fullrecord |
[{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rauhala, Viia", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-06-02T11:52:19Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-06-02T11:52:19Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/102957", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "China is widely recognized for its extensive data collection efforts, both within its borders and globally. However, existing research presents conflicting narratives about the motivations, goals, and the actual capabilities behind this data collection. There is little insight on the internal dynamics that shape China\u2019s approach on data. This thesis seeks to offer a more cohesive view on China\u2019s data collection and analysis practices by examining the strategic, political and structural conditions that influence them.\nDomestically, China\u2019s data capabilities seem powerful, but there is not much reliable information on them. It has strict control over its domestic cyberspace with the goal of ensuring national security and the Chinese Communist Party\u2019s (CCP) position in power. Internationally, China utilizes multiple techniques when collecting data including espionage, spies and businesses. There is an underlying motive to enhance the nation\u2019s international standing as a superpower through initiatives and projects.\nThe findings of this study highlight three core factors that influence China: governance, bureaucracy and control. Internationally, China promotes a data governance model centered on national sovereignty. Internally, its capabilities are hindered by a rigid and fragmented bureaucratic system. This all comes down to the CCP\u2019s need for authoritarian control over the country.\nUnderstanding China\u2019s data strategy requires an overall view on the country\u2019s ambitions and needs. Maintaining diplomatic contact with China, especially in matters related to cyber security, is important. This does not mean that China should be blindly trusted, and the rising superpower must not be underestimated.\n\nKeywords: China, data, espionage", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kiina tunnetaan valtavien datam\u00e4\u00e4rien ker\u00e4\u00e4misest\u00e4 sek\u00e4 sis\u00e4isesti, ett\u00e4 kansainv\u00e4lisesti. Aiempi tutkimus esitt\u00e4\u00e4 kuitenkin osittain ristiriitaisia n\u00e4kemyksi\u00e4 maan tiedonkeruun motiiveista, tavoitteista ja todellisista kyvykkyyksist\u00e4. T\u00e4m\u00e4 tutkimus pyrkii tarjoamaan yhten\u00e4isemm\u00e4n ja perusteellisemman kuvan Kiinan tekem\u00e4st\u00e4 datan ker\u00e4\u00e4misest\u00e4 ja sen k\u00e4sittelyst\u00e4. Samalla tarkastellaan taustalla vaikuttavia strategisia ja poliittisia tekij\u00f6it\u00e4.\nKansallisesti Kiinan valvontakoneisto on laaja, mutta sen todellisista kyvyist\u00e4 on saatavilla vain rajallisesti tietoa. Kiinan kommunistinen puolue hallitsee tiukasti maan kybertilaa taatakseen oman valta-asemansa. Kansainv\u00e4lisesti Kiina hy\u00f6dynt\u00e4\u00e4 useita erilaisia keinoja tiedon ker\u00e4\u00e4miseen, kuten vakoilua, yritystoimintaa ja kybertiedustelua. Samalla se tavoittelee asemansa vahvistamista suurvaltana erilaisten hankkeiden ja aloitteiden kautta.\nTutkimuksen tuloksissa nousee esille kolme keskeist\u00e4 teemaa, jotka vaikuttavat Kiinan toimintaan: hallinto, byrokratia ja kontrolli. Kansainv\u00e4lisesti Kiina ajaa datanhallintamallia, joka perustuu valtioiden itsem\u00e4\u00e4r\u00e4\u00e4misoikeuteen. Sis\u00e4isesti maan toimintaa rajoittaa j\u00e4ykk\u00e4 ja pirstaleinen byrokratia. N\u00e4iden ilmi\u00f6iden taustalla vaikuttaa kommunistisen puolueen tarve s\u00e4ilytt\u00e4\u00e4 ja oikeuttaa autoritaarinen kontrolli koko valtiossa.\nKiinan datastrategian ymm\u00e4rt\u00e4minen edellytt\u00e4\u00e4 kokonaisvaltaista n\u00e4kemyst\u00e4 maan tarpeista ja tavoitteista. Kyberturvallisuuteen liittyvien diplomaattisten suhteiden yll\u00e4pit\u00e4minen on jatkossa yh\u00e4 t\u00e4rke\u00e4mp\u00e4\u00e4. Samaan aikaan on olennaista, ettei suurvallan tavoitteita, kykyj\u00e4 ja m\u00e4\u00e4r\u00e4tietoisuutta aliarvioida.\n\nAsiasanat: Kiina, data, tiedustelu", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2025-06-02T11:52:19Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-06-02T11:52:19Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "56", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Endless Data, Limited Insight: A Literature review of China's data system", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202506024766", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}]
|