Online Privacy Protection in Chinese City Governments: An Analysis of Privacy Statements

  • Christopher G. Reddick
  • Yueping Zheng


e-Government in China has made great progress in its development. However, many challenges stills persist with privacy protection being a serious issue. In this chapter, we analyse privacy statements in city governments in China. We chose the 100 largest cities in China based on their GDP ranking and evaluated their privacy statement performance through an index. The study found that the overall performance was poor with an average score of 26.63 out of 100 cities’ use of privacy statements showed that greater performance was explained by economy, budget, and location factors. With more and more public services being provided through government websites, city governments need to have stronger privacy protection to create a better environment for e-Government development.


  1. Alhomod, S. M., & Shafi, M. M. (2012). Privacy policy in e-government websites: A case study of Saudi Arabia. Computer and Information Science, 5(2), 88–93.CrossRefGoogle Scholar
  2. Al-Jamal, M., & Abu-Shanab, E. (2015a). Privacy policy of e-government websites and the effect on users’ privacy. ICIT 2015 The 7th International Conference on Information Technology, 4, 338–344.Google Scholar
  3. Al-Jamal, M., & Abu-Shanab, E. (2015b). Privacy policy of e-government websites: An itemized checklist proposed and tested. Management Research and Practice, 7(3), 80–95.Google Scholar
  4. Bannister, F. (2005). The panoptic state: Privacy, surveillance and the balance of risk. Information Polity: The International Journal of Government & Democracy in the Information Age, 10(1, 2), 65–80.Google Scholar
  5. Bannister, F. (2007). The curse of the benchmark: An assessment of the validity and value of e-government comparisons. International Review of Administrative Sciences, 73(2), 171–188.CrossRefGoogle Scholar
  6. Bannister, F., & Connolly, R. (2011). Trust and transformational government: A proposed framework for research. Government Information Quarterly, 28(2), 137–147.CrossRefGoogle Scholar
  7. Belanche-Gracia, D., Casaló-Ariño, L. V., & Pérez-Rueda, A. (2015). Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions. Government Information Quarterly, 32(2), 154–163. doi: 10.1016/j.giq.2014.12.004.CrossRefGoogle Scholar
  8. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1042.Google Scholar
  9. Bélanger, F., & Hiller, J. S. (2006). A framework for e-government: Privacy implications. Business Process Management Journal, 12(1), 48–60.CrossRefGoogle Scholar
  10. Beldad, A., De Jong, M., & Steehouder, M. F. (2009). When the bureaucrat promises to safeguard your online privacy: Dissecting the contents of privacy statements on Dutch municipal websites. Government Information Quarterly, 26(4), 559–566. doi: 10.1016/j.giq.2009.05.002.CrossRefGoogle Scholar
  11. Beldad, A., De Jong, M., & Steehouder, M. (2010). Reading the least read? Indicators of users’ intention to consult privacy statements on municipal websites. Government Information Quarterly, 27(3), 238–244.CrossRefGoogle Scholar
  12. Beldad, A., Van der Geest, T., De Jong, M., & Steehouder, M. (2012). A cue or two and I’ll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens’ personal information disclosed online. Government Information Quarterly, 29(1), 41–49. doi: 10.1016/j.giq.2011.05.003.CrossRefGoogle Scholar
  13. Carter, L., & Bélanger, F. (2005). The utilization of e-government services: Citizen trust, innovation and acceptance factors. Information Systems Journal, 15(1), 5–25.CrossRefGoogle Scholar
  14. Carter, L., & McBride, A. (2010). Information privacy concerns and e-government: A research agenda. Transforming Government: People, Process and Policy, 4(1), 10–13. doi: 10.1108/17506161011028777.CrossRefGoogle Scholar
  15. Dawes, S. S. (2010). Stewardship and usefulness: Policy principles for information-based transparency. Government Information Quarterly, 27(4), 377–383.CrossRefGoogle Scholar
  16. Dias, G. P., Gomes, H., & Zúquete, A. (2013). Privacy policies in web sites of portuguese municipalities: An empirical study. In Advances in information systems and technologies (pp. 87–96). Berlin; Heidelberg: Springer.CrossRefGoogle Scholar
  17. Drogkaris, P., Gritzalis, S., & Lambrinoudakis, C. (2013). Employing privacy policies and preferences in modern e-government environments. International Journal of Electronic Governance, 6(2), 101–116.CrossRefGoogle Scholar
  18. Dutton, W., Guerra, G. A., Zizzo, D. J., & Peltu, M. (2005). The cyber trust tension in E-government: Balancing identity, privacy, security. Information Polity: The International Journal of Government & Democracy in the Information Age, 10(1/2), 13–23.Google Scholar
  19. Hiller, J. S., & Bélanger, F. (2001). Privacy strategies for electronic government. In M. A. Abramson & G. E. Means (Eds.), E-Government 2001 (pp. 162–198). Lanham, MD: Rowman & Littlefield Publishers.Google Scholar
  20. Holzer, M., Manoharan, A., & Van Ryzin, G. (2010). Global cities on the web: An empirical typology of municipal websites. International Public Management Review, 11(3), 104–121.Google Scholar
  21. Huang, Z. (2007). A comprehensive analysis of U.S. counties’ e-Government portals: Development status and functionalities. European Journal of Information Systems, 16(2), 149–164.CrossRefGoogle Scholar
  22. Huang, Z., & Benyoucef, M. (2014). Usability and credibility of e-government websites. Government Information Quarterly, 31(4), 584–595.CrossRefGoogle Scholar
  23. Janssen, M., & Van den Hoven, J. (2015). Big and open linked data (BOLD) in government: A challenge to transparency and privacy? Government Information Quarterly, 32(4), 363–368.CrossRefGoogle Scholar
  24. Liu, J., & Jiang, X. (2015). Analysis to current legislation of China’s internet security of personal information. Retrieved July 24 from
  25. Liu, X., & Lin, Q. (2014). 12306 website responds to data leakage of 130,000 users. Retrieved July 20, 2016, from
  26. Manoharan, A., Fudge, M., & Zheng, Y. (2015). Global clusters in municipal e-governance: A longitudinal study. International Journal of Public Administration, 38(2), 116–131.CrossRefGoogle Scholar
  27. McCarthy, L., & Yates, D. (2010). The use of cookies in federal agency web sites: Privacy and recordkeeping issues. Government Information Quarterly, 27(3), 231–237.CrossRefGoogle Scholar
  28. McNeal, R. S., Tolbert, C. J., Mossberger, K., & Dotterweich, L. J. (2003). Innovating in digital government in the American States. Social Science Quarterly, 84(1), 52–70.CrossRefGoogle Scholar
  29. Pina, V., Torres, L., & Royo, S. (2009). E-government evolution in EU local governments: A comparative perspective. Online Information Review, 33(6), 1137–1168.CrossRefGoogle Scholar
  30. Qihoo 360. (2015). 2015 China website security report. Retrieved July 22, 2016, from
  31. Reddick, C. G. (2004). Public-sector e-commerce and state financial management. Social Science Computer Review, 22(3), 293–306.CrossRefGoogle Scholar
  32. Rorissa, A., Demissie, D., & Pardo, T. (2011). Benchmarking e-government: A comparison of frameworks for computing e-government index and ranking. Government Information Quarterly, 28(3), 354–362.CrossRefGoogle Scholar
  33. Shao, G. (2012). Internet law in China. Oxford: Chandos Publishing.CrossRefGoogle Scholar
  34. Tolbert, C. J., Mossberger, K., & McNeal, R. (2008). Institutions, policy innovation, and e-government in the American States. Public Administration Review, 68(3), 549–563.CrossRefGoogle Scholar
  35. Torres, L., Pina, V., & Acerete, B. (2005). E-government developments on delivering public services among EU cities. Government Information Quarterly, 22(2), 217–238.CrossRefGoogle Scholar
  36. Tsohou, A., Lee, H., & Zahir, I. (2014). Innovative public governance through cloud computing. Transforming Government: People, Process and Policy, 8(2), 251–282.CrossRefGoogle Scholar
  37. Welch, E. W., Hinnant, C. C., & Moon, M. J. (2005). Linking citizen satisfaction with e-government and trust in government. Journal of Public Administration Research and Theory, 15(3), 371–391.CrossRefGoogle Scholar
  38. Wu, Y. (2014). Protecting personal data in E-government: A cross-country study. Government Information Quarterly, 31(1), 150–159.CrossRefGoogle Scholar
  39. Zhang, L. (2013). China: NPC decision on network information protection. Retrieved July 20, 2016, from
  40. Zhang, X. (2015). From privacy to personal information: Theory of interest balancing and institutional arrangement. Chinese Laws, 3, 38–59.Google Scholar
  41. Zhao, J. J., & Zhao, S. Y. (2010). Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly, 27(1), 49–56.CrossRefGoogle Scholar
  42. Zheng, Y., Schachter, H. L., & Holze, M. (2014). The impact of government form on e-participation: A study of New Jersey municipalities. Government Information Quarterly, 31(4), 653–659.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Christopher G. Reddick
    • 1
  • Yueping Zheng
    • 2
  1. 1.The University of Texas at San AntonioSan AntonioUSA
  2. 2.Sun Yat-sen UniversityGuangzhouChina

Personalised recommendations