Academia.eduAcademia.edu

How to Think about Cyber Sovereignty: The Case of China

2020, Chinese Journal of Communication

The cybersphere constitutes a global disagreement space. There, the contested, ongoing ties that link states and the internet come into being. A critique of sovereignty and political economy is offered to evaluate contemporary controversies concerning authority, independence, regulation, and access to communications as matters of relationality, materiality, and disagreement. We review China's promotion of cyber sovereignty as a complicating episode that expresses development stresses of the sphere. China wishes to establish guardrails for the practices of multipolar global digital capitalism; yet, it has ushered in an Internet keyed variety of global issues-security, privacy, material well-being, developmental justice, and planetary futures. These complex aims invite and expand the dialectical spaces animating the cybersphere.

How to Think about Cyber Sovereignty How to Think about Cyber Sovereignty: The Case of China1 Yu Hong, Zhejiang University, [email protected] G. Thomas Goodnight, University of Southern California, [email protected] Article accepted by Chinese Journal of Communication (upcoming 2020) Abstract The cybersphere constitutes a global disagreement space. There, the contested, ongoing ties that link states and the internet come into being. A critique of sovereignty and political economy is offered to evaluate contemporary controversies concerning authority, independence, regulation, and access to communications as matters of relationality, materiality, and disagreement. We review China’s promotion of cyber sovereignty as a complicating episode that expresses development stresses of the sphere. China wishes to establish guardrails for the practices of multipolar global digital capitalism; yet, it has ushered in an Internet keyed variety of global issues--security, privacy, material well- being, developmental justice, and planetary futures. These complex aims invite and expand the dialectical spaces animating the cybersphere. Keywords: China; geopolitics; internet governance; cyber sovereignty; political economy; disagreement space; cybersphere; global communication 1 Research for this article was supported by the Chinese Social Science Fund (18AXW009). We’d like to thank anonymous reviewers for their critical comments. 1 How to Think about Cyber Sovereignty How to Think about Cyber Sovereignty: The Case of China The contestation over cyberspace and ICTs constitutes an important vector in the renewed global scramble for command and power. The Chinese state has taken a slew of actions announcing claims to China’s cyber sovereignty. China watchers and internet pundits ask: how will claims to sovereign governance facilitate or hinder China’s global integration? To what extent do such claims portend the “nationalization of the internet” (Herold, 2011)? Meanwhile, other states grow inclined to territorialize cyberspace. The US has developed a National Cybersecurity Division within its Department of Homeland Security. The UK set up the National Cyber Security Center. French President Macron launched the “Paris Call for Trust and Security in Cyberspace.” In the absence of authoritative global institutions, states develop parallel but different premises, protocols, and apparatuses of governance. Despite these verifiable trends, the “strong and persistent tension between state sovereignty, which is territorially bounded, and the non-territorial space for social interaction created by networked computers” remains unresolved (Mueller, 2010, p. 1). Cyberspace is no longer presumed a “natural” environment that would portend certain governing principles. Internet scholars debate about good or bad governance--amidst unfixed values, shifting contexts, and changing applications (DeNardis, 2014). Still, the tendency is to regard the internet as an autonomous global polity clashing with interests, 2 How to Think about Cyber Sovereignty processes, and structures that predate networks, especially national systems, inter-state treaties, and local norms. Based on liberal values, this framework has a lacuna of political economies and, therefore, risks totalizing the internet. Other than rehearsing binary constructs between material and virtual, state and market, liberal and authoritarian, national and international, it has little to say about the varied but related forms of state sovereignty. In this paper, we intend to move the debate forward by weakening the binary and by noting the emergent geopolitical nature of the internet. We show how continuities and discontinuities among networked political economies can be mapped through discourses, and that internet governance has “expanded beyond operational governance functions” to an expanded geopolitics (DeNardis, 2014, p. 222). The case of China and internet governance is assembled from the construction of political economy events and the critique of contesting discourse vectors. The theoretical part of this paper de-reifies the popular constructs of the internet, of the state, and of sovereignty so as to recognize cyber sovereignty as a common but varied practice. For this purpose, we develop the concept of the cybersphere as a sociotechnical and ultimately geopolitical environment; outline contested yet living roles of nation states in constituting what is environed; and, identify entanglements of geopolitics, sovereignty, and communications as features of the multipolar political economy. The cybersphere comprises materialized political economies where presumably independent stakeholders mingle, align, and delink in ways that re-work relationships among, and sometimes transcend, conventional typologies. 3 How to Think about Cyber Sovereignty China is known as a major advocate of cyber sovereignty—we propose to see the Chinese variant of cyber sovereignty as part and parcel of the cybersphere as a complex, emergent whole. The empirical part of this paper, which combines discourse inquiry with political economy and policy analysis, examines this cyber sovereignty in action so as to detect possible directions. With the focus on the ambiguous contested central term, discourse inquiry sets the stage for reading relationships driving political economies; but, relationships registered by the discourse are not all the connections with and within political economies. So, we also move beyond generalizing the term context to interpret sphere dynamics of political economies in stress, development, and controversy within and against the setting up of state discourse. We ask, what does the Chinese state seek to accomplish and what has it accomplished? We find that constructed dynamically through words and actions, cyber sovereignty shifts from a territory-based anchor into a global assembly of developmental devices. On the grounds that the old information order is fragmented and lacking equal access, the Chinese vision embraces the unmet longings of the developing global South. The vision frames sovereignty as a state’s responsibility for collective rights, but not exactly in terms of Westphalian autonomy. The Chinese state is not the only governing subject in the cybersphere, and its actions are subject to disagreement and contestation. So, it works to forge a state-led multi-stakeholder model and expresses boundaries both as its preference and compromise. Thus, the interactions between traditional sovereignty and its digital configurations are likely to induce a dialectical oscillation of policies. Policies vary between inward-looking unilateralism meant to consolidate the party state and outwardlooking advocacy for a multilateral, global internet order. In the longer run, we suggest 4 How to Think about Cyber Sovereignty that China’s assertions of cyber sovereignty are likely to further global entanglements. The result is a contested space of an international sphere where rules of the road are formally and informally produced, materialized, tested, and settled—and perhaps then again disrupted. Beyond Dichotomy: China and the Cybersphere China’s stance on cyber governance marks a different way of thinking and praxis, but it should be viewed not in a binary relationship to the Global North but as intertwined with historical, geopolitical, and epistemological power relations (Wasserman, 2018). Borrowing from postcolonial infrastructure studies, critical algorithm studies, and internet histories, we use the cybersphere—defined as a historical ensemble of material, organizational, regulatory, and socio-cultural layers of communicative relations among populations, machines, and institutions developed across scales—as a substitute for cyberspace, to challenge the digital sublime and to underscore its emergent geopolitical nature. The digital sublime, whose influence has waned but is not finished, sees cyberspace to be a de-territorialized virtual global village (Johnson & Post, 1996). Its mistake lies in exaggerating social freedom to link and to exchange by rendering cyberspace as a natural given, rather than a geopolitical sphere. Enacted as a top-down model, cyberspace has been used to smuggle in universal norms that do not recognize historical struggle. The cybersphere, however, entails both materiality and relationality (Cooren, 2018). It entails not just virtual reality but material grounding. Power base, storage, and server locations are one thing; the interconnection of information and things 5 How to Think about Cyber Sovereignty that 5G mobile networks are adding, quite another. Furthermore, the cybersphere shapes, and is shaped by, relational dynamics. It mediates labor relations, production chains, innovative resources, knowledge production capacities, and human relations with environment (Aouragh & Chakravartty, 2016; Murdock, 2018; Srinivasan, 2017). Extending political economies and expressing power relations, the sphere has selectively amalgamated national, material, and territorial spaces, on the one hand, and virtual networks of digital data exchange, on the other. It features both interdependence and discontinuity, blending functional flows, spatial fragments, and social segments (Castells, 2010). In the cybersphere, the continuity and discontinuity of political economies are named and arranged by discourse for exchange, forming disagreement spaces that “express differences, disrupt convention, and field imagined alternatives” (Jackson, 2015; Liu & Goodnight, 2016). Notably, the assemblage of policies, organizations, and material structures that underpin the socio-spatial logic of networks and networking is such a focal site of struggles over ideas, interests, and power across scales and units. If the old romantic thinking of cyberspace as a separate realm subject only to community-supported self-regulation long lost its force (Goldsmith & Wu, 2006), the multi-stakeholder model that has ever since prevailed evokes pluralistic participation but evades national sovereignty and hierarchical power (Mueller, 2010), even implicitly extending Northern bias against redistributive and developmental deficits (Chakravarty, 2007). Such failure ignites alternative politics centered on sovereign authorities, after decades of neoliberal regulatory reforms. 6 How to Think about Cyber Sovereignty Instead of being a natural space of unity or inevitability, the cybersphere—which entangles political economies and disagreement spaces, national and international relations, virtual and material ties—has evolved into an expanded geopolitics. Its boundaries and sources of authority are fought over by different groups and, therefore, are intrinsically political (Kristof, 1960). Various spaces have already shaped but do not define the cybersphere. History shows that states and societies make their own interpretations amidst global techno-economic trends—depending on their values, interests, and capacities. The most notable is the Sino-US digital interdependence and discontinuity. The US has made foreign policy efforts to extend the liberal capitalist model to cyberspace, but China preserved some crucial political-economic and ideational foundations for self-determination despite its steadfast global digital convergence (Kiggins, 2012; Hong, 2017). Still, beneath the foreground of apparent variation lies the shared background of material ties and relational dynamics that defy binary distinctions. China’s internet has been conventionally rendered in the state territorial imaginary (Shen, 2017). By portraying a contest-and-conquest relationship between the state preoccupied with regime insecurity and varying social usages, the dual foci implicitly frame the Chinese Intranet against the globalist internet (King, et al., 2013; Rauchfleisch & Schäfer, 2015). Whereas the latter associates its governance with the presumably pluralistic, fragmented, and competitive societies of Western democracy, the former illustrates the will of the state and the structures of state control. Indeed, although contested and compromised, the efficacy of state control has legitimized deploying the Great Firewall as a synecdoche for China’s internet governance (MacKinnon, 2011; Wei, 2017). 7 How to Think about Cyber Sovereignty Political economy frames a different cyber imaginary; one that loosens this stark dichotomy. Critical studies suggest that states co-exist with non-state agents in shaping the global internet, and that the influence of ownership, policies, laws, and commercial interests renders the idea of a “singular virtual space” misleading (Graham, 2013). Cast in light of the cybersphere, China’s so-called Intranet also reveals entanglements with foreign capital, foreign technology, foreign markets, and foreign labor. Rather than hold up “highly conservative” telecoms policy or exemplify “cyber-conservatives” (Zeng, Stevens & Chen, 2017; Mueller, 2010), the state has unleashed different sequences of liberalization, decisively exposing its share of the cybersphere to the dynamics of global digital capitalism (Hong, 2017; Schiller, 2014). Symbolic, cultural, and social dimensions are also folded into the cybersphere. From blogging to social networking to e-commerce, the platformization of cyberspace is structured by bottom-up vitalities, which sustain and derail top-down governance (Yang, 2003; Yu, 2017). Shaping and shaped by actors of the political economy, including states, markets, and societies, the cybersphere continues to extend social relations and material structures across boundaries, be they spatial, temporal, material, corporeal, and social. Its ubiquitous expansion, accelerated by the Internet of Things, the Internet of Bodies, and 5G mobile networks, has enmeshed the state in a “variable geometry” of wills, interests, and values and even overwhelms it with torrents of capital, technology, information, and communication (Castells, 2010, p. 53). If “statism disintegrated in contact with new information technologies,” as Manuel Castells wrote in the Information Age trilogy, does the exercise of cyber sovereignty mark an orchestrated reaction of the state? What kind of 8 How to Think about Cyber Sovereignty state? And how? This brings back the state as a strategic actor in the generally “stateless” internet studies (Flew, 2018). Rethinking the State in Transnational Digital Political Economy China’s official vision as to the state’s authority over internet-related public policy differs from the Western liberal model, not just in the sense of opposing individualist democracies and authoritarian states. China’s communication policies persist as a dialectic between incumbent powers that own, regulate, and change the organizational apparatuses and material structures of communications and emergent powers that use, extend, and innovate counter-orders. So, the approach here is not to dissolve the state-centric framework, nor do we suggest an economic cosmopolitan account to replace the national framing. But, alternative to the ontological fracture between the state as a mutually exclusive territorial monopoly on the use of force, on the one hand, and market forces and individual rights that can be universally applied, on the other, we do want to de-abstract the state—to see the state as mutually constituting, and frictionally meshing, with a broader network of power materialized by the cybersphere. This statement, along with the replacement of cyberspace by cybersphere, has implications for the theory of the state. A decades-long debate between liberal and Marxist strains of state theories has bearing on the state’s positioning in the cybersphere. Embedded in social science disciplines from the postwar era, the liberal theory of politics posits that power in western democratic societies is diffused enough; the state responds to competing demands, rendering Marxist class-based notions, such as ruling class and corporate power, 9 How to Think about Cyber Sovereignty irrelevant (Miliband, 2009). Having rightfully constructed a liberal critique of traditional authoritarianism and even networked authoritarianism, this “class-less” thinking of pluralistic politics nevertheless leads to the obfuscation of state-society interlinks and thus unduly precluding capitalist, developmental, and legitimacy-seeking logics of the state—before and after the arrival of the networked digital age. At the international level, liberal and realist theories treat states as unitary and autonomous actors. As in the case of China, national factors still offer compelling explanations for its performance—as the Chinese state rejected the outright Washington Consensus and has paced global integration. Still, this state-led global convergence created unexpected results and has fostered transnational imperatives from inside. So, instead of deducing the logic of state actions from its arguably timeless essence of security and control, it is imperative to see the state’s wills, interests, values, and practices as relationally intertwined with global and market-based structures of power and to appreciate the crosscutting of state agendas by various transnational interests across multiple scales. The neoliberal turn from the 1970s advanced the notion that it is desirable, and even feasible, to separate politics from economics, states from markets (Panitch, 2009). This fracture reflects neither the intervention-and-investment the US government makes in the internet nor the accommodations the Chinese state makes toward global techno-economic trends. Meanwhile, postwar neo-Marxist state theory has resisted reducing state interests and capacities to the servitude for capital and instead notes the historical make-up of social forces and recognizes the state’s relative autonomy (Starrs, 2017). Extending this critical perspective, the political economy approach to communication examines 10 How to Think about Cyber Sovereignty historically specific relations between states, markets, and social actors and explores how these factors parlay into structural, institutional, and discursive transformations of international/national policy making (Charkravartty & Sarikakis, 2006). The cybersphere adds a new twist to the dynamics of the state. To reckon the recursive relationship between the state and the cybersphere, a holistic conception and historiography of the state should be re-framed. The transition literature on China notes that the formerly Leninist state has internalized a liberal orientation and even moved to a globally integrated model of policy process (Fewsmith, 2010). The state-led capitalist socio-economic transition has accelerated in and through the cybersphere, but spurs intensive social dissent, which invites an ever-expanding state information control regime (Zhao, 2008). Thus, after having alternately unleashed, shaped, and stalled the cybersphere that extends change and disturbance, the party state becomes a major contested site and a contesting subject as well. Notably, the party state can adapt, contract or expand its power over the cybersphere. The state under Xi’s leadership generates sweeping transformative initiatives, holding China at an “inflection point”: the post-WII capitalist order is mired in chronic crises; the party state-led China continues to grow stronger, after weathering market reforms; therefore, the responses to global crises must be organized to achieve the millennial mission of national rejuvenation (Economy, 2018). Pivoting to developing digital economy, digital government, and digital society, the state attempts to re-organize symbolic protocols, social norms, or economic organizations that have hitherto defined the cybersphere, taking cyber sovereignty as a salient position. 11 How to Think about Cyber Sovereignty Despite the state’s transformative agency, a more fundamental dialectics between geopolitics and globalization has been at work, altering the state’s will and dispersing its capacity. As the driver of globalization, capitalist development transcends national boundaries through the cybersphere, inducing states to facilitate internet development and commercialization (Simpson, 2004). Globalization as such, mediated by states and geopolitics, is never a completely finished set of projects though. Developing-country states are strategic actors in contesting the global order—increasingly in and through the cybersphere (Desai, 2013). Still, states cannot afford alienating capitalist logic too much as contemporary geopolitics is increasingly tied with inter-capitalist competition (Woodley, 2015). The cybersphere also deepens the state’s entanglement in the multilateral order of interdependence. While the state can act on its transformative initiatives, it is variably involved in ad hoc networks with subnational, national, and international actors and has to “ensure the balance and power of the network state to which they belong” (Castells, 2010, p. 361). When the US government asserts unilateralism over bilateral and multilateral issues at the cost of losing global moral appeal, and when the field of internet governance features layered, diffuse, and even privatized control of power (DeNardis, 2014), China’s position is likely to oscillate between reclaiming state sovereignty and supporting shared sovereignty. Thus, the internet is a new sphere where the state extends political authority, prioritizes certain rights, responds to capitalist cycles, and enters a multilateral interdependence. It endorses and acts on contradictory initiatives, mostly within the capitalist global order. These range from subsuming the directionless logic of capital to 12 How to Think about Cyber Sovereignty the territorial logic of the state to facilitating transnational capital accumulation; from strengthening the social and symbolic foundation of the party’s rule to encouraging the digital turn of globalization; and from promoting itself as a champion of globalization to sponsoring regional factions and domestic protectionism. The mixture is an empirical question, which nevertheless cannot be exhausted by the control protocols of the state-authoritarian or liberal democratic—but is conditioned by the dialectics between intranational needs the state prioritizes and global legitimacy and sphere sustainability the state seeks. The following section addresses how to qualify, rather than reify, the cyber sovereignty mandate. Cyber Sovereignty in Historical Perspectives Sovereignty from its modern conception “implies a theory of politics which claims that in every system of government there must be some absolute power of final decision” (Crick 1968). Territoriality strongly defines sovereignty (Betz & Stevens, 2011), but this definition obscures the fact that sovereignty is both territorially and nonterritorially circumscribed. From a political economy of communication standpoint, the status of sovereignty works, out of and against, a disagreement space crossing boundaries and denotes the state with questions of who has standing and controls resources for decisions over senders, receivers, codes, messages, channels, audiences and feedback. Claims to sovereignty offer an index of power relations among nations and also register the spread of capitalism as well as geopolitical pressure and popular resistance that follows (Desai, 2013). A historical association of communication with capitalist 13 How to Think about Cyber Sovereignty states means that the principle of territorialized sovereignty when put in practice has incorporated the need to trade, to flow, and to invest. Hence, globalization from the 1990s did not linearly undermine the state, but has further complicated the relationship between a bounded physical territory and the state as the presumably supreme authority therein— as sovereignty had operated through multiple spatial modes and non-state actors even shared the operation of sovereignty (Agnew, 2009). This proposition applies to China. Despite its stance to push against hegemonic intervention, sovereignty is in no way unyielding in the post-Mao era (Carlson, 2005). A new school of International Relations, intent to qualify the diluted but still crucial role of sovereignty-based states in the age of globalization, disaggregated sovereignty into multiple components, foregrounding multiple yet inconsistent practices of redefining sovereignty (Biersteker & Weber, 1996). As the cybersphere extends globalization, how does it redefine sovereignty? Adopting Krasner’s concepts (1999), Betz & Stevens (2011) argued that the internet compromises the regulation of crossborder flows, or so-called “interdependence sovereignty,” which further weakens Westphanlian constructs and domestic authority; yet, it does not affect the legal integrity of states in international law, which means that states persist. Still, if the cybersphere is not universally experienced, the re-configuration of sovereignty is not a homogenous process either. Two trends vie for acceptance. First, sovereign relations are being worked out with a great range of variation. The US government has supported a presumably benevolent and borderless corporate-run cyberspace. But its security rhetoric, which transcends the distinction between inside and outside, legitimizes an empire model, wherein military capacity is kept constant and co- 14 How to Think about Cyber Sovereignty extensive with its global networks (Hardt & Negri, 2004; Katin-Borland, 2012). Still, even a US-based Leviathan is not immune from cyber attacks. As fake news, internetenabled theft and disruption, and cyber weapons have shaken the American internet, a Foreign Affairs commentary proclaimed “state sovereignty is alive and well on the Internet” (Flournoy & Sulmeyer, 2018, para. 4). In an emergent counter position, EU uses privacy as a lever to rein in Silicon Valley-originated platforms (Dijck, 2013). But this rights-based cyber sovereignty in no way negates strong strategic purpose (Pohle, 2019). If the tension between users and corporations obscures the roles of states in liberal democratic contexts, the Chinese state plays a salient role in ousting Western platforms, blocking IP addresses, silencing dissents, and orchestrating propaganda campaigns to the extent that Western security and policy studies conveniently equate a cyber-sovereignty position with coherent statist control (Tai, 2017; See Harold, et al., 2016). Yet, despite the state’s sustained efforts to control the flow of information to its people, the bigger picture is more complex. To participate in the cybersphere, the state both practices negative proscription, such as censorship, and makes proactive moves to legalize nonstate forces. To the extent that states unleash the cybersphere, states and the cybersphere then becomes co-constituting (Kohl & Fox, 2017). Generally, a state deployed its sovereign power to project national interests and to bolster certain values, interests, and projects. The cybersphere modifies this equation to the extent that sovereign power is no longer a status that states can either own or not. Vulnerability and interdependence are built into a cyber committed nation. First, as the internet’s choke points often transcend state jurisdictions, it is inconceivable to squeeze the transnational nature of technical standards, supply chains, material and virtual 15 How to Think about Cyber Sovereignty architectures, and multidirectional communicative activities all into traditional jurisdictions (Kohl, 2007); second, if internet governance is mostly enacted through technical design, private corporations, and nongovernmental organizations (DeNardis, 2014), the specific governance structure in China expresses its unique global history. Still, the Chinese state has to negotiate with supranational entities, corporate infrastructures, and networked publics; third, the prosperity of a digital ecosystem driven jointly by expressive, productive, and commercial energy contests the ability of the state to define information flows in distributed networks (Navarria, 2016). Embedded in this sphere, state policies are subjected to ideational, institutional, and material contestations—within the country and without. Then, on what terms and in what mode can states seek to redefine cyber sovereignty? Ideally, as the cybersphere has become the dominant medium of global and public communication, the deployment of cyber sovereignty as a heuristic device would reveal, and even encourage, a disagreement space for peaceful negotiation among states, whose networking, competition, and collaboration inevitably interact with the non-traditional power structures made up of private companies, expert groups, civic organizations, and institutional and individual users. As the Chinese state advocates cyber sovereignty and globalization at once, how is it expressing this set of goals through concrete constructing practices? In the following, we examine China’s institutional and normative vocabularies that organize material governance of cyber sovereignty, trace these into the international realm as a case for global connectivity and relationship development, then review domestic, negotiated policies designed to work through disagreements leveraging domestic ends against China’s standing in a global cybersphere. 16 How to Think about Cyber Sovereignty The Discursive and Institutional Constructions of China’s Cyber Sovereignty Again, China and the cybersphere are a set of intertwined engines that render the party state contesting and contested in a volatile political economy within which Xi’s leadership wants to better harness the internet for navigating through the turbulence and to push through the party’s self-appointed mission. Issues of global politics, developmental sustainability, and social welfare emerge as domestic network development questions. The project of the party state is both: to project outwards ideational and material influences and to seek inward-looking power consolidation through techno-economic and ideological steering. Still, problematic socio-economic structures constrain governance and complicate state initiatives—although without obscuring the state’s intent and impact. This section maps the state’s cyber sovereignty constructing words and practices as part and parcel of the global topography of disagreement space constituted by varied norms and institutions. A qualitative discourse and thematic analysis of statements retrieved from the CAC website is offered first. Within the total of 397 pieces of commentaries, speeches, and interviews retrieved up to October 2017, all contain mention of cyber sovereignty in the full text. The majority, or 160 pieces, are written by CAC, People’s Daily, Xinhua News Agency, and New Media, a journal run by CAC2. 2 The miscellaneous rest are from a slew of state media including but limited to Guangming Online, Zhejiang Daily, Beijing News, Youth.cn, ChinaNews.com, Huanqiu.com, China Daily, and China Military, with each outlet offering one article or two. 17 How to Think about Cyber Sovereignty These official and semi-official discourses aim at domestic and global formation of opinions. To interpret these political/policy discourses defined as “thematically connected and problem-related semiotic occurrences” that serve particular political functions (Reisigl, 2008, p. 99), we first used an inductive category development approach (Elo & Kynga¨s, 2007; Hsieh & Shannon 2005). Through a cyclical procedure of open coding, categorization, and abstraction until the point of saturation, a family of thematic categories was distilled and hierarchically arranged, i.e., who speaks, to whom (opponents vs. allies), when, and where (local, national, regional, and international); problems, causes, and solutions; self-presentation, action, and justification; lastly, proposition, action, results. These coding schemes were used individually and collectively to organize and analyze the texts and, ultimately, to interpret explicit and latent communication as registering and also pivoting to the contexts of politicaleconomic practices. Special attention was paid to the usage of cyber sovereignty in relation with means (i.e., border, authority, communication) and strategic and normative goals, on the one hand, and systems, processes, and disagreements that are said to cue the workings of communications within and across political economies, on the other. As discourse analysis already extends to a critical reading of political-economic practices, manifest and latent, we further note that institutionally cyber sovereignty entails enacting a domestic authoritative structure for demarcating control over activities within and across borders. So, we examine policies the CAC enacted from 2014. Our analysis reveals some dimensions of domestic cyber sovereignty, dialectical policy vectors, and how they are tied with the negotiation of boundaries. Together, the analysis sets the stage for reading trajectories of policy and the vectors of political economy. 18 How to Think about Cyber Sovereignty Disagreement spaces are thus uncovered in the emergent mixes of contestations or the cybersphere. We find that cyber sovereignty first speaks to issues of external sovereignty. Recognition/equity on the international scene is asserted. The states capacity and ability for self-determination and development is defended—because of acknowledged global structural imbalances. This defensive concern features national security as the primary motivation for installing cyber sovereignty; but, arguments quickly morphed into a globalist developmental ethos. Network sovereignty constituted a feature of building an international “community of common destiny,” meant to counter the US-led top-down model and to widen global interdependence at once. This view constructs a “cosmopolitan turn of reshaping global communications,” an outlook that embraces cross-cultural differences and prioritizes global harmony (Shi, 2017). Cyber sovereignty also serves to institutionalize the cyber power of the party state at home. Still, the demarcation of pubic authorities is intended to decenter rather than remove preexisting external actors from domestic authority structures. The practice of discourse and policy asserts positive state power, but it also positions China in a reactive move, too. Enacting Material Governance and Countering US Hegemony The cybersphere features dialectical and even multiple relations among states— and among different yet interrelated political economies and crises states operate through; so, positive assertions of state power are complemented by reasons to resist U.S. claims to global internet hegemony. In light of the Edward Snowden revelation and, ultimately, the US unilateral control over crucial internet resources, the Chinese statements in 2014 19 How to Think about Cyber Sovereignty compared the cybersphere to a war zone and China to a “tenant” in a space controlled by superior powers (Xie, 2014). The recognition of cyber sovereignty, in this light, is a reactive step towards containing external threats instigated by techno-economic weakness and, just as important, towards correcting the unjust global order. The defensive proposition defined cyber sovereignty in territorial terms, extended analogously to traditional and potential allied partners. China is to lead the effort to recoup developing countries’ rights and benefits in a so-called imperialist and monopolistic cyberspace. Renowned cyber security experts, including the architect of the Great Firewall Fang Binxing, asserted the territoriality of the internet and defended the necessity for border controls (Wang, 2014b). Notably, despite this emphasis, the policymaking circle conceived cyber security as a global issue from the outset. They attributed the difficulty to draw borders to the “transnational” nature of the cybersphere, the fact that private companies own and manage internet gateways where the state has limited role (Wang, 2014a). Also, while conceding that external authority overrides domestic authority in the cybersphere, official and semi-official discussions proposed to establish an independent global authority (Qian, 2014). At the Internet Corporation for Assigned Names and Numbers (ICANN)’s high-level government meeting in 2014, Lv Wei, former director of CAC, described ICANN as “indispensable” for global internet governance before promulgating self-determination, equity, and broad-based participation as some missing norms (Liu & Feng, 2014). Lang Ping, of the Institute of World Economics and Politics at the Chinese Academy of Social Sciences, contended that global governance, which is 20 How to Think about Cyber Sovereignty premised on cyber sovereignty and is a battleground among national interests, in essence entails “giving up” (rang du) on part of sovereign rights (Wang, 2014a). China’s diplomatic stance was deemed by many as an outright statist offense to the global status quo. Pushback ensued. At its inaugural Wuzhen World Internet Conference (Wuzhen Summit hereafter) in 2014, the Chinese state sought but failed to get participating American companies to sign a declaration to “respect the internet sovereignty of all countries” (Makinen, et al., 2015). At the end of 2014, the ITU Plenipotentiary Conference concluded that ITU should not expand its role into internet issues (“Remarks,” 2016). In 2015, during the ten-year review of the World Summit on the Information Society (WSIS), China along with the Group 77 sought to push words such as “multilateral” and “sovereign rights of states” into the outcome document. But the WSIS reaffirmed the existing multi-stakeholder model and recommended states to “avoid” actions (Levin, 2015). Diplomacy stumbled; yet, the state initiated outward-looking remarks and actions, especially on bilateral fronts such as the One Belt One Road initiative (now BRI). At the inaugural China-ASEAN Forum on Cyberspace in 2014, the Chinese authority praised the ultimate value of cross-border connectivity and information flow from the standpoint of integrating markets, only paying lip service to security (“Lv Wei zai,” 2014). Tacitly defying the US paradigm at the 7th Sino-US Internet Forum, the Chinese representative held interstate differences as a base for bilateral trust and collaboration (Yuan, 2015). Notably, political culpability and ideological finger-pointing took a back seat to preserving China’s contested convergence with the US-led global internet. 21 How to Think about Cyber Sovereignty Sovereignty, Relationships and Global Connectivity In light of the diplomatic stalemate and internal pressure for widening globalization, the state moved to transcend the opposition between border-reinforcing and opportunity-seeking imperatives. The discursive justification of cyber sovereignty shifts from defending national security to achieving positive goals. Opportunity, development, and innovation in and around the internet are featured. The move is made from reacting to an external adversary to addressing transnational connectivity and shared collectiveness. The contours of this discourse shift is indicated by changes regarding selfperception, causes for action, conception of border 2.0, and construction of global authority. The idea of “building a cyberspace community of shared destiny,” introduced in 2015 by President Xi at the Second Wuzhen Summit, entails establishing a multilateral governing structure and turning the internet into development opportunities commonly shared by people across nations. It is a vision for reshaping transnational structures of communicative relations, opportunities, resources, and protocols. Claiming that China has become an “internet big nation” in the world—thanks to the efforts of all stakeholders and to the integration of advanced technologies and ideas from around the world, commentaries contrast the ideal of shared development with the reality of domination and monopoly and oblige internet big nations, especially the US, to fulfill the promise of global justice (Wei, 2015). To break away from the US-style technocratic corporatist dominance of global communication, the discourse justifies component principles of cyber sovereignty, i.e., non-transferable rights to development, governance, and participation regardless one’s 22 How to Think about Cyber Sovereignty techno-economic capacities, for redressing crises in the political economy stemming from the “law of the jungle.” The trope of common prosperity, or internet-enabled development across borders and divides, turns cyber sovereignty from a territory-based device into a global developmental vision. In turn, the realization of sovereignty, defined as encompassing security, connectivity, and development, is cast in transnational and multicultural terms. Ultimately, cyber sovereignty is implied not as a return to absolute autonomy because membership in the cybersphere has already eroded Westphalian sovereignty in the first place, but it is proposed as a viable option of global governance for shielding state capacity necessary to fulfill economic and social responsibilities. While projecting a counter vision that embraces the developing world’s unmet developmental need, the Chinese state is not without strategic considerations. It takes upon itself to drive the global digital economy. In 2014, it denounced protectionism and demanded law harmonization for integrating online marketplaces (“Guowuyuan,” 2014). In 2015, the construction of four cross-border cables connecting China and ASEAN countries, and a spurring of regional business partnership that followed, were praised as highlights of the year (“Lv wei,” 2015). The discursive gesture, and the state-led wave of investment, represents a profound reaction by the Chinese state to the new requirements of a globalizing cyber economy originating from China, a reaction the basic purpose of which is to help break barriers against China-based techno-corporate forces and to gain more commanding position in the global order of communication. Notably, these actions invite disagreement and complicate regional relations not least because China’s rise has disturbed the hegemonic position of the Global North—and has complicated the category of the South (Wasserman, 2018). Recent data shows that Chinese companies’ 23 How to Think about Cyber Sovereignty investments tripled in Asian developing countries, but growing criticism that BRI increased debt burdens have pressed the Chinese authority to limit Chinese overseas investments as part of the state initiative for the first time (Kynge, 2019; “China moves,” 2019). Sovereignty in Action: Disagreement and Porous Borders In China’s counter vision, the fixed and reliable notion of borders remains important, but complex relationships of state and private governance, national and international standards, emerge. The lexicon of internet sovereignty, for instance, has evolved more de-territorialized and flexible notions of security, such as confrontational capacity, capacity frontier, authorization power, and relative security (Li & Li, 2017). At the Third Wuzhen Summit in 2016, Xi also affirmed internet development as “borderless.” He advised his rank-and-file cyber administrators that cyber security could only be improved in an “open” environment—through more “communication, collaboration, and contention” (“Xi Jinping zai,” 2016). This reflects a new thinking among Chinese policy makers. Cyber sovereignty is not to be clawed back through rigid control over a bounded territory, but political economies of communication power are to be built by transcending and uniting the domestic and global, central and peripheral, and state and market binaries. This stance leads to institutional and material thrusts of cyber sovereignty, which trigger conflict and complicity, opposition and alliance, and ultimately dispersed and contestable dominance. The party state’s mission in Xi’s view requires “solid, domestically developed technology, rich and comprehensive information services, a 24 How to Think about Cyber Sovereignty prosperous cyber culture, a robust infrastructure, high-caliber experts in internet security and information, as well as international cooperation” (Herold, 2018, p. 57). So, domestic authority is enacted over and through varied degrees of privatization, liberalization, and globalization in the cybersphere. But as these efforts may contradict liberal values and compromise neoliberal interests, they make strides at the cost of facing consistent pushback and reversed allegations. The National Cyber Security Law passed in 2016 installs in legal terms various dimensions of domestic sovereignty, including authority over cyber activities at home, control over cross-border flows, jurisdiction over foreign entities operating in China, and authority to block out unwanted information from overseas (Wu, 2016). How to parlay legal principles into practices is subject to contention though—as Wang Yukai, professor from China National School of Administration, advised: the law needs a viable method for implementation or it would backfire on the international scene (Wang, 2015). Notably, tension and caution runs through three main policy areas, namely platform liability for speech and actions of netizens, transnational supply chain management, and data collection and transmission. To buttress the legitimacy of the party state against so-called “digital storms,” the state attempts to re-organize non-traditional power structures enabled by the internet. This is done focally through the privatization of internet content control—without contesting transnational ownership or mass self-communication capacity. The Provision on Management of Instant Messaging Services (2015) obliges platform providers to screen institutional accounts, authorizes the former to shut down accounts if the latter violates political bottom-lines, and mandates a reporting relationship between platform 25 How to Think about Cyber Sovereignty providers and supervisory authority. Online news providers, including online intermediaries authorized only to convey news, are required to have an editor-in-chief for overseeing content preview, whose nationality must be Chinese so as to facilitate law enforcement. Still, when institutional accounts exceeded 20 million on Tencent’s WeChat alone, the power of digital re-mixing, translating, and sharing is too diffuse to be contained. So, despite intensified efforts to clean up the Internet, a public opinion cycle has shaped up as acknowledged by an authoritative source, with a singular scandal leading to investigation of similar cases and then breaking into generalized critiques of the establishment (Peng & Che, 2018). The state also attempts to rein in various transnational supply chains by installing virtual and physical borders. Yet this attempt, and the formative domestic authority structure that supports it, continues to contend with global authorities that represent the interests of the transnational internet industry. The “Network Products and Services Security Inspection Measures” (2017) stipulates critical network products and services to pass a national security check before put in use. But the inspection excludes technologies and services that only pertain to public interests due to US government pressure (“Xi Jinping fangmei,” 2015). In another example, when the National Information Security Standardization Technical Committee issued about 300 cyber security-related standards, the Chinese authority must disclose required standards to the World Trade Organization and, to avoid backlash, has downgraded 1000 such standards from required national standards to recommendations (Sacks & Li, 2018). The state also demarcates authority claims over cross-border data flows, stipulating that data collected real-time on cloud-service platforms at the behest of state 26 How to Think about Cyber Sovereignty agencies belongs to state agencies. Boundaries are further demarcated through territory and population—as data is digital traces of populations and their conduct. In principle, data collected within physical national borders should be stored and processed locally, subject to security assessment. But leeway is available—as “Measures of Security Assessment for Offshore Personal Information and Critical Data Storage (draft)” set up thresholds below which businesses can exercise independent discretion. Although making rules for itself rather than promoting the model through trade diplomacy, China’s unilateral stance on data localization has hampered digital flows. This triggered US unilateralism in the ongoing trade negotiations, forcing China to reconsider its cloudmarket access policy and to delay the final verification of the draft measure (Kubota & Wei, 2019; Yang, 2019). The Chinese state is asserting sovereign rights and securing new borders, but its independence is circumscribed and its interdependence is constantly felt. To prevent a delink from the global internet system and to avert stoking domestic disagreement and global confrontation, the formative border 2.0 is porous rather than solid—as far as jurisdiction over security throttles are ensured. One may still read the state’s words and actions in the traditional manner as for internal political-security reasons and/or as protective techno-economic policy. But it is imperative to add: the state is a major site of struggle in global domestic politics—as the internet enabled by the state has materialized China’s integration and struggle with the global capitalist system. Thus, even when the state’s actions and reactions express its own wills for control or reflect the interests of domestic constituents it prioritizes, the state has to mind global legitimacy and sphere sustainability in its words and actions. Indeed, in transforming the cybersphere as non- 27 How to Think about Cyber Sovereignty traditional structures of power, the state’s sovereign authority is contested. Its assertion of authority and boundary expresses both preference and compromise. Discussion and Conclusion Sovereign relations are being worked out in various fashions. To make sense of contested yet ongoing ties between states and the internet, we use the cybersphere to conceptualize a layered, varied, and evolving network-enabled ensemble of production chains, techno-economic infrastructures, and legal-political arrangements that translate socio-cultural vitality and channel communicative flows. The cybersphere is global in its scope, unifying uneven engagements, different trends, and numerous venues. Its new centrality in the ever-expanding scope and depth of communication has further animated disagreement over political economy and governance. The entanglement of political economies and disagreement spaces transforms the cybersphere into an expanded geopolitics where competing narratives, categories, proposals, and arrangements emerge, clash, work out, or transcend difference. We reviewed the Chinese state’s agentic power at a critical moment when China and the cybersphere, a set of intertwined engines in the global political economy, render the party state a contesting subject and a contested object at once, especially its bid for cyber sovereignty. The state’s construction of cyber sovereignty is intended to safeguard the multipolar direction of global digital capitalism and to extend contestation over cyberspace governance beyond issues of security and privacy to material wellbeing, developmental justice, and alternative planetary futures. Notably, the state functions both a driver and barometer of disagreement. It has come to heed the risk of using sovereignty 28 How to Think about Cyber Sovereignty and territoriality interchangeably and is turning the concept from a territory-based device into a global developmental rhetoric. At home, the state is demarcating boundaries through authority, territory, and population in the transnational structures of the cybersphere, leaving loopholes, decentralization, and diffusion as normality under the pressure of discord and defiance. Notably, if cyber sovereignty embraces the cybersphere and also critiques crises it amplifies, this “embrace plus critique” gesture is made up of three competing visions and practices, i.e., a counterhegemonic order, a defender of the globalization order, and a unilateral reorganization of non-traditional structures of power. Looking forward, heated contests for the future global internet governance is torn by inter-hegemonic rivalries, but controversies over development and justice will become increasingly embroiled with tensions between sustaining global interdependence and asserting national interests. To prevent a slide into decision-making patterns driven by power interests, it is the case that 'ideal' cybersphere for different national/international projects is differently envisioned, but that the political economy of practice (adjusting inside and out by nation states and international groups) is a necessity. With adjustments tacit and voiced, secret and opened, a sphere of engagement, entanglement, and regulatory/performance rules gets put into place, contested, and revised. Following the traditional praxis of critique, we hold accountable practices and structures developed during an era of prevailing communication flows from center to periphery. This paper ultimately offers a step towards laying the grounds for open public debates over a global digital cybersphere order and for considering anew the internet and governance. 29 How to Think about Cyber Sovereignty Reference Agnew, J. (2009). Globalization and sovereignty. Lanham, MD: Rowman & Littlefield Publishers. Aouragh, M., & Chakravartty, P. (2016). Infrastructures of empire: towards a critical geopolitics of media and information studies. Media, Culture & Society, 38(4), 559–575. Betz, D., & Stevens, T. (2011). Chapter Two: Cyberspace and sovereignty. Adelphi Series, 51(424), 55–74. Biersteker, T. J., & Weber, C. (1996). State sovereignty as social construct. Cambridge, MA: Cambridge University Press. Carlson, A. (2005). Unifying China, integrating with the world: Securing Chinese sovereignty in the reform era. Stanford, CA: Stanford University Press. Castells, M. (2010). The power of identity (2nd ed.). West Sussex, England: WileyBlackwell. Chakravartty, P. (2007). Governance without politics: Civil society, development and the postcolonial state. International Journal of Communication, 1(1), 21. Chakravartty, P., & Sarikakis, K. (2006). Media policy and globalization. New York: Palgrave Macmillian. 30 How to Think about Cyber Sovereignty China Moves to Define ‘Belt and Road’ Projects for First Time. (2019, April 3). Bloomberg News. Cooren, F. (2018). Materializing Communication: Making the Case for a Relational Ontology. Journal of Communication, 68(2), 278–288. Crick, B. (1968). Sovereignty. International Encyclopedia of the Social Sciences. NY: Mamillan Free Press. 76-82. DeNardis, L. (2014). The global war for internet governance. Yale University Press. Desai, R. (2013). Geopolitical economy: After US hegemony, globalization and empire. London: Pluto Press. Dijck, J. (2013). The culture of connectivity a critical history of social media. New York: Oxford University Press. Economy, E. (2018). The third revolution : Xi Jinping and the new Chinese state . New York, NY: Oxford University Press. Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107-115. Fewsmith, J. (2010, Ed.). China today, China tomorrow: Domestic politics, economy and society. Lanham, MY: Rowman and Littlefield. Flew, T. (2018). Post-Globalisation. Javnost - The Public, 25(1-2), 102–109. Flournoy, M., & Sulmeyer, M. (2018). Battlefield Internet: A Plan for Securing Cyberspace. (WORLD WAR WEB)(Essay). Foreign Affairs, 97(5), 40–46. Goldsmith, J., & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world. New York: Oxford University Press. 31 How to Think about Cyber Sovereignty Graham, M. (2013). Geography/internet: Ethereal alternate dimensions of cyberspace or grounded augmented realities? Geographical Journal, 179(2), 177-182. Guowuyuan fuzongli Makai zai shoujie shijie hulianwang dahuishang de zhici. (2014, Nov 19). Xinhua News. Retrieved Dec 7, 2017, from http://www.cac.gov.cn/201411/19/c_1113315121.htm Hardt, M., & Negri, A. (2000). Empire. Cambridge, Mass: Harvard University Press. Harold, S., et al. (2016). Getting to yes with China in cyberspace. Retrieved Dec 7, 2017, from https://www.atlcom.nl/upload/RAND_RR1335.pdf Herold, D. K. (2011). An inter-nation-al internet: China’s contribution to global internet governance? SSRN Electronic Journal, DOI: 10.2139/ssrn.1922725 Herold, D. (2018). Xi Jinping’s Internet: Faster, Truer, More Positive and More Chinese? China: An International Journal, 16(3), 52–73. Hong, Y. (2017). Networking China: The digital transformation of the Chinese economy. Urbana, IL: University of Illinois Press. Hsieh, H. & Shannon, S. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9):1277-1288. Jackson, S. (2015). Design thinking in argumentation theory and practice. Argumentation, 29(3):243–263. Johnson, D., & Post, D. (1996). Law and borders - the rise of law in cyberspace. Stanford Law Review, 48(5), 1367–1402. Katin-Borland, N. (2012). Cyberwar: A Real and Growing Threat. Cyberspaces and Global Affairs, 83. 32 How to Think about Cyber Sovereignty Kiggins, R. (2012). US Identity, Security, and Governance of the Internet. Cyberspaces and Global Affairs, 189. King, G., et al. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 107(2), 326343. Kohl, U. (2007). Jurisdiction and the internet: Regulatory competence over online activity. Cambridge, MA: Cambridge University Press. Kohl, U., & Fox, C. (2017). Introduction. The net and nation state: multidisciplinary perspectives on internet governance. Cambridge, Cambridge University Press, p.123. Krasner, S. D. (1999). Sovereignty: Organized hypocrisy. Princeton, NJ: Princeton University Press. Kristof, L. (1960). The origins and evolution of geopolitics. Journal of Conflict Resolution, 4(1), 15–51. Kubota, Y, & Wei, L. L. (2019, April 11). China Sweetens Its Cloud-Computing Offer in U.S. Trade Talks. The Wall Street Journal. Kynge, J. (2019, April 3). China triples investment in emerging Asia on trade war. The Financial Times. Levin, D. (2015, Dec 18). Beijing fights for state control of internet. International New York Times, p. 18. Li, H. Y., & Li, M. H. (2017, April 17). Qiantan wangluo kongjian zhanchang de zhisheng jili. New Media, 3, 92-93. 33 How to Think about Cyber Sovereignty Liu, J. F., & Goodnight, G. T. (2016) China’s green public culture: Network pragmatics and the environment. International Journal of Communication 10: 5535-5557 Liu, S. L., & Feng, Q. (2014, June 24). Lu Wei elaborated on China’s views and opinions on the internationalization of ICANN. CAC. Retrieved Dec 22, 2017, from http://news.sina.com.cn/c/2014-06-24/200230415788.shtml Lv wei. Build an interconnected port and share the results of network development). (2015, Sep 13). CAC. Retrieved Dec 23, 2017, from http://gx.wenming.cn/db/201509/t20150914_2854134.htm Lv wei zai shoujie zhongguo-dongmeng wangluo kongjian luntanshang de zhuzhi yanjiang. (2014, Sep 18). CAC. Retrieved Dec 22, 2017, from http://media.people.com.cn/n/2014/1022/c390063-25887386.html MacKinnon, R. (2011). China’s “Networked Authoritarianism”. Journal of Democracy, 22(2), 32-46. Makinen, J., et al. (2015, Dec 16). China’s vision for internet; Global conference to focus on innovation, society and sovereignty. Los Angeles Times, p. 2. Miliband, R. (2009). The state in capitalist society. London: Merlin Press. Mueller, M. (2010). Networks and states: the global politics of internet governance. Cambridge: MIT Press. Murdock, G. (2018). Media Materialities: For A Moral Economy of Machines. Journal of Communication, 68(2), 359–368. Navarria, G. (2016). China: the Party, the Internet, and power as shared weakness. Global Change, Peace & Security, 29(1), 1–20. Panitch, L. (2009). Reading the State in Capitalist Society. New York: Routledge. 34 How to Think about Cyber Sovereignty Peng, X. Y., Che, Z. L. (2018). Analysis of nine characteristics of online public opinions in the first half of 2018. Public Opinion Monitoring Center. Pohle, J. (2019). Digital sovereignty? Past, present and future ideas about selfdetermination in times of digitalization. Paper presented at IAMCR, Madrid, Spain. Qian, W. R. (2014, May 27). Jianjue fandui wangluo baquan jianli guoji xinzhixu. CAC. Retrieved Dec 7, 2017, from http://news.xinhuanet.com/world/201405/27/c_1110885470.htm Rauchfleisch, A., & Schäfer, M. S. (2015). Multiple public spheres of Weibo: A typology of forms and potentials of online public spheres in China. Information, Communication & Society, 18(2), 139-155. Reisigl, M. (2008). Analyzing political rhetoric. In R. Wodak & M. Krzyzṅowski (Eds.), Qualitative Discourse Analysis in the Social Sciences.Basingstoke, England: Palgrave Macmillan. Remarks of assistant secretary strickling at the information technology and innovation foundation (2016, March 17). The Washington Post. Sacks, S.& Li, M. K. (2018, August 2). How Chinese Cybersecurity Standards Impact Doing Business In China. the Center for Strategic and International Studies. Schiller, D. (2014). Digital depression : information technology and economic crisis . Urbana: University of Illinois Press. Shi, A. (2017). China’s role in remapping global communication. Shi, A. B. Thussu, D. K., De Burgh, H., & Shi, A. (Eds.). (2017). China's Media Go Global. Routledge, p. 34-51. 35 How to Think about Cyber Sovereignty Shen, H. (2017). Across the Great (Fire) Wall: China and the global Internet (doctoral dissertation). University of Illinois at Urbana-Champaign, Urbana-Champaign. Simpson, S. (2004). Explaining the commercialization of the internet: A neo-Gramscian contribution. Information, Communication & Society, 7(1), 50-68. Srinivasan, R. (2017). Whose global village? Rethinking how technology shapes our world. New York: New York University Press. Starrs, S. (2017). The Global Capitalism School Tested in Asia: Transnational Capitalist Class vs Taking the State Seriously. Journal of Contemporary Asia. Routledge. Tai, K. (2017). China’s multiple cybersovereignties. Paper presented at the 15th China Internet Research Conference, Beijing, China. Wang, Y. (2014a, June 23). Wangluo zhuquan: yige buronghuibi dewenti. People’s Daily. Retrieved Dec 24, 2017, from http://www.cac.gov.cn/201406/23/c_1111262370.htm Wang, Y. (2014b, June 24). Cong wangluo daguo zouxiang wangluo qiangguo. People’s Daily. Retrieved Dec 24, 2017, from http://www.cac.gov.cn/201406/24/c_1111279634.htm Wang, Y. K. (2015, Nov 4). Lifa weihu guojia zhuquan. Retrieved Dec 8, 2017, from http://www.cac.gov.cn/2015-11/04/c_1117015619.htm Wasserman, H. (2018). Power, Meaning and Geopolitics: Ethics as an Entry Point for Global Communication Studies. Journal of Communication, 68(2), 441–451. Wei, L. (2015, Dec 17). Xizhuxi gongxian zhongguo zhihui chanming zhongguo zhuzhang. Retrieved Dec 23, 2017, from http://www.cac.gov.cn/201512/17/c_1117490998.htm 36 How to Think about Cyber Sovereignty Wei, L. L. (2017). Gatekeeping practices in the Chinese social media and the legitimacy challenge. The net and nation state: multidisciplinary perspectives on internet governance. Cambridge: Cambridge University Press, p.69-80. Woodley, D. (Ed.). (2015). Globalization and capitalist geopolitics: Sovereignty and state power in a multipolar world. Taylor and Francis. Wu, Y. (2016 Nov 8). Yifa queli wangluo anquan zhidu kuangjia tuidong wangluo anquan shuiping yuesheng. Retrieved Dec 9, 2017, from http://www.cac.gov.cn/2016-11/08/c_1119866644.htm Xi Jinping fangmei qijian zhongmei guanyu wangluokongjian de gongshi yu chengguo qingdan. (2015, Sep 28). Retrieved Dec 7, 2017, from http://www.cac.gov.cn/2015-09/28/c_1116702255.htm Xi Jinping zai wangluo anquan he xinxihua gongzuo zuotanhuishang de jianghua. (2016, April 25). Xinhua News. Retrieved Dec 23, 2017, from http://www.cac.gov.cn/2016-04/25/c_1118731366.htm Xie, X. Z. (2014, June 5). Wangluo kongjian xu jiaqiang dingceng sheji. People’s Daily. Retrieved Dec 23, 2017, from http://www.cac.gov.cn/201406/05/c_126582441.htm Yang, G. (2003). The internet and the rise of a transnational Chinese cultural sphere. Media Culture & Society, 25(4), 469–+. Yang, Y. (2019, April 22). Trade war with US delays China’s rules curbing data transfers. The Financial Times. Yu, H.Q. (2017). Beyond e-commerce: The social case of China’s digital economy. China Perspectives, 73(4), 3–8. 37 How to Think about Cyber Sovereignty Yuan, G. (2015, Dec 16). Cyberspace door stays open. China Daily. Zeng, J., Stevens, T., & Chen, Y. (2017). China’s solution to global cyber governance: Unpacking the domestic discourse of “internet Sovereignty.” Politics & Policy, 45(3), 432-464. Zhao, Y. Z. (2008). Communication in China : political economy, power, and conflict . Lanham, Md: Rowman & Littlefield. 38