编者按:
原文《中国模式的更进一步:COVID-19的历史分水岭作用(一)》、《从防疫、反恐到在气候问题上拯救人类——中国模式的更进一步:COVID-19的历史分水岭(二)》发布于2021年4月,本译文由“兔友” 王平 & 唐姬柯德 提供翻译。英文仅供参考,文义以中文正文为准。
Today, I would like to discuss the Chinese model and the way forward, focusing on the issues of information, digital, privacy and governance.
First of all, the author is not engaged in related work, mainly combining his own knowledge system and personal experiences ,to analyze from the social, cultural and political perspectives.So forgive me for using words or concepts used by non-technical amateurs.
I.The 2020 pandemic as a watershed event in human history: China is accelerating into its own model
The 2020 COVID-19 pandemic has the potential to be a very important watershed event in human history, it is also push China to accelerate steps to its very unique own path.
This watershed comes from the fact that China has fully enjoyed the vital functions of the information and digital tools in the fight against COVID-19.
——Data will evolve into a public good, a public resource;
——China will accelerate its developments in digital/information infrastructures, digital governance practices, big data, artificial intelligence and other information technology industries;
——China will accelerate the development of a governance model that differs from those of the most other countries( especially western countries led by the US).In addition to the obvious differences between the forms of the political systems, specifically, in the field of data, China will form a completely different relationship between public power and private power.If we put public and private powers on the two sides of the same scale, China will be more inclined to public power than in the West:Our society will expect individuals to "cede" more rights to the public, and expect people to "contribute" and "invest" more of their privacy into the society's "public data pool." This "surrender" and "investment" in personal privacy bring with them corresponding social obligations and responsibilities.1)Individual are considered to have a duty and responsibility to "contribute" some of their privacy to society, forming "public data", which is fundamentally aimed at improving the well-being of society, while also bringing some personal benefits;2)Public regulators have an obligation and responsibility to use these data correctly as a means of promoting public and civic well-being.
——China will also accelerate on a path of its own, very different from other countries in the world.Is it possible that China's model could spread to other countries?I think it's possible.And, as the West fears, it may begin in developing countries outside the Western world, such as in Asia, Africa and Latin America.
We'll come back to that later.
Take a look at the evolution progress of digital privacy protection concept in China.I will give my opinion combined with my own personal experience.Readers are also welcome to share their memories.
II.The relationship between personal (digital) privacy and public/public power: Western systems, cultures and models
The mainstream political cognition in the west is that civil society and individual and public power have some kind of opposite relationship.As long as the public power is improperly restrained, it will become a threat to individuals and affect their rights and well-being.Some of the core themes of the modern western political system are about how to restrain, limit and regulate public power (" to put power into the cage of the system ").
——Why, for example, is the electoral system so important?That is, the West believes that only with the right to vote, can we ensure that the public power can be restrained and that the public power can serve us.
——separation of powers——To let the different institutions of power separate, check and balance each other, self-restraint.So as to limit public power;
——Judicial independence: among them, the judiciary must be independent, free from interference, become a tool to restrain public power;
——Freedom of the press: giving the media the maximum freedom to criticize the government freely, as a check on public power;
——The sanctification of individual political and civil rights.These rights are in fact what the West calls "human rights".Human rights in the West are in fact "narrow", mainly around these so-called "negative rights" : the person, speech, association, protest, freedom of belief - believe that these rights are born and should not be deprived.Many of these rights, such as freedom of speech, are also primarily directed at government: a business can restrict the speech of its employees, but government/public power cannot restrict the speech of its citizens.It's all about protecting the individual against public power.
In short, people distrust public power/government.The logic of the Western system firstly is not to reflect public opinion or seek consensus, but to limit public power.
The greatest enemy of the people is the government.
So do people in the West, and especially in the United States, the leader of the western free world, trust their governments?No.No matter how secure the data may be and how safe it may be from hackers, the United States will not use real-name authentication or facial recognition for presidential voting.There will be no mandatory health codes.In fact, the United States can't even produce a national ID card.The people do not trust their elected government.This is a great paradox.
According to the westerners' understanding, citizens and the government/public power are in essence "opposition". Only through the current political system in the West can this opposition be resolved and "power is confined in a cage".What about systems that are different from the West, such as "authoritarian regimes"?
The West, of course, sees public power in these systems as great threats to individual liberty.People can't trust the government, they can't be willing to cede their power to the government.
——I am An American, and I have elected my own officials at all levels of government through our democracy. I do not trust my government and would not be willing to cede my personal data and digital privacy to it. How much less any other countries?
III.Personal (digital) Privacy and public/public Power: Changes and developments in China
The Americans have good reason to worry.
In addition to digital security (which is a technical issue), in any society, people can form a relatively smooth relationship with the government/public power on digital privacy issues, which is a very complicated process.
Stage 1: institutional and cultural support.The situation in China is as follows:
1) People should have some trust in the government and be willing to give it a chance;
2) People don't have much choice but to give the government a chance (e.g. "Real-name system for Internet forums /BBS")
3) Most people are pragmatic and would not challenge the government in the first place. They don't think they will encounter too many problems.
4) The relationship between government and society/individual is not antagonistic, but symbiotic;
5) The relationship between enterprises and the government is not antagonistic. The government helps enterprises, while enterprises support the government, and the government and enterprises are also "symbiotic".However, according to the symbiotic relationship between government and enterprises, it is inferred that enterprises may provide data to the government, so giving data to enterprises = giving data to the government.
The second stage: practice and running-in.Personal vs public power in the continuous run-in, established the boundary between each other, establish trust;
1) The government/public authority knows when to use the data and when not to use it.Specifically, the purpose of government is not to spy on its citizens, but to serve them (including fighting crime)
2) The public authority should be especially careful about using data on the most sensitive issues -- political speech -- to "regulate what it does and ignore what it does";After repeated practice, even if people participate in political issues, they can reliably determine their "margin of safety" : for example, content -- can criticize policies at the technical level, but cannot challenge the fundamental political order or political limits;Scope -- what kind of environment and scope to say what scale;Punishment mechanism - what kind of words have what kind of consequences.
3) Most people will find that there are no privacy or security issues associated with giving up this data.In fact, companies offer extra protection(“self-censorship”) when it comes to sensitive political issues.
Stage three: People are comfortable surrendering their digital privacy
Once individuals establish the security and safety margin of their digital privacy in front of the public power, they will complete the "from zero to one", and then have a leapfrog change.
1) People are becoming more comfortable surrendering their digital privacy in all areas
2) The requirement of digital privacy has also changed from voluntary to taken for granted or even forced (for example, many things require mobile phone authentication + ID number + face recognition on APP).
3) The government "emerges" as a direct participant.In the early days, there was some concern about providing digital privacy to corporations, that they would give their data to the government and cause some kind of trouble.Later, the government could emerge, and people no longer feared giving data directly to the government.
Stage 4: Individuals and governments accelerate the continuous enjoyment of the benefits of individuals to society/government's transfer of digital privacy, and accelerate the development of society in digital infrastructure, digital governance, and digital-related technology industries
1) People find that they can get a lot of convenience and improve efficiency
2) Society has discovered that "giving away" digital privacy can bring unexpected "public benefits", such as lower crime rates;For example, epidemic prevention and control
3) The government/society find that data is an important public resource and public product, and an excellent means of public governance and public service
4) The above will further promote the digitization of social and public governance, and promote the development of related infrastructure and industries.
IV.China: The process by which individuals "cede" digital privacy
Previously the upper several stages are more abstract, the author will give specific examples as following.Maybe not so exactly, because I was abroad for a while.Readers are welcome to share their own experiences.The transfer of personal digital privacy started with the real-name system on the Internet, and then pushed into other areas, and gradually became a matter of course.
1:1990's: A personal experience
The Internet was still a “new thing.I got dial-up Internet access from the phone in the early 90s.("Doo-doo, drip, stomp stomp , squeak).At that time, I could read all kinds of overseas websites.It was the early nineties.One day, someone from the public security department or other any relative department, came to the door,
The visitor: is there someone on the Internet in your house?
My mom: Yeah, what’s wrong?
The visitor: who are you to surf the Internet.
My mom: My son.What's the matter?
The visitor: Oh, just some web pages.We now only try to know a few things.
My mom: Oh, he's a kid. Just surf the Internet.What's the matter?
The visitor: That's nothing, we're just getting some information.
This was happened in 1990s.Very early.The visitor didn’t ask very specifically then left.But this made an impression on me.
2:1990s: Habitual anonymity
In the mid - 1990s, I was mainly on Telnet BBS.Web forums came later.At that time Net Ease BBS revision forum version we are not used to.
All the information I signed up for on the Internet forums was anonymous.One ID, one email address.All the information I gave (name, date of birth, etc.) was made up.Because I don't believe in digital security -- everything I signed up for on overseas sites or software (ICQ, Hot mail, Yahoo), not just in China,was made up.I am also wary of public power because of my historical experience, and I was afraid that any real-name information would bring me troubles.I'm sure most of you did the same.
Two days ago, I modified the information of a user registered in the website of mine.I found out my birthday was a deliberate mistake.Today, I do things differently. To make sure my account is safe, I replaced it all with real information.
3. Early 2000s: REAL-name system in BBS
The two things that impressed me most at that time were:1st, Li Xiguang's idea that the network must have real name system, which was too long ago. I looked it up and confirmed it was 2002.2nd was the real-name system of BBS. I looked it up and confirmed it was 2005.Can be found at https://www.zhihu.com/question/21263660 ,this policy was actually has been building for years, the implementation had been a great event then.I was using Shuimu Tsinghua BBS, many users were extremely resistant, felt that this would bring great "unsafe".The insecurity was not about digital security, but about public power and the impact on free speech.Unlike today, it was difficult for people to accept the real-name system.At that time, people's concern was real, because they had not experienced what the author called the "practice and running-in" of the second stage.The author also believes that the REAL-name system of BBS is an important historical event for the earlier netizen.
In addition, Internet bars adopted the real-name system earlier, mainly to prevent minors from entering Internet bars.The author was abroad at that time, I had impressions return home ,was asked for id card as came into Internet bar.
4. Mid-2000s:Real-name system for blogs
This was in the period of 2006-2008.At that time, I was in the United States, running several similar blogs (Shuimu Tsinghua BBS, Sina, Blogbus), etc.I remember at that time, China wanted to introduce the real-name system for bloggers, but many people opposed it.Since blogging was an important channel on the internet in China at the time, writers like Hanhan were also of the blogging age.Therefore, the society paid more attentions to blog.Since I was abroad at the time, I didn't have much feeling about that, let alone participate in the relevant discussions.
5. Mid-2000s: Facebook's overseas social media experiences
The first fully real-name social media account I ever officially used was actually -- a Facebook account.
I was at Harvard -- the Harvard community where Facebook started.The students were all on Facebook.I also used Facebook to connect with my classmates.That was in 2005.
The essence of Facebook is REAL-name system.At that time, I felt very new to the real-name system, and also a little insecure.But because of the limitation in the circle of classmates, I felt that the problem is not big.
There was also A Faceren, also developed by North American students at Harvard University, that mimicked Facebook.A Xiaonei network (later Renren) was also created during that time in China.
These small networks based on alumni were all real-name.In 2005, I also thought that The Facebook model might be suitable for students in the United States, but it might not be suitable in China, because people were concerned about digital privacy and Chinese people were more worried about the abuse of digital privacy by public power, which was not as clearly defined as in the United States.
Interestingly, China's online real-name system emerged around the same time as overseas real-name social media.
Perhaps overseas social media helped to popularize the online real-name system?I don't know.I was not in China during that period.
6. Late 2000s: Alipay -- a major advance of real-name payment system
An important factor pushing for a full real-name system is likely to be internet-based and mobile (mobile Internet) payments.
By this time, I had already returned to China.A history check will know that Alipay launched mobile payment in 2008;Credit card express payment was introduced in 2010.By 2013, Alipay had more than 100 million users.In that year, Alipay also launched Yu 'ebao, a nationwide phenomenon in the financial field.
Payment is very important to promote the full real-name system.
1) Internet-based payment is extremely convenient (especially with smart phones).People are attracted by the benefits of this convenience;
2) After several years, people get used to the online real-name system and find that there are no problems.Had good practice and running-in experience with public power;
3) Payment involves personal finance, first of all, security.A credit card must be attached;Bind real name.People surrender a certain amount of privacy for their own financial security.At this point, the surrender of privacy is purely selfish and self-protective;
4) Buying and selling goods has nothing to do with "sensitive issues" such as politics, and individuals prefer to gain personal benefits by giving up their privacy.
Payments have had a major impact on changing the way people think about digital privacy and security.
At this time, people no longer "surrender" privacy, but "surrender" as a "price" or "investment" for additional security.
7. Early 2010s: Wechat Pay strengthens the real name
If Yu 'ebao established Alipay's position in 2013, then the "wechat Red envelope" in 2014-2015 established wechat (payment)'s position.
The addition of wechat has made mobile payments the dominant form of payment in China.Payments helped push the online real-name system.
8. Mid-2010s: Mobile phone real-name system was promoted
It took several years for the mobile phone real-name system (from new to existing) to be implemented (around 2013~2016).By the end of 2016, The real-name ratio of mobile phones in China had almost reached 100%.
In the days before the United States had a national ID card, mobile phone numbers in China were already traceable to individuals and thus treated as ID numbers (though one person could have more than one).
Mobile phone verification + ID number has become the guarantee of real name identity.Most of the time, mobile verification has a high status in itself.Of course, today's highly developed internet finance also brings hidden dangers of digital security.
9.The second half of 2010: the addition of face recognition
I don't know exactly when facial recognition became widespread.
My own impression of using Apps is that first, Internet finance/wealth management Apps need to use face recognition.Later, I used The App Of Freely (distributed long rent apartment), face recognition, blink, move my head, felt a little new.At that time, investment, rental housing, such a major thing, face recognition was necessary.But I don't know how the background data was unified.
Then I found myself needing facial recognition when I checked into some hotels.I first experienced this in Hangzhou.
And then it turned out that you could or needed facial recognition for airplane security.
Then found in office buildings, residential areas, the use of face recognition property had been very common.
At the same time, I found that my mobile phone number, ID number and face in more and more places in the background had been unified.
The last time I used face recognition was when I used shell's "Quilt decoration" APP to confirm the identity of my decoration owner.Blink and shake your head.At this point, I take everything for granted.
10. COVID-19 Prevention 2020
Not only do you need to wear a mask, but you also need to show a health code.
Beijing's regulations have always been and are stricter than local ones’, and it's not just about showing health codes.Even today, many places have to scan the code to register.
Digital means may be the most successful means and the most important lesson of China's epidemic prevention and control in 2020.
Most other countries do not have such means.Either there are no such information/digital infrastructures, or there are no such public acceptance and compliance.
China have them all: infrastructures, public acceptance and compliance.This is why China has succeeded in fighting the epidemic until now.
There are very few societies around the world that do both.China is probably unique in the world.This is a vivid portrayal of China exceptionalism.
That is why China has performed so well in the fight against the epidemic.
The result will be:
1) Individuals believe that the transfer of their digital privacy is beneficial to the security and well-being of themselves/society/the public/nation/country and even the whole human society;
2) The government finds that digital is a valuable tool and resource for improving public governance and maintaining public safety and well-being.
This is what I am saying: COVID-19 2020 will push China further down a different path from the West.Twenty years ago, we also feared and even resisted the real-name system on the internet.Today, we take for granted the ubiquity of real-name registration and the surrender of privacy.
Why did it become so?
1) We generally believe in technology and data security;
2) Through a lot of practice and run-in, we have established and defined our relationship with public power;We are confident that the public will not abuse our data, and as law-abiding citizens we have nothing to worry about;
3) We fully feel the benefits of real names: safety, convenience, and no cost or loss;
As long as we don't break the law, the real-name system will do us more good than harm.
5) The provision of data information by citizens has become the norm of society, a matter of course or even an obligation;
6) We even think that without these real name protections, there are some hidden risks.We will begin to fear or reject the non-real name system.
A few years ago, WHEN I used a mobile App for human face recognition, I might have felt a little strange, wondered whether it was necessary, and felt a little awkward.Now I use Apps, and if the system asks for facial recognition, I actively cooperate, taking everything for granted: "You have to recognize human faces.That's how it works.It would be risky not to."
This is the effects of osmosis.We've become more used to it;Our standards and considerations are different than they were a decade or two ago.The Chinese may not know it: we are entering a very different world from the West.But that may well be the world of the future.
Further of the China Model : The Historical Watershed role of COVID-19(II)
来源: mp.weixin.qq.com/s/?id=5f56bfda206ae314ba19e3691b993dcf&source_url=https%3A%2F%2Fmp.weixin.qq.com%2Fs%2Ftgo6f1h-IHf1gqWMgZmC8w