References

In researching this book, around 1,000 sources were consulted. These included government documents, policy reports, academic studies, books and website articles. At the request of the publisher, to make the list manageable for this short book, three types of references are omitted: those that are cited only because they have documented factual events, including speeches or statements of government policy, that can be easily verified; references to website statements about the missions of various organizations; and UN documents. Where appropriate, these are clearly referenced through the text by date and source but without weblinks.

All website references in this list were reconfirmed on 30 December 2013.

AI (Amnesty International) (2006) Undermining freedom of expression in China: The role of Yahoo!, Microsoft and Google. http://www.amnesty.org/en/library/asset/POL30/026/2006/en/18c6f357-d41b-11dd-8743-d305bea2b2c7/pol300262006en.html.

Anon. (1972) Computing in China: A Travel Report [by six American computer scientists invited by the People's Republic of China]. http://digitalcollections.library.cmu.edu/awweb/awarchive?type=file&item=74954.

Austin, Greg (2001) China's power: Searching for stable domestic foundations. In Zhang, Y. and Austin, G. (eds.), Chinese Foreign Policy: Motivations, Power and Responsibility. Asia Pacific Press, Canberra, 69–104.

Austin, Greg and Gady, Franz (2012) Cyber Detente between the United States and China. EastWest Institute, New York/Brussels/Moscow.

Ball, Desmond (2011) China's cyber warfare capabilities. Security Challenges, 7(2), 81–103.

Bandurski, David (2013) Managing the hazards of online society. China Media Project, 13 May. http://cmp.hku.hk/2013/05/13/33042.

Bao Xiaohui, Xu Xiaofan, Li Cheming, Yuan Zhensheng, Lu Chaoyang and Pan Jianwei (2012) Quantum teleportation between remote atomic-ensemble quantum memories. Cornell University Library. Submitted 13 November. http://arxiv.org/abs/1211.2892.

Bell, Daniel (1976) The Coming of Post-Industrial Society. Harper Colophon Books, New York.

Bell, Mark R. and Boas, Taylor C. (2003) Falung Gong and the internet: evangelism, community and struggle for survival. Nova Religio, 6, 277–93.

Benney, Jonathon (2013) Defending Rights in Contemporary China. Routledge, London.

Bradsher, Keith (2013) Next made-in-China boom: College graduates. New York Times, 16 January. http://www.nytimes.com/2013/01/17/business/chinas-ambitious-goal-for-boom-in-college-graduates.html?pagewanted=all&_r=0.

Breschi, Stefani and Malerba, Franco (1997) Sectoral innovation systems. In Edquist, C. (ed.), Systems of Innovation: Technologies, Institutions and Organizations. Pinter/Cassell, London, 130–56.

Breznitz, Dan (2007) Innovation and the State: Political Choices and Strategies for Growth in Israel, Taiwan and Ireland. Yale University Press, New Haven CT.

Brock, Darryl E. (2009) Science innovation during the Cultural Revolution: Notes from the Peking Review. Southeast Review of Asian Studies, 31, 226–32.

BSA (Software Alliance) (2013) 2013 BSA Global Cloud Computing Scorecard: A Clear Path to Progress. Software Alliance and Galexia Consulting. http://cloudscorecard.bsa.org/2013/index.html.

CAS (2009) Technological Revolution and China's Future: Innovation 2050. http://english.bic.cas.cn/NE/200906/t20090619_7263.html.

CASS (2007) Surveying internet Usage and its Impact in Seven Chinese cities: China Internet Project Survey Report. http://www.markle.org/news-events/media-releases/chinese-turn-internet-entertainment-and-connecting-others-number-broadban.

Castells, Manuel (2012) Networks of Outrage and Hope: Social Movements in the Internet Age. Polity, Cambridge.

Castells, Manuel (2005) The network society: From knowledge to policy. In Castells, M. and Cardoso, G. (eds.), The Network Society: From Knowledge to Policy. Johns Hopkins Center for Transatlantic Relations, Washington DC, 3–21.

CC&M (China Copyright and Media) (2013) Secret central committee document calls for loyalty, warns for Western influence. 14 May. http://chinacopyrightandmedia.wordpress.com/2013/05/14/secret-central-committee-document-calls-for-loyalty-warns-for-western-influence.

CECC (Congressional-Executive Commission on China) (2010) Top Chinese security officials urge continued crackdown in 2010. 12 February. http://www.cecc.gov/pages/virtualAcad/index.phpd?showsingle=135611.

Central Committee (2013) CCP Central Committee resolution concerning some major issues in comprehensively deepening reform, passed at the 3rd Plenum of the 18th Central Committee of the Chinese Communist Party on 12 November. 15 November. http://chinacopyrightandmedia.wordpress.com/2013/11/15/ccp-central-committee-resolution-concerning-some-major-issues-in-comprehensively-deepening-reform.

Central Committee and State Council (2006) CPC Central Committee and State Council on issuing the 2006–2020 National Development Strategy [in Chinese]. http://www.china.com.cn/chinese/PI-c/1203246.htm.

Chao Xueqin, Gao Xiaoyu and Ma Dongyan (2012) Analysis of China's downgrade in informatization development indexes in an international comparative study. In Analysis and Forecast on China's Informatization (2012): Blue Book of China's Informatization. Social Sciences and Academic Press, Beijing [in Chinese], 324–42.

Chen, Huijie and Chu, Heting (1995) Chinese information market: Seamless networking in China – progress, problems and perspectives. Bulletin of the American Society for Information Science. http://www.asis.org/Bulletin/Jun-95/chen.html.

Cheng Li (2012) Introduction. In He Weifang, In the Name of Justice: Striving for the Rule of Law in China. Brookings Institution, Washington DC, xvii–xlix.

Cheng Li (2013) Rule of the princelings. Brookings Research, 10 February. http://www.brookings.edu/research/articles/2013/02/china-xi-jinping-li.

Chiu, Joanna (2013) Censored Sina Weibo posts translated into English by HKU project. South China Morning Post, 14 May. http://www.scmp.com/news/china/article/1237117/censored-sina-weibo-posts-translated-english-hku-project.

Cisco (2002) Overview of the Public Security Sector. http://www.wired.com/images_blogs/threatlevel/files/cisco_presentation.pdf.

Clarke, Richard A. and Knake, Robert K. (2010) Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins, New York.

Cliff, Roger, Fei, John F., Hagen, Jeff, Hague, Elizabeth, Heginbotham, Eric and Stillion, John (2011) Shaking the Heavens and Splitting the Earth: Chinese Air Force Employment Concepts in the 21st Century. Rand, Santa Monica CA.

CNCERT (2013) Annual Report 2012. http://www.cert.org.cn/publish/english/115/2013/20130716100050563462704/20130716100050563462704_.html.

CNNIC (1986–2013) Internet timeline, available on several separate pages at http://www1.cnnic.cn/IDR/hlwfzdsj.

CNNIC (2013) Statistical Report on Internet Development in China: 31st Semi-Annual Survey Report. CNNIC, Beijing.

Dai Xiudan (2002) Towards a digital economy with Chinese characteristics? New Media and Society, 4, 141–61.

Deng Xiaoping (1980) Talk with some leading comrades of the Central Committee, 25 October. http://english.peopledaily.com.cn/dengxp/vol2/text/b1420.html.

Deng Xiaoping (1979) Speech to the Central Committee, 30 March: Uphold the four cardinal principles. In translation, http://english.peopledaily.com.cn/dengxp/vol2/text/b1290.html.

DHS (US Department of Homeland Security) (2012) Immigration statistics, tables 3, 7 and 8. http://www.dhs.gov/files/statistics/publications/LPR11.shtm.

DoD (US Department of Defense) (2013) Military and Security Developments Involving the People's Republic of China 2013. United States Dept of Defense, Washington DC.

DoD (US Department of Defense) (2012) Military and Security Developments Involving the People's Republic of China 2012. United States Dept of Defense, Washington DC.

DoD (US Department of Defense) (2011) Military and Security Developments Involving the People's Republic of China, 2011. United States Dept of Defense, Washington DC.

Dong Zhengwei (2013) Blog, 25 February. http://blog.sina.com.cn/s/blog_57a1cb0701019wtf.html.

Duan Qing (2012) China's IT Leadership: The Political Struggle behind China's Information Revolution. Akademiker, Saarbrüchen.

Economist (2013) Security in Tibet: Grid locked. Economist, 22 June.

Esarey, Ashley and Xiao Qiang (2011) Digital communication and political change in China. International Journal of Communication, 5, 298–319.

Etzkowitz, Henry, Dzisah, James, Ranga, Marina and Zhou Chunyan (2007) University–industry–government interaction: The triple helix model for innovation. Asia-Pacific Tech Monitor, 24(1), 14–23.

Fang Lizhi (1989) The past and the future, trans. Perry Link. http://www.nybooks.com/articles/archives/2011/jun/23/past-and-future.

Farina, Claudio and Preissl, Brigitte (2000) Research and Technology Organizations in National Systems of Innovation. DIW Discussion Paper, 221. http://www.diw.de/documents/publikationen/73/38616/dp221.pdf.

Farrall, Kenneth Neil (2008) Global privacy in flux: Illuminating privacy across cultures in China and the U.S. International Journal of Communication, 2, 993–1030.

Finn, Michael B. (2010) Stay Rates of Foreign Doctorate Recipients from U.S. Universities, 2007. Oak Ridge Institute for Science and Education (ORISE). http://heglobal.international.gbtesting.net/media/7133/stay-rates-foreign-doctorate-recipients-2007.pdf.

Floridi, Luciano (2013) The Ethics of Information. Oxford University Press, Oxford.

Floridi, Luciano (2005) Information ethics, its nature and scope. In van den Hoven, J. and Weckert, J. (eds.), Moral Philosophy and Information Technology. Cambridge University Press, Cambridge, 40–65.

Floridi, Luciano and Sanders, J. W. (2002) Mapping the foundationalist debate in computer ethics. Ethics and Information Technology, 4(1), 1–9.

Frost, Mervyn (2009) Global Ethics: Anarchy, Freedom and International Relations. Routledge, New York.

Frost, Mervyn (1986) Towards a Normative Theory of International Relations. Cambridge University Press, Cambridge.

Fu Guangxin and Yan Shuzhen (2012) Information and regional economic growth: Taking the case of Shandong province. Paper presented at the 2012 Second International Conference on Business Computing and Global Informatization.

Fuller, Douglas B. (2008) The political economy of technological development in China's information technology sector. In Rowen, H. S., Hancock, M. and Miller, W. F. (eds.), Greater China's Quest for Innovation. Walter H. Shorenstein Asia-Pacific Research Center Books, Stanford CA, 85–108.

Gady, Franz Stefan and Austin, Greg (2010) Russia, the United States, and Cyber Diplomacy: Opening the Doors. EastWest Institute, New York/Brussels/Moscow.

Gereffi, Gary, Wadwha, Vivek and Rissing, Ben (2006) Framing the engineering outsourcing debate: Comparing the quantity and quality of engineering graduates in the United States, India and China. Paper prepared for SASE 2006 Conference, ‘Constituting Globalisation: Actors, Arenas, and Outcomes’, Trier, Germany, 30 June–2 July.

Hassan, Robert (2008) The Information Society. Polity, Cambridge.

Hayhoe, Ruth and Zha Qiang (2011) Peking University: Icon of cultural leadership. In Hayhoe, R., Li Jun, Lin Jing and Zha Qiang, Portraits of 21st Century Chinese Universities: In the Move to Mass Higher Education. Springer, Dordrecht, 95–130.

Herold, David Kurt (2013) Captive artists: Chinese university students talk about the internet (1 May). http://ssrn.com/abstract=2259020.

Hjortdal, Magnus (2011) China's use of cyber warfare: Espionage meets strategic deterrence. Journal of Strategic Security, IV(2), 1–24.

Hu, Albert Guangzhou (2008) What do they patent in China, and why? In Rowen, H. S., Hancock, M. and Miller, W. F. (eds.), Greater China's Quest for Innovation. Walter H. Shorenstein Asia-Pacific Research Center Books, Stanford CA, 255–68.

Huang Lucheng, Wang Kangkang, Wu Feifei, Lou Yan, Miao Hong and Xu Yanmei (2012) SWOT analysis of information technology industry in Beijing, China using patent data. In Murgante, B. et al. (eds.), ICCSA 2012, part 1, 447–61.

Hughes, Christopher (2003) Fighting the smokeless war. In Hughes, C. R. and Wacker, G., China and the Internet: Politics of the Digital Leap Forward. Routledge, London, 139–61.

Hunton & Williams LLP (2013a) Chinese legislature passes data privacy resolution. Blog, 2 January. http://www.huntonprivacyblog.com/2013/01/articles/chinese-legislature-passes-data-privacy-resolution.

Hunton & Williams LLP (2013b) Chinese Ministry of Industry and Information Technology enacts new data protection rule. Blog, 26 July. http://www.huntonprivacyblog.com/2013/07/articles/chinese-ministry-of-industry-and-information-technology-enacts-new-data-protection-rule.

Hwang Ji-Jen (2012) China's Cyber Warfare: The Strategic Value of Cyberspace and the Legacy of People's War. PhD thesis, Newcastle University.

Inkster, Nigel (2010) China in cyber space. Survival, 52(4), 55–66.

Intelligence Squared Debate (2010) The cyber war threat has been grossly exaggerated. 8 June, transcript, p. 7. http://intelligencesquaredus.org/wp-content/uploads/Cyber-War-060810.pdf.

ITU (2013) Measuring the Information Society 2013. ITU, Geneva. http://www.itu.int/en/ITU-D/Statistics/Documents/publications/mis2013/MIS2013_without_Annex_4.pdf.

Ji Ping (2011) Implementing higher education quality assurance on system level: The case of China. Presented at the Asia Europe Meeting (ASEM) Bonn. http://www.asem-education-secretariat.org/imperia/md/content/asem2/events/2011asemqaseminar/4_jiping.pdf.

Jiang Zemin (2010) On the Development of China's Information Technology Industry, trans. Central Party Literature Press and Shanghai Jiao Tong University Press. Elsevier, Oxford. [First published in Chinese (2009). Central Party Literature Press and Shanghai Jiatong University Press.]

King, Gary, Pan, Jennifer and Roberts, Margaret E. (2013) How censorship in China allows government criticism but silences collective expression. American Political Science Review, May. http://gking.harvard.edu/files/gking/files/censored.pdf.

Kirkman, Geoffrey, Cornelius, Peter K., Sachs, Jeffrey D. and Schwab, Klaus (eds.) (2002) The Global Information Technology Report 2001–2002: Readiness for the Networked World. Oxford University Press, Oxford.

Krekel, Bryan, Adams, Patton and Bakos, George (2012) Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. Prepared for the U.S.–China Economic and Security Review Commission by Northrop Grumman Corp. http://www.gwu.edu/∼nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-066.pdf.

Krepinevich, Andrew (2012) Cyber Warfare: A ‘Nuclear Option’? Center for Budgetary Assessments, Washington DC.

Laforet, Sylvie (2009) Chinese consumers’ attitudes and adoption of online and mobile banking. In de Pablos, P. O. and Lytras, M. D. (eds.), The China Information Technology Handbook. Springer, Dordrecht, 23–40.

Lai, David (2010) Introduction. In Kamphausen, R., Lai, D. and Scobell, A. (eds.), The PLA at Home and Abroad: Assessing the Operational Capabilities of China's Military. US Army War College Press, Carlisle PA, 1–44.

Leu, Russell (2013) China's first-ever national standard on data privacy: Best practices for companies. In China on Managing Data Privacy: China Law Update. Blog, 13 June. http://www.chinalawupdate.cn/2013/06/articles/other/chinas-firstever-national-standard-on-data-privacy-best-practices-for-companies-in-china-on-managing-data-privacy.

Lewis, James A. (2005) Computer espionage, Titan Rain and China. Center for Strategic and International Studies – Technology and Public Policy Program, December. http://csis.org/files/media/csis/pubs/051214_china_titan_rain.pdf.

Li Guojie (ed.) (2011) Information Science and Technology in China: A Roadmap to 2050. Chinese Academy of Social Sciences/Science Press/Springer, Beijing.

Li Haizheng (2011) Higher education in China: Complement or competition to US universities? In Clotfelter, C. T. (ed.), American Universities in a Global Market. National Bureau of Economic Research, University of Chicago Press, Chicago, 269–304.

Li Xiaodong (2012) The Western theories of war ethics and contemporary controversies. http://english.cssn.cn/8203/820305/201202/t20120225_231239.shtml.

Li Zhongzhou (2006) China's informatization strategy and its impact on trade in ICT goods and ICT services. Presented at the UNCTAD Expert Meeting in Support of the Implementation and Follow-Up of WSIS: Using ICTs to Achieve Growth and Development, jointly organized by UNCTAD, OECD and ILO, 4–5 December. http://archive.unctad.org/sections/wcmu/docs/c3em29p016_en.pdf.

Lieberthal, Kenneth (2004) Governing China: From Revolution through Reform (2nd edition). W. W. Norton, New York.

Lieberthal, Kenneth and Oksenberg, Michael (1988) Policy Making in China: Leaders, Structures and Processes. Princeton University Press, Princeton NJ.

Ling Lan (2005) Enhancing e-democracy via fiscal transparency: A discussion based on China's experience. In Böhlen, M., Gamper, J., Polasek, W. and Wimmer, M. A. (eds.), E-Government: Towards Electronic Democracy. Proceedings of the International Conference TCGOV 2005, Bolzano, Italy, 2–4 March. Springer, Berlin/Heidelberg/New York, 57–69.

Liu Chun (2012) The myth of informatization in rural areas: The case of China's Sichuan province. Government Information Quarterly, 29(1), 85–97.

Livingston, Scott (2013) China releases national standard for personal information collected over information systems; industry self-regulatory organization established. Inside Privacy, 25 January. http://www.insideprivacy.com/international/china-releases-national-standard-for-personal-information-collected-over-information-systems-industr.

Lü Yao-Huai (2005) Privacy and data privacy issues in contemporary China. Ethics and Information Technology, 7, 7–15.

Ma Lie (2012) Call for information security law. China Daily.com, 6 March.

McGregor, James (2010) China's Drive for ‘Indigenous Innovation’: A Web of Industrial Policies. Global Intellectual Property Center/U.S. Chamber of Commerce/APCO Worldwide. https://www.uschamber.com/sites/default/files/legacy/reports/100728chinareport_0.pdf.

Machlup, Fritz (1962) The Production and Distribution of Knowledge in the United States. Princeton University Press, Princeton NJ.

MacKinnon, Rebecca (2011) China's ‘networked authoritarianism’. Journal of Democracy, 22(2), 32–46.

MANDIANT (2013) APT1: Exposing One of China's Cyber Espionage Units. www.mandiant.com.

Masuda, Yoneji (1981 [1980]) The Information Society as Post-Industrial Society. World Future Society, Bethesda MD.

Mattis, Peter (2013) Informatization drives expanded scope of public security. China Brief, 13(8), 12 April. http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=40721#.UbHkMpzleSo.

Mattis, Peter (2011) China's adaptive approach to the information counter-revolution. China Brief, 11(10), 3 June. http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=38013&tx_ttnews[backPid]=517#.UbHn3JzleSo.

Meltzer, Joshua (2013) Taiwan's Economic Opportunities and Challenges and the Importance of the Trans-Pacific Partnership. Working Paper, Brookings Institution, Washington DC.

Meng Qingxuan and Li Mingzhi (2001) New Economy and ICT Development in China. WIDER Discussion Papers, World Institute for Development Economics (UNUWIDER), 2001/76. http://hdl.handle.net/10419/53080.

Minzer, Carl (2010) Countries at the Crossroads 2011: China. Freedom House. http://www.freedomhouse.org/sites/default/files/inline_images/ChinaFINAL.pdf.

Moran, Theodore H. (2011) Foreign Manufacturing Multinationals and the Transformation of the Chinese Economy: New Measurements, New Perspectives. Working Paper, Petersen Institute for International Economics, Washington DC, April.

Mueller, Milton and Lovelock, Peter (2000) The WTO and China's ban on foreign investment in telecommunication services: A game-theoretic analysis. Telecommunications Policy, 24(8–9), 731–59.

Mulvenon, James (2009) Chairman Hu and the PLA's ‘new historic mission’. China Leadership Monitor, 27. http://media.hoover.org/sites/default/files/documents/CLM27JM.pdf.

Mulvenon, James (2008) ‘True is false, false is true, virtual is reality, reality is virtual’: Technology and simulation in the Chinese military training revolution. In Kamphausen, R., Scobell, A. and Tanner, T. (eds.), The ‘People’ in the PLA: Recruitment, Training, and Education in China's Military. United States Army Strategic Studies Institute, Carlisle PA, 49–98. http://www.strategicstudiesinstitute.army.mil/pdffiles/pub858.pdf.

Mulvenon, James (1999) The PLA and information warfare. In Mulvenon, J. C. and Yang, R. H. (eds.), The People's Liberation Army in the Information Age. Rand, Santa Monica CA, 175–86.

National Research Council (2012) The New Global Ecosystem in Advanced Computing: Implications for U.S. Competitiveness and National Security. Committee on Global Approaches to Advanced Computing, Board on Global Science and Technology; Policy and Global Affairs Division. National Academies Press, Washington DC.

ONCIX (US Office of the National Counterintelligence Executive) (2011) Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009–2011. October. http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf.

Orcutt, John and Shen Hong (2010) Shaping China's Innovation Future: University Technology Transfer in Transition. Edward Elgar, Cheltenham.

Polpetter, Kevin (2010) Towards an integrative C4ISR system: Informationization and joint operations in the People's Liberation Army. In Kamphausen, R., Lai, D. and Scobell A. (eds.), The PLA at Home and Abroad: Assessing the Operational Capabilities of China's Military. US Army War College Press, Carlisle PA, 193–236.

Qiang, Christine Zhen-Wei (2007) China's Information Revolution: Managing the Economic and Social Transformation. World Bank, Washington DC.

Qiang, Christine Zhen-Wei, Bhavnani, Asheeta, Hanna, Nagy K., Kimura, Kaoru and Sudan, Randeep (2009) Rural Informatization in China. World Bank, Washington DC.

Qin Gang (2007) China's malformed media sphere. China Media Project, Hong Kong University, 11 July. http://cmp.hku.hk/2012/07/11/25293.

Qu Weizhi (2010) China's Path to Informatization, English edn. Cengage Learning Asia, Hong Kong.

Ramzy, A. (2011) Wired up. Time Magazine, 17 February. http://www.time.com/time/magazine/article/0,9171,2048171,00.html#ixzz2Vd0gwUXk.

Rauscher, Karl Frederick and Zhou Yonglin (2013) Frank Communication and Sensible Cooperation to Stop Harmful Hacking. EastWest Institute and Internet Society of China. http://www.cert.org.cn/publish/main/upload/File/China-U.S.%20Anti-Hacking%20Report%20v190.pdf.

RFA (Radio Free Asia) (2012) Lecturer sent to mental hospital. Radio Free Asia, 11 December. http://www.rfa.org/english/news/china/sent-12112012150340.html.

Scobell, Andrew (2010) Discourse in 3-D: The PLA's evolving doctrine, circa 2009. In Kamphausen, R., Lai, D. and Scobell, A. (eds.), The PLA at Home and Abroad: Assessing the Operational Capabilities of China's Military. US Army War College Press, Carlisle PA, 99–134.

Segal, Adam (2012) The cyber trade war. Foreign Policy, 25 October. http://www.cfr.org/cybersecurity/cyber-trade-war/p29356?cid=emc-ACC_Spring13_BCK-Segal_Cyber_Trade_War-042513.

Serger, Sylvia and Breidne, Magnus (2007) China's fifteen year plan for science and technology: An assessment. Asia Policy, 1(4), 135–64.

Sha Zukang (2002) Statement by Ambassador Sha Zukang, Head of the Chinese Delegation at the First Meeting of the Intergovernmental Preparatory Committee of the World Summit on the Information Society, 1 July, Geneva. http://www.fmprc.gov.cn/eng/wjdt/zyjh/t25077.htm.

Simon, Denis Fred and Cao Cong (2009) China's Technological Edge: Assessing the Role of High-end Talent. Cambridge University Press, Cambridge.

SIPO (2008) Outline of the National Intellectual Property Strategy (issued by the State Council of the People's Republic of China on 25 June). http://www.wipo.int/wipolex/en/details.jsp?id=859.

Snell, Robin and Tseng Choo Sin (2002) Moral atmosphere and moral influence under China's network capitalism. Organization Studies, 23, 449–78.

Springut, Micah, Schlaijker, Stephen and Chen, David (2011) China's Program for Science and Technology Modernization: Implications for American Com­petitiveness. Prepared for the U.S.–China Economic and Security Review Commission. CENTRA Technology, Arlington VA.

Suttmeier, Richard P. and Shi Bing (2008) Success in ‘Pasteur's quadrant’? The Chinese Academy of Sciences and its role in the National Innovation System. In Rowen, H. S., Gong Hancock, M. and Miller, W. F. (eds.), Greater China's Quest for Innovation. Walter H. Shorenstein Asia Pacific Research Center, Stanford CA, 35–56.

Tanyildiz, Zeynep Esra (2013) The ethnic composition of science and engineering research laboratories in the United States. International Migration, 28 January. http://onlinelibrary.wiley.com/doi/10.1111/imig.12035/pdf.

Tendulkar, Rohini (2013) Cyber-Crime, Securities Markets and Systemic Risk. Joint Staff Working Paper of the International Organization of Securities Commissions and World Federation of Exchanges, 16 July. http://www.world-exchanges.org/files/statistics/pdf/IOSCO_WFE_Cyber-crime%20report_Final_16July.pdf.

Toffler, Alvin (1980) The Third Wave. Bantam Books, New York.

Tung, Rosalie L. (2008). Brain circulation, diaspora, and international competitiveness. European Management Journal, 26, 298–304.

USCBC (US–China Business Council) (2009) Request for Company Input on PRC Domestic Innovation Policies. US-China Business Council, 15 December. http://cbi.typepad.com/files/us-china-business-council—indigenous-innovation-policy-brief-1.pdf.

Vogel, Ezra (2011) Deng Xiaoping and the Transformation of China. Belknap Press, Cambridge MA.

Wacker, Gudrun (2003) The internet and censorship in China. In Hughes, C. and Wacker, G. (eds.), China and the Internet: Politics of the Digital Leap Forward. Routledge Curzon, London, 58–82.

Wang Hao (2011) Protecting Privacy in China. Springer, Heidelberg.

Wang Qun (2011) Speech by H.E. Ambassador Wang Qun at the First Committee of the 66th Session of the GA on Information and Cyberspace Security, 20 October. http://www.fmprc.gov.cn/eng/wjdt/zyjh/t869580.htm.

Wang Wensheng, Peng Guangqian and Lu Guangming (2009) Agricultural informationization in China. In de Pablos, P. O. and Lytras, M. D. (eds.), The China Information Technology Handbook. Springer, Dordrecht, 271–97.

Wang Xinjun (2012) China makes military budget based on strict principles. China Military News cited from People's Daily Overseas Edition, 6 March. http://www.china-defense-mashup.com/china-makes-military-budget-based-on-strict-principles.html.

Webster, Frank (2006) Theories of the Information Society (3rd edition) Routledge, Oxford.

WEF and INSEAD (2013) The Global Information Technology Report 2013. WEF, Geneva. http://www.weforum.org/reports/global-information-technology-report-2013.

WEF and INSEAD (2012) The Global Information Technology Report 2012. WEF, Geneva. http://www.weforum.org/reports/global-information-technology-report-2012.

WEF and INSEAD (2011) The Global Information Technology Report 2010–2011. WEF, Geneva. http://www3.weforum.org/docs/WEF_GITR_Report_2011.pdf.

Wei Jingsheng (1978) The Fifth Modernization. In translation, http://www.rjgeib.com/thoughts/china/jingshen.html.

Wiener, Norbert (1964) God & Golem, Inc.: A Comment on Certain Points where Cybernetics Impinges on Religion. MIT Press, Cambridge MA.

WIP (World Internet Project) (2009) World Internet Project International Report 2009. http://www.digitalcenter.org/wp-content/uploads/2013/02/WIP-report-2009-final.pdf.

WOIPFG (World Organization to Investigate the Persecution of Falun Gong) (2005) Investigation on Microsoft's Involvement in the Chinese Communist Party's Human Rights Abuses. August. http://www.upholdjustice.org/node/156.

World Bank (2001) China and the Knowledge Economy: Seizing the 21st Century. World Bank, Washington, DC. http://info.worldbank.org/etools/docs/library/137742/ChinaKE.pdf.

World Bank (2000) China's Development Strategy: The Knowledge and Innovation Perspective. World Bank, Washington DC. http://info.worldbank.org/etools/docs/library/108303/ChinaDevStrat.pdf.

World Bank and DRC (Development Research Center of the State Council, People's Republic of China) (2012) China 2030: Building a Modern, Harmonious, and Creative High-Income Society. Conference edn. http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2012/02/28/000356161_20120228001303/Rendered/PDF/671790WP0P127500China020300complete.pdf.

Wu Bangguo (2011) Report on the work of the Standing Committee of the National People's Congress. Delivered at the Fourth Session of the Eleventh National People's Congress, 10 March. http://english.gov.cn/official/2011-03/18/content_1827230.htm.

Xia Jun (2010) Linking ICTs to rural development: China's rural information policy. Government Information Quarterly, 27(2), 187–95.

Xiao Weibing (2012) Freedom of Information Reform in China: Information Flow Analysis. Routledge, London.

Xu Chuan-xiang (2004) National Informatization Index System of China. http://www.cicc.or.jp/japanese/kouryu/pdf_ppt/04china.pdf.

Xue Lan and Liang Zheng (2008) Multinational R&D in China: Myths and realities. In Rowen, H. S., Hancock, M. and Miller, W. F. (eds.), Greater China's Quest for Innovation. Walter H. Shorenstein Asia-Pacific Research Center Books, Stanford CA, 103–22.

Yang Fengchun (2009) The style and contents of China government in steering eGovernment construction and implementation. In Jirapon Tubtimhin and Pipe, R. (eds.), Global E-Governance: Advancing E-Governance through Innovation and Leadership. IOS Press, Amsterdam, 84–93.

Yang Rui (2005) Toward massification: Higher education development in the People's Republic of China since 1949. In Smart, J. C. (ed.), Higher Education: Handbook of Theory and Research, vol. 19. Springer, Dordrecht, 311–74.

Yang Rui (2002) Third Delight: The Internationalization of Higher Education in China. Routledge, Abingdon.

Yang Su (2011) Collective Killings in Rural China during the Cultural Revolution. Cambridge University Press, Cambridge.

Yi Wenli (2012) Divergence and co-operation between China and the U.S. on the cyberspace issue. Contemporary International Relations, 4, 124–41.

Yu Hua (2012) China in Ten Words, trans. Alan H. Barr. Vintage, New York.

Zeng Haijun, Huang Ronghuai, Zhao Yuchi and Zhang Jinbao (2012) ICT and ODL in Education for Rural Development: Current Situation and Good Practices in China. http://www.inruled.org/iERD/Publication/iERD%20in%20China%20for%20eLA%20%28UNESCO-INRULED%29.pdf.

Zeng Shaojun (2010) Searching for disappeared trust in China: With a discussion of Prof. W. F. Tang's Public Opinion & Political Change in China. China Nonprofit Review, 2(2), 363–75.

Zha Qiang and Li Jun with Cheng Xiaofang (2011) The University of Science and Technology of China: Can the Caltech model take root in Chinese soil? In Hayhoe, R., Li Jun, Lin Jing and Zha Qiang, Portraits of 21st Century Chinese Universities: In the Move to Mass Higher Education. Springer, Dordrecht, 271–306.

Zhang Fanghua and Tao Jingyuan (2012) Study on relationship among FDI's spillover, intellectual capital and innovation capability in China. 2012 Second International Conference on Business Computing and Global Informatization, 943–46.

Zhao Yuezhi (2008) Communication in China: Political Economy, Power, and Conflict. Rowman and Littlefield, Lanham MD.

Zhao Ziyang (2009) Prisoner of the State: The Secret Journal of Zhao Ziyang, trans. and ed. Bao Pu, Renee Chiang and Adi Ignatius. Simon & Schuster, New York.

Zheng Silin and Ward, Michael R. (2011) The effects of market liberalization and privatization on Chinese telecommunications. China Economic Review, 22(2), 210–20.

Zhi Xiaoli and Gao Fuping (2008) Improving the regulative environment to facilitate the exploitation of information resources in the People's Republic of China. In Fitzgerald, B., Gao, F., O’Brien, D. and Shi, S. X. (eds.), Copyright Law, Digital Content and the Internet in the Asia-Pacific. Sydney University Press, Sydney, 155–69.

Zhu Tao, Phipps, David, Pridgen, Adam, Crandall, Jedidiah R. and Wallach, Dan S. (2013) The velocity of censorship: High-fidelity detection of microblog post deletions. Cornell University Library. Submitted 4 March, arXiv:1303.0597v1 [cs.IR]. http://arxiv.org/abs/1303.0597.