In today’s world, no organization or enterprise is completely safe from cyber-attacks or their possible consequences. In fact, one may even argue that the effects of Cyber Security incidents on our increasingly interconnected world have the potential to negatively affect every single individual on this planet. As a result, and aided by a progressively complex landscape of regulatory and legal requirements in this field and beyond, raising awareness of Cyber Security threats and, by extension, building Cyber Resilience, have developed from a traditionally rather technical matter into an increasingly important strategic topic for businesses, on the one hand, and into a critical diplomatic challenge for States, on the other hand.
The EU Network and Information Security Directive was the first piece of EU-wide Cyber Security legislation and aims to enhance Cyber Security across the EU. The national supervision of critical sectors, such as energy, transport, water, health, and critical digital service providers, including online market places, as well as the enhancement of national Cyber Security capabilities and facilitation of cross-border collaboration, are the key topics covered by the NIS Directive. Moreover, the NIS Directive is part of the EU Cyber Security Strategy, which states “achieving Cyber Resilience” as one of its five priorities. However, the fact that the NIS Directive was only adopted in 2016, with a deadline for national transposition by EU member States as recent as May 9, 2018, illustrates that Cyber Security and Cyber Resilience are relatively new topics in international collaborative efforts surrounding security and stability in Europe. One may argue that this recency inherently implies a certain lack of preparation for Cyber Security incidents; thus, vulnerability.
“The technology of today serves not only a Weberian predictability imperative – to further rationalise society. It makes society less safe and its individuals less free” – recently stated my former professor Anis H. Bajrektarevic discussing the EU cyber-related legislation.Hence, a preparation, in other words – strategic investment in preventative measures and resources, is considered an essential aspect of Cyber Security as well as critical to Cyber Resilience. While Cyber Security is primarily concerned with the protection of information technology and systems, Cyber Resilience aims to ensure the effective continuation of an organizations operations and to prevent demobilization of business- or organization-critical functions in the event of security incidents. To be more specific, it is “the ability to prepare for, respond to and recover from cyber attacks” and other security incidents, such as data breaches, that is commonly referred to as Cyber Resilience.
In this context, it has been argued that the creation of a resilience-conscious culture is a key element of successful Cyber Resilience strategies. Creating such a cyber resilient culture involves raising awareness of Cyber Security threats, such as phishing and malware, and communicating ways to minimize risks stemming from them to people outside of Cyber Security functions. The main goal here is to facilitate a cyber resilient mindset through awareness-building measures, leading to the question: If promoting awareness of Cyber Security threats ultimately enhances Cyber Resilience, how can we, first of all, assess the status quo of Europe’s Cyber Resilience and subsequently, monitor the progress and effectiveness of such awareness building measures, in order to better understand, compare and ultimately enhance the Cyber Resilience of individual States and Europe in its entirety?
This essay will argue that “a false sense of security” in the private sector is a warning sign regarding the Cyber Resilience of States, hence, a warning sign regarding the status quo of Europe’s Cyber Resilience. Moreover, it will argue that “a false sense of security” can serve as a valuable indicator for the effectiveness of, and increased need for Cyber Security awareness measures. This will be accomplished through the following approach:
Firstly, the essential need for and feasibility of active preparation for seemingly unlikely crisis situations, will be emphasized. To illustrate this point, the controversy surrounding the classification of the COVID-19 pandemic as “black swan event” will be discussed. Secondly, the discussion of several recent Cyber Security related incidents and their implications, will highlight that businesses and governments worldwide must, more than ever, and especially due to the C-19 related acceleration of digitalization, improve their Cyber Resilience. The main goal here will be to draw attention to the worldwide existing deficiencies regarding Cyber Resilience and, based on this, illustrate the need for and value of finding new ways to assess Cyber Resilience, but also key aspects of Cyber Resilience. Thirdly, current insights from the recently published study “Cyber Security in Austria” will be discussed and contrasted with the respective risk assessment from The Global Risks Report 2019 to illustrate apparent discrepancies in security related self-perception in the private sector versus the reality of the risk situation. It is important to note here that “a false sense of security” means feeling safe in an unsafe environment. Therefore, such discrepancies represent “a false sense of security”. As a final step, possible implications and limitations of the presented ideas will be discussed.
A black swan event is an unpredictable, highly improbable and rare event that has serious and potentially catastrophic consequences. One main characteristic of black swan events is the widespread insistence that their occurrence was obvious in hindsight; thus, should have been foreseen. In the recent past, this concept, which the Lebanese-American philosopher, professor and former Wall Street trader, Nassim Nicholas Taleb, developed and already described in 2007, has, in connection with the C-19 pandemic, again become a topic of conversation – not least because of social media, such as Twitter (#blackswan). While there seems to be general disagreement as to whether the ongoing C-19 pandemic constitutes a “real” black swan event, Taleb himself stated in an interview that the eventual outbreak of a global pandemic with all its consequences was, in fact, a predictable “white swan” event, arguing that companies, corporations and especially governments, had no excuse, not to be prepared.
Regardless of swan color, however, in connection with the aforementioned ability to prepare for cyber attacks, it can be argued that a particularly relevant consequence of the C-19 pandemic, in terms of Cyber Security and subsequently, security in Europe, has been the acceleration of digitalization throughout the world, affecting the public and private sector, as well as the private sphere of people’s homes. Exit restrictions and other social-distancing measures imposed by governments worldwide, in an effort to curb the spread of the virus, have caused the global demand for remote working technologies to skyrocket within a remarkably short period of time. For example, the video conferencing solution provider Zoom experienced, within just a few weeks, a surge from around 10 million daily active users at the end of December 2019, to over 200 million daily active users in March 2020. It was not long before data privacy and data security related problems with Zoom became apparent: “Zoom bombing” or video hijacking, which refers to the unwanted and disruptive intrusion of a person into a Zoom video meeting, a lack of end-to-end encryption and, in this regard, misleading information advertised on part of the provider, along with various IT security related vulnerabilities that allowed hackers, among other things, unauthorized remote access to end user’s Mac computers – including webcam and microphone access, Zoom’s deployment of in-app surveillance features, as well as questionable handling and alleged trade with the obtained user data were, already by April 2020, seen as a considerable cause for concern, leading security experts to describe Zoom as “a privacy disaster”, and “fundamentally corrupt”. Moreover, Arvind Narayanan, associate computer science professor at Princeton University, was quoted as saying: “Zoom is malware”. The most memorable piece of news concerning Zoom was, however, arguably about the British prime minister Boris Johnson accidentally posting sensitive information, including the Zoom meeting ID and the login names of several participants, when sharing a screenshot of his first-ever digital cabinet meeting via Twitter.
The example of Zoom illustrates how companies, organizations, governments and private individuals benefit to an unprecedented extent from the advantages of digitalization, especially in the context of the ongoing C-19 pandemic, but also beyond such global crisis situations, while at the same time being faced with the considerable challenges and security risks brought about by the new technologies of what is known as the Fourth Industrial Revolution. This Fourth Industrial Revolution, being “characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres”, is changing the ways we live, work and interact, resulting in significant risks to the privacy of natural persons, as well as to security and stability in general.
Several recently occurring or publicly emerging Cyber Security incidents underpin the scope of these risks: A cyber-attack on the British airline EasyJet, in the course of which personal data including email addresses and travel plans of 9 million EasyJet customers and additionally, credit card details of over 2,000 customers, were stolen, became known in May 2020. This once again demonstrates that companies of all kinds can at all times become targets and victims of cyber-attacks. Costly penalties for violations of the General Data Protection Regulation (EU) 2016/679 (GDPR), as well as claims for damages and lawsuits by those affected and, last but not least, the loss of reputation often caused by such security incidents, pose significant challenges for companies under any circumstances. These challenges can, however, easily become existence-threatening, especially in view of the C-19 induced crisis situation, in which particularly the aviation industry currently finds itself in, as recently highlighted, when Austrian Airlines received EUR 450 million in financial aid from the Austrian government.
On the one hand, the EasyJet security incident illustrates that Cyber Resilience has, in recent years, developed from a formerly predominantly technical matter into a business-critical strategic topic and, in today’s world, competitive advantage for companies, whereas on the other hand, the case of Austrian Airlines requiring millions of Euros of state aid to continue their operations, illustrates how crisis situations faced by private companies can and do affect States.
As a matter of fact, we live in a time where the vulnerability of critical infrastructure is a real concern among security specialists and States, as illustrated by the following example: A joint memo, sent out in May 2020 by German intelligence and security agencies, warned German operators of critical infrastructure against hacker attacks. The memo included a description of the hackers’ approach as well as information indicating long-standing compromises in corporate networks of companies operating in the energy, water and telecommunications sector, in other words, critical sectors covered by the EU Network and Information Security Directive 2016/1148 (NIS).
It is in light of security incidents like these, that the results of and contradictions arising from this year’s “Cyber Security isn Austria” study (KPMG, 2020), may be perceived as especially worrying: According to the study, 27% of 652 companies surveyed place great trust in their Cyber Security measures, while 58% “rather” trust their Cyber Security measures. At the same time, 57% of participating companies became victims of cyber attacks in the past 12 months, of which 74% where phishing attacks. It is important to note here, that, when it comes to the prevention of phishing attacks, security experts consider regularly training employees on security awareness, essential. In the context of such Cyber Security awareness measures, it seems especially interesting that the study highlighted the significance of employees in the detection of cyber attacks, as opposed to merely focusing on employees as a potential weakness: 79% of companies stated that they had become aware of a cyber attack through their own employees, while internal security systems ranked second (72%) as a means of detection. Awareness building measures must, therefore, remain a high priority for companies.
Furthermore, the study established that one third of companies believe it would take them 1 to 4 weeks to safely remove attackers from their systems, while a fourth of companies even believe it would merely take them between 2 and 6 days. These findings are in direct contradiction with the considerably longer and demonstrably increasing average “dwell time” (100 to 170 days) of attackers in corporate networks. Regarding Cyber Resilience, it is worth noting here, that although 69% of companies surveyed invest in awareness and security monitoring to protect themselves against cyber attacks, only 25% prepare for possible damage through cyber insurance coverage. Also, the study found that 82% of companies would like to see established a government agency dedicated exclusively to Cyber Security issues and 77% would like to be supported more by the State, while at the same time, 57% state that they do not trust the authorities when it comes to Cyber Security. Additionally, it was found that the primary expectation (64% of companies) companies have toward the State is the provision of information and EU-wide support as well as exchange between experts from the State and private sector, in order to learn from each other. Considering the companies’ expectations regarding the exchange of information between experts, it seems particularly striking that about 90% declined to comment on the effects that past Cyber Security incidents had in terms of damage caused to their reputation. Based on this finding, it was concluded that a trustful exchange of information must be encouraged and observed, that changes to the existing legal framework would help facilitate open communication on cybercrime.
All in all, it was concluded that Austrian companies mistrust others, but do not protect themselves sufficiently, that they demand cooperation, however, shy away from open communication and that they feel more secure than they are. In other words, “a false sense of security” in the Austrian private sector, emerged as a key finding.
It was already established earlier that “a false sense of security” means feeling safe in an unsafe environment. Therefore, it seems only logical to look in more detail at the threat environment, also known as risk environment, in which businesses in today’s world operate in. For the sake of coherence and comparability, the following section will, first of all, examine Austria’s situation before briefly considering the global risk environment:
The “Risks of Doing Business 2019” report (World Economic Forum) rates cyber-attacks as the most critical business risk in Austria (46.7%) and data fraud or theft as second critical (34.1%). Taking into account the previously discussed findings regarding levels of trust companies place in their security measures (27% trust “greatly”, 58% “rather” trust) and unrealistic company estimates of attacker “dwell time” in corporate networks, “a false sense of security” clearly reemerges. The top Risks of Doing Business 2019 on a global scale are fiscal crises (28.9%), closely followed by cyber attacks (28.2%) as the second critical risk and unemployment or underemployment (28.2%) as the third critical risk, while data fraud or theft ranks seventh (22.4%), firmly establishing technological risks among the most critical risks globally.
Overall, and especially against the background of the global risk environment and increasing interconnectedness of the public and private sector, “a false sense of security”, or to be more precise, “a false sense of Cyber Security” in the private sector must, therefore, be considered a significant threat for the security of private companies and, consequently, the security in Europe, a warning sign regarding the status quo of Europe’s Cyber Resilience and, one may argue, valuable instrument in assessing the effectiveness of Cyber Security awareness measures.
While the scope and purpose of this essay did not allow for an in-depth analysis of how “a false sense of security” may practically be translated into a quantifiable, clearly defined key performance or risk indicator, it may serve as a starting point in doing so. Also, it may rightfully be argued that any indicator of performance or risk must be evaluated in the context of already established key performance and risk indicators, as well as existing efforts, procedures and best practices in the field, in order to fully assess its value and usefulness. Again, the scope of this essay did not allow for an in-depth analysis in this regard. Nevertheless, it may prove useful as a starting point in doing so. Other limitations and challenges arising from the scope, purpose and choice of approach as well as ideas advanced in this essay, include the risk of bias when generalizing from Austria to Europe and the risk of response bias (demand bias) when utilizing survey questions to identify “a false sense of security” with the same participants.
Nevertheless, despite these limitations, it seems possible to derive the following conclusions from the analysis conducted in this essay: a) the security and stability in Europe depend on the ability of States to continuously improve and maintain their Cyber Resilience, b) Europe’s Cyber Resilience is closely tied to the Cyber Resilience of each States’ private sector and, as a result, the actors operating within them, c) improving cooperation and trust between the public and the private sector as well as between States is necessary to improve Europe’s Cyber Resilience and, d) an organization with the appropriate authority, financial and professional capacity as well as reach, such as, one may argue, the OSCE, must act as the initiator and governing body of projects aiming to utilize “a false sense of security” to assess Europe’s Cyber Resilience and existing security awareness measures.
All in all, one may conclude that in order to ensure and enhance security and stability in Europe in our increasingly interconnected world, especially in the face of rapid technological progress, new technologies and the recent acceleration of digitalization, an urgent need to continuously improve and monitor Europe’s Cyber Resilience exists. This will call for more and more cooperation between the public and private sector, as well as between States and will, consequently, likely even heighten the significance of international organizations, such as the OSCE, in initiating, financing, overseeing and supporting Cyber Resilience initiatives in Europe.
 ENISA. NIS Directive. n.d. https://www.enisa.europa.eu/topics/nis-directive (accessed June 25, 2020).
 European Commission. EU Cybersecurity plan to protect open internet and online freedom and opportunity. February 7, 2013. https://ec.europa.eu/commission/presscorner/detail/en/IP_13_94 (accessed June 25, 2020).
Bajrektarevic, Anis. Twinning Europe and Asia in Cyberspace: the EU GDPR Legislation and its Transformative Power.January 2019. Diplomat Magazine (Hague-Brussels)
 RSI Security. What is cyber resilience and why is it important? August 14, 2019. https://blog.rsisecurity.com/what-is-cyber-resilience-and-why-is-it-important/ (accessed June 25, 2020).
 De Groot, Juliana. What is Cyber Resilience. February 4, 2019. https://digitalguardian.com/blog/what-cyber-resilience (accessed June 25, 2020).
 IT Governance Ltd. What is cyber resilience? n.d. https://www.itgovernance.co.uk/cyber-resilience (accessed June 25, 2020).
 Hughes, Mark. Beyond awareness: Create a cyber resilient culture. September 2019. https://thrive.dxc.technology/2019/09/10/beyond-awareness-create-a-cyber-resilient-culture/ (accessed June 6, 2020).
 Hughes. Beyond awareness: Create a cyber resilient culture. September 2019.
 KPMG. Cyber Security in Österreich. Study, Vienna: KPMG Security Services GmbH, 2020.
 World Economic Forum. Risks of Doing Business 2019. 2019. https://reports.weforum.org/global-risks-report-2020/survey-results/global-risks-of-highest-concern-for-doing-business-2020/ (accessed June 25, 2020).
 Chappelow, Jim. Black Swan. March 11, 2020. https://www.investopedia.com/terms/b/blackswan.asp (accessed June 25, 2020).
Taleb, Nassim Nicholas, interview by Bloomberg TV. Taleb Says “White Swan” Coronavirus Was Preventable (March 31, 2020).
Fuscaldo, Donna. Zoom’s Daily Active Users Surged to 200 Million in March… and That’s Part of the Problem. April 2, 2020. https://www.nasdaq.com/articles/zooms-daily-active-users-surged-to-200-million-in-march…-and-thats-part-of-the-problem (accessed June 25, 2020).
 Paul, Kari. ‘Zoom is malware’: why experts worry about the video conferencing platform. April 2, 2020. https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing (accessed June 25, 2020).
 futurezone. Netzpolitik: Boris Johnson postet aus Versehen sensible Infos.April 1, 2020. https://futurezone.at/netzpolitik/corona-boris-johnson-postet-aus-versehen-sensible-infos/400800110 (accessed June 25, 2020).
 Schwab, Klaus. The Fourth Industrial Revolution: what it means, how to respond. January 14, 2016. https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/ (accessed June 25, 2020).
 Hauser, Christine. EasyJet Says Cyberattack Stole Data of 9 Million Customers. May 19, 2020. https://www.nytimes.com/2020/05/19/business/easyjet-hacked.html (accessed June 25, 2020).
 Hodoschek, Andrea. Wirtschaft: AUA-Rettungspaket steht: 450 Millionen Euro Staatshilfe.June 8, 2020. https://kurier.at/wirtschaft/aua-rettungspaket-steht-450-millionen-euro-staatshilfe/400934555 (accessed June 25, 2020).
 Allianz. Cyber attacks on critical infrastructure. n.d. https://www.agcs.allianz.com/news-and-insights/expert-risk-articles/cyber-attacks-on-critical-infrastructure.html (accessed June 25, 2020).
 Tanriverdi, Hakan. Kritische Infrastruktur: Behörden warnen vor Hackerangriffen.May 27, 2020. https://www.br.de/nachrichten/deutschland-welt/kritische-infrastruktur-behoerden-warnen-vor-hackerangriffen,S0CJ1JP (accessed June 25, 2020).
 KPMG. Cyber Security in Österreich. 2020.
 KPMG. Cyber Security in Österreich. 2020: 6.
 Lord, Nate. Phishing Attack Prevention: How to Identify & Avoid Phishing Scams in 2019. July 12, 2019. https://digitalguardian.com/blog/phishing-attack-prevention-how-identify-avoid-phishing-scams (accessed June 25, 2020).
 KPMG. Cyber Security in Österreich. 2020: 13.
 KPMG. Cyber Security in Österreich. 2020: 4.
 KPMG. Cyber Security in Österreich. 2020: 6.
 KPMG. Cyber Security in Österreich. 2020: 23.
 KPMG. Cyber Security in Österreich. 2020: 14.
 KPMG. Cyber Security in Österreich. 2020: 4.
 World Economic Forum. Risks of Doing Business 2019. 2019.
 KPMG. Cyber Security in Österreich. 2020: 6.
 World Economic Forum. Risks of Doing Business 2019. 2019.
How Putin’s Russia is Exploiting Jihadists Against pro-Navalny Protesters?
Who is Putin’s terrorist: Navalny or Jihadist?
Russia’s strongman Vladimir Putin is considering using old tactics to stem the growing wave of nationwide protests in support of his fiercest critic, popular opposition leader Alexei Navalny. This tactic was developed in the late 90s by the KGB ideologists and successfully applied in order to bring to power Vladimir Putin, who is ruling the country with an iron hand longer than all his Soviet predecessors except Joseph Stalin. The tactical skills of the Putin’s policy architects were aiming to frighten Russian citizens by Islamist terrorism and Chechen separatism and unite patriotic and nationalist forces around a new leader capable of challenging the West.
Thus, when the nationwide protests in support of Navalny from Yakutia to Kaliningrad became the most serious challenge, the Kremlin began to trumpet the threat of Islamist extremists and international terrorists. This time, the Putin regime is intimidating protesters with impending terrorist attacks of Central Asian and Caucasian jihadists and their Syrian parent organization, Hayat Tahrir al-Sham (HTS).
On the eve of the next nationwide protests on February 14, the Prosecutor General’s Office, the Investigative Committee and the Ministry of Internal Affairs of the Russia warned of the inadmissibility of calls to participate in an unsanctioned rally. Russian state news agencies RIA Novosti and TASS have disseminated information that the most powerful Sunni militant faction of HTS in northern Syria is preparing a series of lone-wolf attacks during the upcoming mass street protests of Navalny’s supporters in various Russian cities. In doing so, however, the pro-Kremlin media cited its undisclosed law enforcement sources and ultimately spread merely conspiracy theories.
According to anonymous sources of Russian security services, HTS-backed Uzbek Jihadi battalion Katibat Tawhid wal Jihad(KTJ), Chechen militant groups Ajnad al-Kavkaz (AK) and Jaysh al-Muhajirin wal-Ansar (JMA) are planning to carry out explosions and attack protesters. To achieve these purposes, terrorist groups allegedly recruited Russian citizens and Central Asian migrants, who expect their leaders’ commands.
The Putin regime faced the most serious challenge when anti-government protests took place across the Russia in support Navalny in recent weeks. As is known, in mid-January, Navalny returned to the country after recovering from a chemical Novichok poisoning that nearly took his life and was immediately detained and later jailed for alleged parole violations. The robust Putin regime first demonstrated its grave alarm when tens of thousands pro-Navalny protesters demanded his resignation in more than 100 cities and towns, chanting Putin as a ‘thief’. Police detained more than 11,000 people at what they say were unsanctioned protests that the Moscow condemned as illegal and dangerous.
Alexei Navalny’s political creativity and tactical skill inspired Russian liberal youth weary with the corruption-plagued political order presided over by Putin. Fierce clashes between protesters and riot police during the mass rallies indicate that a new generation is not afraid of arrests and the repressive state machine. And to stop the pace of marathon confrontation with the opposition, Putin resorted to his long-standing KGB tactics, intimidating society with possible terrorist attacks and explosions by Islamists.
Will Uzbek and Chechen Jihadists hit pro-Navalny Protesters?
But the fact is, it’s not the first time Putin’s Russia has intimidated society with possible terror attacks by Islamist terrorists and Chechen separatists to achieve political goals. During the transition of power from Boris Yeltsin to Vladimir Putin at the end of the second millennium, Kremlin ideologists successfully tested anti-Islamist tactics to overcome the challenges of the political opposition. The ideologists of Putin’s election campaign created his image as a decisive and strong leader, the one who can defeat Islamist terrorism, Chechen separatism and preserve the integrity of Great Russia. His image as the only savior of the Russian Empire was accompanied by radio and television spots and news about the atrocities of Chechen militants and their beheading of Russian soldiers.
Meanwhile, there is a conspiracy theory in Russian political circles that the powerful FSB orchestrated apartment bombings in the Russian cities of Buinaksk, Moscow and Volgodonsk in 1999 to boost Putin’s approval rating aiming to ensure his victory in the presidential elections. As a result of these “terrorist attacks”, 307 people were killed, more than 1,700 people were injured. Russian officials concluded that there was a “Chechen trail” in the bombings, but no proof of their involvement was adduced. Many still doubt the results of the investigation and consider Putin to be the culprit of this tragedy.
That’s when Putin uttered his famous phrase: “We will pursue the [Islamist] terrorists everywhere. If they are in an airport, we’ll kill them there. If we catch them in the toilet, we’ll exterminate them in the toilet.” Many still believe that the apartment bombings and the FSB’s tactic against Islamist extremists catapulted Putin into the presidency. Putin soon launched a second war in Chechnya and emerged victorious in the intra-Kremlin struggle. His ratings soared. He met with huge approval in a society weary from the economic collapse, corruption and crime of the Yeltsin era.
Usually people prefer to keep quiet about this tragedy. Russian political figures Sergei Yushenkov, Yuri Shchekochikhin, Anna Politkovskaya, Alexander Litvinenko, and Boris Berezovsky worked to unravel the mystery of apartment bombings. But all of them were brutally murdered under mysterious circumstances. Ultimately, the Kremlin’s tactics to combat Islamist terrorists not only helped to rocket Putin to the political Olympus, but also increased Islamophobia, nationalism and chauvinism in Russian society.
Today, even 22 years after Putin came to power, the Kremlin’s ideologists have begun to intimidate Russia’s liberal society with likely Islamist terrorist attacks again as the nationwide protests seriously threaten his regime. This illustrates the regime exhaustion and the lack of confidence in face of the strategic sophistication of Navalny’s team.
So far, neither HTS, nor Central Asian and North Caucasian Salafi-Jihadi groups have officially responded to the FSB on the plotting of terrorist attacks in Russian cities during opposition rallies. However, in encrypted Telegram chats, Uzbek and Chechen jihadists actively discussed the “leak information”.
Thus, one of the KTJ’s followers on Telegram under the name Al Hijrat said in Uzbek: “Kafir Putin frightens his people with the just sword of Allah.But the people of the blessed land of Sham know that he himself is the main terrorist. Russian infidels and Putin’s Nusayri puppy (Alawites regime of Bashar al-Assad) bomb Greater Idlib to destroy Ahlus Sunnah wal Jamaah. Executioners will have to hold a harsh response before the Almighty for their crimes.”
A pro-Jihadi chat “Inspire” in Telegram wrote in Russian: “the information about the impending attacks by Ajnad al-Kavkaz is fake. The authorities are trying to hold Russia’s awakening people from mass protests against Putin’s criminal group. To intimidate civilians, the Russian siloviki (FSB) can and are ready to commit terrorist acts, blaming HTS for this, which are not interested in what is happening there in Russia. The Putinists have a lot of experience in killing their own citizens and blowing up their houses.” In this message, Chechen militants indirectly protect HTS from accusations by pro-Kremlin media on impending terrorist attacks in Russian cities during opposition protests. This is no coincidence, since Ajnad al Kavkaz is known for its close ties with HTS.
On Telegram channel, some Russian-speaking jihadists from the post-Soviet space mocked at the ‘leaked information’, some expressed their anger against the “Russian occupants” in Sham, some advised protesters to be vigilant before the FSB provocation. A pro-Jihadi chat Icharkhoin Telegram recommended Muslims of Caucasus be ready for new repressions of Russian infidels and local Murtad (apostate), because after the bombings of houses in Volgodonsk, Putin started the 2-Chechen war and took away the independence of Ichkeria. The Telegram chat “Muhajireen” says that the Kremlin is preparing for a harsh suppression of the mass protests.
It is not the first time the Russian authorities have accused Central Asian and North Caucasian Jihadi networks of organizing terrorist act. On April 3, 2017, the Russian FSB blamed KTJ for the bombing on a subway train in St. Petersburg that killed 16 people and injured 67 others. On October 15, 2020, the FSB once again accused the Uzbek KTJ militants of preparing subversive and terrorist acts in Russian cities of Moscow, St. Petersburg, Ufa, Maikop and Volgograd. In a statement, the intelligence services claimed that during the counter-terrorist operation, they prevented explosions and eliminated two members of KTJ. Then FSB distributed photos and videos of firearms, ammunition, IED’s chemical components, and religious literature seized during the operation.
On October 16, 2020, KTJ in its statement denied the Russian authorities’ accusation in these attacks. The Uzbek militant group stated that “according the Hayat Tahrir al-Sham’s policy, our activities are limited to the territory of Sham, and we do not conduct jihadi acts outside of it.” Further, KTJ assured via its Telegram channel that it “does not have its cells in Russia and is not involved in organizing terrorist acts there.”
Jihadi factor of Russian democracy
The Russian authorities often make thunderous statements about plotting terrorist attacks by “international terrorist groups” and how siloviki (FSB) successfully prevented its. This time, trumpeting about terrorist plots by HTS and its foreign subsidiaries during mass protests in various Russian cities, Moscow hoped to hit two birds with one stone. First, the Kremlin hopes that alarm on terrorist attacks could become a cold shower for Navalny’s supporters, as a result of which the activity of protesters will subside and the scale of the rallies will decrease. Second, by accusing HTS of plotting terrorist attacks, Russia is trying to justify its bloody bombing in northern Syria before the international community.
However, experts on jihadism and political Islam were skeptical about accusations of HTS for plotting terrorist attacks in Russia.HTS, Syria’s most powerful rebel group, is trying to implement a new strategy to transform itself from a global jihadist outlook into a local “moderate national liberation movement”. Today its new agenda is entirely dedicated to Syria and the Syrian local Sunni community. Within this new strategy, HTS severely restricted external attacks by its subsidiaries – Central Asian and North Caucasian Salafi-Jihadi groups –KTJ, AK and JMA. Consequently, HTS, which holds the last major rebel bastion in Idlib province and backs the local Salvation Government, is focused only on the internal Syrian jihad than organizing external terrorist attacks.
HTS emir Abu Mohammed al-Julani is well aware that any terrorist attacks in Russia could place his group among the global terrorist organizations, such as ISIS and al Qaeda, from which he decisively disavowed. HTS pursues a pragmatic approach to the political context, and its external attacks outside of Syria could undermine its fragile legacy, which Julani has achieved with great difficulty.
According to the new strategy, HTS has excluded Central Asian and local hardliners from its ranks. Those jihadists who did not want to submit to its new policy, such as former KTJ emir Abu Saloh al-Uzbeki and HTS Shura Council member Abu Malek al-Talli, were arrested or taken out of the Syrian jihad zone. Given the ability of Hayat Tahrir al-Sham to pressure Russian-speaking militant groups to abandon its global jihadist ambitions, it can be concluded that the Russian FSB’s accusation against HTS raises many questions.
In conclusion, the Russian authorities alert about Islamists terrorist attacks during pro-Navalny protests is aimed at an internal audience and pursues exclusively domestic political goals. And these goals are clear as plain as the nose on the face. Using these methods, the Kremlin wants to stop the turbulent development of mass protests and divert the attention of people from the Navalny factor. If they succeed, the authorities will take time out to gather strength for the parliamentary elections in the fall of 2021.But if the wave of protests grows ever stronger and threatens Putin’s regime, then a repetition of the 1999 scenario is quite possible. As then, radical Islamism and terrorism can become a starting point for strengthening authoritarianism in Russia.
Corona pandemic: Realism limitation in solving 21st century security threats
Today, most serious threats of the 21st century are not ones we can protect ourselves by using armies or advanced weapons. Indeed, the popularity of extreme-right politics, unilateralism based on nationalism and COVID-19 are threatening the world’s post-war security architecture.
The state-based unilateralism and the trends of national response to the 21st century’s biggest security threat trigger lack of coordination, diplomatic divisions, and incoherent global answer to COVID-19. Hence, as we face the biggest challenge of the contemporary century today, we need to rethink the very nature of our comprehension of national security threats. By doing so, we need a different approach to facing security threats.
With the Corona pandemic as a security threat, one of the foundational international relations theories, the realism, has been revealed to be far limited in terms of its explanatory power than it declares. The argument is that realism has a valid logic and reasons for confidence since answers to the pandemic have confirmed the supremacy of sovereign states, the grounds for the state’s power competition. Nevertheless, the pandemic also presents realism’s weaknesses as a source for successful policy answer to this security challenge. In other words, realism is better at defining risks and threats than suggesting solutions. Put simply, realism’s explanatory power lies in diagnosis rather than treatment or prevention. To make this clear, one insight the theory emphasizes is the representation of states as the fundamental actors in world politics.
As the coronavirus hit, states shifted quickly to close or tighten international borders, controlled movement within their borders. However, while much independent national action is understandable from a realism’s point of view, it’s insufficient. Unilateralism and state-based measures, such as border controls did not spare states from the pandemic, and unilateral measures risk ending up in national economic and social crisis.
To fight the Corona pandemic most efficiently, policymakers will have to shift to other theoretical traditions to overcome this security threat. They will depend more and more on greater international openness, trust and cooperation. Hence, while from the realism’s view, unilateral and state-based actions may serve national interest to fight the pandemic “within the national borders”, the pandemic is a global security threat and thus remains unsolved so long as other states and non-state actors have not done the same and states move on unilaterally.
Solving global crises and security threats such as a pandemic, similar to world economic or other security crises cannot be solved based on the realist considerations of zero-sum competitive logic. Instead, transnational security threats, such as Coronavirus, is unmasking the limitations of individual states actions in the global system. Thus, while realism does an excellent job of “diagnosing the problem”, it does not offer solutions to that problem.
Considering the necessity of worldwide medical items and actions, coordinated and offered by international organizations and non-state actors, the uncoordinated state-based actions result in an ineffective solution to this security crisis. The perspective this article aims to offer is that given the limitations of realism, we need more faith in international transboundary cooperation based on mutual trust, especially trust vis-a-vis international institutions. However, neither the United Nations nor the World Health Organization (WHO) nor any other non-state actor can overcome the Coronavirus on its own; nor non-state actors such as international institutions are alternatives to national states in international relations.
Instead, they are an instrument of foreign policy and statecraft and states need to rely on them, incorporating them in finding solutions to global security threats. According to constitutionalists, Robert Keohane and Lisa Martin, “States are indeed self-interested, but cooperation is often in their interest and institutions help to facilitate that cooperation.”
From our partner Tehran Times
The Media System Within and Beyond the West: Australian, Russian and Chinese Media
This article takes Australian, Russian and Chinese media as three examples to differentiate media systems and elucidate their political or economic context to understand media systems globally. Arguably, the concept of media systems “does not possess a normative or even generally accepted definition“, mainly because the notion is posited on existing publications and empirical research rather than normative theory. More precisely, “this is so for two reasons: firstly—because of the term’s content specificity; secondly—because it is dynamic and variable in time and therefore difficult to precisely define“.
Drawing on the current research of advanced capitalist democracies in Western Europe and North America, Hallin and Mancini propose “there are two main elements of the conceptual framework of Comparing Media Systems (setting aside political-social system variables): the set of four “dimensions” of comparison, and the typology of three models that summarizes what we see as the distinctive patterns of media system development among our 18 cases”. Furthermore, they clarify the four major dimensions that can be compared in different media systems: “first, the development of media markets, with particular emphasis on the strong or weak development of a mass circulation press; second political parallelism; that is, the degree and nature of the links between the media and political parties or, more broadly, the extent to which the media system reflects the major political divisions in society; third, the development of journalistic professionalism; and fourth, the degree and nature of state intervention in the media system”.
Drawing on the four dimensions, Hallin and Mancini summarize three modules from Western Europe and North America: “the Mediterranean or Polarized Pluralist Model, the North/Central European or Democratic Corporatist Model,
and the North Atlantic or Liberal Model”, which will be elaborated on by the next tables.
Table 1 Mediterranean or Polarized Pluralist Model
|Country Examples||France, Greece, Italy, Portugal, Spain|
|Newspaper Industry||Low newspaper circulation; elite politically oriented press|
|Political Parallelism||High political parallelism; external pluralism, commentary-oriented journalism; parliamentary or government model of broadcast governance—politics-over-broadcasting systems|
|Professionalization||Weaker professionalization; instrumentalization|
|Role of the State in Media System||Strong state intervention; press subsidies in France and Italy; periods of censorship; “savage deregulation” (except France)|
Table 2 North/Central European or Democratic Corporatist Model
|Country Examples||Austria, Belgium, Denmark, Finland, Germany, Netherlands, Norway, Sweden, Switzerland|
|Newspaper Industry||High newspaper circulation; early development of mass-circulation press|
|Political Parallelism||External pluralism, especially in the national press; historically strong party press; a shift toward neutral commercial <p>press; the politics-in-broadcasting system with substantial autonomy|
|Professionalization||Strong professionalization; institutionalized self-regulation|
|Role of the State in Media System||Strong state intervention but with protection for press freedom; press subsidies, robust in Scandinavia; strong public-service broadcasting|
Table 3 North Atlantic or Liberal Model
|Country Examples||Britain, the United States, Canada, Ireland|
|Newspaper Industry||Medium newspaper circulation; early development of mass circulation commercial press|
|Political Parallelism||Neutral commercial press; information-oriented journalism; internal pluralism (but external pluralism in Britain); professional model of broadcast governance—formally autonomous system|
|Professionalization||Strong professionalization; noninstitutionalized self-regulation|
|Role of the State in Media System||A market dominated (except strong public broadcasting in Britain, Ireland)|
Source: created by the author of this thesis and based on Hallin and Mancini.
Furthermore, it is unfeasible to simply apply the conceptual framework to other countries without appropriate modification. In fact, the “four dimensions” and “three models” are just perfect types, only loosely matched by the media systems of different countries. The ultimate purpose is not to classify individual media systems but to identify the “characteristic patterns of relationship between system characteristics“. Consequently, these inherent patterns of media systems offer “a theoretical synthesis and a framework for comparative research on the media and political systems“.
The Australian media system as an outlier in the Liberal Model
Hallin and Mancini illustrate that Australia should be another example of the Liberal Model. It is because firstly, the “Liberal Model is the broadest, attempting to bridge the trans-Atlantic gulf that regularly emerges in the comparative literature“. Secondly, Australia has historical connections with the UK and the US regarding “early democratization and highly professionalized information-based journalism“. This association has led to strong characteristics of Anglo-American conventions in the Australian media structure, with the quintessence of a dual media system. The binary design has combined the UK-style PSBs (public service broadcasters) such as ABC and SBS (Special Broadcasting Service) with the “US-style commercial networks“. Thirdly, Australia is famous for one of the highest commercial media ownership concentration rates globally, particularly in the newspaper area.
However, the Australian media system does not offer the quintessence of the Liberal Model. Jones and Pusey apply the Liberal Model to the Australian media system and identify four remarkable discrepancies. More precisely, compared to the Liberal Model, Australia has “historically late professionalization of journalism; comparatively low levels of education of journalists; low per capita investment in PSBs; poor regulation for accuracy and impartiality of commercial broadcast journalism; and slow development of relevant bourgeois liberal institutional conventions and rational-legal authority, e.g., formal recognition of freedom of the press”.
Furthermore, Jones and Pusey contend that Australia has several similar features with the Polarized Pluralist Model, especially in clientelism. Based on the definition of Hallin and Mancini, “clientelism tends to be associated with instrumentalization of both public and private media. In the case of public media, appointments tend to be made more based on political loyalty than purely professional criteria”. More concretely, Jones and Pusey outline the following examples to indicate the similarities of the Australian media system with the Polarized Pluralist Model: “the widely accepted recognition that appointments to the ABC Board have been more often than not party-political; the infamous ‘Murdoch amendments’ by the Fraser government to broadcasting legislation in the late 1970s to facilitate Murdoch’s concentration of television ownership; and the long history of proprietorial intervention in the political world”.
Thus, to this extent, there is a certain degree of political parallelism in the Australian media system. However, the Australian one does not match the Polarized Pluralist Model in some key areas. More precisely”, Australia does not have a highly polarized political culture and a strong tradition of mass-circulation party newspapers“. Therefore, it is arguable to perceive the Australian media system as an outlier of the Liberal Model, which can be shown in the following figure:
Figure 1 Relation of individual cases to the three models
Source: derived from Jones and Pusey.
Beyond the West: the unique Russian and Chinese media model
Although the Australian media system is an outlier in the Liberal Model, it still belongs to the typology and scope of the three models, posited on the empirical reality of Western Europe and North America. However, bringing the Russian and Chinese media models into this global comparative apparatus involves two distinct and peculiar systems into the Western-centric framework. Thus, the three models’ classification cannot apply to Russia and China’s two unique systems. Nevertheless, the four dimensions of comparison as a tool for analyzing systemic characteristics still work. However, they are not perfect and need to be modified in the application, as mentioned before.
The Russian media system as a statist commercialized model
After the disintegration of the USSR, Russia took a series of measures to adopt elements of the Western media apparatus, such as “abolition of censorship, freedom of press concepts and related legislation, privatization of media, a shift to more objective reporting, and increasing control by journalists and editorial boards over news production“. However, arguing that the Russian media have been westernized only shows “a poor understanding of” the legacy of the Soviet Union and the “complexity and dissimilarities of the post-Soviet society“, ignoring the most influential factor in the Russian media system: the state. Arguably, the interplay between the state and media has defined the essence and main features of the Russian media system. Historically and culturally, “in Russian public communications, relations between the state and a citizen have involved a clear subordination of the individual to a social power that has always been associated in the Russian context with the state“.
Thus, even though the Polarized Pluralist Model is the most similar of the three models to the Russian one, the Russian media system is still far from the Mediterranean apparatus. The Russian state’s role has exceedingly overshadowed that of the Mediterranean states, suggesting that they cannot be classified as the same type. Ivanitsky differs the Russian media system from the Polarized Pluralist Model in that “it is the state which defined the particular journalism modes such as Court journalism, Imperial journalism, Communist Party journalism in Russian history. Currently, while liberating the media’s economic activity, the state is not ready to relax the control over the content”.
This overwhelming influence of the state also reflects in Russian political parallelism. Although new political parties have appeared after the formation of the Russian Federation, Oates argues that “rather than encouraging the growth and the development of a range of political parties, media outlets in Russia have worked at supporting relatively narrow groups of elites”, part of which have been formed due to the privatization. These elites, combining old political and new emerging business elites, “became key players in the media scene“. More concretely, they created “a particularly Russian form of political parallelism” by using “political media as traditional instruments of political elite management“. Besides, due to the dominant role of the state in Russia, “media, particularly television, have been used to subvert the development of a pluralistic party system“.
Furthermore, in terms of the media industry, the influence of the state is also ubiquitous. Ivanitsky believes the state “has produced practically unsolvable tension for the media themselves trying to function both as commercial enterprises and as institutions of the society”, even though Russia has achieved rapid development in its advertising and media market. Hypothetically, these tensions between the media and the state are supposed to be the “decentralized market competition as a vital antidote to political despotism“. However, Vartanovaargues that “the aims of the state converged with those of the advertising industry, and commercially determined content became both a means of increasing depoliticization and instrumentalization of political communication, and of stimulating consumption”. From another angle, de Smaele believes that the Western influence on Russian media has only been limited to market demand, with the lack of Western notions such as “independent Fourth Estate”.
As for Russia’s professionalization, “journalism as a profession had a rather late start” with a strong censorship history, thus resulting in a self-censorship tradition until now. Another factor contributing to the self-censorship is that “formally declared freedom and autonomy of media professionals came into conflict with the efforts of the new owners”, deeply connected to the state and political elites, “to use these new professional values to further their own interests” rather than the public interests and social responsibility. Thus, to notch economic successes and avoid potential political risks, Russian journalists have become increasingly market-driven and apathetic to politics. Due to the different “professional identity“, Russian journalists have a dissimilar “literary style and attitude to facts and opinions“, which has restrained them from integration into Western journalism.
However, this statist media policy does not mean there is no freedom regarding the Russian media system’s political news. Admittedly, the state has strong influences on “television channels with national distribution“, which has been regarded as “the main source of information about Russia and the world“. By comparison, the pressure of the state has become weak and even non-existent in some less disseminated areas such as the television channel “REN-TV“, the radio station “Ekho Moskvy“, and the newspapers “Novaya Gazeta“, “Nezavisimaya Gazeta” and “Kommersant“, as well as almost the whole of the internet.
Therefore, it is possible to say that the duality of authoritarian attitudes to mass media and journalism—a statist media policy deeply rooted in the framework of state influence on media combined with the growing market-driven economy—has become the most crucial characteristic of the Russian media system“. To this extent, the Russian media system can be described as a statist commercialized model.
The Chinese media system as a state-dominated model
If there is still a likelihood to compare the Russian media system with the Mediterranean Model due to a certain extent of similarities, “bringing the Chinese media system into a worldwide comparative project is to bring one of the most dissimilar systems into the non-Western empirical reality“. Furthermore, if the role above of the state in the Russian media system can be portrayed as “strong influence”, the Chinese state’s position or the sole ruling party CPC in its media apparatus should be regarded as dominant. As mentioned, regarding the political news, Russians still enjoy some freedom in less influential media. In contrast, there is no autonomy in the Chinese press, with the omnipresent regulative measures such as media censorship and the internet Great Firewall in China. Thus, considering the state’s special role, the Chinese media system is far beyond the intervention framework in the West.
In fact, despite Deng Xiaoping’s reform, the Chinese media system of the post-Mao period has still applied the “different versions of Marxism and socialism” to “build socialism with Chinese characteristics” by “providing moral guidance to the population and engineering economic development and social change“. One of the most important reasons that may clarify this “guidance”, namely, strong and resilient media control, is the media ownership in China. It is undeniable that the post-Mao economic reforms have expanded the private capital to some areas that had been commanded by the Chinese government or state-owned enterprises for decades. However, Zhao argues that “in the media sector, although the Chinese state has not only drastically curtailed its role in subsidizing media operations but has also targeted the media and cultural sector as new sites of profit-making and capitalistic development, the state continues to restrict private capital, let alone the privatizing of existing media outlets”.
In fact, the Chinese state has opened the door to private and even foreign capital participation in “the media’s entertainment function” such as the film industry with the intention of profit-making. However, this profit-making entertainment also needs to be filtered by the ideological orientation of the state. More importantly, “the production and distribution of news and informational content” and the “ownership of news media outlets” have remained “monopolized by the state“. Furthermore, this monopoly also results in the fact that the state has appointed major media agencies’ leadership.
Despite the state’s overwhelming control, the Chinese media market has boomed for years since the economic reform of Deng Xiaoping, attributable to the power of marketization. For instance, in 2004, there were 6,580 daily newspapers published worldwide, and the number of daily newspapers published in China ranked first in the world, accounting for 14.5% of the global daily newspapers. However, the commercialization of the Chinese media industry has not surmounted the ideological control of the state. The media market has constituted “two distinct and yet institutionally intertwined press sectors or subsystems“. The first press sector is market-based as the film above industry, while the second is “the party organ sector“, which combines the duality of the political instrument and profit-making. This is because “most state media outlets no longer receive large government subsidies and have largely to depend on commercial advertising“. Nevertheless, rather than causing tensions, the dual roles the party organ sector plays have adopted and contained the marketization within the current political control by the statist implementation of “licensing system and the sponsor unit system“. Consequently, these two systems have guaranteed the predominance of the state over the commercialization and marketization.
As for the political parallelism, the state-dominated Chinese media system has top-level political instrumentalization, indicating “all the features of a quintessential party-press parallelism“. Almost all the media content should and, in practice, have revolved around the official ideology and slogan of the state. This is pertinent to another aspect of four dimensions, based on the theory and standard of Hallin and Mancini: the utterly low professionalization in Chinese journalism, where journalists have to successfully balance the “market forces and the party-press system” to obtain financial benefits and political security. Furthermore, Pan and Lu argue that Chinese journalists “do not fit their practices into the universal model of professionalism”, but “utilize and appropriate diverse and often conflicting ideas of journalism through their improvised and situated practices”, leading to the “truncated and fragmented in Chinese journalism”. Also, unlike the Western conception of relative objectivity in journalism, Hackett and Zhao create a term “regime of objectivity” to describe how Chinese journalists portray information on the precondition of conforming to the state ideology.
Therefore, due to its restricted commercialization and dominated state, Chan summarizes the Chinese media industry’s development as commercialization without independence. Drawing on the above, the Chinese media system can be described as a state-dominated model.
- Chan, Joseph Man. “Commercialization without Independence: Trends and Tensions of Media Development in China”. In China Review 1993, edited by Joseph Cheng Yu-shek and Maurice Brosseau, 25.1 – 25.21. Hong Kong: Chinese University of Hong Kong Press, 1993.
- de Smaele, Hedwig. “The Applicability of Western Media Models on the Russian Media System”. European Journal of Communication 14, no. 2 (1999): 173-89. https://doi.org/10.1177/0267323199014002002.
- Dunn, John A. “Lottizzazione Russian Style: Russia’s Two-Tier Media System”. Europe-Asia Studies 66, no. 9 (2014): 1425-51. https://doi.org/10.1080/09668136.2014.956441.
- Hackett, Robert A., and Yuezhi Zhao. Sustaining Democracy? Journalism and the Politics of Objectivity. Edited by Yuezhi Zhao. Toronto: University of Toronto Press Higher Education, 2000.
- Hallin, Daniel C., and Paolo Mancini. Comparing Media Systems: Three Models of Media and Politics. Communic
- ation, Society and Politics. Cambridge: Cambridge University Press, 2004.
- ———. “Ten Years after Comparing Media Systems: What Have We Learned?”. Political Communication 34, no. 2 (2017): 155-71. https://doi.org/10.1080/10584609.2016.1233158.
- Hu, Zhengrong, Peixi Xu, and Deqiang Ji. “China: Media and Power in Four Historical Stages”. In Mapping Brics Media, edited by Kaarle Nordenstreng and Daya Kishan Thussu, 166-80. London ;: Routledge, Taylor & Francis Group, 2015.
- Ivanitsky, Valerij. “Mass Media Market in Post-Soviet Russia [Рынок Сми В Постсоветской России]”. Bulletin of Moscow University, no. 6. (2009): 114–31. Retrieved from http://www.ffl.msu.ru/en/research/bulletin-of-moscow-university/.
- Jones, Paul K., and Michael Pusey. “Political Communication and ‘Media System’: The Australian Canary”. Media, Culture & Society 32, no. 3 (2010): 451-71. https://doi.org/10.1177/0163443709361172.
- Keane, John. The Media and Democracy. Cambridge, MA: Polity in association with Basil Blackwell, 1991.
- Oates, Sarah. Television, Democracy, and Elections in Russia. Basees/Routledge Series on Russian and East European Studies. Abingdon, Oxon, England: Routledge, 2006.
- Pan, Zhongdang, and Ye Lu. “Localizing Professionalism: Discursive Practices in China’s Media Reforms”. In Chinese Media, Global Context, edited by
- Chin-Chuan Lee, 210-31: RoutledgeCurzon Taylor & Francis Group, 2003.
- Sonczyk, Wieslaw “Media System: Scope—Structure—Definition”. Media Studies 3, no. 38. (2009). Retrieved from http://mediastudies.eu/.
- Sosnovskaya, Anna. Social Portrait and Identity of Today’s Journalist: St. Petersburg-a Case Study. (Södertörn Academic Studies: 2000). https://bibl.sh.se/skriftserier/hogskolans_skriftserier/Russian_reports/diva2_16051.aspx.
- Tiffen, Rodney. How Australia Compares. Edited by Ross Gittins. Cambridge: Cambridge University Press, 2004.
- Vartanova, Elena. “The Russian Media Model in the Context of Post-Soviet Dynamics”. In Comparing Media Systems Beyond the Western World, edited by Daniel C. Hallin and Paolo Mancini, 119-42. Cambridge: Cambridge University Press, 2012.
- Wang, Guoqing. “China Newspaper Annual Development Report [中国报业年度发展报告]”. People’s Daily, August 5 2005. http://www.people.com.cn/.
- Zhao, Yuezhi. “Understanding China’s Media System in a World Historical Context”. In Comparing Media Systems Beyond the Western World, edited by Daniel C. Hallin and Paolo Mancini, 143-74. Cambridge: Cambridge University Press, 2012.
- Zhou, Shuhua. “China: Media System”. In, edited by W. Donsbach2015.
From our partner RIAC
The hydrogen revolution: A new development model that starts with the sea, the sun and the wind
“Once again in history, energy is becoming the protagonist of a breaking phase in capitalism: a great transformation is taking...
‘Industry 4.0’ tech for post-COVID world, is driving inequality
Developing countries must embrace ground-breaking technologies that have been a critical tool in tackling the COVID-19 pandemic, or else face...
Gugu Mbatha-Raw named latest UNHCR Goodwill Ambassador
British actor Gugu Mbatha-Raw was on Wednesday appointed a global Goodwill Ambassador with the UN refugee agency, UNHCR. Ms. Mbatha-Raw highlighted the...
Huge blast on the Afghanistan-Iran border
On Saturday 13 February the Islam Qala reception center owned by the IOM was demolished at the border between Afghanistan...
Overcoming The Tragedy of Plural Mother Tongue Denial in America
Sunday morning , February 21, I was in the Bangladesh High Commission in Port Louis, Mauritius.Google reminds us”Bangladesh, to the...
UNIDO works to scale up the ICT start-up ecosystem in Iran
Together with its national counterparts from the Information Technology Organization of Iran’s Ministry of Information and Communication Technologies and in...
Laws Still Restrict Women’s Economic Opportunities Despite Progress
Countries are inching toward greater gender equality, but women around the world continue to face laws and regulations that restrict...
International Law3 days ago
How nations states are limited
Africa3 days ago
African problems require African solutions
Defense2 days ago
The world arms sales market
Diplomacy3 days ago
China-India Vaccine Diplomacy – Will Pakistan Learn From Neighbors?
Economy2 days ago
Capitalism and the Fabrication of Food Insecurity
Europe3 days ago
France’s Controversial ‘Separatism’ Bill
Finance3 days ago
Credit to Small Firms to Boost Economic Recovery
Reports3 days ago
Confident in managing liquidity, organizations still face challenges forecasting