research-asia-shanghai>>Google Scholar
Zhu, Julie and Cohen, Tova, ‘China’s Tech Money Heads for Israel as US Welcome Wanes’ (Reuters, 11 May 2017) <http://www.reuters.com/article/us-china-investment-israel-idUSKBN187080>>Google Scholar
«15 个部委合力 首批 4 家国家创新平台确立–聚焦我国新一代人工智能发展规划» [15 Ministries Join Forces to Establish the First Batch of 4 National Innovation Platforms – Focusing on China’s New Generation of AI Development Plan] (Gov.cn, 23 November 2017) <http://www.gov.cn/guowuyuan/2017-11/23/content_5241718.htm>>Google Scholar
« 47 次《中国互联网络发展状况统计报告》 [47th Statistical Report on the Development of the Internet in China] (CNNIC, 3 February 2021) <http://www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/202102/t20210203_71361.htm>>Google Scholar
«2018 微信年度数据报告: 00 后睡觉少, 70 后爱刷朋友圈» [WeChat Annual Data Report: Less Sleep after Midnight and 70 Love to Swipe Friends Groups] (Sina, 9 January 2019) <https://tech.sina.com.cn/i/2019-01-09/doc-ihqhqcis4468637.shtml>>Google Scholar
«AI 芯片卡位战: 谁赢得自动驾驶处理器, 谁就赢得了AI 时代» [AI Chip War: Whoever Wins the Autonomous Processor Race Will Win the AI Era] (Sequoia Exchange, 26 April 2018) <https://mp.weixin.qq.com/s/0Th9C7pwhGU9D1vEkShZE> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
«中央网信办: 正制定个人信息收集规范标准» [CAC: Establishing a Standard for Collecting Personal Information] (Xinhua, 11 November 2016) <http://news.xinhuanet.com/2016-11/11/c_1119897534.htm>>Google Scholar
«习近平: 把我国从网络大国建设成为网络强国» [Xi Jinping: Build Our Country from a Large Network Country into a Strong Network Country] (Xinhua, 27 February 2014) <http://news.xinhuanet.com/politics/2014-02/27/c_119538788.htm>>Google Scholar
«人工智能国家队正式出炉 阿里云负责建设城市大脑» [The AI National Team Officially Released Alibaba Cloud to Build the City Brain] (Sohu, 16 November 2017) <http://www.sohu.com/a/204718930_694841>>Google Scholar
«你的个人信息安全吗? 工信部约谈百度蚂蚁金服今日头条?» [Is Your Personal Information Safe? MIIT Cites Baidu, Ant Financial and Jinri Toutiao’s Conduct] (Sina, 12 January 2018) <http://tech.sina.com.cn/roll/2018-01-12/doc-ifyqqciz5880474.shtml>>Google Scholar
«创新工场智能投资基金落户广州, 目标总规模 25 亿» [Innovative Workshop Smart Investment Fund Settled in Guangzhou with a Total Target of 2.5 Billion] (Innovation Works WeChat page, 24 May 2018) <https://mp.weixin.qq.com/s/V7MVeYST17wQKau_7GjIpg>>Google Scholar
«印发 智能网联汽车道路测试管理规范 (试行)» [Three Ministries and Commissions: Issued the ‘Intelligent Network Linked Vehicle Road Test Management Regulations (Trial)’] (Tencent Research Institute, 16 April 2018) <https://mp.weixin.qq.com/s/yK2G1LMKPAdGLdnGN5-BLQ>>Google Scholar
«商汤继 BAT, 科大讯飞后成第五个国家人工智能开放创新平台» [SenseTime Follows BAT and IFlytek to Become the Fifth National Artificial Intelligence Open Innovation Platform] (Sohu, 20 September 2018) <https://www.sohu.com/a/254985856_115565>>Google Scholar
«国家互联网信息办公室网络安全协调局约谈 ‘支付宝年度账单事件’ 当事企业负责人» [National Internet Information Office Cyber Security Coordination Bureau Schedules a Meeting to Talk to the Business Leaders Responsible for the ‘Alipay Annual Event’] (CAC.gov.cn, 10 January 2018) <http://www.cac.gov.cn/2018-01/10/c_1122234687.htm>>Google Scholar
«国家级 ‘新一代人工智能开放创新平台’ 怎么建» [How to Build a National New-Generation AI Open Innovation Platform] (Xinhua, 27 November 2017) <http://www.xinhuanet.com//tech/2017-11/27/c_1122013676.htm>>Google Scholar
«关于 Megvii Technology Limited 公开发行存托凭证并在科创板上市 之辅导基本情况表» [CITIC Securities Co, Ltd Notice about Megvii Technology Limited Public Issuance of Depositary Receipts and Listing on the Science and Technology Innovation Board] (China Securities Regulatory Commission, 29 September 2020) <http://www.csrc.gov.cn/pub/beijing/bjfdqyxx/bjfdqyjbqk/202101/P020210112533742962617.pdf>>Google Scholar
«我们真的在意隐私吗: 多少中国网民’一套密码走天下’?» [Do We Really Care about Privacy: How Many Chinese Netizens ‘Have a Set of Passwords to Go Online’?] (Qianjia Net, 15 August 2018) <http://www.qianjia.com/html/2018-08/15_301849.html>>Google Scholar
«揭秘个人信息交易黑市: 内部分工明确 日交易额百万» [Exposing the Personal Information Transaction Black Market: The Scheme Is Exposed, the Daily Trade Is Worth Millions] (People’s Daily, 11 October 2018) <http://tech.qq.com/a/20181011/003346.htm>>Google Scholar
«李彦宏称中国人愿意用隐私换便利, 你认可他的观点吗?» [Robin Li Said That Chinese People Are Willing to Trade Privacy for Convenience. Do You Agree?] (Weibo, May 2018) <http://vote.weibo.com/poll/138701440> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
«根据 ‘规划’ 将形成 ‘1+N’ 人工智能项目群» [According to the Plan the ‘1+N’ AI Project Group Will Be Formed] (State Council Information Office, 21 July 2017) <http://www.scio.gov.cn/32344/32345/35889/36946/zy36950/Document/1559032/1559032.htm>>Google Scholar
«涉嫌侵犯用户隐私 工信部约谈百度、支付宝、今日头条» [User Privacy Infringements Alleged, MIIT Cites Baidu, Ant Financial and Jinri Toutiao’s conduct] (Xinhua, 12 January 2017) <http://www.xinhuanet.com/fortune/2018-01/12/c_1122250046.htm>>Google Scholar
«百度推出 Apollo 3.5 和 Apollo Enterprise» [Baidu Launches Apollo 3.5 and Apollo Enterprise] (Baidu Official Blog, 9 January 2019) <https://www.infoq.cn/article/3NA0SmwHbeg_CaUEXgxR>>Google Scholar
«百度用网盘、发贴、评论都得实名认证» [Those Who Use Baidu’s Network, Posting or Comments Functions Must All Undergo Real-Name Certification] (Xianji, 11 May 2017) <https://www.xianjichina.com/news/details_35326.html>>Google Scholar
«百度系两款 APP 未经提示开启隐私权限» [Two Baidu Apps Expand the Limits of Privacy Permission without Giving Warnings] (Xinhua, 28 March 2018) <http://www.xinhuanet.com/fortune/2018-03/28/c_1122600485.htm>>Google Scholar
«百度联手北环卫发布 7 款智能环卫产品» [Baidu Teamed Up with Northern Environmental Protection Department to Release 7 Smart Sanitation Products] (PingWest, 28 September 2018) <https://www.pingwest.com/w/177811>>Google Scholar
«盘点: 2018 年全国各级网信办互联网乱象规范治理工作» [Inventory: 2018 Work on Standardizing Governance by CAC at Every Level throughout China of Disorderly Online Practices] (China Information Security, 1 September 2018) <https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664115873&idx=1&sn=29fc50a73b0b3e92260ac511ccc9d854&chksm=8b5e2c58bc29a54ee0282605911888e1153f156c77f823df938bb67bc9797d3746d47d6f74ac&scene=0&xtrack=1#rd>>Google Scholar
«腾讯 QQ 群机器人服务调整中: QQ 小冰、Baby Q 被关闭» [Tencent’s QQ Chatbot Suspended: QQ Xiaobing, Baby Q Shut Down] (Sina, 30 July 2017) <http://tech.sina.com.cn/i/2017-08-03/doc-ifyitamv4697563.shtml>>Google Scholar
«谁卖了我的手机号? 手机信息被盗一年损失近千亿» [Who Sold My Mobile Number? Mobile Phone Information Stolen Worth Nearly 100 Billion in One Year] (People’s Daily, 21 December 2017) <http://it.people.com.cn/n1/2017/1221/c1009–29720427.html>>Google Scholar
«辛识平: 奋斗应提倡, 996 当退场» [Xin Zhiping: The Struggle Should be Advocated, 996 Should Be Ended] (Xinhua, 15 April 2019) <http://www.xinhuanet.com/politics/2019-04/15/c_1124370790.htm>>Google Scholar
«重大预警! 多家国家机关、金融机构 Wi-Fi 密码被窃, 9 亿用户如同 ‘裸奔’» [Major Warning! Wi-Fi Passwords of Many State Agencies and Financial Institutions Stolen, 900 Million Users Are ‘Exposed’] (CCTV Finance, 28 March 2018) <https://mp.weixin.qq.com/s/ZZnnyuIJRKV9vnYEHSbjAQ>>Google Scholar
«重磅: 百度 Apollo 发布全球首个车路协同开源方案» [Heavyweight: Baidu Apollo Releases the World’s First Car Road Collaborative Open Source Solution] (Baidu Public Policy Research Institute, 14 September 2018) <https://mp.weixin.qq.com/s/p7TWjidyZ5eN5Uhc3yx1-g>>Google Scholar
«阿里云涉侵权被判赔 26 万: ‘宁输官司也要保护隐私» [AliYun (AliCloud) Alleged Infringement: 26 Million Awarded: ‘Would Rather Face a Lawsuit in Order to Protect Users’ Privacy’] (Sina, 3 June 2017) <http://tech.sina.com.cn/i/2017-06-03/doc-ifyfuzmy1489932.shtml>>Google Scholar
«雄安: 年» [Xiongan: After One Year] (The Paper, 1 April 2018) <https://www.thepaper.cn/newsDetail_forward_2048269>>Google Scholar
«雄安新区: 周年 这座城正在如何改变?» [The First Anniversary of Xiongan: How Is the City Changing?] (China News, 1 April 2018) <http://www.chinanews.com/gn/2018/04-01/8480837.shtml>>Google Scholar
«深圳星行科技有限公司关于处理周光违纪行为的公告» [Shenzhen Xingxing Technology Co, Ltd Announcement on Handling Zhou Guang’s Disciplinary Behaviour] (Roadstar.ai Official WeChat Account, 21 January 2019) <https://mp.weixin.qq.com/s?__biz=MzU3MDA5ODkyOQ==&mid=2247484868&idx=1&sn=5c340f0169fa3e5dc811596d9a06bcf9&chksm=fcf5d05acb82594c13b1f0f1528a52593a586906d547714984aa7bf048cd83b5ff72df54d5fb&mpshare=1&scene=1&srcid=0121aLVkJQh096XryqUdXhfT#rd>>Google Scholar
«从首家无人车公司猝死,看股权设计 7 个原则» [Beyond the Sudden Death of a Leading Autonomous Car Company, a Look at the Company’s 7 Equitable Principles] (China HRD, 4 October 2019) <http://www.chinahrd.net/blog/412/469578/411740.html>>Google Scholar
«习近平在世界经济论坛 “达沃斯议程” 对话会上的特别致辞» [Full Text: Special Address by Chinese President Xi Jinping at the World Economic Forum Virtual Event of the Davos Agenda] (Xinhua, 25 January 2021) <http://www.xinhuanet.com/politics/leaders/2021-01/25/c_1127023884.htm>>Google Scholar
«工信部携 Gitee 入场,国内开源生态建设进入快车道» [MIIT Backs Gitee, to Support the Development of the Domestic Open Source Ecosystem] (Gitee, July 2020) <https://blog.gitee.com/2020/08/17/gitee-gxb/>>Google Scholar
«腊月十二, 来听互联网隐私保护界最 ‘硬核’ 的故事» [Twelfth Day of the Lunar Month, Come and Listen to the Most ‘Hardcore’ Story in the Internet Privacy Protection Community’] (Privacy Guard in the Southern Metropolis Daily, 9 January 2019) <https://m.mp.oeeee.com/a/BAAFRD000020190109129910.html>>Google Scholar
阿司匹林 [Aspirin – a pen name], «GitHub 汽车标星 20000+, 国产 AI 开源从算法开始突破 | 专访商汤联合创始人林达华» [20,000+ Stars on Github, a Domestically Developed AI Open Source Software Starts to Breakthrough | Interview with Lin Dahua, Sensetime Cofounder] (CSDN, 31 August 2020) <https://mp.weixin.qq.com/s/7LLfEEONLaVTxAQDke87xw?fbclid=IwAR30b6jkmKfnrPrQR5lww4w_3qtmBBBmlfWZT8AxDiXgetqnZ13GmJ31qTw>>Google Scholar
刘俊海 [Junhai, Liu], «网安法一周年: 网络安全筑起五道 ‘防火墙’» [The One Year Anniversary of the Cyber Security Law: Cyber Security Builds Five ‘Firewalls’] (China Information Security, 2 June 2018) <https://mp.weixin.qq.com/s/cjMZ1Km4bfNjwaIvw9u5Mw>>Google Scholar
刘迈 [Mai, Liu], «GDPR 之风盛行, 美, 印, 巴接连启动数据保护立法» [The Winds of the GDPR Are Blowing, as the United States, India and Pakistan Successively Initiate Data Protection Legislation] (Baidu Institute for Public Policy, 29 August 2018) <https://mp.weixin.qq.com/s/ePwUquQL9gZ3EeANnGAwDA>>Google Scholar
吴晓灵、周学东 [Xiaoling, Wu and Xuedong, Zhou], «吴晓灵、周学东: 建议尽快制定 ‘个人信息保护法’» [Wu Xiaoling and Zhou Xuedong: Recommended Formulating the Personal Information Protection Law as Soon as Possible] (Caixin, 16 March 2018) <http://topics.caixin.com/2017-03-16/101066803.html>>Google Scholar
张一琪 [Yiqi, Zhang], «今天, 个人该怎样保护隐私» [Today, How Do Individuals Protect Privacy?] (People’s Daily, 16 April 2018) <https://mp.weixin.qq.com/s/rSW-Ayu6zNXw87itYHcPYA>>Google Scholar
张朝 [Chao, Zhang], «张朝: 百度隐私保护经验分享» [Sharing Baidu’s Privacy Protection Experience] (Baidu Institute for Public Policy, 13 August 2018) <https://mp.weixin.qq.com/s/2cw5suQgwIY8augRepLjNQ>>Google Scholar
张林成 [Lincheng, Zhang], «微信官方:我们不留存任何用户的聊天记录» [WeChat Official: We Don’t Keep Users’ Chat History] (TechNode, 2 January 2018) <https://cn.technode.com/post/2018-01-02/wei-xin-yinsi>>Google Scholar
彭云燕 [Yunyan, Peng], «邓玉峰个展开幕 34.6 万武汉公民的秘密被 ‘公之于众’ [Deng Yufeng’s Opening Ceremony: 346,000 Wuhan Citizens’ Secrets ‘Made Public’] (1Shoucang, 4 April 2018) <http://www.1shoucang.com/article-41710-1.html>>Google Scholar
方可成 [Kecheng, Fang], «搜索引擎百度已死 (以及我的几点补充)» [Search Engine Baidu is Already Dead (as Well as a Few Other Points)] (Weibo, 23 January 2019) <https://www.weibo.com/ttarticle/p/show?id=2309404331600992154916#_0>>Google Scholar
李开复 [Lee, Kai-Fu], «李开复: 人工智能超级大国的那些事» [Kai-Fu Lee: The Things That Are Needed to Create an Artificial Intelligence Superpower] (Sina, 23 August 2018) <http://tech.sina.com.cn/csj/2018-08-23/doc-ihicsiav6703902.shtml>>Google Scholar
李诗 [Shi, Li], «商汤成为第五大国家人工智能开放创新平台» [Sensetime Becomes the Fifth Company to Join the National Artificial Intelligence Open Innovation Platform] (Leifeng, 20 September 2018) <https://www.leiphone.com/news/201809/Xf5pNSS103T1cZMh.html>>Google Scholar
杨鑫倢 [Xinyu, Yang], «独家: 51Job 百万条用户信息外泄?暗网售价 12 个比特币» [Exclusive: Millions of 51Job Users Information Leaked? The Darknet Price Is 12 Bitcoins] (The Paper, 15 June 2018) <https://www.thepaper.cn/newsDetail_forward_2198458>>Google Scholar
洪延青 [Yangqing, Hong], «数据出境安全评估: 保护基础性战略资源的重要一环» [Outbound Data Security Assessment: An Important Part of Protecting Basic Strategic Resources] (CAC, 7 August 2017) <http://www.cac.gov.cn/2017-08/07/m_1121443948.htm> (the link is no longer active)+(the+link+is+no+longer+active)>Google Scholar
洪延青 [Yanqing, Hong], «对 ‹个人信息安全规范› 五大重点关切的回应和解释» [Responses and Explanations to the Five Major Concerns of the Personal Information Security Specification] 网安寻路人 Wanganxunluren (5 February 2018) <https://mp.weixin.qq.com/s/rSW-Ayu6zNXw87itYHcPYA>>Google Scholar
洪延青 [Yanqing, Hong], «解析 ‘个人信息出境安全评估办法 (征求意见稿)’ 实体保护规则背后的主要思路» [An Analysis of the Main Ideas behind the Entity Protection Rules of the ‘Measures for the Assessment of Outbound Security of Personal Information (Opinion-Seeking Draft)’] (CAC, 15 June 2019) <https://mp.weixin.qq.com/s/sCGZtqmQBWyH_sSan8q-Eg>>Google Scholar
洪杉 [Shan, Hong] «当顶尖的 AI 创业者济济一堂, 他们在谈些什么? 特别报道» [When Top AI Entrepreneurs Come Together, What Do They Talk About? Special Report] (Sequoia Exchange, 27 August 2018) <https://mp.weixin.qq.com/s/1F2IZ_DGQ318nDDQsmu8Yg>>Google Scholar
王刚 [Gang, Wang], «BAT, 科大讯飞, 商汤等 5 大 AI 国家队的一次 集体工作汇报» [A Collective Work Report of the Five Major ‘National Team’ Members – BAT, iFlytek, and Sensetime] (Leiphone, 11 May 2019) <https://mp.weixin.qq.com/s/ksJm980HsmfUEhI5U6UQlg?fbclid=IwAR3BGbjFtiz1UFtMRWvYPjkfWDfGf3KgsIWJtVKn_UwXjAdGyC3wE_cnZ-I>>Google Scholar
王融 [Rong, Wang], «TC 杭州: 王坚博士: ‘人工智能’ 是人类傲慢的名词产物» [TC Hangzhou: Dr Jian Wang: ‘Artificial Intelligence’ Is a Name Resulting from Human Arrogance] (TechCrunch, 2 July 2018) <https://mp.weixin.qq.com/s/1jNalbynko_MtPxQ_PERBQ>>Google Scholar
王融 [Rong, Wang], «自动驾驶三件事, 安全、安全、还是安全!» [The Three Keys to Drive Autonomously: Safety, Safety, and Safety!] (Baidu AI, 26 July 2018) <https://mp.weixin.qq.com/s/Ro_5bJYx9WO_46JjEMPSCA>>Google Scholar
王融 [Rong, Wang], «迷雾中的新航向: 2018 年数据保护政策年度观察» [A New Direction in the Fog: 2018 Data Protection Policy Observations] (Tencent Research Institute, 29 December 2018) <https://www.secrss.com/articles/7496>>Google Scholar
吴朋阳 [Wu Pengyang], «人工智能在医疗行业应用的三大场景, 信任如何建立? 前沿科技» [How to Build Trust in the Three Major Scenarios of AI Application in the Medical Industry? Frontier Technology] (Tencent Research Institute, 30 March 2018) <https://mp.weixin.qq.com/s/Zf5Igvkqc-N2JqW9ail1lQ>>Google Scholar
胡喆 [Wei, Hu] and 周琳 [Lin, Zhou], «智能视觉国家新一代人工智能开放创新平台正式亮相» [Intelligent Vision National New Generation AI Open Innovation Platform Officially Debuts] (Xinhua, 20 September 2018) <http://www.xinhuanet.com/politics/2018-09/20/c_1123461737.htm>>Google Scholar
蔡雄山 [Xiongshan, Cai], «第三波人工智能发展浪潮中的顶层设计,评《新一代人工智能发展规划» [Top-Level Design in the Third Wave of Artificial Intelligence Development, Commenting on the ‘New Generation Artificial Intelligence Development Plan’] (Tencent Research Institute, 27 July 2017) <https://mp.weixin.qq.com/s/vtarWQe1vZiBkJyJBvhHtw>>Google Scholar
车宁 [Ning, Che], «‘个人信息安全规范’ 生效在即, 金融科技从业人员应了解这些事» [The ‘Privacy Standards’ [author’s terminology] Come into Effect Soon, and Financial Technology Practitioners Should Understand These Things] (TC260, 20 January 2018) <https://www.tc260.org.cn/front/postDetail.html?id=20180201201040>>Google Scholar
陆奇 [Qi, Lu], «新经济 NEO100: 陆奇, YC 中国的 01 号员工» [New Economy NEO100: Lu Qi, YC China’s No 01 Employee] (36Kr, 15 August 2018) <https://36kr.com/p/5148299.html>>Google Scholar
«中华人民共和国反恐怖主义法» [Anti-Terrorism Law of the People’s Republic of China] (People’s Republic of China) National People’s Congress, Order No 36, 27 December 2015Google Scholar
«中华人民共和国国家安全法» [National Security Law of the People’s Republic of China] (People’s Republic of China) National People’s Congress, Order No 68, 1 July 2015Google Scholar
«中华人民共和国外国投资法 (草案征求意见稿)» [Foreign Investment Law of the People’s Republic of China (Opinion-Seeking Draft)] (People’s Republic of China) Ministry of Commerce, 19 January 2015Google Scholar
«中华人民共和国外国投资法» [Foreign Investment Law of the People’s Republic of China] (People’s Republic of China) Ministry of Commerce, 15 March 2019Google Scholar
«中华人民共和国外资企业法 (2016 修正)» [Law on Wholly Foreign-Owned Enterprises of the People’s Republic of China (2016 Revision)] (People’s Republic of China) National People’s Congress, Order No 51, 9 March 2016Google Scholar
«中华人民共和国民法典» [Civil Code of the People’s Republic of China] (People’s Republic of China) National People’s Congress, 28 May 2020Google Scholar
«中华人民共和国密码法 (草案征求意见稿)» [Encryption Law of the People’s Republic of China (Opinion-Seeking Draft)] (People’s Republic of China) Office of State Commercial Cryptography Administration (OSCCA), 13 April 2017Google Scholar
«中华人民共和国密码法» [Encryption Law of the People’s Republic of China] (People’s Republic of China) Office of State Commercial Cryptography Administration (OSCCA), 26 October 2019Google Scholar
«中华人民共和国测绘法» [Surveying and Mapping Law of the People’s Republic of China] (People’s Republic of China) National People’s Congress, Order No 66, amended 27 April 2017Google Scholar
«中华人民共和国网络安全法» [Cyber Security Law of the People’s Republic of China] (People’s Republic of China) National People’s Congress, Order No 53, 7 November 2016Google Scholar
«中华人民共和国个人信息保护法(草案)» [Personal Information Protection Law of the People’s Republic of China (Opinion-Seeking Draft)] (People’s Republic of China) National People’s Congress, 21 October 2020Google Scholar
«中华人民共和国个人信息保护法» [Information Protection Law of the People’s Republic of China] (People’s Republic of China) National People’s Congress, 20 August 2021Google Scholar
«中华人民共和国数据安全法(草案)» [Data Security Law of the People’s Republic of China (Opinion-Seeking Draft)] (People’s Republic of China) National People’s Congress, 2 July 2020Google Scholar
«中华人民共和国数据安全法» [Data Security Law of the People’s Republic of China] (People’s Republic of China) National People’s Congress, 10 June 2021Google Scholar
«GB/T 35273-2017 信息安全技术 个人信息安全规范» [GB/T 35273-2017 Information Technology – Personal Information Security Specification] (People’s Republic of China) National Information Security Standardisation Technical Committee (TC260), 29 December 2018Google Scholar
«GB/T 35273-2020 信息安全技术 个人信息安全规范» [GB/T 35273-2020 Information Technology – Personal Information Security Specification] (People’s Republic of China) National Information Security Standardisation Technical Committee (TC260), 6 March 2020Google Scholar
«个人信息出境安全评估办法 (征求意见稿) 公开征求意见的通知» [Personal Information Outbound Transfer Security Assessment Measures (Draft for Comment)] (People’s Republic of China) CAC, 13 June 2019Google Scholar
«个人信息和重要数据出境安全评估办法 (征求意见稿)» [Personal Information and Important Data Outbound Security Assessment Measures (Opinion-Seeking Draft)] (People’s Republic of China) SIIO, 11 April 2017Google Scholar
«个人信息和重要数据出境安全评估办法 (征求意见稿)» 公开征求意见 [Circular of the SIIO on the Public Consultation on the Measures for the Assessment of Personal Information and Important Data Exit Security (Opinion-Seeking Draft)] (People’s Republic of China) SIIO, 11 April 2017Google Scholar
《网络安全审查办法》 [Cyber Security Review Measures] (People’s Republic of China) CAC, 13 April 2020Google Scholar
«中华人民共和国电信条例» [Telecommunications Regulations of the People’s Republic of China] (People’s Republic of China) State Council, amended 2 June 2016Google Scholar
«互联网信息服务管理办法» [Administrative Measures on Internet Information Services] (People’s Republic of China) State Council, amended 1 August 2011Google Scholar
«互联网用户账号名称管理规定» [Internet User Account Name Management Regulations] (People’s Republic of China) CAC, 4 February 2015Google Scholar
«信息安全技术 个人信息去标识化指南» [Guide for De-Identifying Personal Information] (People’s Republic of China) National Information Security Standardisation Technical Committee (TC260), 1 September 2018Google Scholar
«信息安全技术 个人信息安全影响评估指南» [Information Security Technology – Security Impact Assessment Guide of Personal Information] (People’s Republic of China) National Information Security Standardisation Technical Committee (TC260), 13 June 2018Google Scholar
«信息安全技术 数据出境安全评估指南» [Guide for Data Cross-Border Transfer Security Assessment] (People’s Republic of China) National Information Security Standardisation Technical Committee (TC260), 1 September 2018Google Scholar
《关键信息基础设施安全保护条例》 [Critical Information Infrastructure Security Protection Regulations] (People’s Republic of China) State Council of the People’s Republic of China, 30 July 2021Google Scholar
《关于加强车联网(智能网联汽车)网络安全工作的通知(征求意见稿)》 [Notice on Strengthening Cyber Security Work in the Internet of Vehicles (Smart Connected Vehicles) (Opinion-Seeking Draft)] (People’s Republic of China) MIIT, 23 June 2021Google Scholar
«关于审理理应信息网络侵权人身权益民事纠纷按键使用法律若干问题的规定» [Regulations Concerning Some Questions of Applicable Law in Handing Civil Dispute Cases Involving the Use of Information Networks to Harm Personal Rights and Interests] (People’s Republic of China) Supreme People’s Court, 9 October 2014Google Scholar
«关于应用安全可控信息技术加强银行业网络安全和信息化建设的指导意见» (称 317 号文) [Guiding Opinions on Applying Secure and Controllable Information Technology to Strengthen the Network Security and Informatisation of the Banking Industry (Circular 317)] (People’s Republic of China) China Banking Regulatory Commission (CBRC), 26 December 2014Google Scholar
«关于规范政府和社会资本合作合同管理工作的通知» [Guidance on Public–Private Partnerships] (People’s Republic of China) Ministry of Finance, 30 December 2014Google Scholar
«最高人民法院 最高人民检察院关于办理侵犯公民个人信息刑事案件适用法律若干问题的解释» [Explanation on Several Issues Concerning the Application of Law in Criminal Cases of Infringing on Citizens’ Personal Information] (People’s Republic of China) Supreme People’s Court and the Supreme People’s Procuratorate, 1 June 2017Google Scholar
«北京市移动互联网应用程序公众信息服务自律公约» [Beijing Municipality Self-Discipline Convention on Internet Application Programmes and Public Information Services] Capital Internet Society, 26 November 2011Google Scholar
«即时通信工具公众信息服务发展管理暂行规定» [Provisional Regulations for the Development and Management of Instant Messaging Tools and Public Information Services] (People’s Republic of China) SIIO, 7 August 2014Google Scholar
«国务院关于印发节能与新能源汽车产业发展规划 (2012–2020 年) 的通知» [Notice of the State Council on Printing and Distributing the Development Plan for Energy Saving and New Energy Vehicle Industry (2012–2020)] (People’s Republic of China) State Council, 28 June 2012 <http://www.gov.cn/zwgk/2012-07/09/content_2179032.htm>>Google Scholar
«国务院关于授权国家互联网信息办公室负责互联网信息内容管理工作的通知国发» [Notice Concerning Empowering CAC to Be Responsible for Internet Information Content Management Work] (People’s Republic of China) State Council, 26 August 2014Google Scholar
«国务院关于积极推进 ‘互联网+’ 行动的指导意见» [Guiding Opinions on Actively Promoting the ‘Internet Plus’ Action Plan] (People’s Republic of China) National People’s Congress, 4 July 2015Google Scholar
«地图管理条例» [Administrative Regulation of Maps] (People’s Republic of China) State Council, 1 January 2016Google Scholar
«数据安全管理办法 (征求意见稿) 公开征求意见的通知» [Data Security Management Measures (Opinion-Seeking Draft)] (People’s Republic of China) CAC, 28 May 2019Google Scholar
«数据安全管理办法 (征求意见稿)» [Data Security Management Measures (Opinion-Seeking Draft)] (People’s Republic of China) CAC, 28 May 2019Google Scholar
«智能网联汽车道路测试管理规范试行» [Intelligent Connected Vehicle Road Test Management Standards (Trial)] MIIT, the Ministry of Public Security and the Ministry of Transport, 1 May 2018Google Scholar
«电话用户真实身份信息登记规定» [Telephone User Real Identity Information Registration Regulations] (People’s Republic of China) MIIT, 16 July 2013Google Scholar
«外国的组织或者个人来华测绘管理暂行办法» [Temporary Measures on Administration of Mapping and Surveying in China by Foreign Organisations and Individuals] (People’s Republic of China) Ministry of Land and Resources, 27 April 2011Google Scholar
«网络产品和服务安全审查办法 (试行)» [Security Review Measures for Network Products and Services (Interim)] (People’s Republic of China) CAC, 2 May 2017Google Scholar
«网络产品和服务安全审查办法征求意见 (草案征求意见稿)» [Measures for Security Reviews of Network Products and Services (Opinion-Seeking Draft)] (People’s Republic of China) SIIO, 4 February 2017Google Scholar
«网络关键设备安全检测实施办法 (征求意见稿)» [Critical Network Equipment Security Testing Implementing Measures (Opinion-Seeking Draft)] (People’s Republic of China) CAC, 4 June 2019Google Scholar
«网络出版服务管理规定» [Network Publishing Services Management Regulations] (People’s Republic of China) Ministry of Industry and Information Technology and the State Administration of Press Publication Radio Film and TelevisionGoogle Scholar
«网络安全审查办法 (征求意见稿)» [Cyber Security Review Measures (Opinion-Seeking Draft)] (People’s Republic of China) CAC, 21 May 2019Google Scholar
《网络安全审查办法(修订草案征求意见稿)》 [Measures for Cyber Security Reviews (Revised, Opinion-Seeking Draft)] (People’s Republic of China) CAC, 10 July 2021Google Scholar
«网络预约出租汽车经营服务管理暂行办法» [Interim Regulations for the Management of Network Appointed Taxi Services Operations] (People’s Republic of China) Ministry of Industry and Information Technology, 28 July 2016Google Scholar
«‘互联网+’人工智能三年行动实施方案» [‘Internet Plus’ AI Three-Year Action Implementation Plan] (People’s Republic of China) MIIT, 25 May 2016Google Scholar
«2015 年政府工作报告» [2015 Government Work Report] (People’s Republic of China) State Council, 5 March 2015Google Scholar
«中国互联网状况白皮书» [China Internet Status White Paper] (People’s Republic of China) State Council, June 2010Google Scholar
«中国人工智能开源软件发展白皮书» [White Paper on the Development of China’s AI Open Source Software] (People’s Republic of China) MIIT, July 2018Google Scholar
«国家新一代人工智能开放创新平台» [National Open Innovation Platforms for New Generation AI] (Gov.cn, 4 August 2019) <http://www.gov.cn/xinwen/2019-08/04/content_5418542.htm>>Google Scholar
«中国制造 2025» [Made in China 2025] (People’s Republic of China) State Council, 8 May 2015Google Scholar
«人工智能安全白皮书» [AI Security White Paper] China Academy of Information and Communications Technology (CAICT) (People’s Republic of China), September 2018 <http://www.caict.ac.cn/kxyj/qwfb/bps/201809/P020180918473525332978.pdf>>Google Scholar
«人工智能标准化白皮书 (2018 版)» [AI Standardization White Paper (2018)] (People’s Republic of China) National Standards Management Committee Second Ministry of Industry, January 2018Google Scholar
«全国 PPP 综合信息平台项目库第五期季报» [National PPP Integrated Information Platform Project Library Phase 5 Quarterly Report] (People’s Republic of China) Ministry of Finance, Department of Finance, 2017 <http://www.cpppc.org/zh/pppyw/4684.jhtml>>Google Scholar
«关于开展国家智慧城市试点工作的通知» [Notice of Carrying out the National Smart City Pilots] (People’s Republic of China) State Council, 6 December 2012Google Scholar
«十三届全国人大常委会立法规划» [Legislative Planning of the 13th National People’s Congress Standing Committee] (National People’s Congress, 10 September 2018)Google Scholar
«国务院关于加快培育和发展战略性新兴产业的决定» [Decision on Accelerating and Developing Strategic Emerging Industries] (Peoples’ Republic of China) State Council, 18 October 2010Google Scholar
«国家中长期科学和技术发展规划纲要 (2006–2020 年)» [National Outline for Medium- and Long-Term Science and Technology Development Planning (2006–2020)] Ministry of Science and Technology, 9 February 2006Google Scholar
«国家信息化发展战略纲要» [Outline of the National Informatisation Development Strategy] (People’s Republic of China) State Council, 27 July 2016Google Scholar
«国家智慧城市试点暂行管理办法» [National Interim Measures for Smart City Pilots] (People’s Republic of China) State Council, 22 November 2012Google Scholar
«国家网络空间安全战略» [National Cyberspace Security Strategy] (People’s Republic of China) CAC, 27 December 2016Google Scholar
«国民经济和社会发展第十二个五年规划» [Twelfth Five-Year Plan for National Economic and Social Development] National People’s Congress, 14 March 2011Google Scholar
«国民经济和社会发展第十三个五年规划» [Thirteenth Five-Year Plan for National Economic and Social Development] National People’s Congress, 17 March 2016Google Scholar
«外商投资产业指导目录 (2017 年修订)» [Catalogue for the Guidance of Foreign Investment Industries (2017 Revision)] (People’s Republic of China) Ministry of Commerce, 28 June 2017Google Scholar
«大众创业与创新» [Mass Entrepreneurship and Innovation] (People’s Republic of China) State Council, 2014Google Scholar
«战略性新兴产业» [Strategic Emerging Industries] (People’s Republic of China) State Council, 19 October 2010Google Scholar
«战略性新兴产业重点产品和服务指导目录 (2016 版)» [Catalogue for the Guidance of Important Products and Services in Strategic and Emerging Industries (2016 version)] (People’s Republic of China) National Reform and Development Commission, 25 January 2017Google Scholar
«新一代人工智能发展规划» [New Generation AI Development Plan] (People’s Republic of China) State Council, 8 July 2017Google Scholar
«‘十三五’国家战略性新兴产业发展规划» [13th Five-Year Plan for Developing National Strategic and Emerging Industries] (People’s Republic of China) State Council, 19 December 2016Google Scholar
«‘十三五’国家科技创新规划» [13th Five-Year Plan for National Science and Technology Innovation] (People’s Republic of China) State Council, 8 August 2016Google Scholar
«国务院关于印发 ‘中国制造 2025 ’的通知» [Notification on the Printing and Distribution of Made in China 2025] (People’s Republic of China) State Council, 8 May 2015Google Scholar
Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth)Google Scholar
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with regard to the Processing of Personal Data and on the Free Movement of Such Data, and repealing Directive 95/46/EC [2016] OJ L 119/1Google Scholar
Investigatory Powers Act 2016 (UK)Google Scholar
US Department of Commerce, Bureau of Industry and Security, Addition of Certain Entities to the Entity List (Final Rule), Effective May 16, 2019 (16 May 2019) <https://www.bis.doc.gov/index.php/all-articles/17-regulations/1555-addition-of-certain-entities-to-the-entity-list-final-rule-effective-may-16-2019>>Google Scholar
US Department of Commerce, Bureau of Industry and Security, Addition of Certain Entities to the Entity List, A Rule by the Industry and Security Bureau on 10/09/2019 (10 September 2019) <https://www.federalregister.gov/documents/2019/10/09/2019-22210/addition-of-certain-entities-to-the-entity-list>>Google Scholar
Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth)Google Scholar
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with regard to the Processing of Personal Data and on the Free Movement of Such Data, and repealing Directive 95/46/EC [2016] OJ L 119/1Google Scholar
Investigatory Powers Act 2016 (UK)Google Scholar
US Department of Commerce, Bureau of Industry and Security, Addition of Certain Entities to the Entity List (Final Rule), Effective May 16, 2019 (16 May 2019) <https://www.bis.doc.gov/index.php/all-articles/17-regulations/1555-addition-of-certain-entities-to-the-entity-list-final-rule-effective-may-16-2019>>Google Scholar
US Department of Commerce, Bureau of Industry and Security, Addition of Certain Entities to the Entity List, A Rule by the Industry and Security Bureau on 10/09/2019 (10 September 2019) <https://www.federalregister.gov/documents/2019/10/09/2019-22210/addition-of-certain-entities-to-the-entity-list>>Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Max Parasol
  • Book: AI Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws
  • Online publication: 16 December 2021
  • Chapter DOI: https://doi.org/10.1017/9781009064804.014
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Max Parasol
  • Book: AI Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws
  • Online publication: 16 December 2021
  • Chapter DOI: https://doi.org/10.1017/9781009064804.014
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Max Parasol
  • Book: AI Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws
  • Online publication: 16 December 2021
  • Chapter DOI: https://doi.org/10.1017/9781009064804.014
Available formats
×