<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Vestnik RUDN. International Relations</journal-id><journal-title-group><journal-title xml:lang="en">Vestnik RUDN. International Relations</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Международные отношения</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2313-0660</issn><issn publication-format="electronic">2313-0679</issn><publisher><publisher-name xml:lang="en">федеральное государственное автономное образовательное учреждение высшего образования «Российский университет дружбы народов имени Патриса Лумумбы» (РУДН)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">23978</article-id><article-id pub-id-type="doi">10.22363/2313-0660-2020-20-2-382-394</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>PEACE AND SECURITY</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>МИР И БЕЗОПАСНОСТЬ</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="zh"><subject>世界和安全</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Information Policy and Information Security of PRC: Development, Approaches and Implementation</article-title><trans-title-group xml:lang="ru"><trans-title>Информационная политика и информационная безопасность КНР: развитие, подходы и реализация</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Ponka</surname><given-names>Tatyana Ivanovna</given-names></name><name xml:lang="ru"><surname>Понька</surname><given-names>Татьяна Ивановна</given-names></name></name-alternatives><bio xml:lang="en"><p>PhD in History, Associate Professor, the Department of Theory and History of International Relations</p></bio><bio xml:lang="ru"><p>кандидат исторических наук, доцент кафедры теории и истории международных отношений</p></bio><email>ponka-ti@rudn.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Ramich</surname><given-names>Mirzet Safetovich</given-names></name><name xml:lang="ru"><surname>Рамич</surname><given-names>Мирзет Сафетович</given-names></name></name-alternatives><bio xml:lang="en"><p>Student, the Department of Theory and History of International Relations</p></bio><bio xml:lang="ru"><p>студент кафедры теории и истории международных отношений</p></bio><email>ramich_ms@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Wu</surname><given-names>Yuyao</given-names></name><name xml:lang="ru"><surname>У</surname><given-names>Юйяо</given-names></name></name-alternatives><bio xml:lang="en"><p>Postgraduate Student, the Department of Theory and History of International Relations</p></bio><bio xml:lang="ru"><p>аспирант кафедры теории и истории международных отношений</p></bio><email>6166480@qq.com</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">RUDN University</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2020-12-15" publication-format="electronic"><day>15</day><month>12</month><year>2020</year></pub-date><volume>20</volume><issue>2</issue><issue-title xml:lang="en">Contemporary Area Studies: Overcoming Level-of-Analysis Eclecticism</issue-title><issue-title xml:lang="ru">Современное регионоведение: преодолевая эклектику уровней анализа</issue-title><fpage>382</fpage><lpage>394</lpage><history><date date-type="received" iso-8601-date="2020-06-15"><day>15</day><month>06</month><year>2020</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2020, Ponka T.I., Ramich M.S., Wu Y.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2020, Понька Т.И., Рамич М.С., У Ю.</copyright-statement><copyright-year>2020</copyright-year><copyright-holder xml:lang="en">Ponka T.I., Ramich M.S., Wu Y.</copyright-holder><copyright-holder xml:lang="ru">Понька Т.И., Рамич М.С., У Ю.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/international-relations/article/view/23978">https://journals.rudn.ru/international-relations/article/view/23978</self-uri><abstract xml:lang="en"><p>The subject of the study is the new course of the PRC information policy, which was launched by the “Fifth generation” of the PRC leaders after the 18th Congress of the Chinese Communist Party in 2012. As a result, after the 18th Congress of the CPC was started the implementation of the “Strong cyberpower” strategy, which implies not only ensuring cyber security in the country, but also the usage of network resources to develop the national economy. China’s new information policy was caused by the sharply increased role of information and communication technologies in international processes and the shift in the focus of international relations to the Asia-Pacific region. The PRC’s information policy is based on the most advanced technologies in the IT sphere and the cooperation with private companies on regulating external and internal information security. The relevance of the research topic is due to the increasing role of ICT in international processes. In this context, the most important are the positions of the leading countries of the world to regulate this area, as well as the mechanisms and tools used by them. The People’s Republic of China is one of the leaders in the field of scientific and technical developments and actively uses its achievements to accomplish tasks in the field of domestic and foreign policy. In this regard, the purpose of the study is to analyze and compare the development strategies of the PRC information policy and the resources that are necessary for their implementation. The unique network landscape, which was formed under the influence of government policy on control over published content and the sharing of digital services market among the three largest information corporations (Baidu, Tencent and Alibaba), has become an essential part of the country’s information security system and requires detailed study. The purpose of the article is to identify the evolution of China’s information policy development strategy and resources for its implementation. This article also discusses the threats to the information security of the People’s Republic of China and analyzes the approaches to ensuring it. The results of the study are the conclusions that show the role and place of information policy in the PRC foreign policy, the structure of the information security system and strategic approaches to the regulation of international relations in cyberspace.</p></abstract><trans-abstract xml:lang="ru"><p>Статья посвящена рассмотрению нового курса информационной политики Китайской Народной Республики, который стало проводить «пятое поколение» лидеров КНР после XVIII съезда Коммунистической партии Китая (КПК) в 2012 г. По итогам данного съезда КПК была выдвинута стратегия «Сильного сетевого государства», которая предполагает не только обеспечение кибербезопасности страны, но и использование сетевого потенциала для развития национальной экономики. Новая информационная политика КНР была вызвана резко возросшей ролью информационно-коммуникационных технологий в международных процессах и смещением фокуса международных отношений в Азиатско-Тихоокеанский регион. Основой информационной политики КНР является наличие наиболее современных технологий в ИТ-сфере и активное использование частных компаний для регулирования внешней и внутренней информационной безопасности. Актуальность данного исследования обусловлена возросшим научным интересом к опыту ведущих стран мира по вопросу регулирования в данной области. Китай является одним из лидеров в области научно-технических разработок и активно использует их для реализации задач в области внутренней и внешней политики. Уникальный сетевой ландшафт, который сформировался под влиянием государственной политики по контролю за публикуемым контентом и за счет разделения рынка цифровых услуг между тремя наиболее крупными информационными корпорациями (Baidu, Tencent и Alibaba), стал неотъемлемой частью системы обеспечения информационной безопасности страны и требует тщательного изучения. Целью статьи является выявление эволюции стратегии развития информационной политики КНР и ресурсов для ее реализации. Исследование информационной политики КНР проводится на внешнем и на внутреннем уровне. В статье также рассматриваются угрозы информационной безопасности КНР и проводится анализ подходов к ее обеспечению. Результатами исследования являются выводы, которые показывают роль и место информационной политики во внешней политике КНР, структуру системы обеспечения информационной безопасности и стратегические подходы к регулированию международных отношений в киберпространстве.</p></trans-abstract><kwd-group xml:lang="en"><kwd>People’s Republic of China</kwd><kwd>information security</kwd><kwd>cybersecurity</kwd><kwd>information policy</kwd><kwd>cyberspace</kwd><kwd>Internet</kwd><kwd>information technologies</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>Китайская Народная Республика</kwd><kwd>информационная безопасность</kwd><kwd>кибербезопасность</kwd><kwd>информационная политика</kwd><kwd>киберпространство</kwd><kwd>Интернет</kwd><kwd>информационные технологии</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Antipov, K.V. (2013). Cyber Conflict in Sino-US Relations and the Search for Dialogue. The Far Eastern Affairs, 6, 39—54. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Антипов К.В. Киберконфликт в китайско-американских отношениях и поиски диалога // Проблемы Дальнего Востока. 2013. № 6. С. 39-54.</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Bulavin, A.V. (2014). Concerning Approaches of the USA and China to Cybersecurity. Society: Politics, Economics, Law, 1, 27—31. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Булавин А.В. О подходах США и Китая к обеспечению кибербезопасности // Общество: политика, экономика, право. 2014. № 1. С. 27-31.</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Cheung, T.M. (2018). The Rise of China as a Cybersecurity Industrial Power: Balancing National Security, Geopolitical, and Development Priorities. Journal of Cyber Policy, 3 (3), 306—326. DOI: 10.1080/23738871.2018.1556720</mixed-citation><mixed-citation xml:lang="ru">Ватрушкин А.А. Правовые основы обеспечения кибербезопасности критической инфраструктуры Российской Федерации // Евразийская адвокатура. 2017. Т. 31. № 6. С. 78-84.</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Creemers, R. (2017). Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century. Journal of Contemporary China, 26 (103), 85—100. DOI: 10.1080/10670564.2016.1206281</mixed-citation><mixed-citation xml:lang="ru">Ибрагимова Г.Р. Стратегия КНР в киберпространстве: вопросы управления интернетом и обеспечения информационной безопасности // Индекс безопасности. 2013. Т. 6. № 19. С. 169-184.</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Ebert, H. &amp; Maurer, T. (2013). Contested Cyberspace and Rising Powers. Third World Quarterly, 34 (6), 1054—1074. DOI: 10.1080/01436597.2013.802502</mixed-citation><mixed-citation xml:lang="ru">Кошурникова Н.А. Особенности информационной политики современного Китая // Китай: история и современность: материалы IX международной научно-практической конференции «Китай: история и современность» 22-23 октября 2015. Екатеринбург: Уральский федеральный университет имени первого Президента России Б.Н. Ельцина, 2016. С. 279-284.</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Fei, G. (2011). China’s Cybersecurity Challenges and Foreign Policy. Georgetown Journal of International Affairs. International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity, 185—190.</mixed-citation><mixed-citation xml:lang="ru">Разумов Е.А. Политика КНР по обеспечению кибербезопасности // Россия и АТР. 2017. Т. 98. № 4. С. 156-170</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Heinl, C.H. (2017). New Trends in Chinese Foreign Policy: The Evolving Role of Cyber. Asian Security, 13 (2), 132—147. DOI: 10.1080/14799855.2017.1286160</mixed-citation><mixed-citation xml:lang="ru">Cheung T.M. The Rise of China as a Cybersecurity Industrial Power: Balancing National Security, Geopolitical, and Development Priorities // Journal of Cyber Policy. 2018. Vol. 3. Iss. 3. P. 306-326. DOI: 10.1080/23738871.2018.1556720</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">Hong, Y. &amp; Goodnight, G.T. (2020). How to Think about Cyber Sovereignty: The Case of Chin. Chinese Journal of Communication, 13 (1), 8—26. DOI: 10.1080/17544750.2019.1687536</mixed-citation><mixed-citation xml:lang="ru">Creemers R. Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century // Journal of Contemporary China. 2017. Vol. 26. Iss. 103. P. 85-100. DOI: 10.1080/10670564.2016.1206281</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><citation-alternatives><mixed-citation xml:lang="en">Hong, Y. &amp; Harwit, E. (2020). China’s Globalizing Internet: History, Power, and Governance. Chinese Journal of Communication, 13 (1), 1—7. DOI: 10.1080/17544750.2020.1722903</mixed-citation><mixed-citation xml:lang="ru">Ebert H., Maurer T. Contested Cyberspace and Rising Powers // Third World Quarterly. 2013. Vol. 34. Iss. 6. P. 1054-1074. DOI: 10.1080/01436597.2013.802502</mixed-citation></citation-alternatives></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Ibragimova, G.R. (2013). China’s Strategy in Cyberspace: The Issues Internet Governance and Information Security. Security Index, 2013, 19 (6), 169—184. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Fei G. China’s Cybersecurity Challenges and Foreign Policy // Georgetown Journal of International Affairs. International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity. 2011. P. 185-190</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">King, G., Pan, J. &amp; Roberts, M. (2017). How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument. American Political Science Review, 111 (3), 484—501.</mixed-citation><mixed-citation xml:lang="ru">Heinl C.H. New Trends in Chinese Foreign Policy: The Evolving Role of Cyber // Asian Security. 2017. Vol. 13. Iss. 2. P. 132-147. DOI: 10.1080/14799855.2017.1286160</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Koshurnikova, N.A. (2016). Specifics of Information Policy of China. China: History and the Present. Materials of the IX International Scientific and Practical Conference “China: History and the Present”, October, 22—23. Yekaterinburg: Ural Federal University named after the first President of Russia B.N. Yeltsin publ.</mixed-citation><mixed-citation xml:lang="ru">Hong Y., Harwit E. China’s Globalizing Internet: History, Power, and Governance // Chinese Journal of Communication. 2020. Vol. 13. Iss. 1. P. 1-7. DOI: 10.1080/17544750.2020.1722903</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">P. 279—284. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Hong Y., Goodnight G.T. How to Think about Cyber Sovereignty: The Case of China // Chinese Journal of Communication. 2020. Vol. 13. Iss. 1. P. 8-26. DOI: 10.1080/17544750.2019.1687536</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Lewis, D. (2017). China’s Global Internet Ambitions: Finding Roots in ASEAN. ICS Occasional Papers, 14, 1—28.</mixed-citation><mixed-citation xml:lang="ru">King G., Pan J., Roberts M. How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument // American Political Science Review. 2017. Vol. 111. Iss. 3. P. 484-501.</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Lindsay, J.R. (2015). The Impact of China on Cybersecurity: Fiction and Friction. International Security, 39 (3), 7—47.</mixed-citation><mixed-citation xml:lang="ru">Lewis D. China’s Global Internet Ambitions: Finding Roots in ASEAN // ICS Occasional Papers. 2017. No. 14. Р. 1-28.</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><citation-alternatives><mixed-citation xml:lang="en">Makridis, C.A. &amp; Smeets, M. (2019). Determinants of Cyber Readiness. Journal of Cyber Policy, 4 (1), 72—89. DOI: 10.1080/23738871.2019.1604781</mixed-citation><mixed-citation xml:lang="ru">Lindsay J.R. The Impact of China on Cybersecurity: Fiction and Friction // International Security. 2015. Vol. 39. No. 3. (Winter 2014/15). P. 7-47.</mixed-citation></citation-alternatives></ref><ref id="B17"><label>17.</label><citation-alternatives><mixed-citation xml:lang="en">Manson, G.P. (2011). Cyberwar: The United States and China Prepare For the Next Generation of Conflict. Comparative Strategy, 30 (2), 121—133. DOI: 10.1080/01495933.2011.561730</mixed-citation><mixed-citation xml:lang="ru">Makridis C.A., Smeets M. Determinants of Cyber Readiness // Journal of Cyber Policy. 2019. Vol. 4. Iss. 1. P. 72-89. DOI: 10.1080/23738871.2019.1604781</mixed-citation></citation-alternatives></ref><ref id="B18"><label>18.</label><citation-alternatives><mixed-citation xml:lang="en">Mori, S. (2019). US Technological Competition with China: The Military, Industrial and Digital Network Dimensions. Asia-Pacific Review, 26 (1), 77—120. DOI: 10.1080/13439006.2019.1622871</mixed-citation><mixed-citation xml:lang="ru">Manson G.P. Cyberwar: The United States and China Prepare For the Next Generation of Conflict // Comparative Strategy. 2011. Vol. 30. No. 2. P. 121-133. DOI: 10.1080/01495933.2011.561730</mixed-citation></citation-alternatives></ref><ref id="B19"><label>19.</label><citation-alternatives><mixed-citation xml:lang="en">Nye, J.S.Jr. (2011). Nuclear Lessons for Cyber Security. Strategic Studies Quarterly, 5 (4), 9—20.</mixed-citation><mixed-citation xml:lang="ru">Mori S. US Technological Competition with China: The Military, Industrial and Digital Network Dimensions // Asia-Pacific Review. 2019. Vol. 26. No. 1. P. 77-120. DOI: 10.1080/13439006.2019.1622871</mixed-citation></citation-alternatives></ref><ref id="B20"><label>20.</label><citation-alternatives><mixed-citation xml:lang="en">Razumov, E.A. (2017) China’s Cybersecurity Policy. Russia and the Pacific, 4 (98), 156—170. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Nye J.S. Jr. Nuclear Lessons for Cyber Security // Strategic Studies Quarterly. 2011. Vol. 5. Iss. 4. P. 9-20.</mixed-citation></citation-alternatives></ref><ref id="B21"><label>21.</label><citation-alternatives><mixed-citation xml:lang="en">Schia, N.N. &amp; Gjesvik, L. (2017). China’s Cyber Sovereignty. Norwegian Institute of International Affairs Policy Brief Series, 2, 1—4.</mixed-citation><mixed-citation xml:lang="ru">Segal A. Chinese Cyber Diplomacy in a New Era of Uncertainty // Hoover Institution, Aegis Paper Series. 2017. Vol. 1703. P. 1-23.</mixed-citation></citation-alternatives></ref><ref id="B22"><label>22.</label><citation-alternatives><mixed-citation xml:lang="en">Segal, A. (2017). Chinese Cyber Diplomacy in a New Era of Uncertainty. Hoover Institution, Aegis Paper Series, 1703, 1—23.</mixed-citation><mixed-citation xml:lang="ru">Schia N.N., Gjesvik L. China’s Cyber Sovereignty // Norwegian Institute of International Affairs Policy Brief Series. 2017. Vol. 2. P. 1-4.</mixed-citation></citation-alternatives></ref><ref id="B23"><label>23.</label><citation-alternatives><mixed-citation xml:lang="en">Sheldon, J.B. (2011). Deciphering Cyberpower: Strategic Purpose in Peace and War. Strategic Studies Quarterly, 5 (2), 95—112.</mixed-citation><mixed-citation xml:lang="ru">Sheldon J.B. Deciphering Cyberpower: Strategic Purpose in Peace and War // Strategic Studies Quarterly. 2011. Vol. 5. Iss. 2. P. 95-112.</mixed-citation></citation-alternatives></ref><ref id="B24"><label>24.</label><citation-alternatives><mixed-citation xml:lang="en">Sheldon, J.B. (2014). Geopolitics and Cyber Power: Why Geography Still Matters. American Foreign Policy Interests, 36 (5), 286—293. DOI: 10.1080/10803920.2014.969174</mixed-citation><mixed-citation xml:lang="ru">Sheldon J.B. Geopolitics and Cyber Power: Why Geography Still Matters // American Foreign Policy Interests. 2014. Vol. 36. No. 5. P. 286-293. DOI: 10.1080/10803920.2014.969174</mixed-citation></citation-alternatives></ref><ref id="B25"><label>25.</label><citation-alternatives><mixed-citation xml:lang="en">Vatrushkin, A.A. (2017). The Legal Framework for Cybersecurity of Russian Federation’s Critical Infrastructure. Eurasian Advocacy, 6 (31), 78—84. (In Russian).</mixed-citation><mixed-citation xml:lang="ru">Wang F., Lai M. Woguo dianzi zhengwu fazhan xianzhuang yu duice yanjiu [Исследование о современном состоянии и мерах развития электронного правительства Китая] // Renwen. 2015. No. 15. Р. 198 (на кит. яз.)</mixed-citation></citation-alternatives></ref><ref id="B26"><label>26.</label><mixed-citation>Wang, F. &amp; Lai, M. (2015). Woguo dianzi zhengwu fazhan xianzhuang yu duice yanjiu [Research on the Current Situation and Measures of China’s E-Government Development]. Renwen, 15, 198. (In Chinese).</mixed-citation></ref></ref-list></back></article>
