China's Internet Penetration Rate

1154 Words5 Pages
computer, which is then used to gain access to other computers on a network, often inflicting massive economic damage in the process. It is estimated that Chinese websites (including government and banking sites) suffer over 2,000 botnet and other similar attacks per month. Such problems are only made more acute as China’s Internet penetration rate is among the fastest growing in the world, while its information enterprises are still inexperienced relative to Western industry experts.
Network technology is innovating and evolving so quickly that the government cannot keep up with market demands and guarantee security without industry cooperation. Most domestic Internet enterprises in China are still relatively new private companies, and it
…show more content…
It illustrates the speed and variability at which these cybersecurity developments shape up. For example, it is not difficult to imagine that under less turbulent circumstances, advocates for democratic values in China would have gained a stronger foothold in the realm of cybersecurity policy. Russia also faces complex questions despite the apparent clarity of its “Information Security” policy. The history of cybercrime in Russia provides an interesting illustration of one of these complications. The 1990s marked a legal and economic collapse in Russia, leading to high unemployment even among the tech savvy, ambitious students of the Soviet education tradition. During this time, there arose a national trend of citizens becoming more engaged in criminal structures just to make a living. Cybercrime, both with domestic and international targets, became one of these outlets (Glenney 147). This further illustrates the differences in circumstances between Western and Eastern cyberspace, and leads one to question whether the stronger role of state intervention in Russia is justified or not. For both China and Russia, the basic idea that “Information Security” is an instrument of state power ”has not yet led to an adequate understanding of how to best utilize it; what interests it could protect and advance; how to deter its use by others; and the rules to which states should
Get Access