- Chinese history and philosophy
- China's Ethnic Minorities and Relations
- China's Socioeconomic Reforms and Governance
- Terrorism, Counterterrorism, and Political Violence
- Vietnamese History and Culture Studies
- Corporate Insolvency and Governance
- Legal principles and applications
- Ideological and Political Education
- International Law and Human Rights
- China's Global Influence and Migration
- Corporate Governance and Law
- Medical Research and Treatments
- Regional Development and Environment
- Post-Communist Economic and Political Transition
- Political Conflict and Governance
- Communism, Protests, Social Movements
- Crime Patterns and Interventions
- Educational Reforms and Innovations
- Asian Culture and Media Studies
- Cybersecurity and Cyber Warfare Studies
- Corporate Law and Human Rights
- War, Ethics, and Justification
- Intelligence, Security, War Strategy
- Corporate Finance and Governance
- Crime, Illicit Activities, and Governance
University of St Andrews
2019-2025
Shanghai Micro Electronics Equipment (China)
2024
University of Bristol
2023
British Academy
2021-2022
School of International Relations
2021-2022
Wuhan National Laboratory for Optoelectronics
2021
Huazhong University of Science and Technology
2021
Stockholm University
2021
University of Massachusetts Lowell
2021
University of Glasgow
2017-2020
We find firms’ work-related injury rates are negatively associated with the level of analyst coverage. This result is also robust at establishment which we local analysts have a more profound impact than distant analysts. Cross-sectionally, our results exacerbated in firms weak internal governance mechanisms and industries low union representation. Finally, management likely to discuss safety issues during earnings conference calls presence Overall, suggest play an effective external...
Patriotic campaigns and mass mobilization draw on existing xenophobic attitudes of the public, reinforcing 'us vs. them' dualism between China 'the West'. However, patriotic are not always top-down, state-led, nor they primarily driven by political ideology. content appeals to a growing nationalist audience who consumes mixed feeling perceived victimization at hand foreign aggression pride arising from being Chinese citizen. This paper argues that profitability circulating social media...
Abstract How has China’s privacy protection strategy been developed, with its broad scope and stringent requirements for data localization cross-border flows? What are the broader geopolitical implications of divergence from Western models privacy? This paper argues that China's strategy, characterized by comprehensive regulatory framework government access to data, is redefining contours global governance creating new fault lines. Drawing on official documents, laws, regulations, a case...
"Revitalising the Silk Road. China’s Belt and Road Initiative." Europe-Asia Studies, 70(3), pp. 496–497
Accurate and fast thermal estimation is important for the runtime regulation of modern microprocessors due to excessive on-chip temperatures. However, nonlinear relationship between leakage power temperature, full-chip methods suffer slow speed scalability issue when increasing static considered. In this work, we propose a new leakage-aware method. Unlike traditional methods, which use iteration handle leakage-temperature nonlinearity dependency issue, method applies dynamic linearization...
"The Anatomy of Post-Communist Regimes. A Conceptual Framework." Europe-Asia Studies, 73(7), pp. 1385–1386
The People's Republic of China's (PRC) approach to data governance, centred on sovereignty, is much debated in academic literature. However, it remains unclear how the PRC's different state actors justify this approach. Based an analysis discourse and behaviour through strategic framing theory, their role as a privacy guardian can arguably be described strategically constructed. Chinese government legislative bodies have tailored communications present themselves champions individual...
Abstract This article examines the continuity of heteropatriarchal discourse within China’s population policies, focusing on transition from one-child policy to current three-children initiative, and women’s responses these official narratives. Through lens Foucauldian bio-politics, study explores how discursive practices surrounding family planning are manipulated sustain authoritarian rule, linking it with loyalty state fostering an anti-feminist support base that attributes collective...
This book represents the efforts to contextualise political violence in general and understand a heterogeneous set of actions influence various audiences subsequently effect or resist politi...
"Weaponized words: the strategic role of persuasion in violent radicalization and counter-radicalization." Behavioral Sciences Terrorism Political Aggression, ahead-of-print(ahead-of-print), pp. 1–2
"Understanding dark networks: a strategic framework for the use of social network analysis." Behavioral Sciences Terrorism and Political Aggression, 9(3), pp. 238–239
Click to increase image sizeClick decrease sizeKEYWORDS: Menstruationmisogynydigital feminist protestChinasocial media Disclosure statementNo potential conflict of interest was reported by the authors.Additional informationFundingThis work supported British Academy Postdoctoral Fellowship: [Grant Number PF20_100052].Notes on contributorsMing ZhangMing Zhang is currently an independent researcher after receiving a PhD in Media and Communication from Bournemouth University, UK. She scholar...
The configuration perspective in business management research is growing, but the lack of supportive method slows it down. Since Fiss(2007)proposed to use qualitative comparative analysis(QCA)to solve problem empirical from perspective, has been widely used overseas. Conversely, QCA still its initial stage with few achievements China. Based on a systematic review related literature adopting field at home and abroad, this paper summarizes that three major problems can be solved by QCA:...
Xi Jinping’s moves towards the “core” of Chinese leadership intrigued many observers – this “title,” was earned not only through years hard work in demonstrating achievements governance, ...
Abstract This special issue explores the relationship between digital trade and security, emphasizing geopolitical implications for global economy in age. The rapid growth of has introduced significant challenges opportunities, necessitating robust data governance to balance national security interests with free flow goods, services, across borders. papers explore different models championed by US, China, EU, highlighting complexities cross-border flows their impact on international...
Abstract The fight against terrorism prompts governments to differentiate between “good” religious practices and the “bad” ones. simplistic dichotomy of Muslims has led a cascade criticism, but fallacy underlying this dualism remains underexplored. This paper examines “no true Scotsman” that is prevalent in political discourse surrounding religion. It argues China's attempt counteract essentialist assumption about Uyghurs leads reinforced “good-versus-bad” dichotomous categorization Muslims,...
"The terrorists of Iraq: inside the strategy and tactics Iraq insurgency 2003–2014." Behavioral Sciences Terrorism Political Aggression, 8(3), pp. 227–228
This paper contributes to the debate on terrorism designation and proscription by providing information analysis "double-track" system of in China. It calls for greater attention China's as China has increased its engagement international affairs became more willing capable cooperation counterterrorism. The case provides important insights from a non-Western perspective into how states function dealing with challenge poses. In particular, it examines efforts balancing effective...
The mass line principle offers an alternative approach to mobilize citizens participate in governance. key tenets of the resemble that regime community engagement, aiming at encouraging democratic participation, improving trust between rule and ruled, ability government gather intelligence. In context China’s counterterrorism strategy, involves citizens’ participation People’s War on Terror, incentivizing individuals provide tip-offs, engaging patriotic believers, opinion leaders,...
"Using human rights to counter terrorism." Behavioral Sciences of Terrorism and Political Aggression, 12(2), pp. 169–170
Abstract We minimize the stray electric field in a linear Paul trap quickly and accurately, by applying interferometry pulse sequences to trapped ion optical qubit. The are sensitive change of equilibrium position when stiffness is changed, we use this determine field. simplest sequence two-pulse Ramsey sequence, longer with multiple pulses offer higher precision. methods allow strength be minimized beyond state-of-the-art levels. Using nine reduce 2D (10.5 ± 0.8) mV m −1 11 s measurement...