skip to main content
10.1145/3396956.3396962acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Lessons from China - The Formation of a Social Credit System: Profiling, Reputation Scoring, Social Engineering

Published:16 June 2020Publication History

ABSTRACT

Against the background of China's Social Credit policies to foster pro-social behavior, this study provides a conceptual underpinning for such incentive schemes by defining their underlying elements and parameters based on official Chinese government statements and related literature. The first element is the creation of digital profiles of individuals based on an interpretation of real-world interaction and behavior by combining various data sets to gain an extensive description of each character. The second element is the quantification of those profiles by defining a multifaceted construct of ‘social reputation’ and transferring the derived profile into a single score. The third element is the delineation of pro-social behavior. The two central control parameters are the policy for the allocation of merit scores as well as the determination of incentives and sanctions based on respective scores. Each element is examined and discussed in the context of current independent applications in different social settings. Within this frame of reference, the study provides a framework of potential effects that a social credit system may have on public and private life.

References

  1. Ackerman, P. L. 1996. A theory of adult intellectual development: Process, personality, interests, and knowledge. Intelligence 22, 2, 227–257.Google ScholarGoogle ScholarCross RefCross Ref
  2. Acquisti, A. 2009. Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy 7, 6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahmed, S. 2017. Cashless Society, Cached Data. Security Considerations for a Chinese Social Credit System. The Citizen Lab 1.Google ScholarGoogle Scholar
  4. Backer, L. C. 2017. Measurement, assessment and reward: the challenges of building institutionalized social credit and rating systems in China and in the West. Proceedings of the Chinese Social Credit System, Shanghai Jaiotong University 23.Google ScholarGoogle Scholar
  5. Ball, A. L. 2010. Are 5,001 Facebook friends one too many. The New York Times 28.Google ScholarGoogle Scholar
  6. Barnett, M. L., Jermier, J. M., and Lafferty, B. A. 2006. Corporate reputation: The definitional landscape. Corporate Reputation Review 9, 1, 26–38.Google ScholarGoogle ScholarCross RefCross Ref
  7. Basili, M. and Nicita, A. 2005. Deterrence and compliance in a demerit point system. Universita degli Studi di Siena.Google ScholarGoogle Scholar
  8. Berwick, A. 2018. How ZTE helps Venezuela create China‑style social control. Reuters Investigates 14.Google ScholarGoogle Scholar
  9. Bromley, D. B. 1993. Reputation, image and impression management. John Wiley & Sons.Google ScholarGoogle Scholar
  10. Busuioc, E. M. and Lodge, M. 2016. The reputational basis of public accountability. Governance 29, 2, 247–263.Google ScholarGoogle ScholarCross RefCross Ref
  11. Cadwalladr, C. and Graham-Harrison, E. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian 17, 22.Google ScholarGoogle Scholar
  12. Campbell, D. T. 1979. Assessing the impact of planned social change. Evaluation and Program Planning 2, 1, 67–90.Google ScholarGoogle ScholarCross RefCross Ref
  13. Chan, T. F. 2018. China's social credit system has blocked people from taking 11 million flights and 4 million train trips. Business Insider 22.Google ScholarGoogle Scholar
  14. Chandler, G. G. and Parker, L. E. 1989. Predictive value of credit bureau reports. Journal of Retail Banking 11, 4.Google ScholarGoogle Scholar
  15. Chen, Y. and Cheung, A. S. Y. 2017. The transparent self under big data profiling: privacy and Chinese legislation on the social credit system. HKU Scholars Hub - University of Hong Kong. https://core.ac.uk/download/pdf/84930493.pdf. Accessed 11 August 2019.Google ScholarGoogle Scholar
  16. Chen, Y. and Cheung, A. S. Y. 2017. The transparent self under big data profiling: Privacy and Chinese legislation on the social credit system.Google ScholarGoogle Scholar
  17. Cheng, C. and Ou, S. Y. 2014. The status quo and problems of the building of china's social credit system and suggestions. International Business and Management 8, 2, 169–173.Google ScholarGoogle Scholar
  18. Chipman, M. L. 1982. The role of exposure, experience and demerit point levels in the risk of collision. Accident Analysis & Prevention 14, 6, 475–483.Google ScholarGoogle ScholarCross RefCross Ref
  19. Chorzempa, M., Triolo, P., and Sacks, S. 2018. China's social credit system: A mark of progress or a threat to privacy? Policy Brief. https://www.piie.com/system/files/documents/pb18-14.pdf. Accessed 29.7.19.Google ScholarGoogle Scholar
  20. Creemers, R. 2018. China's Social Credit System: An Evolving Practice of Control, University of Leiden.Google ScholarGoogle Scholar
  21. Crotty, J. 2009. Structural causes of the global financial crisis: a critical assessment of the 'new financial architecture'. Cambridge Journal of Economics 33, 4, 563–580.Google ScholarGoogle ScholarCross RefCross Ref
  22. Engelmann, S., Chen, M., Fischer, F., Kao, C.-y., and Grossklags, J. Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines" Good" and" Bad" Behavior. In Proceedings of the Conference on Fairness, Accountability, and Transparency, 69–78.Google ScholarGoogle Scholar
  23. Espeland, W. N. and Sauder, M. 2007. Rankings and Reactivity:. How public measures recreate social worlds. American Journal of Sociology 113, 1, 1–40.Google ScholarGoogle ScholarCross RefCross Ref
  24. Garcia, S. E. 2019. U.S. Requiring Social Media Information From Visa Applicants. The New York Times (Jun. 2019).Google ScholarGoogle Scholar
  25. Gaultier-Gaillard, S., Louisot, J.-P., and Rayner, J. 2009. Managing reputational risk. A cindynic approach. In Reputation Capital. Springer, 115–141.Google ScholarGoogle Scholar
  26. Gerstner, E., Hess, J., and Chu, W. 1993. Demarketing as a differentiation strategy. Marketing Letters 4, 1, 49–57.Google ScholarGoogle ScholarCross RefCross Ref
  27. Hadnagy, C. 2010. Social engineering: The art of human hacking. John Wiley & Sons.Google ScholarGoogle Scholar
  28. Hallsworth, M., Halpern, D., Algate, F., Gallagher, R., Nguyen, S., Ruda, S., Sanders, M., Pelenur, M., Gyani, A., and Harper, H. 2014. EAST Four simple ways to apply behavioural insights. The Behavioural Insights Team Publications, Cabinet Office.Google ScholarGoogle Scholar
  29. Hanks, A. S., Just, D. R., Smith, L. E., and Wansink, B. 2012. Healthy convenience: nudging students toward healthier choices in the lunchroom. Journal of Public Health 34, 3, 370–376.Google ScholarGoogle ScholarCross RefCross Ref
  30. Hildebrandt, M. and Gutwirth, S. 2008. Profiling the European Citizen. Springer Netherlands, Dordrecht.Google ScholarGoogle Scholar
  31. Hornby, L., Ju, S. F., and Lucas, L. 2018. China cracks down on tech credit scoring. Tencent and Alibaba pilot schemes curbed by central bank amid privacy fears. Financial Times (Feb. 2018).Google ScholarGoogle Scholar
  32. Horsley, J. 2018. China's Orwellian social credit score isn't real. Foreign Policy 16.Google ScholarGoogle Scholar
  33. Isaak, J. and Hanna, M. J. 2018. User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection. Computer 51, 8, 56–59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Jøsang, A. 2007. Trust and Reputation Systems. In Foundations of Security Analysis and Design IV, A. Aldini and R. Gorrieri, Eds. Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, 209–245. DOI=10.1007/978-3-540-74810-6_8.Google ScholarGoogle Scholar
  35. Keverne, E. B., Martel, F. L., and Nevison, C. M. 1996. Primate brain evolution: genetic and functional considerations. Proceedings of the Royal Society of London. Series B: Biological Sciences 263, 1371, 689–696.Google ScholarGoogle Scholar
  36. Klewes, J. and Wreschniok, R. 2009. Reputation capital Building and maintaining trust in the 21st century. In Reputation Capital. Springer, 1–8.Google ScholarGoogle Scholar
  37. Kostka, G. 2019. China's social credit systems and public opinion: Explaining high levels of approval. New Media & Society 21, 7, 1565–1593.Google ScholarGoogle ScholarCross RefCross Ref
  38. Küpper, A. 2005. Location-based services: fundamentals and operation. John Wiley & Sons.Google ScholarGoogle Scholar
  39. Liang, F., Das, V., Kostyuk, N., and Hussain, M. M. 2018. Constructing a data‐driven society: China's social credit system as a state surveillance infrastructure. Policy & Internet 10, 4, 415–453.Google ScholarGoogle ScholarCross RefCross Ref
  40. Liu, C. 2019. Multiple Social Credit Systems in China. Department of Sociology, University of California San Diego. SSRN Journal.Google ScholarGoogle Scholar
  41. McNeil, L. and Valenzuela, A. 2001. The harmful impact of the TAAS system of testing in Texas: Beneath the accountability rhetoric. In Raising standards or raising barriers? Inequality and high-stakes testing in public education, G. Orfield and M. L. Kornhaber, Eds. Civil rights in a new era. Century Foundation Press, New York.Google ScholarGoogle Scholar
  42. Meissner, M. 2017. China's Social Credit System: A Big-Data Enabled Approach to Market Regulation with Broad Implications for Doing Business in China. Mercator Institute for China studies 24.Google ScholarGoogle Scholar
  43. O'Malley, L. 1998. Can loyalty schemes really build loyalty? Marketing intelligence & planning 16, 1, 47–55.Google ScholarGoogle Scholar
  44. Packin, N. G. and Lev-Aretz, Y. 2016. On social credit and the right to be unnetworked. Columbia Business Law Review, 339.Google ScholarGoogle Scholar
  45. Palmer, A., Mcmahon-Beattie, U., and Beggs, R. 2000. Influences on loyalty programme effectiveness: a conceptual framework and case study investigation. Journal of Strategic Marketing 8, 1, 47–66.Google ScholarGoogle ScholarCross RefCross Ref
  46. Piaget, J. 1971. Psychology and epistemology: Towards a theory of knowledge (A. Rosin, Trans.). New York: Viking.Google ScholarGoogle Scholar
  47. Pinyol, I., Sabater-Mir, J., and Cuní, G. 2007. How to talk about reputation using a common ontology: From definition to implementation. In Proceedings of the Ninth Workshop on Trust in Agent Societies, Hawaii, USA., 90–101.Google ScholarGoogle Scholar
  48. Pulido, J., Lardelli, P., La Fuente, L. de, Flores, V. M., Vallejo, F., and Regidor, E. 2010. Impact of the demerit point system on road traffic accident mortality in Spain. Journal of Epidemiology & Community Health 64, 3, 274–276.Google ScholarGoogle ScholarCross RefCross Ref
  49. Ragas, J. 2017. A Starving Revolution: ID Cards and Food Rationing in Bolivarian Venezuela. Surveillance & Society 15, 3/4, 590–595.Google ScholarGoogle Scholar
  50. Rimkutė, D. 2019. Building organizational reputation in the European regulatory state: An analysis of EU agencies' communications. Governance.Google ScholarGoogle Scholar
  51. Shahin, S. and Zheng, P. 2020. Big data and the illusion of choice: Comparing the evolution of India's Aadhaar and China's Social Credit System as technosocial discourses. Social Science Computer Review 38, 1, 25–41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. State Council of the People's Republic of China. 2018. State Council Notice concerning Issuance of the Planning Outline for the Construction of a Social Credit System (2014-2020). GF No. (2014) 21. Translation by Rogier Creemers, Beijing.Google ScholarGoogle Scholar
  53. Sustein, C. R. 2015. The ethics of nudging. Yale Journal on Regulation 32, 413.Google ScholarGoogle Scholar
  54. Thaler, R. H. and Sunstein, C. R. 2009. Nudge. Improving decisions about health, wealth, and happiness. Penguin, New York, NY.Google ScholarGoogle Scholar
  55. Tomba, L. 2004. Creating an urban middle class: Social engineering in Beijing. The China Journal, 51, 1–26.Google ScholarGoogle ScholarCross RefCross Ref
  56. van Praet, D. 2012. Unconscious branding: How neuroscience can empower (and inspire) marketing. St. Martin's Press.Google ScholarGoogle Scholar
  57. Vercammen, J. A. 1995. Credit bureau policy and sustainable reputation effects in credit markets. Economica, 461–478.Google ScholarGoogle Scholar
  58. Wansink, B. and Seed, S. 2001. Making brand loyalty programmes succeed. Journal of Brand Management 8, 3, 211–222.Google ScholarGoogle ScholarCross RefCross Ref
  59. Weiying, Z. 2002. Reputational Foundation of the Legal System [J]. Economic Research Journal 1, 3–13.Google ScholarGoogle Scholar
  60. Wertsch, J. V. 1985. Vygotsky and the social formation of mind. Harvard University Press.Google ScholarGoogle Scholar
  61. Weyerer, J. C. and Langer, P. F., Eds. 2019. Garbage In, Garbage Out: The Vicious Cycle of AI-Based Discrimination in the Public Sector. ACM.Google ScholarGoogle Scholar
  62. Wilkinson, T. M. 2013. Nudging and manipulation. Political Studies 61, 2, 341–355.Google ScholarGoogle Scholar
  63. Wittner, F. 2019. A Public Database as a Way Towards More Effective Algorithm Regulation and Transparency? In Regulating New Technologies in Uncertain Times, L. Reins, Ed. Information Technology and Law Series. Springer, 175–192.Google ScholarGoogle Scholar
  64. Yu, L., Li, X., Tang, L., Zhang, Z., and Kou, G. 2015. Social credit: a comprehensive literature review. Financial Innovation 1, 1, 6.Google ScholarGoogle ScholarCross RefCross Ref
  1. Lessons from China - The Formation of a Social Credit System: Profiling, Reputation Scoring, Social Engineering

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      dg.o '20: The 21st Annual International Conference on Digital Government Research
      June 2020
      389 pages
      ISBN:9781450387910
      DOI:10.1145/3396956

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 June 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate150of271submissions,55%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format