SlideShare une entreprise Scribd logo
1  sur  24
China’s National Search Engine
               Jike

                  Min Jiang (Ph.D.)
 Assistant Professor of Communication, UNC Charlotte
Affiliate Researcher @ CGCS, University of Pennsylvania

                  Kristen Okamoto
 M.A. Student, Dept. of Communication, UNC Charlotte

    1 0 th C h i n e s e I n t e r n e t R e s e a r c h C o n f e r e n c e ( # C I R C 1 0 )
             USC Annenberg School of Communication
The Party & The Vatican
Jike


 Background


 Branding: National identity


 Funding: Political economy of propaganda


 Surveilling: Panopticon
Jike ranks 643rd in China
            7,412th globally (Alexa, 2012)
Total # of Chinese websites: 2.3 million (CNNIC, 2012)
80% of 513 million Chinese Internet users use search engine
A More Politicized, Nationalized Web

 Jan 12, 2010: Google-China conflict

 Jan-21, 2010: Clinton “Internet freedom”

 June 8, 2010: “Internet in China” white paper

  Internet   sovereignty
 June 20, 2010: Goso  June 20, 2011: Jike

 Dec 16, 2011: Real name registration on Weibo

 April 20, 2012: People’s Daily Online IPO
National Identity
(Semioticized) National Identity
Design




60% of Chinese Internet users under age 30
Deng Yaping: Jike CEO
“National Team”




         Not to make money but
         to fulfill our national
         duty
The Political Economy of Jike



 Ownership & control


 Market regulation


 Power relations
Jike: State-Owned Enterprise (SOE)

 Funding Jike
   50 million yuan ($7.92 milion)
   81% - People’s Daily (newspaper)
   19% - People’s Daily Online (online arm of PD)

 People’s Daily Online IPO in 2012
   Raised 1.4 billion yuan ($222 million) > NYT

 Who owns People’s Daily Online?
   66% - People’s Daily
   12% - Global Times
   4% - Bank of China
   3% - China Mobile
Party Publicity Inc.
Propaganda for Sale
Panopticon

 Theoretical Underpinnings

    Foucault and the panopticon

 Panopticon and Cyberspace
   “Surveillance society”


    The Internet and
     authoritarianism

    China’s existing forms of
     panoptic control
Log Record
Jike and Panoptic Control


 Corporate Self-
 censorship

 Centralization of data
 surveillance

 Limitations of the
 panopticon
Summary


              Perspective    Key Concepts     Application in Jike

                                                  Party Image:
 National                    Sign, Symbol,
               Semiotics                      Friendly, High-tech,
 Identity                   Design, Meaning
                                               and Nationalistic
   State                      Ownership,           Capitalistic
               Political
Ideological                    Control,       Production of Party
               Economy
Apparatus                   Commodification         Ideology
                                              State Surveillance of
Panopticon Postmodern         Surveillance      Netizen Data &
                                                     Desires
Limitations and Future Research

 Users
  Perception

  Knowledge

  Efficacy

 Search engine performance
  Search
        query data
  Comparative data (Baidu, Google)
Implications of Jike

 From filtering, blocking, regulating to manufacturing

 Propaganda: high-tech, scientific, user-friendly

 From coercion to attraction

 Let the market subsidize propaganda work

 Search market: regulator and player

 Commodification of surveillance

 The degenerative Web

Contenu connexe

Similaire à China's National Search Engine Jike

Using Social Media in the Chinese Online Travel Market
Using Social Media in the Chinese Online Travel MarketUsing Social Media in the Chinese Online Travel Market
Using Social Media in the Chinese Online Travel MarketDr Matt McDougall
 
Inbound Tour Operators Council of New Zealand (ITOC)
Inbound Tour Operators Council of New Zealand (ITOC) Inbound Tour Operators Council of New Zealand (ITOC)
Inbound Tour Operators Council of New Zealand (ITOC) Dr Matt McDougall
 
Australian Tourism Export Council - 2010 Meeting Place Presentation
Australian Tourism Export Council - 2010 Meeting Place PresentationAustralian Tourism Export Council - 2010 Meeting Place Presentation
Australian Tourism Export Council - 2010 Meeting Place PresentationDr Matt McDougall
 
Marcom Beijing 2010- Social Media Session
Marcom Beijing 2010- Social Media SessionMarcom Beijing 2010- Social Media Session
Marcom Beijing 2010- Social Media SessionDr Matt McDougall
 
Exponential technologies institute
Exponential technologies instituteExponential technologies institute
Exponential technologies institutemoldovaictsummit2016
 
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)Niraj Vaidya
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)Han Woo PARK
 
Intelclinic - NeuroOn
Intelclinic - NeuroOnIntelclinic - NeuroOn
Intelclinic - NeuroOnIntelclinic
 
UNWTO/PATA Event - Technology in Tourism
UNWTO/PATA Event - Technology in TourismUNWTO/PATA Event - Technology in Tourism
UNWTO/PATA Event - Technology in TourismDr Matt McDougall
 
Social Media Analytics: The Value Proposition
Social Media Analytics: The Value PropositionSocial Media Analytics: The Value Proposition
Social Media Analytics: The Value PropositionContent Savvy
 
China Digital Economy
China Digital EconomyChina Digital Economy
China Digital EconomyMelanie Swan
 
Top Technology Trends Affecting Nonprofits
Top Technology Trends Affecting NonprofitsTop Technology Trends Affecting Nonprofits
Top Technology Trends Affecting NonprofitsAbila
 
Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Simon Kemp
 

Similaire à China's National Search Engine Jike (20)

Using Social Media in the Chinese Online Travel Market
Using Social Media in the Chinese Online Travel MarketUsing Social Media in the Chinese Online Travel Market
Using Social Media in the Chinese Online Travel Market
 
Inbound Tour Operators Council of New Zealand (ITOC)
Inbound Tour Operators Council of New Zealand (ITOC) Inbound Tour Operators Council of New Zealand (ITOC)
Inbound Tour Operators Council of New Zealand (ITOC)
 
Australian Tourism Export Council - 2010 Meeting Place Presentation
Australian Tourism Export Council - 2010 Meeting Place PresentationAustralian Tourism Export Council - 2010 Meeting Place Presentation
Australian Tourism Export Council - 2010 Meeting Place Presentation
 
Marcom Beijing 2010- Social Media Session
Marcom Beijing 2010- Social Media SessionMarcom Beijing 2010- Social Media Session
Marcom Beijing 2010- Social Media Session
 
DigiMarketing Seminar AsiaSoft
DigiMarketing Seminar AsiaSoftDigiMarketing Seminar AsiaSoft
DigiMarketing Seminar AsiaSoft
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 
Exponential technologies institute
Exponential technologies instituteExponential technologies institute
Exponential technologies institute
 
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
1. FINTECH Course NMIMS - CONTEXT (Guest Lecture by NIRAJ VAIDYA)
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)
 
Intelclinic - NeuroOn
Intelclinic - NeuroOnIntelclinic - NeuroOn
Intelclinic - NeuroOn
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
Technology in Tourism
Technology in TourismTechnology in Tourism
Technology in Tourism
 
UNWTO/PATA Event - Technology in Tourism
UNWTO/PATA Event - Technology in TourismUNWTO/PATA Event - Technology in Tourism
UNWTO/PATA Event - Technology in Tourism
 
What in The World?
What in The World?What in The World?
What in The World?
 
Social Media Analytics: The Value Proposition
Social Media Analytics: The Value PropositionSocial Media Analytics: The Value Proposition
Social Media Analytics: The Value Proposition
 
Chung-Hong Chan and King-Wa Fu: Differential opinions among Hong Kong online ...
Chung-Hong Chan and King-Wa Fu: Differential opinions among Hong Kong online ...Chung-Hong Chan and King-Wa Fu: Differential opinions among Hong Kong online ...
Chung-Hong Chan and King-Wa Fu: Differential opinions among Hong Kong online ...
 
China Digital Economy
China Digital EconomyChina Digital Economy
China Digital Economy
 
Top Technology Trends Affecting Nonprofits
Top Technology Trends Affecting NonprofitsTop Technology Trends Affecting Nonprofits
Top Technology Trends Affecting Nonprofits
 
Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)
 
Brunswick seminar 2.3.12
Brunswick seminar 2.3.12Brunswick seminar 2.3.12
Brunswick seminar 2.3.12
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

China's National Search Engine Jike

  • 1. China’s National Search Engine Jike Min Jiang (Ph.D.) Assistant Professor of Communication, UNC Charlotte Affiliate Researcher @ CGCS, University of Pennsylvania Kristen Okamoto M.A. Student, Dept. of Communication, UNC Charlotte 1 0 th C h i n e s e I n t e r n e t R e s e a r c h C o n f e r e n c e ( # C I R C 1 0 ) USC Annenberg School of Communication
  • 2. The Party & The Vatican
  • 3.
  • 4. Jike  Background  Branding: National identity  Funding: Political economy of propaganda  Surveilling: Panopticon
  • 5. Jike ranks 643rd in China 7,412th globally (Alexa, 2012) Total # of Chinese websites: 2.3 million (CNNIC, 2012)
  • 6.
  • 7. 80% of 513 million Chinese Internet users use search engine
  • 8. A More Politicized, Nationalized Web  Jan 12, 2010: Google-China conflict  Jan-21, 2010: Clinton “Internet freedom”  June 8, 2010: “Internet in China” white paper  Internet sovereignty  June 20, 2010: Goso  June 20, 2011: Jike  Dec 16, 2011: Real name registration on Weibo  April 20, 2012: People’s Daily Online IPO
  • 11. Design 60% of Chinese Internet users under age 30
  • 13. “National Team” Not to make money but to fulfill our national duty
  • 14. The Political Economy of Jike  Ownership & control  Market regulation  Power relations
  • 15. Jike: State-Owned Enterprise (SOE)  Funding Jike  50 million yuan ($7.92 milion)  81% - People’s Daily (newspaper)  19% - People’s Daily Online (online arm of PD)  People’s Daily Online IPO in 2012  Raised 1.4 billion yuan ($222 million) > NYT  Who owns People’s Daily Online?  66% - People’s Daily  12% - Global Times  4% - Bank of China  3% - China Mobile
  • 18. Panopticon  Theoretical Underpinnings  Foucault and the panopticon  Panopticon and Cyberspace  “Surveillance society”  The Internet and authoritarianism  China’s existing forms of panoptic control
  • 20.
  • 21. Jike and Panoptic Control  Corporate Self- censorship  Centralization of data surveillance  Limitations of the panopticon
  • 22. Summary Perspective Key Concepts Application in Jike Party Image: National Sign, Symbol, Semiotics Friendly, High-tech, Identity Design, Meaning and Nationalistic State Ownership, Capitalistic Political Ideological Control, Production of Party Economy Apparatus Commodification Ideology State Surveillance of Panopticon Postmodern Surveillance Netizen Data & Desires
  • 23. Limitations and Future Research  Users  Perception  Knowledge  Efficacy  Search engine performance  Search query data  Comparative data (Baidu, Google)
  • 24. Implications of Jike  From filtering, blocking, regulating to manufacturing  Propaganda: high-tech, scientific, user-friendly  From coercion to attraction  Let the market subsidize propaganda work  Search market: regulator and player  Commodification of surveillance  The degenerative Web