TY - BOOK AU - Kokas,Aynne TI - Trafficking data: how China is winning the battle for digital sovereignty SN - 9780197620502 (hardback) AV - HD 30.3815 K79t 2023 U1 - 323.44/80951 PY - 2023/// CY - New York, NY PB - Oxford University Press KW - Inteligencia empresarial KW - Data mining KW - China KW - Minería de datos KW - Protección de datos personales KW - Privacidad de datos KW - Data sovereignty KW - United States KW - Data privacy KW - Business intelligence KW - Personal information management KW - Political aspects KW - Disclosure of information KW - Data trafficking N1 - Includes bibliographical references and index; The data trafficking dilemma What happens in Vegas stays in China: fragmented US tech oversight Becoming a cyber sovereign: China's politics of data governance From farms to outer space: how China networks sovereignty in the United States Social media: the algorithm as national security asset Gaming: the porous boundaries of virtual worlds Money: the risks of data trafficking for China Health: surveilling borderless biodata Home: data through the back door Toward data stabilization N2 - "Trafficking Data argues that the movement of human data across borders for political and financial gain is disenfranchising consumers, eroding national autonomy, and destabilizing sovereignty. Focusing on the United States and China, it traces how US government leadership failures, Silicon Valley's disruption fetish, and Wall Street's addiction to growth have yielded an unprecedented opportunity for Chinese firms to gather data in the United States and quietly send it back to China, and by extension, the Chinese government. Such "data trafficking," as the book names this insidious phenomenon, is enabled by the competing governance models of the world's two largest economies: mass government data aggregation in China and impenetrable corporate data management policies in the United States. China is stepping up its data trafficking efforts through national regulations, soft power persuasion, and tech investment, extending the scope of state control over domestic and international data and tech infrastructure, and thereby expanding its global influence. The United States, by contrast, is retreating from participation in foreign alliances, international organizations, and the systemic regulation of the tech industry-practices with the potential to counter data trafficking. Confronting data trafficking as the defining international competition of the twenty-first century, this book ultimately advocates for an alternative future of data stabilization. To stem data trafficking and stabilize data flows, it shows, policymakers can synthesize tools from across the private sector, public sector, multi-national organizations, and consumers to protect users, secure national sovereignty, and establish valuable international standards"-- ER -