For most of its history, the SSC has been conceived as a narrow market reform initiative. The system was designed in 1999 when then-Premier Zhu Rongji attempted to mitigate the difficulties faced by foreign companies in obtaining information about their Chinese partners (Raphael and Xi 2019). For years after the system was mentioned at the 16th Party Congress in 2002 as part of the Chinese Communist Party`s (CCP) efforts to create a “unified, open, competitive, and orderly modern market system,” official documents discussed it only in the context of market reforms (Jiang 2002). In 2007, credit, tax and contract enforcement records were proposed as possible elements of social credit status (Chorzempa et al., 2018). The Interministerial Conference on the Development of Social Credit Systems (the “Interministerial Conference”) was organized, composed mainly of government agencies responsible for development, trade and taxation (中华人民共和国中央人民政府国务院办公厅, 2007). Some security and privacy courses may not count towards the concentration requirements. These courses all serve different important purposes, but do not correspond to the concentration as it is currently designed. For example, 17-331 is more appropriate for students who are interested in a broader introduction to information security, but have too much overlap with the introductory concentration course required to count in the concentration. For other excluded courses, please visit the concentration website. Illing, Sean, “A political scientist explains how big data is changing politics.” Vox.

16. March 2017, www.vox.com/conversations/2017/3/16/14935336/big-data-politics-donald-trump-2016-elections-polarization. The SCS Senior Honors thesis consists of 36 academic credit units for this work. Up to 12 units can be counted in the ML concentration. Students should contact the Computer Science Department for information about the SCS Senior Honors thesis. Once the student and consultant have agreed on a project, the student must submit a unilateral research proposal to the Director of the Machine Learning concentration to confirm that the project counts towards the Machine Learning concentration. The Security and Privacy Emphasis is designed to familiarize students with the key facets and concerns regarding computer security and privacy that guide practice, research, and legislation. Upon completion of the program, students will be well prepared to further develop their interest in security or privacy through graduate study.

hold security or privacy jobs that allow for training in relevant fields; and to be informed participants in public and other processes that shape the development of organizations and society to meet new challenges related to computer security or privacy. Huang, Yasheng. “Democratize or Die: Why Chinese Communists Face Reform or Revolution.” Foreign Affairs (January/February 2013). www.foreignaffairs.com/articles/china/2012-12-03/democratize-or-die. The system is currently designed to act as a platform for public shame and interactive data-driven propaganda. According to Chinese legal tradition, the court often pronounces the conviction of a criminal in a public place, symbolically affirming the Party`s control over public space and educating citizens about the cost of violating the law (Trevaskes 2003, 362-364). The SCS transports this model into the online space by revealing the identity of individuals, details of their behavior, and subsequent sanctions. The SCS would also act as a propaganda channel, crossing both the online and offline worlds. Even when the government publicly denounced a person in newspapers or film screenings, these ads often went unnoticed by people who did not use these media (Ahmed 2019). Under CBS, sanctions and rewards will be distributed more universally and standardized; Not everyone who has shown the same good behavior is on the red list, but people with similar social credit scores can still access the same benefits. In turn, blacklisted and red lists facilitate the dissemination of government messages by serving as role models from which others can learn.