Baranovitch, N. (2003) ‘From the margins to the centre: the Uyghur challenge in Beijing’, The China Quarterly 175.
Bejtlich, R. et al. (2013) APT1: exposing one of China’s cyber espionage units, Alexandria VA: Mandiant.
Brautigam, D. (2009) The Dragon’s Gift: the real story of China in Africa, Oxford: Oxford University Press.
Buruma, I. (2001) Bad Elements: Chinese rebels from Los Angeles to Beijing, New York NY: Random House.
Callanan, C., H. Dries-Ziekenheiner, A. Escudero-Pascual and R. Guerra (2011) Leaping Over the Firewall: a review of censorship circumvention tools, Washington DC: Freedom House, https://freedomhouse.org/sites/default/files/inline_images/Censorship.pdf.
Chase, M. and J. Mulvenon (2002) You’ve Got Dissent! Chinese dissident use of the internet and Beijing’s counter-strategies, Santa Monica CA: Rand Corporation.
Chiu, J. et al. (2018) Forbidden Feeds: government controls on social media in China, New York NY: PEN America.
Cliff, T. (2016) Oil and Water: being Han in Xinjiang, Chicago IL: University of Chicago Press.
Cook, S. (2017) The Battle for China’s Spirit: religious revival, repression, and resistance under Xi Jinping, Washington DC: Freedom House, https://freedomhouse.org/sites/default/files/FH_ChinasSprit2016_FULL_FINAL_140pages_compressed.pdf.
Corera, G. (2016) Intercept: the secret history of computers and spies, London: Weidenfeld and Nicolson.
Damm, J. and S. Thomas (2006) Chinese Cyberspaces: technological changes and political effects, Abingdon: Routledge.
Deibert, R. (2013) Black Code: inside the battle for cyberspace, Toronto: McClelland & Stewart.
DeLisle, J., A. Goldstein and G. Yang (2016) The Internet, Social Media, and a Changing China, Philadelphia PA: University of Pennsylvania Press.
Dickson, B. (2016) The Dictator’s Dilemma: the Chinese Communist Party’s strategy for survival, Oxford: Oxford University Press.
Dikotter, F. (2016) The Cultural Revolution: a people’s history, 1962–1976, London: Bloomsbury.
Epstein, H. (2017) Another Fine Mess: America, Uganda, and the War on Terror, New York NY: Columbia Global Reports.
Faris, R., J. Palfrey, E. Zuckerman, H. Roberts and J. York (2010) ‘2010 circumvention tool usage report’, Cambridge MA: Berkman Klein Center for Internet and Society at Harvard University, 14 October, https://cyber.harvard.edu/publications/2010/Circumvention_Tool_Usage.
Fish, E. (2015) China’s Millennials: the want generation, Lanham MD: Rowman & Littlefield.
French, H. (2014) China’s Second Continent: how a million migrants are building a new empire in Africa, New York NY: Alfred A. Knopf.