Hacking into China's cybersecurity law

JA Lee - Wake Forest L. Rev., 2018 - HeinOnline
HACKING INTO CHINA'S CYBERSECURITY LAW Page 1 HACKING INTO CHINA'S
CYBERSECURITY LAW Jyh-An Lee* China's Cybersecurity Law, which is thus far the most …

Social media policies as responses for social media affordances: The case of China

Q Chen, X Xu, B Cao, W Zhang - Government information quarterly, 2016 - Elsevier
The study aims to reveal how government organizations manage governmental social
media use by employing policies to respond to the affordances of social media. The existing …

Privacy, predictability and internet surveillance in the US and China: Better the devil you know

JD Fry - U. Pa. J. Int'l L., 2015 - HeinOnline
The People's Republic of China (" PRC") has received considerable criticism from the United
States for the human rights issues raised by its Internet surveillance program. For example …

Real-name registration rules and the fading digital anonymity in China

JA Lee, CY Liu - Wash. Int'l LJ, 2016 - HeinOnline
China has implemented comprehensive online real-name registration rules, which require
Internet users to disclose their identities. Chinese national law has required most online …

Searching for Internet freedom in China: A case study on Google's China experience

JA Lee, CY Liu, W Li - Cardozo Arts & Ent. LJ, 2012 - HeinOnline
Google has been a giant in the global Internet economy, but the company has encountered
a series of setbacks in China. In order to prevent its search results from being filtered out or …

Comparative Cybersecurity Law in Socialist Asia

NS Bui, JA Lee - Vand. J. Transnat'l L., 2022 - HeinOnline
This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam
in 2017 and 2018, respectively. The two laws both converge and diverge. Their …

[PDF][PDF] The data protection regime in China

P De Hert, V Papakonstantinou - Depth Analysis//Brussels …, 2015 - biblio.vub.ac.be
This in-depth analysis was commissioned by the European Parliament's Policy Department
for Citizens' Rights and Constitutional Affairs at the request of the LIBE Committee. One …

The red storm in uncharted waters: China and international cyber security

JA Lee - UMKC L. Rev., 2013 - HeinOnline
US President Barack Obama and Chinese President Xi Jinping had a two-day summit at
Sunnylands in Rancho Mirage, California in June 2013.1 This meeting was the first of two …

Search boundaries: human flesh search, privacy law, and internet regulation in China

D Han - Asian Journal of Communication, 2018 - Taylor & Francis
This research examines privacy law and Human Flesh Search (HFS) on the Chinese
Internet. HFS is spontaneous, widely participated search and publication of targeted …

Privacy Laws and Privacy Levers: Online Surveillance Versus Economic Development in the People's Republic of China

A Bartow - Ohio St. LJ, 2013 - HeinOnline
This Essay describes and contextualizes the ongoing efforts by the Communist Party of
China (CPC) to reconcile two dramatically competing interests: the desire to extensively …