Education, Science, Technology, Innovation and Life
Open Access
Sign In

Information Securitisation in China-US Relations: Adjusting the Neoliberal Order

Download as PDF

DOI: 10.23977/infkm.2025.060105 | Downloads: 14 | Views: 625

Author(s)

Sijia Liu 1

Affiliation(s)

1 Luoyang Normal University, Luoyang, Henan, 471000, China

Corresponding Author

Sijia Liu

ABSTRACT

This paper focuses on the securitisation of information and explores the impact of information technology on the political, economic, and social dimensions of China-US relations. It begins by reviewing the security challenges posed by the development of information and communication technology (ICT) and examines the differing perspectives of realism, liberalism, and constructivism in international relations theory, highlighting their respective limitations. The study then focuses on the TikTok incident, analysing the divergent stances and policy interactions between China and the United States regarding information governance and securitisation. By integrating theoretical frameworks with case studies, the paper proposes a comprehensive analytical approach to uncover the critical role of information security in the current global political and economic system and its implications for structural transformations in international relations. The findings demonstrate that the securitisation of information technology not only reshapes power distribution among states but also profoundly influences interaction patterns between state and non-state actors.

KEYWORDS

China-US relations, information securitisation, information and communication technology (ICT)

CITE THIS PAPER

Sijia Liu, Information Securitisation in China-US Relations: Adjusting the Neoliberal Order. Information and Knowledge Management (2025) Vol. 6: 28-34. DOI: http://dx.doi.org/10.23977/infkm.2025.060105.

REFERENCES

[1] Adler, E. (2002) "Constructivism and International Relations," in Carlsnaes, W., Risse, T., and Simmons, B.A. (eds) Handbook of International Relations. London: Sage. 
[2] Aronson, J.D. and Cowhey, P.F. (2010) "The Information and Communication Revolution and International Relations," in Oxford Research Encyclopedia of International Studies. Oxford University Press. 
[3] Bauman, Z. et al. (2014) "After Snowden: Rethinking the Impact of Surveillance," International Political Sociology, 8(2), pp. 121–144.  
[4] Boyd, D. and Crawford, K. (2012) "Critical Questions for Big Data," Information, Communication & Society, 15(5), pp. 662–679.   
[5] Buzan, B., Wæver, O. and de Wilde, J. (1998) Security: A New Framework for Analysis. Lynne Rienner Publishers. 
[6] Cha, V.D. (2020) "Allied Decoupling in an Era of US–China Strategic Competition," The Chinese Journal of International Politics, 13(4), pp. 509–536.  
[7] Choucri, N. and Goldsmith, D. (2012) "Lost in cyberspace: Harnessing the Internet, international relations, and global security," Bulletin of the Atomic Scientists, 68(2), pp. 70–77.  
[8] Clapton, W. (2011) "Risk in International Relations," International Relations, 25(3), pp. 280–295. 
[9] Eriksson, J. (2001a) "Cyberplagues, IT, and Security: Threat Politics in the Information Age," Journal of Contingencies and Crisis Management, 9(4), pp. 200–210.  
[10] Eriksson, J. (2001b) "Securitizing IT," in Eriksson, J. (ed.) Threat Politics: New Perspectives on Security, Risk and Crisis Management. Aldershot: Ashgate. 
[11] Eriksson, J. and Giacomello, G. (2006) "The Information Revolution, Security, and International Relations: (IR) relevant Theory?" International Political Science Review, 27(3), pp. 221–244.  
[12] Freund, C. et al. (2023) "Is US Trade Policy Reshaping Global Supply Chains?" Policy Research Working Paper, World Bank Group [Preprint].  
[13] Janbek, D. and Williams, V. (2014) "The Role of the Internet Post-9/11 in Terrorism and Counterterrorism," The Brown Journal of World Affairs, 20(2), pp. 297–308.  
[14] Jarvenpaa, S.L. and Ives, B. (1993) "Organizing for Global Competition," Decision Sciences, 24(3), pp. 547–580.
[15] Kaska, K., Beckvard, H. and Minarik, T. (2019) Huawei, 5G and China as a Security Threat, NATO Cooperative Cyber Defence Centre of Excellence. 
[16] Keohane, R.O. and Nye, J.S. (1998) "Power and Interdependence in the Information Age," Foreign Affairs, 77(5), p. 81.   
[17] Keohane, R.O. and Nye, J.S., Jr (1973) "Power and interdependence," Survival, 15(4), pp. 158–165.  
[18] Lewis, J.A. (2024) TikTok and National Security, Center for Strategic & International Studies. Available at: https://www.csis.org/analysis/tiktok-and-national-security (Accessed: August 20, 2024). 
[19] Lonsdale, D.J. (1999) "Information power: Strategy, geopolitics, and the fifth dimension," Journal of Strategic Studies, 22(2–3), pp. 137–157. 
[20] Lundgren, B. and Möller, N. (2017) "Defining Information Security," Science and Engineering Ethics, 25(2), pp. 419–441. 
[21] Lyon, D. (2014) "Surveillance, Snowden, and Big Data: Capacities, consequences, critique," Big Data & Society, 1(2), p. 205395171454186.  
[22] McMahon, L. (2024) US TikTok ban: When and why could the app be outlawed? BBC News. Available at: https://www.bbc.co.uk/news/technology-53476117 (Accessed: August 20, 2024). 
[23] Mearsheimer, J.J. (2001) The Tragedy of Great Power Politics. W. W. Norton & Company. 
[24] Morelli, M. and Van Weelden, R. (2013) "Ideology and information in policymaking," Journal of Theoretical Politics, 25(3), pp. 412–439.  
[25] Neilson, D. (2021) "Reversing the catastrophe of neoliberal-led global capitalism in the time of coronavirus: Towards a democratic socialist alternative," Capital & Class, 45(2), pp. 191–213.  
[26] Nye, J.S. (2009) Soft Power: The Means To Success In World Politics. Hachette UK. 
[27] O’Neill, B. (2001) "Risk Aversion in International Relations Theory," International Studies Quarterly, 45(4), pp. 617–640. 
[28] Qian, X. (2019) "Cyberspace Security and U.S.-China Relations," in Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science. New York, NY, USA: ACM. Available at: http://dx.doi.org/10.1145/3349341.3349495 (Accessed: March 26, 2024). 
[29] Ranstorp, M. (2007) "The virtual sanctuary of al-Qaeda and terrorism in an age of globalization," in Eriksson, J. and Giacomello, G. (eds) International Relations and Security in the Digital Age. Routledge, pp. 51–76. Available at: http://dx.doi.org/10.4324/9780203964736-10 (Accessed: March 26, 2024). 
[30] Rennstich, J.K. (2010) "The World System in the Information Age: Structure, Processes, and Technologies," in Oxford Research Encyclopedia of International Studies. Oxford University Press. 
[31] Salganik, M.J. (2019) Bit by Bit: Social Research in the Digital Age. Princeton University Press. 
[32] Sniegocki, J. (2008) "Neoliberal Globalization: Critiques and Alternatives," Theological Studies, 69(2), pp. 321–339. 
[33] von Solms, R. and van Niekerk, J. (2013) "From information security to cyber security," Computers & Security, 38, pp. 97–102. 
[34] Soussan, T. and Trovati, M. (2021) "Social Media Data Misuse," in Lecture Notes in Networks and Systems. Cham: Springer International Publishing, pp. 183–189. 
[35] Strange, S. (1996) The Retreat of the State: The Diffusion of Power in the World Economy. Cambridge University Press. 
[36] Strange, S. (2015) States and Markets. Bloomsbury Publishing. 
[37] Taddeo, M. (2012) "Information Warfare: A Philosophical Perspective," Philosophy & Technology, 25(1), pp. 105–120.  
[38] Thrush, G. and Maheshwari, S. (2023) "Justice Dept. Investigating TikTok's Owner Over Possible Spying on Journalists," The New York Times, 17 March. Available at: https://www.nytimes.com/2023/03/17/us/politics/tik-tok-spying-justice-dept.html (Accessed: March 26, 2024). 
[39] Tiller, J.S. and Fish, B.D. (2004) "Packet Sniffers and Network Monitors," in Tipton, H.F. and Krause, M. (eds) Information Security Management Handbook. Boca Raton: Auerbach. 
[40] Waltz, K.N. (2010) Theory of International Politics. Waveland Press. 
[41] Wendt, A. (1992) "Anarchy is what States Make of it: The Social Construction of Power Politics," International Organization, 46(2), pp. 391–425. 
[42] Williams, M.C. (2003) "Words, Images, Enemies: Securitization and International Politics," International Studies Quarterly, 47(4), pp. 511–531.  
[43] Yan, X. (2019) "Strategic Competition between China and the United States in the Digital Age," World Political Studies, 2.

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.