ArticlePDF Available

The Chinese Social Credit System. Origin, political design, exoskeletal morality and comparisons to Western systems.

Authors:

Abstract and Figures

In 1999, Lin Junyue (Chinese Academy of Social Sciences) developed a “Social Credit” scoring “System” to enhance trust and reliability in the Chinese market economy and strengthen social cohesion, individual ethical behavior, and political stability. In 2002, after the first experiments (in 2000) and fine tuning, Chinese president Jiang Zemin propagated this system in a public speech. In 2014 it was announced that every citizen and company would receive a unique ID and a score in 2020. The score (black list, no list, red list or even points), would indicate the holder’s financial and economic trustworthiness, as well as their filial piety and political loyalty. Low performers would be restricted, especially in mobility (access to planes, high speed trains etc.) and punished with public shame. High performers would be rewarded. This type of combined disciplinary and controlling society creates an exoskeletal, extrinsically motivated moral lead and reduces intrinsically motivated moral rule-following.
Content may be subject to copyright.
EUROPEAN JOURNAL OF
CHINESE STUDIES 2 (2019)
M. WOESLER, ED.
The Chinese
Social Credit System
China-Spain Relations
during the Transition
Period (1976-1982)
The Past
in the Present
Chinese Literature
in Romania
European Journal of Chinese
Studies 2 (2019)
The Journal was founded in 2010 under the
name European Journal of Sinology and pre-
sented at the Biannual Meeting of the Eu-
ropean Association for Asian Studies,
inviting especially European scholars to
contribute. In 2018, the number of
submissions became so large, that the Journal
had to be split into a journal focusing on
ancient times (“Sinology” 汉学) and one
con-centrating on the modern era (“Chinese
Studies” 现代汉学).
The European Journal of Chinese Studies (EJCS)
is published by the European Science &
Scholarship Association, currently under the
scholarly auspices of the German China
Association.
The journal contains articles, occasional
papers, review articles, book reviews,
annotated translations, notes, and essays as
well as abstracts of papers of other journals
and monographs in German, English,
French and Chinese dealing with the history,
economy, culture and society of Greater
China. Founded by Martin Woesler in 2018,
it offers a forum especially for scholars from
the EU and other European countries. We
welcome contributions based on inde-
pendent research by scholars (including PhD
students) everywhere. Currently the journal is
actively seeking to expand its contributor
base (see instructions for contributors)!
This is a PEER REVIEWED publication.
Contributions by any author, including those
with any relation to the editorial board are
double blind peer reviewed externally.
The journal is ABSTRACTED in: Bulletin of
the German China Association.
The Journal of Sinology is a REFEREED
academic journal published once a year both
in print and electronic form (http://china-
studies.com).
The journal’s website is
http://universitypress.eu/en/journals.php.
The journal has applied to be incorporated in
the Emerging Sources Citation Index by
Clarivate (ESCI, Web of Science, formerly
Thomson Reuters).
Editor: Martin Woesler, Witten/Herdecke
University, Witten/Germany
All inquiries, manuscripts, job applications
and books for abstracting/review should be
sent to:
Ruhr University Bochum, P. O. Box “The
University Press Bochum”, European
Journal of Sinology, Editor, Universitaetsst.
150, 44801 Bochum, Germany
email: journal@china-studies.com
Co-Editors:
Luigi Moccia, Rome
Stefan Messmann, Budapest
Editorial Board:
Joël Bellassen
Lutz Bieg
Claudia von Collani
Hermann Halbeisen
Harald Holz
Frank Kraushaar
Peter Kupfer
Wolfgang Ommerborn
Gregor Paul
Karl-Heinz Pohl
Guido Rappe
Maurizio Scarpari
Helwig Schmidt-Glintzer
Harro von Senger
Helmolt Vittinghoff
Regional Advisory Board:
Baltic States: Frank Kraushaar
France: Joël Bellassen
Germany: Martin Woesler
Hungary: Stefan Messmann
Italy: Luigi Moccia
Switzerland: Harro von Senger
All other countries: positions open for
applications
ISSN 2626-9694. Online ISSN 2626-9708.
Europe ISBN 978-3-86515-299-2
EAN *9783865152992*
EBOOK ISBN 978-3-86515-422-4
EAN *9783865154224*
USA ISBN 978-1-68202-539-0
ASIN *9781682025390*
Order: order@china-studies.com
Managing and Production Editor:
Martin Woesler
English Language Editors:
Margaret Chu, Licia D. Kim
Research Assistants:
Gerwin He, Tianwei You (CN)
Publishing Houses:
European University Press
in association with
West German University Press.
In the USA: Academic Press of the U.S.A.
Instructions for contributors
Please format your paper in Microsoft
Word or Open Office in the way it should
appear in the journal and submit it to
journal@china-studies.com.
Individual and institutional subscription
rates incl. (inter)national shipping (single
issues and special issues):
print version 49 € / year
online & print combined version 99 €
university site license (ip range) 398
special issues 49 €
《欧洲现代汉学》是中国湖南师范大
学外语学院的英文学术期刊。
编辑部:湖南师大外院国际汉学中心
出版社、印刷、发行:欧洲大学出版
社,德国波鸿市大学路 150 号邮编
44801主编:吴漠汀
The rate of the book series European Journal
of Chinese Studies. Special Issue, ISSN 2190-
0868, is 49 € / US$ per volume.
Europe
The journal is printed and published in
Europe by European University Press and
can be purchased directly from the Press
via info@universitypress.eu or through
Amazon.de.
Bibliographic information published by the
Deutsche Nationalbibliothek
The Deutsche Nationalbibliothek lists this
publication in the Deutsche Nationalbiblio-
grafie; detailed bibliographic data are avail-
able on the Internet at http://dnb.dnb.de .
USA
The journal is printed and published in the
USA by Academic Press of the USA and
can be purchased directly from the Press
via ap@e-texts.org or through
Amazon.com.
For the Catalogue Information, please refer
to the Library of Congress (Preassigned
Control Number Program).
http://journal.china-studies.com
http://universitypress.eu/en/journals.php
Ethical Statement
The Ethical Statement is based on the recommendations
of the Publication Ethics Committee (COPE) Good
Practices drafted in 2011.
1. Obligations of the editor:
1.1. Neutrality. The intellectual content of
submitted manuscripts is evaluated is
evaluated regardless of race, gender, sexual
orientation, age, disability, religion, ethnicity,
political philosophy of the authors.
1.2. Confidentiality. All manuscripts should be
treated as confidential documents. They must
not be shown to anyone without the
permission of the editor. Managers and
editorial staff should not disclose information
about the manuscript submitted to anyone
except the author, reviewers and potential
reviewers.
1.3. Disclosure of information and conflicts of
interest. Unpublished data contained in the
submitted manuscript must not be used by
editors or reviewers in their own research
without the explicit consent of the author.
1.4. Decision on publication. The editor of the
journal decides on the publication of
submitted articles. The editor is guided by the
Editorial Committee’s policy, taking into
account the legal obligations regarding
defamation, copyrights and plagiarism. The
editor can share the decision with other
members of the Editorial Board or with
reviewers. In the event of an appeal of the
decision of the Reading Committee, the editor
may solicit two new reviewers.
2. Obligations of reviewers.
2.1. Editorial decisions. Reviewers assist the
editorial staff in making decisions and may
also assist the author to improve the quality of
the manuscript.
2.2. Delays and deadlines. When a guest reviewer
does not feel competent enough to evaluate
the research presented in the manuscript, or if
he finds himself unable to provide his report
in time, he must inform the editor without
delay in order to give him time to contact
other reviewers.
2.3. Standards of objectivity, civility and respect.
The reports must be objective. Personal
remarks and criticisms directed at the author
or hurtful remarks directed at the text content
are not eligible. The opinion of the reviewer
must be clear, well-argued and respectful of
the author.
2.4. Indication of sources. The reviewer must
identify appropriate publications not cited by
the author. Any such indication must be
accompanied by an appropriate comment. The
reviewer should draw the editor’s attention to
any similarity, any overlap between the
manuscript and previously published data.
2.5. Disclosure of information and conflicts of
interest. Information and ideas obtained
through anonymous replay are confidential
and should not be used for the personal
benefit of the reviewer. Reviewers should not
accept reviewing manuscripts where this may
result in a conflict of interest arising from
competitive, collaborative or other
relationships with the authors.
3. Obligations of the authors.
3.1. Information validity. The information
contained in the manuscripts submitted for
publication must present the results of the
authors’ research as well as an objective
discussion of these results and their
importance. The underlying data must be
presented correctly. Fraudulent and
consciously inaccurate information is
considered unethical and unacceptable. The
identification of research done by others must
always be given. Authors should cite the
publications that influenced the study in
question.
3.2. Originality and plagiarism. Authors must
ensure that they have written a completely
original study, and if they have used other
people’s books or statements, they must be
properly cited.
3.3. Multiple publications. An author should not
submit manuscripts representing the same
study to more than one journal (or book).
Submitting the same manuscript in more than
one journal is unethical and unacceptable. The
journal accepts articles originally published in
languages other than English. In these cases,
the authors must give the reference of the first
publication and be free from the copyright of
the original publisher.
3.4. Paternity of the manuscript. Only authors who
have made a significant contribution to the
study in question are considered to be authors.
All those who contributed to the study must
be present in the list of authors. If other
people have been involved in some aspects of
the research project, they should be
mentioned in the acknowledgments. The lead
author must ensure that all co-authors and
only they are included in the list of authors of
the manuscript, that the co-authors have seen
and approved the final version of the
manuscript, and that they have agreed to
submission of the manuscript.
3.5. Disclosure of information and conflicts of
interest. All authors must indicate, as a result
of their biographical presentation, any
conflicts of interest that may affect their
proposed publication. Funding for research
projects that made the study possible must be
indicated.
3.6. Errors in publishing. If the author discovers
an important error or an inaccuracy in its
publication, its obligation is to quickly inform
the editor and to consider, in agreement with
the person in charge, the withdrawal of the
article or the publication of the information
about the error.
CONTENTS. EJCS 2 (2019) 5 5
Contents
EJCS 2 (2019)
The Chinese Social Credit System
Woesler, Martin; Warnke, Martin; Kettner,
Matthias & Lanfer, Jens ......................... 7-35
Neither Difference nor Distance Matters:
China-Spain Relations
during Adolfo Suárez' Government
Luo Huiling ........................................... 37-59
The Past in the Present
Messmann, Stefan .................................. 61-84
Chinese Literature in Romania
A Qualitative Study based on In-Depth
Interviews with the Agents Involved in
Sino-Romanian Transfer of Culture
Cîndea Gîţă, Iulia Elena &
Moratto, Riccardo ................................ 85-102
Index ............................................... 103-104
EJCS 3 (2020)
What we can learn from China
Why not 70% of the population will get
infected by COVID-19
and why the pandemic can not only be
slowed down, but stopped
Woesler, Martin ...................................... 7-35
Preliminary report of a study on Arabic
calligraphy of the Hui Muslims the
example of the dū ās
(都阿)
Knüppel, Michael ................................... 37-42
China’s Civil Code and Civil Rights
Weyrauch, Thomas ................................. 43-48
Speaking and Recalling Bitterness in the
Anti-schistosomiasis Campaign of Hubei
Province in the 1960s
Fan, Ka-wai .......................................... 49-68
Index .......................................................... 69
6 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 7
The Chinese Social
Credit System
Origin, political design,
exoskeletal morality and
comparisons to Western systems
Woesler, Martin, University Witten/Her-
decke (UW/H) / Germany;
Warnke, Martin. Leuphana University
Lüneburg / Germany;
Kettner, Matthias (UW/H) &
Lanfer, Jens (UW/H)
DOI:10.12906/9783865152993_002
Abstract
In 1999, Lin Junyue (Chinese Academy of
Social Sciences) developed a “Social
Credit” scoring “System” to enhance trust
and reliability in the Chinese market eco-
nomy and strengthen social cohesion, indi-
vidual ethical behavior, and political sta-
bility. In 2002, after the first experiments
(in 2000) and fine tuning, Chinese presi-
dent Jiang Zemin propagated this system in
a public speech. In 2014 it was announced
that every citizen and company would
receive a unique ID and a score in 2020.
The score (black list, no list, red list or even
points), would indicate the holder’s
financial and economic trustworthiness, as
well as their filial piety and political loyalty.
Low performers would be restricted,
especially in mobility (access to planes,
high speed trains etc.) and punished with
public shame. High performers would be
rewarded. This type of combined
disciplinary and controlling society creates
an exoskeletal, extrinsically motivated
moral lead and reduces intrinsically
motivated moral rule-following.
Key words
social credit system, trust, reliability, Chi-
nese market economy, experiments, unique
id, piety, political loyalty, low performers,
mobility restriction, public shame, exoske-
letal ethics, intrinsically motivated moral
rule-following
1. Introduction
Since the 1980s, the People’s Republic of
China (PRC) has experienced a remarkable
economic boom. In the course of this,
8 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
negative phenomena such as product
piracy, patent infringements, trickery, labor
exploitation, and environmental pollution
have been noted, and there are persistent
complaints about corruption in the public
administration and the party apparatus
(Wedeman 2004) which have also been
analyzed as systemic (Zhu 2012).
Representative surveys (Wang 2008) and
analyses (Zhang 2003) have noted a lack of
trust in the country's citizens, enterprises
and organizations. Since the beginning of
the 21st century, regional test runs of a
system for social trustworthiness, with list-
or points-based assessments for citizens
and organizations, have been carried out
(http://www.chinacredit.gov.cn).
In 1999, the professor of economics, Lin
Junyue (Chinese Academy of Social
Sciences), developed the idea of a “social
credit system”. From around the turn of
the millennium, it has been tested and Lin
has monitored its implementation. (Lin
2015, Louvet 2019, Settelen 2019).
Lin is very pleased with the results; he is
sure that a movement like the “yellow
vests” in France could have been
prevented if the social credit system had
been implemented there as well. The basic
idea behind the system, he says, is to ease
the burden on prisons, because critics are
quickly encouraged to 'mend their ways' by
hints from their acquaintances (social
nudging). Lin hopes to export the system
to “capitalist countries”. He claims that
Cambodia, Sri Lanka, Poland and Chile
have already signaled interest (Louvet
2019).
In 2002, in a plenary speech at the XVI
Central Committee, President Jiang Zemin
justified the introduction of a Social Credit
System as a way to promote a free-flow
economy (Jiang 2002). In 2007, the State
Council officially decided to introduce it.
In the Anglophone context, the term
“Social Credit System” (SCS) was coined.
Large internet technology companies
competed for the official state contract
along with private commercial point
systems (e.g. Alibaba's Sesame Credit
system) and different point scales. In 2014,
the State Council announced the
implementation of the SCS nationwide by
2020 (State Council 2014). Over the course
of time official texts have always asserted
that the SCS corresponds exactly to the
respective current political orientation or
terminology, such as the “Chinese-style
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 9
socialist market economy” or Xi Jinping's
ideas (Xi 2014).
In fact, since 2017 (these are the earliest
documents the authors could find),
companies which had wanted to register
their business in the PRC were already
given only one number, the SCS number.
Under this one registration number, data
from various authorities are stored
centrally, so that all data can be accessed
under one number. (Woesler 2021)
In China, for millennia, trade has been
based on trust, which often has to be built
upon human relationships. In Internet
commerce, this lack of acquaintance has
been successfully replaced by ratings in the
PRC. This experience is to be transferred
to the whole society with the SCS.
The SCS not only includes financial criteria
in its assessment, like the “credit history”
in the U.S. and Schufa/Credit reform in
Germany, but also, in much greater detail,
incorporates almost total surveillance: civil
and criminal violations (payment morale,
punctuality of tax returns and payments)
and misdemeanors (such as parking
violations, jaywalking, sitting in the wrong
seat in the subway), are included along with
social behavior, such as the obligation to
visit one's parents. It assesses political
loyalty by monitoring social media, social
contacts, friendships, and interactions by
and with party members. (Woesler 2021)
makes the finely graded SCS ranking of a
company much more meaningful than the
broad AAA ratings of American rating
agencies and makes it interesting for stock
speculators, funds, mergers and
acquisitions, for tracking down takeover
candidates, filtering applicants for large
tenders, and for industrial espionage.
While foreigners and foreign companies are
only part of the system if they have
residency in the PRC, SCS is only one
system to monitor people and
organizations, as can be seen by Chinese
operations outside of China (McGregor
2021).
The SCS appears to be a strong extension
of the concept of punishment for venial
offenses, such as misdemeanors. The SCS
aims to change the trust (from Latin
creditum “that which is entrusted in good
faith”) in a person or institution. Sanctions
are imposed (the publicly visible score and,
since June 2018, full names of black listed
people on https://www.creditchina.gov.cn)
through privileges (preferential treatment
10 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
in rental contracts, visa applications, tax
declarations, etc.) or exclusion, comparable
to the ancient shard court (ostracism);
inclusion and exclusion include not only
financial credits but also social
participation such as the use of high-speed
trains or airplanes and a more or less
smooth handling of official procedures.
Western reporting has so far been limited
to the 2014-2020 phase, mostly in the form
of criticism towards the evaluation criteria
(such as principles that are highly
problematic from a Western perspective
like political loyalty). It has portrayed and
criticized a system of near total surveillance
and a lack of rule of law, a disregard for
data protection and privacy, and has been
mostly focused on dramatic individual fates
(as in the event of system failures or
draconian punishments).
Figure 1: In this illustration by Nazalya 2019, the
social credit system is thought to have started in
2009 or later. In fact, conceptualization began in the
1990s with first test-runs around 2000.
Due to the language barrier, the
international community has only been
able to take note of a very small section of
the materials which have been available to
the Chinese public for much longer than
generally known (from as early as Jiang's
speech in 2002). If these documents are
included in an assessment of this system,
the picture becomes much more
complicated. It becomes clear that
although the SCS began with the goal of
promoting the economy, it has gradually
and systematically expanded to include the
general trustworthiness of all actors
including the government in all areas of
society and for all concerns.
At its core, the SCS enables the free
movement of capital and rapid decision-
making on production processes, while, at
the same time, maintaining the overarching
control of the state (and thus the party) and
enforcing a political canon of values.
But the SCS also has an external effect; it
creates the conditions for participation in
world trade under capitalistic principles on
a sound business basis. From the outset,
the SCS was designed, and strictly
operated, with a view to its
computerization. (Woesler 2021) With the
advent of the global internet (and its
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 11
Chinese, partly delimited variant), it can
now find its technical realization.
Thus, the SCS integrates subsectors of
Chinese society and at the same time
shapes the external relationship of the
People's Republic of China to globalized
capitalism. It shows itself to be in harmony
with the traditional values of Confucianism
and the state ideology of historical
materialism (which sees the economy as
the basis of all social development). While
this is alienating to international, especially
Western understanding, it does
demonstrate why the SCS is enforceable in
the PRC. However, neoliberal and
parliamentary countries should not
overlook the fact that they too know
monitoring and evaluation (which,
incidentally, provided models for the
Chinese SCS through its rating systems).
The basis of this article is a translation and
evaluation of extensive official (and
unofficial) documents, which chronologi-
cally document the source and emergence
of the SCS since 2000, trace the systematic
expansion from assessment criteria and
application fields initially based solely on
economic aspects to society as a whole,
and describe the motivation and objectives
of the system (document collection
published as Woesler 2021). These
documents discuss the assessment
categories and the actions assessed, the
authorities involved and cooperation with
global companies. They furthermore reveal
the focus on operation and information
implementation and discourse on both the
impact internally (on the Chinese state and
its people) and externally (on international
trading partners).
For the text selection, we first reviewed all
official documents that could be found
with Chinese and Western search engines,
and we also followed up on tips from CCP
members and overviews of thematically
relevant portals of sites in Germany and
China. The texts were then assessed and
evaluated according to their relevance. The
results of the evaluation have been
incorporated into this article.
2. Origins, Objectives and Scientific
Analysis of the Social Credit System
The SCS has been widely implemented but
not yet extensively studied scientifically. In
this paper, we therefore look at the
conception of the system, trace its genesis,
and approach its essence in terms of
conceptual definition.
12 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
Considering the lack of trust in Chinese
enterprises in the global market (as well as
the lack of trust in the domestic market
due to fraud and criminal behavior) and in
an effort to improve reliability for
enterprises, individuals and government
institutions, the PRC began to build SCS in
2000, and planned to be fully implement it
by 2020. SCS operates on a data collection
system and automatically combines and
analyzes data from bank accounts, video
surveillance, purchases, tax returns,
movement profiles, traffic and social
behavior (such as mandatory parental
visitation), chat histories, and use of
Internet media in general. When
considering “social behavior,” it apparently
goes beyond Western and international
credit score aspects. By negatively rating
critical chat posts and befriending
dissidents, positive political expressions of
opinion are also encouraged. In addition, a
list of sanctions, including public black lists
based on the idea of “public shaming,” are
used as “sticks and carrots” for citizens and
businesses.
The localized translation “social credit
system is not self-explanatory and does
not quite get to the heart of the matter. In
fact, when Western readers think of the
term “social credit,” they think of points
for social commitment such as those that
can be earned during university studies
(which are called “social credit points” in
reference to the “credit points” for
studies). Such points are not included in
the evaluation of the study program, but
they can document voluntary commitment,
e.g. on a diploma supplement. The Chinese
term, xinyong 信用”, (sometimes
chengxin 诚信”) does stand for “credit”
in the sense of a credit card, but it can also
mean “trust,” “reliability,”
“trustworthiness,” “loyalty” and “political
loyalty”. Alternative translations for SCS
could therefore be: Social Compliance
Scoring System or Societal
Credibility/Reliability Index, etc.
Basically, the evaluation of complex phe-
nomena in metric systems (Beer 2016)
must be understood as a reduction that
creates a corresponding psychological,
group-dynamic, and extrinsic (mis)incen-
tives, and thus changes, which are similarly
(and indirectly as social nudging)
controls; the manipulation of behavior.
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 13
3. Contextual embedding in “social
management”, phenomenology and
political slogans
The PRC government is currently building
a software system to govern the nation
(Digital System for Society Management
DSSM, officially called “social
management”). It consists of:
an (declaredly complete) surveillance
system and centralized collection of all
accessible data including movement
profile, identity recognition, payments,
communication, behavior (preferen-
ces), and motivation (desires, dreams,
values and ideally, thoughts, with the
first experiments of brain scanners in
workers' hats having started in
Shanghai and Beijing);
algorithmic and Big Data analysis;
an information system to inform (and
lead) citizens;
a motivational system (unconscious ad-
vertising / “priming”, social credits for
political loyalty); and
a sanctions system which includes
awards with privileges (red lists), auto-
matic censorship, black listing (public
shaming), restriction of mobility,
imprisonment, gag orders, and, for
capital crimes, capital punishment
(estimated at up to several thousand
executions per year, e.g. for tax crimes
and for political reasons with,
purportedly, deterrent effect). SCS uses
the slogan, “Hamper every move of
low-performers.”
The “Social management system” aims at
achieving the following results:
1. It is to be artificially intelligent;
2. (ideally) fully automatic, with decisions
(including court decisions) made by
algorithms that are mainly based on
correlation rather than causality;
3. capable of learning from successes and
mistakes to optimize itself,
4. employed through indirect communi-
cation with users (since the system works
best when unknown to the user, e.g., di-
sease probabilities are already discovered
by correlation, but not necessarily commu-
nicated); and
5. employment of data exchange between
humans and machines, as well as between
machines.
14 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
The legal framework, in the PRC, suits
massive data collection, as data protection
and data security are guaranteed for the
state, but not for the individual. Since the
government and the bureaucracy are
(mostly) built by officials, often
technocratic, of a single party, which has
the leading role in all areas of society. The
result being that the highest position in a
company or an academic institution is the
party secretary, not the company director
or the rector of the university.
The software-based scoring system is
supported in real life by education, which
includes indoctrination and propaganda,
and by the state guidance of every citizen
from preschool to retirement and beyond.
Ten percent of school classes, university
courses, and on-the-job training at party
schools, (for nonparty members as well)
upwards from the rank of department head
or dean, are dedicated to ideological
indoctrination.
Students must first become soldiers.
Military camps are located near university
campuses. The ever-expanding universities
are moreover assigned new campuses
outside the city gates.
Citizens are shaped by ideological training,
subjected to psychological pressure, and
swayed by group dynamics towards digital,
external control. SCS inventor Lin says
that, instead of the state imprisoning
people, under SCS, community members
nudge them towards expected
behaviors.The main motivating factor is
patriotism. In school and university
education one of the lessons is that the
PRC has had to overcome 150 years of
oppression by the West to return now to
the self-confidence and the former glory of
a world power. Privileges and honors are
conferred on citizens with high scores. For
example, Figure 2 shows posters on the
roadsides of the SCS model city of
Rongcheng promoting “model citizens”
with their pictures.
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 15
Figure 2: Presentation of Model Citizens in Rong-
cheng (Chiu 2019).
4. SCS test runs
In various regional test phases, individual
facts were cited for point deductions and
gains. Figure 3 is an illustrated overview of
a test in Suining.
Figure 3: Gain and subtraction of points in an SCS
variant (Pohlmann 2018).
The factors assessed include tax declaration
and payment morale, repayment of loans
and credit cards, payment morale for utility
bills and court fines; adherence to traffic
rules and to family planning requirements,
fare evasion, scientific and volunteer
activities, reverence for parents, criminal
record, interaction on the Net with other
netizens, fidelity of posts, and shopping
behavior (see figure 4).
16 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
Figure 4: A systematic illustration by the Wall Street
Journal (McAllister 2019), which categorizes aspects
of Chinese sources. The Western way of illustrating
reminds one of the “Nuremberg funnel”.
The aspects under which those subjected
to the SCS are judged correspond to the
sources originated in the PRC (Chinese
Government Web 2014 ff).
Citizen control, according to our
observations and consistent reports from
private sources, can be broken down into
the following stages.
5. Framework
5.1 Disinformation
Studies by Harvard University and others
have proven that Chinese internet users do
not have access to approximately 17% of
the internet (Zittrain 2003, Qiang 2011,
Bamman 2012). Many scandals in the PRC,
including food scandals, corruption and
even the outbreak of the Coronavirus are
often later revealed to have been covered
up.
Most people in the world today live in filter
bubbles. These filter bubbles in the West
are created by IT and social media
companies. The combination of user
profile analysis and automatic mechanisms
for distribution and advertising result in
users preferring “fake news” and
conspiracy theories over truth. Although
users believe they themselves still have the
control, it is actually the people in the IT
and social media companies, that have the
highest level of control. The result is the
polarization of societies and a refusal to
engage in discussion and reflection on
one’s standpoint. The filter bubbles in the
PRC lead to political stability, patriotism, a
new pride. Both, the US and the PRC filter
bubbles nourish an attitude of polarization
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 17
between the United States and China. In
certain areas, however, where the different
content of education and PRC filter
bubbles lead to incompatibility with
international work force requirements or
international competition (such as the
acceptance of research papers in journals
and awards like the Nobel Prize), it is
crucial that the Chinese government
reconsiders its policy of certain filter
bubbles so that Chinese citizens and
Chinese companies are not disadvantaged
in global competition.
Recent historical events are deemed
“sensitive”. Thus it is that the PRC has not
yet come to terms with the Cultural
Revolution and the peaceful
demonstrations for democratization in
1989, with the latter being classified as
“counterrevolution” in subsequent PRC
history.
Contemporary international politics, for
their part, are played out differently by the
PRC overseas. This is especially the case
with the exercise of its power in the UN
Security Council, its exploration of Africa,
its geostrategic projects such as the “One
Belt One Road”, its involvement in the
islands in the South China Sea, and its
policy towards the Hong Kong question.
5.2 Brainwashing
The term “brainwashing” in English is one
of the few Chinese loan words, originating
from Chinese “xinao” 洗腦. It was first
used by Edward Hunter in 1950 to
describe PRC policies of compelling
submission and cooperation.
Ideological indoctrination begins in
kindergarten and continues through
kindergarten, preschool, elementary school,
junior high, high school, college/university
with a tutor for each student and adult
through working life, retirement, and unto
one’s death.
Now every Chinese citizen must spend
about ten percent of her / his study time
or work time in ideological education, and,
in case one has achieved a higher position
in one’s job, even in party schools. Often
their will is broken at preschool age,
sometimes during their military training.
The methodology of will-breaking is
simple. For example, students have to learn
by heart that the state capitalist economic
system in the PRC is a “socialist system”.
This contradicts students' knowledge of
economics, but they are asked to learn this
18 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
factually incorrect term so many times
without explanation, and are subjected to
pressure exercised as deterrent, complete
with tutoring and group dynamics
processes until they resign and parrot
something they know is factually incorrect.
Mao Zedong said in the 1950’s: “600
million people [...] are poor and blank. [...]
On a blank sheet of paper, free of flaws,
the freshest and most beautiful characters
can be written. The freshest and most
beautiful pictures can be painted.” (Mao
1958)
This tradition is obviously still alive.
5.3 Surveillance
The Social Credit System does not create
any additional surveillance, although it
profits from the existing and expanding
surveillance system. In China, cameras in
public spaces are almost omnipresent.
When asked about the many cameras,
people react instantly with the official
reasoning that the more cameras there are,
the safer the place. Traffic rule violations
and other violations often are caught on
camera and then analyzed for their
relevance in regards of the social credit
system (Louvet 2019).
There are discussions on how far eye-
tracking of elementary school students
during class, mobility trackers and other
tracking apps for them and elderly people,
can be used by teachers, relatives and
others. However, there is also a growing
civil resistance against overboarding
surveillance.
As part of the general surveillance and not
as part of the Social Credit System, even in
school and university classrooms there are
cameras. Foreign lecturers are currently
told in job selection interviews: “Your
predecessor in the position of foreign
lecturer had expressed political
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 19
criticism of the system in class and was
dismissed without notice”. Nevertheless,
foreign lecturers are not yet required to
undergo ideological training and do not
have to become a party member or
participate in party events. Funding
applications for them, however, often
contain statements by the party secretary.
Foreign companies in China also have to
offer the office next to the company
director to the party committee.
But what about the situation for the
Chinese, whose evaluated data in turn feed
into the ideological tutoring or ideology
sessions for students, or ideology sessions
and training for faculty? The weekly
ideology-centered sessions are often about
studying the issues set forth by the
leadership as well as self-reflection, self-
criticism, honest repentance, and promises
to do better. In fact, “self-criticism” has a
solid ground in the PRC (for the tradition
of “self-criticism” with its peak during the
‘Cultural Revolution’ see Dittmer 1973).
When self-criticism is combined with
insights gained from data collection, a new
level of communication has certainly been
reached, that of media epoch 5.0 following
Luhmann and Baecker (where 1.0 is orality,
2.0 script, 3.0 printing techniques, and 4.0
digitization). In media epoch 5.0 (term
coined by Martin Woesler) the value of a
communicative act does not consist any
more out of the messages exchanged, but
out of the analysis gained by algorithms to
complete the personality profile of the
participants involved in the communicative
act. The human participant becomes an
object of analysis with the first aim being
to classify the underlying values, beliefs
etc., the second aim that of predicting
future behavior and the third aim that of
changing this behavior and the underlying
thoughts through priming, manipulation
etc. towards the behavior and the
underlying thoughts deemed more
profitable to the group of people
controlling the algorithms. The paradigm
shifts from causes and results to
correlations and predictions.
Chinese students receive 10% of their
tuition in so-called 'core courses', in which
ideology is taught in addition to sports. In
addition, everyone has their tutor, often an
older student, who watches for the
expected ideological attitude.
In this controlled, steered world in a filter
bubble, it would be hard to imagine a scene
like the one that took place at universities
in the PRC in 1989. Back then, fellow
20 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
students came into the classroom and
asked everyone to join the demonstrations.
The regulations by the police chief from
Xinjiang for education camps, which were
leaked under the “China Cables,” regard
repentance and self-criticism as essential
for inmates.
The relationship between the individual
and society is also strengthened by
emotions, with the poles of fear at one end
and of longing for happiness at the other.
The data gained by surveillance is analyzed
using Big Data techniques and correlations
are found. A profile is created that
translates into both a threat level (the
closer a person gets to 100%, the deeper is
the color red which appears in the police's
facial recognition goggles) and a poor
social credit score.
Figure 5: Face recognition with pop-up boxes with
danger potential (Wuollet 2018).
Based on these correlations, the algorithms
make decisions about individuals. The PRC
approach even attempts to take control of
minds, generally believed to be the last
bastion of free will. Artificial intelligence is
apparently targeting values, dreams, beliefs
and political views.
Here lies the qualitative difference between
the PRC approach to control minds by
means of intrusive surveillance measures
analyzed by Big Data techniques and large
IT companies in the developed world
collecting data for commercial purposes, to
learn about purchasing behavior rather
than system-stabilizing or -labeling
behavior.
It is unclear to what extent such a
technology could work. It even sounds like
the dream of surveillance fanatics.
Nonetheless, basal affects, attention levels,
a neurosensory dead man's button, all these
are within the realm of possibility.
Figure 6: Brain scanners, Chen 2018.
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 21
Knowing that the devices you are wearing
have such functionality also has an effect
on individual behavior and psycho-
emotional disposition. Shanghai technology
company Deayea has confirmed that train
drivers on the Shanghai-Beijing line, for
example, regularly wear these brain
scanners. (Chen 2018). Future study on the
efforts of these brain scanners on the
mental and physical health of these train
drivers will illuminate further the tension
between state control and authenticity of
the individual.
Figure 7: Worker in a Shanghai Factory with work
helmets, in which brain scanners were implemented
(Chen 2018).
5.4 Actions
Social media is censored in real time both
with algorithms and manually. In the
process, any expression of opinion with
potential for collective action is censored.
That is, the algorithm bases its decision
solely on whether something can become
hype, not whether it is politically albeling
(“hype control,” see King 2014,
Hiruncharoenvate 2017, Sauer 2018). The
results are directly translated into sanctions
(see catalogs of sanctions e.g. in figure 8
and in Woesler 2021), which are mainly
aimed at limiting the ability to move or act.
This can make the individual's situation
even worse. If, for example, someone is
punished for not visiting her or his parents
who live far away and s/he is no longer
allowed to buy airplane or train tickets, a
vicious cycle could result.
Catalog of stick and carrot
In 2020, the final version of the SCS went
into effect. Prior to that, private companies
applied to get the commissioning to
develop the SCS with eight different
variants of the system designed as an
“application”, with the best-known being
Alibaba's Sesame Credit System and
Tencent's system.
Regional trials of the SCS also use slightly
different scoring bases and point levels.
Ultimately, however, they are very similar.
22 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
In the final version of the SCS, the list of
rewards cited include preference in
government visits, visa applications (to
Singapore, for example), insurance
premiums, credit rates and levels, access to
luxury hotels, educational pathways, and
government offices.
The catalog of punishments mentioned are:
the display of personal data such as photos
or names in public spaces, (for example, in
Shanghai at certain street intersections to
deter pedestrians from ignoring traffic
lights and on websites; the display of full
names on black lists accessible e.g. on
http://www.creditchina. gov.cn), general
restriction of mobility, (such as the denial
of airline tickets and train tickets);
prohibition of entering public places with
cell phone alerts, etc.; effects on lending,
jobs, and so on. Even clan detention is not
uncommon in the PRC.
Figure 8 is a systematic illustration from the Wall
Street Journal (McAllister 2019):
Figure 8: McAllister 2019.
Figure 9: “Public Shaming” is a common method in
the PRC, as is shown in this app, which displays 119
people in the surrounding with full names (here
partly anonymized), who owe debts. (Chris 2019).
6. Acceptance
Surveillance of the population of the
People's Republic of China is carried out
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 23
blatantly and in full visibility to all. What
seems unthinkable in the liberal
democracies of the West (where it takes
place more secretly, to a lesser degree and
on a much narrower group of individuals),
seems to be generally tolerated in the PRC.
In fact, the acceptance of surveillance is
more widespread than it is in the developed
world.
According to a survey conducted by Freie
Universität in Berlin (Kostka 2018), the
Chinese are satisfied with surveillance,
ideological brainwashing, and the social
credit system. Although some of this
satisfaction may be due to brainwashing,
they give several reasons for their
satisfaction. The general sentiment is that
“I have done nothing wrong. Besides,
when bad guys get caught, I feel safer.
Above all, it will improve our society”.
Figure 10: Free University of Berlin survey,
February-April 2018, n:2209 Chinese internet users.
(Kostka 2018).
A survey in the UK yields an unexpected
result. If the SCS also existed in the UK,
the majority of British people would end
their online friendships if it improved their
score.
24 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
Figure 11: Survey by ABC Finance Ltd. in Great
Britain (Hemming 2019[?]).
But a survey in Germany reveals that most
citizens in this country reject the SCS.
Figure 12: Survey of the Sinus Institute / YouGov,
Online-Interviews representative for Germany 18-
49 years, n=2036, February 4, 2019 (Inhoffen
2019).
Although data protection and data security
are at the forefront of Western values,
there is an incentive in some quarters to
follow the Chinese path. The control
system has proven to be more successful
economically, and the need for security,
unsurprisingly, leans towards a surveillance
system. The Corona pandemic does the
rest. In view of the considerable successes
of Far Eastern digital surveillance
technology, Western, especially German,
data protection is under increasing
pressure.
7. Discussion
Behaviorism 2.0 ?
The psychological mechanisms of
punishments and rewards in the SCS have
a striking similarity to the Weltbild of
Burrhus F. Skinner’s “behaviourism”, the
once famous learning-theory paradigm of
“operant” (or “instrumental”) conditioning
that dominated American academic psy-
chology between 1930 and 1960. Skinneri-
an behaviorism with its rigorous exclusion
of the first-person perspective and its ban
on intentional entities (e.g., feelings,
thoughts, beliefs, values, reasons) turned
out to be too reductive and simplistic with
regard to many momentous issues within
scientific psychology, psychotherapy, and
pedagogy, and lost terrain due to the “cog-
nitive revolution” of cognitive science and,
within an altogether different tradition of
scientific psychology, to psychoanalysis.
In order to assess the normative properties
of an SCS that make it an action-guiding
regime, let us compare it to common
morality (Gert 2005) and its normative
properties. The SCS ostensibly represents
ethical standards and norms, including
common morality, e.g. moral rules like “do
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 25
not lie”, “do not cheat”, “respect the law”,
“do your duty”. Yet other kinds of stan-
dards and norms can also be inserted into
the scope of SCS’s compliance engendering
power for instance, politically desired
standards and norms. The content of an
SCS’s compliance engendering power can
be selectively programmed at the will of
the governments that deploy SCSs for
shaping the behavior of their citizens as
they deem fit.
Another interesting difference between the
action-guiding force of motivationally
internalized common morality and the
action-guiding force of an SCS is that the
former is subject to the constraints of
rationality only in a weak sense (to act in
morally right ways must not be irrational)
whereas the latter is subject to strong
negative constraints of prudential
rationality (to act non-compliantly must be
irrational). In comparison to social ethics
and common morality, SCSs function more
like positive laws with sanctions, and they
prioritize a sense of conformity with any
social convention that gets incorporated
into the social credit point system and
therefore is highlighted as being relevant
for the stability of law and order in society.
Functionally, we can compare the SCS to
an exoskeleton. This metaphor seems apt
here: Similar to a physical or technical
exoskeleton, the SCS is an apparatus that is
external to the person and is designed with
the purpose to support and amplify a
person’s motivation for compliance with
rules (here: compliance with rules that the
government deems wise to program into
the SCS) if the person’s intrinsic
motivation turns out to be too weak for
complying properly.
Note the dynamic nature of Chinese
society, its rapid growth, disruptive cultural
developments, partial cultural lags,
normative fragmentation due to cultural
simultaneity of asynchronous cultural
elements, and, in particular, note the
cardinal importance of avoiding what
sociologists like Emile Durkheim and
Robert Merton diagnosed as “anomie”.
Anomie is social-pathological condition
within society: Anomie means massive
weakening or serious lack of well-
entrenched social norms (moral and
otherwise) that most members of the
respective society find attractive to
integrate into their self-conception and into
their ideals of what living good lives should
be. By being vital to the self-integration of
26 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
the majority of members of a society, such
norms, by the same token, are vital to the
social integration of the respective society
and its paramount institutions (cf.
Heitmeyer 2008, Powell 1970). Hence, the
occurrence of anomie threatens peaceful
and sustainable social integration, and
politically ought to be avoided.
Output legitimation vs. input legitima-
tion
Democratic constitutional states also claim
to have developed digitization to a network
society, a “digital democracy” in order to
strengthen what political theorists call
input legitimation. These societies expand
public discourse through social media,
especially through microblogging. They
foster an awareness of alternatives to
established ways of life, political
arrangements, and the status quo. With
reference to civil society, digitization
provides tools that contribute to
maintaining a sense of civic freedoms, e.g.
the freedom of association and freedom of
expression.
Digitization can become a powerful motor
of dynamic differentiations. Via massive
digitization, pre-modern structures can be
modernized at great pace. Societies that
have not yet developed, over a long
historical period, certain valuable traits of
modern societies (esp. political publics,
democratic governance, rule of law,
division of state powers) can do so more
quickly by harnessing, in the right way, the
forces of digitization.
European style Parliamentary democracies
are concerned not only with their input-
legitimacy but with their output-legitimacy
as well. In output legitimacy, the focus is
on political achievements in solving social
problems. Citizens ultimately decide on the
basis of output whether to re-elect or to
dismiss the government in the next cycle of
general elections. The relationship between
input and output is ensured by democratic
institutions, by control instances (parlia-
ments, opposition, media, courts) and by
political parties as responsive intermedia-
ries between citizens’ demands and the
values and decisions of politics.
Even though democratic constitutional
states are increasingly focusing on output
(post-democracy), there are clear
differences from the PRC. The PRC is pur-
suing digitization for purely performance-
based, output-fixated, social cybernetics.
Typical of authoritarian systems, output
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 27
legitimacy is thus predominant for the
PRC. There is state regulation and control
or censorship of the offline and online
world via algorithms and transparent social
rankings. The use of behavior modification
techniques leads to extensive self-
disciplining and self-regulation
(instrumental power - Zuboff 2019), which,
in China, is tied to the supreme goal to
ensure the long term centralization of
political power by the communist party.
The PRC pursues the social-cybernetic
strategy to secure domination by the party.
‘Governance by Algorithm’ (Musiani 2013)
thus forms the only strategy. A ‘governance
of algorithm’ that digitizes the rule of law
(which is not yet sufficiently developed
even in democratic constitutional states),
contradicts the political logic of the PRC,
which pursues a rule by law.
Conclusion
A Great Leap Forward in Virtue of
Digitization?
China aspires to become the world leader
in digital infrastructure and in the
application of artificial intelligence. This
aspiration, plus the prestige connected to
the vastly ambitious Silk Road project, has
made it seem attractive to try to export
digital SCS technology (e.g., to Cambodia,
Sri Lanka, Poland, Chile). Many states have
placed requests for the system. A SCS-
system has even been recommended to
France (Louvet 2019). All this raises the
question; Are global political weights being
shifted? Is this the dawning of a new age of
cyberneticly supported statecraft? Can
there be state capitalism without
constitutionality characterized by economic
neo liberalism? What does all this have to
do with the digital?
It would truly be a significant leap forward,
possibly even a successful one this time, if
digital technology led to a rapprochement
between, or even reconciliation of,
socialism and capitalism, and if a former
developing country could rise to become a
global economic leader, if the transition
from the third world to a digital first world
succeeded. The SCS could certainly play an
important role in this.
It is debatable whether the digital
transformation of technicized societies
based on the Internet already marks a post-
modern era, or whether these
developments are an unfolding completion
of modernity itself (Eposito 2002:287 ff).
Terms that were introduced to describe
28 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
modern society, which was, and is, still
characterized by the printing press, must
first of all be used to describe the new
conditions with a tried and tested
repertoire of terms, because we do not yet
have appropriate newer ones. For Elena
Esposito, it is also the argument for still
speaking of our times, including those in
China, as modern:
Since we have so far dealt with a
model characteristic of modernity, it is
obvious to speak now of an
investigation in the field of
postmodernity [...]. This labeling is all
the more significant because it reveals,
more than in any other case, the
ambiguous characteristic of the
concept of postmodernity, and
precisely through its connotations of
succession, of overcoming, and
ultimately of novelty, it belongs to the
conceptual apparatus of modernity
(which is, after all, virtually obsessed
with novelty and change). The talk of
postmodernism thus remains within
modernity and confines itself to
merely giving it a new term. (Eposito
2002:287, transl. M. Woesler)
But that would be impressive enough if the
PRC does succeed in making a leap from a
pre-modern society into the digital future
of humankind!
The concept of protocol is a key concept
for understanding communication in the
internet and digital information processing
more generally. Alexander Galloway
described how our society has reached its
current stage of development under the
rule of protocols:
“How would control exist after
decentralization? In former times control
was a little easier to explain. In what Michel
Foucault called the sovereign societies of
the classical era, characterized by
centralized power and sovereign fiat,
control existed as an extension of the word
and deed of the master, assisted by
violence and other coercive factors. Later,
the disciplinary societies of the modern era
took hold, replacing violence with more
bureaucratic forms of command and
control. […] Deleuze has extended this
periodization into the present day by
suggesting that after the disciplinary
societies come the societies of control”.
(Galloway 2004:3) “[P]rotocol is how
technological control exists after
decentralization.” (Galloway 2004:8)
Control and power are maintained via
protocols. The SCS provides a pertinent
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 29
example of what such power can amount
to.
Protocols as instruments of power
characterize what Deleuze called societies
of control that replaced what Foucault had
analyzed as disciplinary societies: “You
don’t need science fiction to imagine a
control mechanism that indicates at every
moment the position of an element in an
open milieu, animal in a reserve, human in
a company (electronic collar). Felix
Guattari imagined a city in which everyone
could leave his apartment, his street, his
neighborhood thanks to his electronic
(divisional) card, through which this or that
barrier opens; but the card could also be
invalid on a certain day or for certain
hours; what counts is not the barrier, but
the computer that detects the position -
allowed or not - of each individual and
performs a universal modulation.” What
sounded like science fiction in 1990 has
long since become, and even surpasses,
such a reality.
It is protocols like the SCS that provide
control of people and institutions (Warnke
2019). With Galloway, we think that such
regimes of control appeal more to desire
(and fear) than to reflective reason:
“Protocol is not a superego (like the
police); instead it always operates at the
level of desire, at the level of ‘what we
want’.” (Galloway 2002:241). We want to
be connected, to communicate, to travel, to
consume, and if we score too low, a SCS
would excludes us from all these goods: we
become immobile, cut off, and finally even
excluded from the community of our
cultural peers.
Note also that protocols act impersonally.
No one can be blamed for an operation of
exclusion, not even any party functionary
in particular. Technic protocols function
anonymously, impartially and, if you will,
ruthlessly. A properly implemented and
reasonably programmed SCS may therefore
be a viable means for curbing rampant
corruption.
Niklas Luhmann characterizes the media
epoch (which supersedes the epoch of the
book and the printing press) by its leading
medium, the computer. Computers split
the perceptible into a surface and an
immeasurable depth. Communication using
computers deactivates the interpretative act
of distinguishing a message from its
information: to the computer, everything is
just data. The act of understanding or
misunderstanding, inherent in human
communication and so tremendously
30 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
productive, collapses into a data processing
that no longer has the intermediate tones
of creative communication between
humans. It merely operationalizes only
digital analysis and correlation-based
decisions by algorithms to social operation
or its rejection (Luhmann 1997:302ff, cf.
Baecker 2007). However, in our present
media epoch call it 5.0 artificial
intelligence tackles the last resorts of
humanness, like thoughts with
consciousness and (self-)awareness, values,
beliefs as well as (emotional) personalities,
reflected in profiles, avatars and
simulations.
Small wonder that a behaviorist, cybernetic,
ethic seems to be the appropriate one for
such a society.
If humanity wants to survive, it needs to
master the new technologies, if only
because certain techniques of digitally
amplified surveillance might prove
necessary in order to prevent digitally
enhanced terrorism set at erasing human
civilization. The question simply is,
whether or not humanity wants to use its
newly acquired digital powers to stabilize
the central governing political agency of a
nation by providing exoskeletons to the
citizens, or to find mechanisms that permit
as much individual freedom as possible and
pose only as few restrictions as are
necessary. Why not employ digitization in
what is truly the general interest of all
individuals and groups the interest in
realizing a sustainable future for humanity?
References
Baecker, Dirk. 2007. Studien zur nächsten
Gesellschaft. Suhrkamp, Frankfurt am
Main
Bamman, David, Brendan O'Connor, and
Noah Smith. 2012. "Censorship and
deletion practices in Chinese social
media." First Monday 17(3).
DOI:10.5210/fm.v17i3.3943.
Beer, David. 2016. Metric Power. London:
Palgrave Macmillan
Bratton, Benjamin. 2015. The Stack: On
Sovereignty and Software. Boston: MIT
press.
Chen, Stephen. 2018. “Forget the
Facebook leak: China is mining data
directly from workers brains” South
China Morning Post (April 28)
https://www.scmp.com/news/china/
society/ article/2143899/forget-
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 31
facebook-leak-china-mining-data-
directly-workers-brains
Chiu, Karen. 2019. China’s social credit
system is becoming a reality. Local
governments are scrambling to realize
Beijing’s sweeping vision. South China
Morning Post (July 10) https://
www.scmp.com/abacus/tech/article/
3029471/chinas-social-credit-system-
becoming-reality
Chinese Government Web 中国政府网.
2014. 务院印发《社会信用体
建设规划纲要(20142020 年)》
[The State Council issued the "Social
Credit System Construction Planning
Outline (2014-2020)”]. (June 27)
http://www.gov.cn/ xinwen/2014-
06/27/content_ 2708964.htm
Chris/inside. 2019. 中國推社會信用「老
賴地圖」,一掃就知身旁多少人欠
[China promotes the social credit
“old rascal map”, a scan to know how
many people around you owe debts].
Inside.com.tw (Jan 18), reposted by
Businesstoday. com.tw,
https://www.businesstoday.
com.tw/article/category/80394/post/
201901190013/, see also
https://www.bbc.com/zhongwen/tra
d/chinese-news-47004328
Dittmer, Lowell. 1973. “The Structural
Evolution of "Criticism and Self-
Criticism".” China Quarterly 56:708-
729.
Esposito, E. 2002. Soziales Vergessen. Formen
und Medien des Gedächtnisses der
Gesellschaft. Frankfurt am Main:
Suhrkamp.
European Union Chamber of Commerce
in China and Sinolytics. 2019. The
Digital Hand. How China’s Corporate
Social Credit System Conditions Market
Actors. (August). https://www.
sinolytics.de/wp-content/uploads/
2019/08/Sinolytics_The-Digital-
Hand-How-Chinas-Corporate-Social-
Credit-System-Conditons-Market-
Actors.pdf
Galloway, Alexander R. 2004. Protocol
How control exists after decentralization.
Boston: MIT press.
Gert, Bernard. 2005. Morality. Its Nature and
Justification. Oxford: Oxford University
Press, Revised Edition.
Heitmeyer, Wilhelm. 2008. Gesellschaftli-
che Integration, Anomie und ethnisch-
32 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
kulturelle Konflikte In: Imbusch P,
Heitmeyer W (Eds): Integration -
Desintegration. Ein Reader zur
Ordnungsproblematik moderner
Gesellschaften. Wiesbaden: VS Verlag für
Sozialwissenschaften. 571-590.
Hemming, Gary. (2019[?]). Could You
Survive the Social Credit Score? abc
Finance Limited, https://abcfinance.
co.uk/blog/surviving-the-social-
credit-score/.
Hiruncharoenvate, Chaya. 2017. Under-
standing and circumventing censor-
ship on Chinese social media. Diss.
Georgia Institute of Technology.
Inhoffen, Lisa. 2019. Social Scoring.
Yougov.de (February 4) https://yougov.
de/news/2019/02/04/social-scoring-
zwei-von-funf-deutschen-wurden-
gern/
King, Gary, Jennifer Pan, and Margaret E.
Roberts. 2014. “Reverse-engineering
censorship in China: Randomized ex-
perimentation and participant obser-
vation.” Science 345.6199.
Kostka, Genia. 2018. China’s Social Credit
Systems and Public Opinion:
Explaining High Levels of Approval
(July 23). Available at SSRN:
https://ssrn.com/abstract=3215138
or http://dx.doi.org/10.2139/ssrn.
3215138
Lin Junyue 林钧跃. 2015. 中共中央网
络安全和信息化委员会办公室 -
网信办 [Lin Junyue - Office of the
Central Committee of the Communist
Party of China for Network Security
and Informatization ONSI], (Oct 28)
http://www.cac.gov.cn/2015-
10/28/c_1116956896.htm
Louvet, Sylvain. 2019. Überwacht: Sieben
Milliarden im Visier. Arte Doku.
Lin Junyue 林钧跃. 2019. Interview. In
Louvet, Sylvain. Überwacht: Sieben
Milliarden im Visier. Arte Doku. Here
mins. 50-56
Luhmann, Niklas. 1997. Die Gesellschaft der
Gesellschaft: Bd. 1 [The Society of the
Society: Volume 1], Frankfurt am
Main: Suhrkamp. 302 pp.
Mao, Zedong. 1958. “Introducing a Co-
operative” (April 15) Hongqi [Red Flag]
7:16-22.
McAllister, Kevin. 2019. To Raise Your
Credit Score, Start by Understanding
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 33
It. A beginner’s guide to understand-
ding how your credit score actually
works. Wall Street Journal (Jan 20)
https://www.wsj.com/articles/to-
raise-your-credit-score-start-by-
understanding-it-11548010800
McGregor, Scott and Ina Mitchell. 2021.
China’s social credit program creeps
into Canada. Sunday Guardian Live
Apr 17, 2021 https://www.
sundayguardianlive.com/news/chinas-
social-credit-program-creeps-canada,
Accessed 18 Apr 2021
Musiani, Francesca. 2013. Governance by
algorithms, Internet Policy Review, 2(3):1-
8.
Nazalya, Sofia. 2019. “China’s social credit
system raises risks for corporates”,
Verisk Maplecroft (August 20)
https://www.maplecroft.com/
insights/analysis/chinas-social-credit-
system-raises-risks-for-corporates/
(accessed March 7, 2021)
Ölander, Folke, and John Thøgersen. 2014.
“Informing versus nudging in environ-
mental policy.” Journal of Consumer Po-
licy 37.3:341-356.
Pohlmann, Markus. 2018. George Orwell in
China. Hypotheses (February 9)
https://heigos.hypotheses.org/8544.
Is based on http://www.cup.com.hk/
2016/10/28/chinese-society-credit-
system/
Powell, Elwin H. 1970. The Design of
Discord. Studies of Anomie. Oxford:
Oxford University Press.
Qiang, Xiao. 2011. "Liberation technology:
the battle for the Chinese internet."
Journal of Democracy 22.2:47-61
Sauer, Anzhelika. 2018. „Zensur in China.
Wo Pu der Bär auf dem Index steht.“
Süddeutsche Zeitung (Sep 24), online
verfügbar unter https://www.
sueddeutsche.de/digital/meinungsfrei
heit-wo-pu-der-baer-auf-dem-index-
steht-1.4141535
Settelen, Michael. 2019. Chinas Social-
Credit-System. Neue Zürcher Zeitung
(December 3), https://www.
nzz.ch/pro-global/asien/chinas-
social-credit-system-ld.1525941
Skinner, Burrhus Frederic. 1974. About
behaviorism. Knopf.
State Council. 2014. Outline of the State
Council’s Plan on the issuance of the
34 EUROPEAN JOURNAL OF CHINESE STUDIES 2 (2019)
Construction of a Social Credit System
(2014-2020), http://www.gov.
cn/zhengce/content/2014-06/27/
content_8913.htm
Wang, Cheng Lu, Noel YM Siu, and
Bradley R. Barnes. 2008. "The signifi-
cance of trust and renqing in the long-
term orientation of Chinese business-
to-business relationships." Industrial
Marketing Management 37.7:819-824,
https://bit.ly/ 3dsxYKm, Accessed 18
Apr 2021.
Warnke, Martin. 2019. „Himmel und Erde.
Das Territorium des Internet“. Internet
und Staat. Baden-Baden: Nomos.
Warnke, Martin. 2020. Heaven and Earth
Cloud and Territory in the Internet. In
Human-Centric Computing in a Data-
Driven Society. IFIP Advances in Infor-
mation and Communication Technology,
Cham: Springer International
Publishing, 117-129.
Wedeman, Andrew. 2004. The Intensifi-
cation of Corruption in China. The
China Quarterly 180:895921
www.jstor.org/stable/20192410.
Accessed 18 Apr. 2021.
Woesler, Martin, and Martin Warnke. 2022.
Social cybernetics in statu nascendi. The
Genesis of the Chinese Social Credit System.
Berlin: Matthes & Seitz (German)
Wuollet, Konsta. 2018. La policía de Pekín
comienza a usar gafas de reconoci-
miento facial. Today Posts (July 9),
https://www.todayposts.com/mx/
2018/07/09/la-policia-de-pekin-
comienza-a-usar-gafas-de-
reconocimiento-facial/
Xi, Jinping. 2014. The Governance of China.
Peking: Foreign Languages Press, 515
pp.
Zhang, Weiying, and Rongzhe Ke. 2003.
"Trust in China: A cross-regional
analysis." SSRN, https://deepblue.lib.
umich.edu/bitstream/handle/2027.42
/39972/wp586.pdf?sequence=3,
Accessed 18 Apr 2021.
Zhu, Jiangnan. 2012. “Do Severe Penalties
Deter Corruption? A Game-Theoretic
Analysis of the Chinese Case.” China
Review 12(2):132.
www.jstor.org/stable/23462215.
Accessed 18 Apr. 2021.
WOESLER/WARNKE/KETTNER/LANFER. THE CHINESE SOCIAL CREDIT SYSTEM. EJCS 2 (2019) 7 - 35 35
Zittrain, Jonathan, and Benjamin Edelman.
2003. "Internet filtering in China."
IEEE Internet Computing 7.2: 70-77
Acknowledgements
This paper is intended to be part of the
discourse on system comparison between
China and the EU (and other systems) and
benefited from the following support:
Bertelsmann Foundation (non-material
support in the form of the implementation
of a workshop on system comparison),
corresponding researcher: Martin Woesler,
participants: Matthias Kettner, Jens Lanfer
German Science Foundation Researchers’
College “Media Cultures of Computer
Simulation”, research project no.
221949125, Directors: Martin Warnke,
Claus Pias
European Commission, Grant Agreement
No. 620942, “EU Studies Chair - Multilevel
experiences from the EU integration
process, from EU intercultural and
multilingual communication and coope-
ration”, Hunan Normal University, Martin
Woesler
European Commission, EU Horizon 2020,
grant agreement no. 740934 “TRIVA-
LENT”, Funding program SEC-06-FCT-
2016, co-applicant 2/21 (third party, with
PIC 999854079), 2016-2020, Wit-
ten/Herdecke University Coordinator:
Martin Woesler
Red Hen Lab, Case Western Reserve, USA,
and Hunan Normal University
Article
Full-text available
Scientists peeked at AI marketing around the world and found it's super strong: boosting sales, grabbing attention, and all that. But guess what? People also freak out about their privacy and wonder if they're being played. So the big question is: how can we use this AI magic without freaking everyone out? That's what this whole "ethical algorithms" thing is about. Finding ways to leverage AI's power while keeping things cool and trustworthy for all. Think of it like a friendship: you want the fun and support, but you also want to feel safe and respected. That's the kind of relationship we need with AI marketing. In our research paper, we will attempt to discuss the topic by presenting three case studies, through which we explore how to balance the power of artificial intelligence in marketing with consumer trust. تسلل العلماء إلى عالم تسويق الذكاء الاصطناعي في مختلف أنحاء العالم، واكتشفوا قوته الهائلة في زيادة المبيعات وجذب الانتباه، لكن الأمر لا يخلو من المخاوف! فهناك قلق حقيقي بشأن الخصوصية، ويتساءل الناس عما إذا كانوا يتعرضون للتلاعب. وبالتالي، السؤال الكبير هو: كيف يمكننا الاستفادة من سحر الذكاء الاصطناعي دون إثارة الذعر؟ هنا يكمن جوهر مفهوم "الخوارزميات الأخلاقية": إيجاد طرق لاستغلال قوة الذكاء الاصطناعي مع الحفاظ على ثقة واحترام الجميع. في بحثنا، سنتطرق إلى هذا الموضوع من خلال تقديم ثلاث دراسات حالة نستكشف من خلالها كيفية تحقيق التوازن بين قوة الذكاء الاصطناعي في التسويق وثقة المستهلك. Keywords artificial intelligence ; ethical algorithms ; consumer trust ; privacy ; marketing ; الذكاء الاصطناعي ; الخوارزميات الأخلاقية ; ثقة المستهلك ; الخصوصية ; التسويق
Article
การควบคุมทางสังคมเป็นหนึ่งในกลไกที่สำคัญที่นำมาสู่การสร้างความเป็นระบบของสังคม เพื่อให้ประชาชนสามารถอยู่ร่วมได้อย่างสงบสุข ระบบเครดิตทางสังคมเป็นหนึ่งในรูปธรรมของการควบคุมทางสังคมที่รัฐสร้างขึ้นเพื่อให้พลเมืองเกิดการควบคุมการแสดงพฤติกรรมของตนเอง การดำเนินระบบเครดิตทางสังคมดำเนินไปควบคู่กับกระบวนการให้รางวัลและลงโทษ เพื่อให้สมาชิกในสังคมเกิดความตะหนักถึงผลที่จะตามมาของการกระทำและการยับยั้งชั่งใจในการแสดงพฤติกรรมของตนเองที่อาจก่อให้เกิดผลกระทบเชิงแก่ตนเอง การนำระบบเครดิตทางสังคมไปใช้ในแต่ละประเทศนั้นมีความแตกต่างกันออกไปตามบริบทการเมืองการปกครองและสังคมวัฒนธรรมของประเทศนั้น ๆ หากประเทศไทยนำแนวคิดระบบเครดิตทางสังคมมาประยุกต์ใช้ในสังคมไทยจำเป็นจะต้องมีการวางแผนแนวทางการดำเนินที่เหมาะสมกับบริบทสังคม งานวิจัยชิ้นนี้จึงมุ่งศึกษาแนวทางการนำระบบเครดิตทาสังคมมาใช้ในประเทศไทย โดยอาศัยการทบทวนกรณีศึกษาประเทศสหรัฐอเมริกาและสาธารณัฐประชาชนจีน ร่วมกับการสัมภาษณ์หน่วยงานและผู้ที่มีส่วนเกี่ยวข้องทั้งภาครัฐ ภาคเอกชน ภาคประชาสังคม ภาคประชาชน และผู้มีส่วนได้ส่วนเสีย เพื่อนำเสนอแนวทางในการประยุกต์ใช้ระบบเครดิตทาสังคม จากการศึกษา พบว่า แนวทางการดำเนินระบบเครดิตทางสังคมของประเทศไทยจะมุ่งนี้ไปที่การกระตุ้นให้ประชาชนแสดงพฤติกรรมเชิงลบ ผ่านการแปลงพฤติกรรมให้กลายเป็นคะแนนที่จับต้องได้ และคะแนนพฤติกรรมเชิงลบเหล่านี้สามารถนำไปแลกสิทธิประโยชน์เพื่อแบ่งเบาภาระในการดำเนินชีวิตประจำวันได้
Article
The Social Credit System (SCS, 社会信用体系, shèhuì xìnyòng tĭxì), is an extremely interesting, ultimately nationwide pilot project, consisting of establishing the system of social rating, which, based on data collected over decades and stored both analog and with the use of state-of-the-art technologies will create profiles of citizens and businesses in the People’s Republic of China. The system focuses on four main spheres – national enterprises and economy, society, the judiciary, and public administration. It is in them that a higher level of social trust and security will be ensured, law regulations better observed, corruption eliminated, and proper transparency guaranteed. In analyzing the issue of the Western world’s attitude to the mechanism of digital surveillance and control of business and social activity in China, I should seek answers to the following questions, intriguing from the cognitive and practical perspective: Which of the above interpretations seems to be closer to the truth?; can the SCS have, at least partially, a universal character in the European Union, especially in the societies with a different system of values and the countries with a different political system than the one of the PRC?
Chapter
The purpose of the article is to study the legal consequences of decisions made as a result of the operation of automated information systems (including robots). The main problem is to determine the subject responsible for the legal consequences of such decisions. In many cases, no person can foresee or influence the results of artificial intelligence. Methods: the authors used the method of system analysis, the formal legal method. Results: The generality of the problem of incorrect solutions of robots and complex information systems is substantiated. This will make it possible to use the accumulated practical experience in the legal regulation of state information systems in relation to the problem of responsibility of robots. The authors proposed a classification of threats of incorrect decisions, as well as the basis of a model for the distribution of legal responsibility based on multiple subject composition (initiator, organizer, interested party, controller, persons bearing risks from the consequences of incorrect decisions of automated systems) and the coincidence of subjects (roles) in different legal regimes.KeywordsRobotAutomated systemSolutionLegal responsibilityInformation legal relationsState information systems
Chapter
This chapter introduces the social credit system (SCS) as one of the Chinese government's disruptive-innovative answers to control its citizens and organizations to secure the retention of political power. Based on source texts and surveys, “external control” and “extrinsic motivation” are identified as core principles of SCS. The unique qualities of the SCS are described in the context of the existing surveillance and control systems in China. The example of dropouts is discussed. The impact of artificial intelligence on communication, the efficiency of the SCS, its effects on everyday life in China are described. The SCS violates the UNESCO agreement, of which China is a signatory. Also the European Union has passed an Artificial Intelligence Ethics Act. The chapter shows the limits of the system and that it is not transferable to liberal democratic societies. However, IT companies and interest groups in data capitalism have also developed small-scale credit systems for economic profit and political manipulation.
Chapter
Zur chinesischen Digitalisierungsstrategie gehört der Aufbau und Ausbau eines „Sozialkredit-Systems“, in das Daten aus allen möglichen Bereichen über jeden Bürger und jede Organisation in China einfließen, die durch Algorithmen aufbereitet werden, um erwünschtes Verhalten zu belohnen und unerwünschtes Verhalten zu sanktionieren. Wenn sich alle selbst anstrengen, Punkte zu sammeln und Vorteile zu erlangen, kann das den Aufwand reduzieren, den Partei und Staat ansonsten für Kontrolle, Überwachung und Bestrafung leisten müssten. Entgegen den öffentlichen Verlautbarungen dient dieses System nicht einem größeren Vertrauen untereinander, einer besseren Zahlungsmoral oder der Bekämpfung der Korruption, sondern letztlich geht es um den Machterhalt der Kommunistischen Partei Chinas (KPCh).
Article
Is the convergence of new technologies and an authoritarian state bound to create an all-encompassing surveillance system? Is this happening in China with the Social Credit System (shehui xinyong tixi, abb. SCS)? Grounded in the field of Science and Technology Studies (STS), this article aims to describe the nature of the project by focusing on its inception and retracing how the initial visions materialized into the system that is now in place. It will do so by seeking to identify the sociotechnical imaginaries rooted in the SCS with the premise that these imaginaries, in particular the ones proposed by authoritative actors, shape the development trajectory of the SCS. Next, it asks whether the dominant sociotechnical imaginaries are control and power legitimation. By touching upon the role of officials, academics, private companies, and citizens in negotiating what is practicable and what is desirable, this article argues that the SCS does not follow a determined trajectory toward technologically enabled dictatorship. It is the result of a process that Sheila Jasanoff has described as co-production, as the various actors embed their values into the project by imagining, engineering, using or even rejecting elements of the SCS. This article finds that before even knowing all the possibilities offered by new technologies, a certain future was envisioned and shared. Rather than the need for control and surveillance, actors emphasized the importance of trustworthiness, the advancement of a post-industrial society, quality of life, and a sense of community. In a certain way, technology was expected to offer a solution to most, if not all social problems. The room left for experimentation supports the argument that sociotechnical imaginaries have the potential to impact the development trajectory of the SCS project. The article concludes that, after more than 20 years since its inception, the SCS is still a policy under construction, whose interpretation and use is yet to be stabilized.
Chapter
Full-text available
When John Perry Barlow declared Cyberspace as independent from the common territory and sphere of influence by economy and state in 1996 he could not know what happened afterwards. All the dreams of immateriality and exclusion from state power had to recede from a reality of internet infrastructures that became more and more massive, resource consuming and dominant. What developed into the metaphor of The Cloud at the same time settled as a highly influential new power rivalling with democratic institutions of the state on its territory. According to Galloway it is the new means of power, the protocol, that reigns technology and society. The key question of this paper is if there is a close connection between the family of internet protocols and the regulatory means of state. My tentative answer is: yes, indeed, there are close connections between the two spheres that seemingly were incompatible: heaven (The Cloud) and earth (the state territory) couple strongly. The approach is done by Luhmannian Systems Theory, the term being “interpenetration” and “structural coupling”. The example will be the Chinese Social Credit System. The main thesis is that the Chinese Social Credit System couples its protocol to the laws and regulations of state and economy, also conceptualized as being protocols, via the internet as its common language. It turns out that the coupling and interpenetration could be highly efficient thus for the first time enabling a co evolution of a highly mobile turbo capitalist economy and a strict authoritarian state territory, a marriage between heaven and earth.
Article
Full-text available
p>Algorithms are increasingly often cited as one of the fundamental shaping devices of our daily, immersed-in-information existence. Their importance is acknowledged, their performance scrutinised in numerous contexts. Yet, a lot of what constitutes 'algorithms' beyond their broad definition as “encoded procedures for transforming input data into a desired output, based on specified calculations” (Gillespie, 2013) is often taken for granted. This article seeks to contribute to the discussion about 'what algorithms do' and in which ways they are artefacts of governance, providing two examples drawing from the internet and ICT realm: search engine queries and e-commerce websites’ recommendations to customers. The question of the relationship between algorithms and rules is likely to occupy an increasingly central role in the study and the practice of internet governance, in terms of both institutions’ regulation of algorithms, and algorithms’ regulation of our society.</p
Article
Full-text available
Despite severe punishments such as the death penalty, corruption is not effectively deterred in China. This research discusses the ineffective deterrence of corruption from a game-theoretic perspective. I first form a corruption-investigation game based on Tsebelis’s model on crimes and sanctions. Next I extend the basic model by linking the two players’ payoffs. Finally, I construct a static game of incomplete information by considering different types of investigator. With the unique advantage of game theory, this research finds that to deter corruption, (1) simply increasing the penalty can counterintuitively decrease the frequency of investigation; (2) it is important to promote incentives for the investigator, such as rewarding anticorruption monetarily or politically; and (3) it is also important to maintain a sufficient proportion of officials who have incentives to fight corruption.
Article
Full-text available
While business relationships with China are receiving increased attention in both practitioner and academic discourse, very little empirical work however, has been undertaken to isolate and examine measures that focus on business-to-business relationships, and as such, research in this area is somewhat scant. In an attempt to bridge this gap, and add to the knowledge in this emerging discipline, the research aims to develop a conceptual framework to explore the relationship between trust and the long-term orientation in Chinese business-to-business market relationships. Based on a survey with Hong Kong companies that have a buyer-seller relationship with Chinese companies, the empirical findings indicate the mediating role and significance of ‘renqing’ for enhancing trust and contributing towards the long-term stability in relational exchange. The results highlight several implications for practicing managers to consider when aiming to establish and develop relationships in a Chinese business-to-business context.
Article
Information has not been proven a very successful means to promote voluntary behaviour change to protect the environment. On this backcloth, there is currently increasing interest in recommendations from behavioural economics focusing on making the choice architecture more facilitating for the desired behaviour. The authors present three studies demonstrating how mental shortcuts, based on subtle cues in the context, unconsciously influence human decision-making, with important consequences for the environment. Two of our own studies illustrate the behavioural impacts of (a) anchoring (the design of the European energy label) and (b) default effect (the framing of a request to participate in the Smart Grid), and data from Göckeritz et al. (Eur J Soc Psych 40:514-523, 2010) are used to illustrate the impacts of (c) herding or descriptive norms (the social context of energy saving). The authors end by pointing at theoretical weaknesses in behavioural economics and calling for research to strengthening the theoretical underpinnings of this approach to behaviour change.
Article
Censorship of social media in China Figuring out how many and which social media comments are censored by governments is difficult because those comments, by definition, cannot be read. King et al. have posted comments to social media sites in China and then waited to see which of these never appeared, which appeared and were then removed, and which appeared and survived. About 40% of their submissions were reviewed by an army of censors, and more than half of these never appeared. By varying the content of posts across topics, they conclude that any mention of collective action is selectively suppressed. Science , this issue 10.1126/science.1251722
Article
Although most analysts agree that corruption has worsened since the advent of reform, this article argues that whereas the first stages of reform witnessed a quantitative increase in corruption, during the 1990s corruption underwent a qualitative change as high-level, high-stakes corruption increased more rapidly than other forms of official malfeasance. Drawing together data from the Party discipline inspection system, the state supervisory system and the judicial procuratorial system, the article examines in detail trends in forms of official misconduct broadly defined and corruption more narrowly defined as the use of public authority for private gain, charting not only overall trends in malfeasance and corruption but also trends in the number of "major cases," cases involving senior cadres, and the amounts of corrupt monies. Its finding that corruption has intensified raises important questions about the efficacy of enforcement, the link between the deepening of reform and the intensification of corruption, and the economic consequences of intensification.