Endless Data, Limited Insight: A Literature review of China's data system

China is widely recognized for its extensive data collection efforts, both within its borders and globally. However, existing research presents conflicting narratives about the motivations, goals, and the actual capabilities behind this data collection. There is little insight on the internal dynami...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Rauhala, Viia
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:eng
Julkaistu: 2025
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/102957
_version_ 1834494319141060608
author Rauhala, Viia
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Rauhala, Viia Informaatioteknologian tiedekunta Faculty of Information Technology Jyväskylän yliopisto University of Jyväskylä Rauhala, Viia Informaatioteknologian tiedekunta Faculty of Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Rauhala, Viia
datasource_str_mv jyx
description China is widely recognized for its extensive data collection efforts, both within its borders and globally. However, existing research presents conflicting narratives about the motivations, goals, and the actual capabilities behind this data collection. There is little insight on the internal dynamics that shape China’s approach on data. This thesis seeks to offer a more cohesive view on China’s data collection and analysis practices by examining the strategic, political and structural conditions that influence them. Domestically, China’s data capabilities seem powerful, but there is not much reliable information on them. It has strict control over its domestic cyberspace with the goal of ensuring national security and the Chinese Communist Party’s (CCP) position in power. Internationally, China utilizes multiple techniques when collecting data including espionage, spies and businesses. There is an underlying motive to enhance the nation’s international standing as a superpower through initiatives and projects. The findings of this study highlight three core factors that influence China: governance, bureaucracy and control. Internationally, China promotes a data governance model centered on national sovereignty. Internally, its capabilities are hindered by a rigid and fragmented bureaucratic system. This all comes down to the CCP’s need for authoritarian control over the country. Understanding China’s data strategy requires an overall view on the country’s ambitions and needs. Maintaining diplomatic contact with China, especially in matters related to cyber security, is important. This does not mean that China should be blindly trusted, and the rising superpower must not be underestimated. Keywords: China, data, espionage Kiina tunnetaan valtavien datamäärien keräämisestä sekä sisäisesti, että kansainvälisesti. Aiempi tutkimus esittää kuitenkin osittain ristiriitaisia näkemyksiä maan tiedonkeruun motiiveista, tavoitteista ja todellisista kyvykkyyksistä. Tämä tutkimus pyrkii tarjoamaan yhtenäisemmän ja perusteellisemman kuvan Kiinan tekemästä datan keräämisestä ja sen käsittelystä. Samalla tarkastellaan taustalla vaikuttavia strategisia ja poliittisia tekijöitä. Kansallisesti Kiinan valvontakoneisto on laaja, mutta sen todellisista kyvyistä on saatavilla vain rajallisesti tietoa. Kiinan kommunistinen puolue hallitsee tiukasti maan kybertilaa taatakseen oman valta-asemansa. Kansainvälisesti Kiina hyödyntää useita erilaisia keinoja tiedon keräämiseen, kuten vakoilua, yritystoimintaa ja kybertiedustelua. Samalla se tavoittelee asemansa vahvistamista suurvaltana erilaisten hankkeiden ja aloitteiden kautta. Tutkimuksen tuloksissa nousee esille kolme keskeistä teemaa, jotka vaikuttavat Kiinan toimintaan: hallinto, byrokratia ja kontrolli. Kansainvälisesti Kiina ajaa datanhallintamallia, joka perustuu valtioiden itsemääräämisoikeuteen. Sisäisesti maan toimintaa rajoittaa jäykkä ja pirstaleinen byrokratia. Näiden ilmiöiden taustalla vaikuttaa kommunistisen puolueen tarve säilyttää ja oikeuttaa autoritaarinen kontrolli koko valtiossa. Kiinan datastrategian ymmärtäminen edellyttää kokonaisvaltaista näkemystä maan tarpeista ja tavoitteista. Kyberturvallisuuteen liittyvien diplomaattisten suhteiden ylläpitäminen on jatkossa yhä tärkeämpää. Samaan aikaan on olennaista, ettei suurvallan tavoitteita, kykyjä ja määrätietoisuutta aliarvioida. Asiasanat: Kiina, data, tiedustelu
first_indexed 2025-06-02T20:00:55Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rauhala, Viia", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-06-02T11:52:19Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-06-02T11:52:19Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/102957", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "China is widely recognized for its extensive data collection efforts, both within its borders and globally. However, existing research presents conflicting narratives about the motivations, goals, and the actual capabilities behind this data collection. There is little insight on the internal dynamics that shape China\u2019s approach on data. This thesis seeks to offer a more cohesive view on China\u2019s data collection and analysis practices by examining the strategic, political and structural conditions that influence them.\nDomestically, China\u2019s data capabilities seem powerful, but there is not much reliable information on them. It has strict control over its domestic cyberspace with the goal of ensuring national security and the Chinese Communist Party\u2019s (CCP) position in power. Internationally, China utilizes multiple techniques when collecting data including espionage, spies and businesses. There is an underlying motive to enhance the nation\u2019s international standing as a superpower through initiatives and projects.\nThe findings of this study highlight three core factors that influence China: governance, bureaucracy and control. Internationally, China promotes a data governance model centered on national sovereignty. Internally, its capabilities are hindered by a rigid and fragmented bureaucratic system. This all comes down to the CCP\u2019s need for authoritarian control over the country.\nUnderstanding China\u2019s data strategy requires an overall view on the country\u2019s ambitions and needs. Maintaining diplomatic contact with China, especially in matters related to cyber security, is important. This does not mean that China should be blindly trusted, and the rising superpower must not be underestimated.\n\nKeywords: China, data, espionage", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kiina tunnetaan valtavien datam\u00e4\u00e4rien ker\u00e4\u00e4misest\u00e4 sek\u00e4 sis\u00e4isesti, ett\u00e4 kansainv\u00e4lisesti. Aiempi tutkimus esitt\u00e4\u00e4 kuitenkin osittain ristiriitaisia n\u00e4kemyksi\u00e4 maan tiedonkeruun motiiveista, tavoitteista ja todellisista kyvykkyyksist\u00e4. T\u00e4m\u00e4 tutkimus pyrkii tarjoamaan yhten\u00e4isemm\u00e4n ja perusteellisemman kuvan Kiinan tekem\u00e4st\u00e4 datan ker\u00e4\u00e4misest\u00e4 ja sen k\u00e4sittelyst\u00e4. Samalla tarkastellaan taustalla vaikuttavia strategisia ja poliittisia tekij\u00f6it\u00e4.\nKansallisesti Kiinan valvontakoneisto on laaja, mutta sen todellisista kyvyist\u00e4 on saatavilla vain rajallisesti tietoa. Kiinan kommunistinen puolue hallitsee tiukasti maan kybertilaa taatakseen oman valta-asemansa. Kansainv\u00e4lisesti Kiina hy\u00f6dynt\u00e4\u00e4 useita erilaisia keinoja tiedon ker\u00e4\u00e4miseen, kuten vakoilua, yritystoimintaa ja kybertiedustelua. Samalla se tavoittelee asemansa vahvistamista suurvaltana erilaisten hankkeiden ja aloitteiden kautta.\nTutkimuksen tuloksissa nousee esille kolme keskeist\u00e4 teemaa, jotka vaikuttavat Kiinan toimintaan: hallinto, byrokratia ja kontrolli. Kansainv\u00e4lisesti Kiina ajaa datanhallintamallia, joka perustuu valtioiden itsem\u00e4\u00e4r\u00e4\u00e4misoikeuteen. Sis\u00e4isesti maan toimintaa rajoittaa j\u00e4ykk\u00e4 ja pirstaleinen byrokratia. N\u00e4iden ilmi\u00f6iden taustalla vaikuttaa kommunistisen puolueen tarve s\u00e4ilytt\u00e4\u00e4 ja oikeuttaa autoritaarinen kontrolli koko valtiossa.\nKiinan datastrategian ymm\u00e4rt\u00e4minen edellytt\u00e4\u00e4 kokonaisvaltaista n\u00e4kemyst\u00e4 maan tarpeista ja tavoitteista. Kyberturvallisuuteen liittyvien diplomaattisten suhteiden yll\u00e4pit\u00e4minen on jatkossa yh\u00e4 t\u00e4rke\u00e4mp\u00e4\u00e4. Samaan aikaan on olennaista, ettei suurvallan tavoitteita, kykyj\u00e4 ja m\u00e4\u00e4r\u00e4tietoisuutta aliarvioida.\n\nAsiasanat: Kiina, data, tiedustelu", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2025-06-02T11:52:19Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-06-02T11:52:19Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "56", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Endless Data, Limited Insight: A Literature review of China's data system", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202506024766", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "qualifier": "accessibilityfeature", "schema": "dc"}]
id jyx.123456789_102957
language eng
last_indexed 2025-06-02T20:02:49Z
main_date 2025-01-01T00:00:00Z
main_date_str 2025
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/0264d4d2-abad-430a-b931-c7915d02e89c\/download","text":"URN:NBN:fi:jyu-202506024766.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2025
record_format qdc
source_str_mv jyx
spellingShingle Rauhala, Viia Endless Data, Limited Insight: A Literature review of China's data system Kyberturvallisuuden maisteriohjelma Master's Degree Programme in Cyber Security
title Endless Data, Limited Insight: A Literature review of China's data system
title_full Endless Data, Limited Insight: A Literature review of China's data system
title_fullStr Endless Data, Limited Insight: A Literature review of China's data system Endless Data, Limited Insight: A Literature review of China's data system
title_full_unstemmed Endless Data, Limited Insight: A Literature review of China's data system Endless Data, Limited Insight: A Literature review of China's data system
title_short Endless Data, Limited Insight: A Literature review of China's data system
title_sort endless data limited insight a literature review of china s data system
title_txtP Endless Data, Limited Insight: A Literature review of China's data system
topic Kyberturvallisuuden maisteriohjelma Master's Degree Programme in Cyber Security
topic_facet Kyberturvallisuuden maisteriohjelma Master's Degree Programme in Cyber Security
url https://jyx.jyu.fi/handle/123456789/102957 http://www.urn.fi/URN:NBN:fi:jyu-202506024766
work_keys_str_mv AT rauhalaviia endlessdatalimitedinsightaliteraturereviewofchinasdatasystem