Information Policy and Information Security of PRC: Development, Approaches and Implementation

Cover Page


The subject of the study is the new course of the PRC information policy, which was launched by the “Fifth generation” of the PRC leaders after the 18th Congress of the Chinese Communist Party in 2012. As a result, after the 18th Congress of the CPC was started the implementation of the “Strong cyberpower” strategy, which implies not only ensuring cyber security in the country, but also the usage of network resources to develop the national economy. China’s new information policy was caused by the sharply increased role of information and communication technologies in international processes and the shift in the focus of international relations to the Asia-Pacific region. The PRC’s information policy is based on the most advanced technologies in the IT sphere and the cooperation with private companies on regulating external and internal information security. The relevance of the research topic is due to the increasing role of ICT in international processes. In this context, the most important are the positions of the leading countries of the world to regulate this area, as well as the mechanisms and tools used by them. The People’s Republic of China is one of the leaders in the field of scientific and technical developments and actively uses its achievements to accomplish tasks in the field of domestic and foreign policy. In this regard, the purpose of the study is to analyze and compare the development strategies of the PRC information policy and the resources that are necessary for their implementation. The unique network landscape, which was formed under the influence of government policy on control over published content and the sharing of digital services market among the three largest information corporations (Baidu, Tencent and Alibaba), has become an essential part of the country’s information security system and requires detailed study. The purpose of the article is to identify the evolution of China’s information policy development strategy and resources for its implementation. This article also discusses the threats to the information security of the People’s Republic of China and analyzes the approaches to ensuring it. The results of the study are the conclusions that show the role and place of information policy in the PRC foreign policy, the structure of the information security system and strategic approaches to the regulation of international relations in cyberspace.

About the authors

Tatyana Ivanovna Ponka

RUDN University

Author for correspondence.
Moscow, Russian Federation

PhD in History, Associate Professor, the Department of Theory and History of International Relations

Mirzet Safetovich Ramich

RUDN University

Moscow, Russian Federation

Student, the Department of Theory and History of International Relations

Yuyao Wu

RUDN University

Moscow, Russian Federation

Postgraduate Student, the Department of Theory and History of International Relations


  1. Antipov, K.V. (2013). Cyber Conflict in Sino-US Relations and the Search for Dialogue. The Far Eastern Affairs, 6, 39—54. (In Russian).
  2. Bulavin, A.V. (2014). Concerning Approaches of the USA and China to Cybersecurity. Society: Politics, Economics, Law, 1, 27—31. (In Russian).
  3. Cheung, T.M. (2018). The Rise of China as a Cybersecurity Industrial Power: Balancing National Security, Geopolitical, and Development Priorities. Journal of Cyber Policy, 3 (3), 306—326. doi: 10.1080/23738871.2018.1556720
  4. Creemers, R. (2017). Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century. Journal of Contemporary China, 26 (103), 85—100. doi: 10.1080/10670564.2016.1206281
  5. Ebert, H. & Maurer, T. (2013). Contested Cyberspace and Rising Powers. Third World Quarterly, 34 (6), 1054—1074. doi: 10.1080/01436597.2013.802502
  6. Fei, G. (2011). China’s Cybersecurity Challenges and Foreign Policy. Georgetown Journal of International Affairs. International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity, 185—190.
  7. Heinl, C.H. (2017). New Trends in Chinese Foreign Policy: The Evolving Role of Cyber. Asian Security, 13 (2), 132—147. doi: 10.1080/14799855.2017.1286160
  8. Hong, Y. & Goodnight, G.T. (2020). How to Think about Cyber Sovereignty: The Case of Chin. Chinese Journal of Communication, 13 (1), 8—26. doi: 10.1080/17544750.2019.1687536
  9. Hong, Y. & Harwit, E. (2020). China’s Globalizing Internet: History, Power, and Governance. Chinese Journal of Communication, 13 (1), 1—7. doi: 10.1080/17544750.2020.1722903
  10. Ibragimova, G.R. (2013). China’s Strategy in Cyberspace: The Issues Internet Governance and Information Security. Security Index, 2013, 19 (6), 169—184. (In Russian).
  11. King, G., Pan, J. & Roberts, M. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument. American Political Science Review, 111 (3), 484—501.
  12. Koshurnikova, N.A. (2016). Specifics of Information Policy of China. China: History and the Present. Materials of the IX International Scientific and Practical Conference “China: History and the Present”, October, 22—23. Yekaterinburg: Ural Federal University named after the first President of Russia B.N. Yeltsin publ.
  13. P. 279—284. (In Russian).
  14. Lewis, D. (2017). China’s Global Internet Ambitions: Finding Roots in ASEAN. ICS Occasional Papers, 14, 1—28.
  15. Lindsay, J.R. (2015). The Impact of China on Cybersecurity: Fiction and Friction. International Security, 39 (3), 7—47.
  16. Makridis, C.A. & Smeets, M. (2019). Determinants of Cyber Readiness. Journal of Cyber Policy, 4 (1), 72—89. doi: 10.1080/23738871.2019.1604781
  17. Manson, G.P. (2011). Cyberwar: The United States and China Prepare For the Next Generation of Conflict. Comparative Strategy, 30 (2), 121—133. doi: 10.1080/01495933.2011.561730
  18. Mori, S. (2019). US Technological Competition with China: The Military, Industrial and Digital Network Dimensions. Asia-Pacific Review, 26 (1), 77—120. doi: 10.1080/13439006.2019.1622871
  19. Nye, J.S.Jr. (2011). Nuclear Lessons for Cyber Security. Strategic Studies Quarterly, 5 (4), 9—20.
  20. Razumov, E.A. (2017) China’s Cybersecurity Policy. Russia and the Pacific, 4 (98), 156—170. (In Russian).
  21. Schia, N.N. & Gjesvik, L. (2017). China’s Cyber Sovereignty. Norwegian Institute of International Affairs Policy Brief Series, 2, 1—4.
  22. Segal, A. (2017). Chinese Cyber Diplomacy in a New Era of Uncertainty. Hoover Institution, Aegis Paper Series, 1703, 1—23.
  23. Sheldon, J.B. (2011). Deciphering Cyberpower: Strategic Purpose in Peace and War. Strategic Studies Quarterly, 5 (2), 95—112.
  24. Sheldon, J.B. (2014). Geopolitics and Cyber Power: Why Geography Still Matters. American Foreign Policy Interests, 36 (5), 286—293. doi: 10.1080/10803920.2014.969174
  25. Vatrushkin, A.A. (2017). The Legal Framework for Cybersecurity of Russian Federation’s Critical Infrastructure. Eurasian Advocacy, 6 (31), 78—84. (In Russian).
  26. Wang, F. & Lai, M. (2015). Woguo dianzi zhengwu fazhan xianzhuang yu duice yanjiu [Research on the Current Situation and Measures of China’s E-Government Development]. Renwen, 15, 198. (In Chinese).



Abstract - 452

PDF (Russian) - 577




Copyright (c) 2020 Ponka T.I., Ramich M.S., Wu Y.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies