China’s Approach to Cybersecurity and Information Integrity

Authors

  • Yi Shen Fudan University, Shanghai, China.
  • Shuyan Zhang Fudan University, Shanghai, China.
  • Ingrid Torquato Oliveira Universidade de São Paulo (USP), São Paulo, SP, Brasil.

DOI:

https://doi.org/10.18617/liinc.v21i1.7537

Keywords:

China, Information Integrity, Cybersecurity, Cyber sovereignty

Abstract

Information Integrity has become one of the most important subjects of cybersecurity. China is one of the pioneers into proposing the concepts of cyber sovereignty and digital sovereignty, to balancing the contradictions between national security and the development of the digital economic. On the one hand, China is committed to building an equal and orderly cross-border data transmission pattern. While on the other hand, China is also committed to dealing with the risks of disinformation to sovereignty and people’s security. This paper introduces China’s practical experience in data security governance and analyzes China’s role in BRICS cybersecurity cooperation.

Author Biographies

  • Yi Shen, Fudan University, Shanghai, China.
    Assistant Dean of the School of International Relations and Public Affairs at Fudan University, Professor of International Politics, and Ph.D. Supervisor, Director of Fudan University’s Research Center for International Governance of Cyberspace. An opinion leader with 5 million followers on Chinese internet platforms.
    Has long been engaged in research on global cyberspace governance, cybersecurity, cyber sovereignty, and Sino-US cybersecurity relations.
    From 1995 to 2005, he studied at the Department of International Politics at Fudan University. During this period (June to December 2004), he visited the American Studies Centre at the Department of History, University of Hong Kong, for academic exchange.
    In 2005, he graduated with a Ph.D. in Law from the Department of International Politics, School of International Relations and Public Affairs at Fudan University, and then stayed on as a faculty member.
    From August 2008 to September 2009, he was sent to the Science, Technology, and International Affairs Program at the School of Foreign Service, Georgetown University, as a postdoctoral researcher under Fudan University’s “Young Faculty Training” program.
    Since 2009, he has published over a dozen academic papers and numerous related commentaries in China on topics related to the network revolution. His research findings have been recognized by relevant research institutions and government departments, having a positive impact.
  • Shuyan Zhang , Fudan University, Shanghai, China.

    Zhuang Shuyan is a master student at the School of International Relations and Public Affairs of Fudan University. 
    Research Assistant at Fudan International Research Institute of Global Cyberspace Governance.

  • Ingrid Torquato Oliveira, Universidade de São Paulo (USP), São Paulo, SP, Brasil.

    Master's Degree in International Relations - International Relations Institute - University of São Paulo
    Bachelor's Degree in International Relations - UNESP

References

BASKERVILLE, 1993. Information systems security design methods: Implications for information systems development. ACM Computing Surveys (CSUR), 25(4), 375-414. [Accessed 24 Feb. 2025]. Available at: https://dl.acm.org/doi/10.1145/162124.162127

BELLI, Luca, GASPAR, Water B., JASWANT, Shilpa Singh., 2024. Data sovereignty and data transfers as fundamental elements of digital transformation: Lessons from the BRICS countries. Computer Law & Security Review, 2024, 54, 106017. [Accessed 24 Feb. 2025]. Available at: https://doi.org/10.1016/j.clsr.2024.106017

BRAZIL, UNESCO, 2024. Integrity of Information and Trust in the Digital Economy: Possible Approaches to Promoting Information Integrity and Trust in the Digital Environment. Digital Economy Working Group. Report prepared under the Brazilian Presidency of the G20, September 2024. [Accessed 24 Feb. 2025]. Available at: https://www.gov.br/mcom/pt-br/acesso-a-informacao/governanca/governanca-de-tic-1/documentos-g20/p3-g20-dewg-brasil-2024-possible-approaches-to-information-integrity.pdf

CHEN, Qiyuan, MA, Liming, MA, Tingxi, 2024. Réngōng Zhìnéng Shēnwěi Jìshù duì Rènzhī Ānquán de Tiǎozhàn yǔ Yìngduì [Challenges and Responses of Artificial Intelligence Deepfake Technology to Cognitive Security]. Nánfāng Chuánméi Yánjiū [Southern Media Research], (06), pp. 23-32.

CHINA, 2017. Zhōnghuá Rénmín Gònghéguó Wàijiāobù: Wǎngluò Kōngjiān Guójì Hézuò Zhànlüè [International Cooperation Strategy on Cyberspace]. Office of the Central Cyberspace Affairs Commission. Published on March 1, 2017. [Accessed 24 Feb. 2025]. Available at: http://www.cac.gov.cn/2017-03/01/c_1120552617.htm.

CHINA, 2020. Zhōngguó guójiā shùjù ānquán zhǐdǎo yìjiàn [China’s proposal on the Global Data Security Initiative]. Central People's Government of the People's Republic of China. [Accessed 24 Feb. 2025]. Available at: https://www.gov.cn/xinwen/2020-09/08/content_5541579.htm

CHINA, 2021. Zhōnghuá rénmín gònghéguó shùjù ānquán fǎ. [The Data Security Law of People’s Republic of China]. The National People’s Congress of the People’s Republic of China. [Accessed 24 Feb. 2025]. Available at: http://www.npc.gov.cn/c2/c30834/202106/t20210610_311888.html

CHINA, 2024. Wǎngluò shùjù ānquán guǎnlǐ tiáolì. [Regulations on Cyberspace Data Security Management]. Government of the People's Republic of China. [Accessed 24 Feb. 2025]. Available at: https://www.gov.cn/zhengce/zhengceku/202409/content_6977767.htm

GOLDSMITH, Jack, 2019. Sovereign Difference and Sovereign Deference on the Internet. The Yale Law Journal Forum, 818, pp. 818-826.

GREEN, Erik, NOUWENS, Meia, NOUWENS, Veerle, 2024. The Global Security Initiative: China’s International Policing Activities. [online]. London: International Institute for Strategic Studies. [Accessed 24 Feb. 2025]. Available at: https://www.iiss.org/research-paper/2024/10/the-global-security-initiative-chinas-international-policing-activities/

GUO, Hailing; WEI, Jinjin; LIU, Zhongshan, 2024. Shēngchéng Shì Réngōng Zhìnéng Xūjiǎ Xìnxī Xiétóng Gòngzhì Yánjiū [Research on Collaborative Governance of Generative Artificial Intelligence Disinformation]. Qingbao Zazhi [Journal of Intelligence], 2024, 43(09), pp. 121-129+165.

HAO, Yeli, 2016. Wǎngluò Shìjiè de Yuánzéxìng yǔ Línghuóxìng — Sān Shìjiǎo Xià Wǎngluò Zhǔquán de Duìlì Tǒngyī [Principle and Flexibility in the Cyber World: The Unity of Opposites in Cyber Sovereignty from Three Perspectives]. Shàntóu Dàxué Xuébào (Rénwén Shèhuì Kēxué Bǎn) [Journal of Shantou University (Humanities & Social Sciences Edition)], 2016, (06).

HE, Yuhua, LI, Xia, 2024. Shēngchéng Shì Réngōng Zhìnéng Xūjiǎ Xìnxī Zhìlǐ de Xīn Tiǎozhàn jí Yìngduì Cèlüè — Jīyú Mǐnjié Zhìlǐ de Shìjiǎo [New Challenges and Response Strategies for Generative Artificial Intelligence Disinformation Governance: A Perspective Based on Agile Governance]. Zhìlǐ Yánjiū [Governance Studies], 2024, 40(04), pp. 142-156+160. [Accessed 24 Feb. 2025]. Available at: DOI:10.15944/j.cnki.33-1010/d.20240618.001.

HU, Yong, 2024. Rengong zhineng qudong de xujia xinxi: xianzai yu weilai. Artificial intelligence-driven misinformation: Present and future. Nanjing Social Sciences, 2024(01), pp. 96-109. [Accessed 24 Feb. 2025]. DOI: 10.15937/j.cnki.issn1001-8263.2024.01.011.

HUANG, Rihan, YAO, Haolong, 2024. Shùzì Shídài de Bóyì: Shēngchéng Shì Réngōng Zhìnéng duì Guójiā Yìshí Xíngtài Ānquán de Yǐngxiǎng [The Game in the Digital Age: The Impact of Generative Artificial Intelligence on National Ideological Security]. Guójiā Ānquán Lùntán [National Security Forum], 2024, 3(06), pp. 54-67+96.

IGNATOV, Alexande, 2024. BRICS expansion and prospects for BRICS cooperation in the digital economy. Russian International Affairs Council. [Acesso em: 26 fev. 2025]. Available at: https://cyberbrics.info/policy-brief-brics-expansion-and-prospects-for-brics-cooperationin-the-digitaleconomy/

INTERNET GOVERNANCE FORUM, 2024. Key Findings from the Internet Governance Forum 2024. [Accessed 24 Feb. 2025]. Available at: https://intgovforum.org/en/filedepot_download/305/28529

INTERNET SOCIETY OF CHINA, 2023. Wǎngluò Zhǔquán: Lǐlùn yǔ Shíjiàn (4.0 Bǎn) [Cyber Sovereignty: Theory and Practice (Version 4.0)]., 2023. [Accessed 24 Feb. 2025]. Available at: https://cn.wicinternet.org/2023-11/09/content_36955448.htm.

LIAO, Fan, 2024. Shùzì Zhǔquán yǔ Quánqiú Shùzì Zhìlǐ [Digital Sovereignty and Global Digital Governance]. Jìnán Xuébào (Zhéxué Shèhuì Kēxué Bǎn) [Journal of Jinan University (Philosophy & Social Sciences Edition)], 2024, 46(07), pp. 47-60.

LU, Jianping, DANG, Ziqiang, 2024. AIGC Shídài Xūjiǎ Xìnxī de Zhìzào Chuánbò yǔ Guójiā Ānquán jí Gōngmín Quányì de Wéihù [The Production and Dissemination of Disinformation in the AIGC Era and the Maintenance of National Security and Citizens' Rights]. Zhèjiāng Dàxué Xuébào (Rénwén Shèhuì Kēxué Bǎn) [Journal of Zhejiang University (Humanities and Social Sciences)], 54(05), pp. 42-58.

NAN, Ting, 2024. Shengcheng Shi Rengong Zhineng Xujia Xinxi de Fengxian yu Zhili Celüe Yanjiu [Research on Risks and Governance Strategies of Generative Artificial Intelligence Disinformation]. Zhongguo Chuanmei Keji [China Media Technology], 2024, (08), pp. 129-133. [Accessed 24 Feb. 2025]. Available at: DOI:10.19483/j.cnki.11-4653/n.2024.08.029.

OECD, 2024. Evolving with Innovation: The 2024 OECD AI Principles Update. [Accessed 24 Feb. 2025]. Available at: https://oecd.ai/en/wonk/evolving-with-innovation-the-2024-oecd-ai-principles-update

PENG, Zhihui, 2022. Lun Zhōngguó Yǔjìng Xià Disinformation Gàiniàn de Duìjiē, Zhuǎnhuàn yǔ Chóngxīn Chǎnshì [On the Alignment, Transformation, and Reinterpretation of the Concept of Disinformation in the Chinese Context]. Qingbao Lǐlùn yǔ Shíjiàn [Information Studies: Theory & Application], 2022, 45(01), pp. 1-10. [Accessed 24 Feb. 2025]. Available at: DOI:10.16353/j.cnki.1000-7490.2022.01.001.

QI, Aimin, PAN, Jia, 2015. Shùjù Quán, Shùjù Zhǔquán de Quèlì yǔ Dà Shùjù Bǎohù de Jīběn Yuánzé [The Establishment of Data Rights, Data Sovereignty, and the Basic Principles of Big Data Protection]. Sūzhōu Dàxué Xuébào (Zhéxué Shèhuì Kēxué Bǎn) [Journal of Soochow University (Philosophy & Social Sciences Edition)], 2015, (01), pp. 64-70.

QI, Chenhang, 2024. Shēngchéng Shì Réngōng Zhìnéng de Xūjiǎ Xìnxī Fēngxiǎn Tèzhēng jí Qí Zhìlǐ Lùjìng [Risk Characteristics and Governance Pathways of Generative Artificial Intelligence Disinformation]. Qingbao Lǐlùn yǔ Shíjiàn [Information Studies: Theory & Application], 2024, 47(03), pp. 112-120. [Accessed in 24 feb. 2025] Available: DOI:10.16353/j.cnki.1000-7490.2024.03.015.

REDMAN, T. C., 1998. The impact of poor data quality on the typical enterprise. Communications of the ACM, 41(2), 79-82. [Accessed 24 Feb. 2025]. Available at: https://dl.acm.org/doi/10.1145/269012.269025

SHEN, Yi, 2014. Quánqiú wǎngluò kōngjiān zhìlǐ yǔ jīnzhū guójiā hézuò. Global cyberspace governance and BRICS cooperation. International Observation, 2014(04), pp. 145-157.

SHEN, Yi, 2020. Jīyú zhǔquán píngděng yuánzé de shùjù zhìlǐ: Quánqiú wǎngluò kōngjiān zhìlǐ liángxìng biànhuà de xīn qūshì. [Data governance based on the principle of sovereign equality: New trends in the positive transformation of global cyberspace governance.] China Information Security, 2020(11), pp. 71-74.

SHEN, Yi, 2022. Shuju Anquan Fa wei Shuzi Jingji Fazhan Tigong Anquan Baozhang [The Data Security Law Provides Security Guarantees for the Development of the Digital Economy]. Jinrong Bolan [Financial Review], 2022, (06), pp. 56-57.

SHEN, Yi, 2024. Digital Economy and Pragmatic Cooperation Among BRICS. Ipea. [Accessed 26 Feb. 2025]. Available at: https://portalantigo.ipea.gov.br/agencia/images/apresentacoes/forum_academico_brics/Shen_Yi_Digital_Economy_and_Pragmatic_Cooperation_Among_BRICS.pdf

SHEN, Yi, YAO, Xu, 2018. Dàguó Zhànlüè Hùxìn yǔ Kuàjìng Shùjù Liúdòng Guǎnlǐ Xīn Móshì Tànsuǒ: Yǐ “Shùjù Zhǔquán” wéi Héxīn Tuījìn Wǎngluò Ānquán Zhànlüè Jiànshè [Exploring a New Model for Strategic Mutual Trust and Cross-Border Data Flow Management: Promoting Cybersecurity Strategy Construction with "Data Sovereignty" as the Core]. Xìnxī Ānquán yǔ Tōngxìn Bǎomì [Information Security and Communications Privacy], 2018, (12), pp. 13-16.

SUN, Xiaoyue, 2025. Duōwéi Xiétóng Shìyù Xià Xūjiǎ Xìnxī Chuánbò de Zhìlǐ Lùjìng [Governance Pathways for Disinformation Dissemination from a Multidimensional Collaborative Perspective]. Zhōngguó Dìshì Bào Rén [China City Newspaper], 2025, (01), pp. 85-87. [Accessed in 24 feb. 2025] Available at: DOI:10.16763/j.cnki.1007-4643.2025.01.009.

UNITED NATIONS, 2024. UN Global Principles for Information Integrity. [Accessed 24 Feb. 2025]. Available at: https://www.un.org/sites/un2.un.org/files/un-global-principles-for-information-integrity-en.pdf

UNITED NATIONS, 2024. World Population Prospects 2024. New York: United Nations. [Accessed 24 Feb. 2025]. Available at: https://population.un.org/wpp/

VON SOLMS, R., VAN NIEKERK, J., 2013. From information security to cybersecurity. Computers & Security, 38, 97-102. [Accessed 24 Feb. 2025]. Available at: https://www.sciencedirect.com/science/article/abs/pii/S0167404813000801

WANG, Richard. Y., Strong, Diane M., 1996. Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems, 1996 12(4), 5-33. [Accessed 24 Feb. 2025]. Available at: http://mitiq.mit.edu/Documents/Publications/TDQMpub/14_Beyond_Accuracy.pdf

WORLD BANK, 2023. GDP (current US$). [Accessed 24 Feb. 2025] Available at: https://data.worldbank.org/indicator/NY.GDP.MKTP.CD

WORLD ECONOMIC FORUM, 2023. The Global Risks Report 2023. [Accessed 24 Feb. 2025]. Available at: https://www3.weforum.org/docs/WEF_Global_Risks_Report_2023.pdf

XI, Jinping, 2015. Xi Jinping zai dier jie shijie hulianwang dahui kaimushi shang de jianghua. [Xi Jinping’s speech at the opening ceremony of the 2nd World Internet Conference.] Xinhua News. [Accessed 24 Feb. 2025]. Available at: https://www.gov.cn/xinwen/2015-12/16/content_5024712.htm

XIONG, Guangqing, WANG, Rui, 2024. Quánqiú hùliánwǎng zhìlǐ zhōng de wǎngluò zhǔquán: Lìshǐ yǎnjìn, guójì zhēngyì hé zhōngguó lìchǎng [Cyber Sovereignty in Global Internet Governance: Historical Evolution, International Disputes, and China’s Position]. Xuéxí yǔ tànsuǒ [Study & Exploration], 2024, (04): 24-33+176.

YUAN, Sha, 2022. Zongti Guojiā Ānquán Guān Shiyù Xià de Xūjiǎ Xìnxī Yánjiū [Research on Disinformation from the Perspective of Holistic National Security]. Guoji Ānquán Yánjiū [Journal of International Security Studies], 2022, 40(03), pp. 32-56+157-158. [Accessed in 24 feb. 2025] Available at: DOI:10.14093/j.cnki.cn10-1132/d.2022.03.002.

YUAN, Sha, 2022. Zǒngtǐ Guójiā Ānquán Guān Shìyù Xià de Xūjiǎ Xìnxī Yánjiū [Research on Disinformation from the Perspective of Holistic National Security]. Guójì Ānquán Yánjiū [Journal of International Security Studies], 2022, 40(03), pp. 32-56+157-158. [Accessed 24 Feb. 2025]. Available at: DOI:10.14093/j.cnki.cn10-1132/d.2022.03.002.

ZHAI, Zhiyong, 2018. Shùjù Zhǔquán de Xīngqǐ jí Qí Shuāngchóng Shǔxìng [The Rise of Data Sovereignty and Its Dual Attributes]. Zhōngguó Fǎlǜ Pínglùn [China Law Review], 2018, (06), pp. 196-202.

ZHANG, Chao, DUAN, Weiyu, CHEN, Kaihua, et al, 2024. Xìnxī Jìshù Tuījìn Guójiā Zhìlǐ Xiàndàihuà de Zhànlüè Yánjiū - Dì S70 Cì Xiāngshān Kēxué Huìyì Xuéshù Zòngshù [Strategic Research on Information Technology Promoting the Modernization of National Governance: An Academic Summary of the 70th Xiangshan Science Conference]. Zhōngguó Kēxuéyuàn Yuànkān [Bulletin of the Chinese Academy of Sciences], 2024, 39(01), pp. 143-151. [Accessed 24 Feb. 2025]. Available at: DOI:10.16418/j.issn.1000-3045.20231219003.

Downloads

Published

14/11/2025

Issue

Section

Segurança Cibernética - Integridade da Informação e Soberania Nacional: os casos do Brasil e da China