{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:22:51Z","timestamp":1775470971294,"version":"3.50.1"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1553069"],"award-info":[{"award-number":["1553069"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Annals Hist. Comput."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/mahc.2022.3220114","type":"journal-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T22:31:31Z","timestamp":1667860291000},"page":"43-54","source":"Crossref","is-referenced-by-count":2,"title":["Tool, Doctor, and Hooligan: History of Antivirus Software in China, 1989\u20132010"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7405-5491","authenticated-orcid":false,"given":"Yue","family":"Zhao","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Rebecca","family":"Slayton","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1353\/tech.2018.0149"},{"key":"ref56","article-title":"Tencent vs. Qihoo: &#x2018;Privacy peeking software&#x2019; sparked a dispute","volume":"29","author":"mo","year":"2010","journal-title":"PC Digest"},{"key":"ref59","article-title":"Notice on the implementation of the &#x2018;Software industry revitalization action plan (2002-2005)&#x2019; to combat software piracy","year":"2003"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2009.2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198295372.001.0001"},{"key":"ref52","first-page":"69","article-title":"The Impact of Microelectronics and Computer Technology on China","volume":"2","author":"liu","year":"1987","journal-title":"Kexue dui shehui de yingxiang (Sci Soc )"},{"key":"ref55","article-title":"Where have you gone, Peter Norton?","author":"mccracken","year":"2014"},{"key":"ref54","first-page":"20","article-title":"Binlai jiangdang shuilai tuyan [Roll with the punches]","volume":"3","author":"lu","year":"1994","journal-title":"Comput Fan China"},{"key":"ref51","author":"ling","year":"2002","journal-title":"Electronic Information Research Information Technology 2002"},{"key":"ref50","author":"ling","year":"2007","journal-title":"China's New Revolution from Zhongguancun to Chinese Society 1980-2006 Di 1 Ban"},{"key":"ref46","first-page":"26","article-title":"The misunderstandings in the field of antivirus","volume":"2","author":"li","year":"1994","journal-title":"Chinese Computer User"},{"key":"ref45","first-page":"89","article-title":"On the logic lock crime in computers","volume":"6","author":"li","year":"1997","journal-title":"J Jiangsu Public Secur College"},{"key":"ref48","article-title":"News report on the &#x2018;logic bomb&#x2019; accident","volume":"2","author":"liao","year":"1997","journal-title":"Collected Volumes Popular Comput Week"},{"key":"ref47","first-page":"2","article-title":"Review and outlook of China's information security industry market","volume":"8","author":"li","year":"2003","journal-title":"Comput Secur"},{"key":"ref42","article-title":"The Chinese software industry","author":"xue","year":"2005","journal-title":"From Underdogs to Tigers The Rise and Growth of the Software Industry in Brazil China India Ireland and Israel"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/2.402080"},{"key":"ref44","article-title":"China celebrates 10 years of being connected to the Internet","author":"lemon","year":"2004"},{"key":"ref43","first-page":"28","article-title":"General principles and implementation methods for manual removal of computer viruses","volume":"2","author":"lei","year":"1994","journal-title":"Chinese Computer User"},{"key":"ref49","article-title":"Follow-up report on the &#x2018;logic bomb&#x2019; accident","volume":"2","author":"liao","year":"1997","journal-title":"Collected Volumes Popular Comput Week"},{"key":"ref8","author":"buzan","year":"1998","journal-title":"Security A New Framework for Analysis"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1353\/tech.1999.0165"},{"key":"ref9","article-title":"KILL signature update","year":"2000"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1353\/ahc.2016.0042"},{"key":"ref3","article-title":"China's personal-computer industry is starting to beat out U.S. companies","author":"arnold","year":"1997","journal-title":"Wall Street Journal - Eastern Edition"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1163\/9781684171118_016","article-title":"DOS Ex Machina: The microelectronic ghost in China's modernization machine","author":"baum","year":"1989"},{"key":"ref5","article-title":"Ruixing Kaka yeshi liumang le [Rising's Kaka is also turning into hooligans]","year":"2006"},{"key":"ref100","article-title":"Hui dajia de fanghuo qiang [Firewalls that &#x2018;fight&#x2019; each other]","volume":"8","author":"zhu","year":"2003","journal-title":"Computer Fan"},{"key":"ref101","author":"zimmerman","year":"2014","journal-title":"China Law Deskbook A Legal Guide for Foreign-Invested Enterprises"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2016.22"},{"key":"ref35","article-title":"Tencent and 360, we have become the victims of your profits","year":"2010"},{"key":"ref34","author":"jiang","year":"2002","journal-title":"Xin Meiti Zhengzhan [New Media in War]"},{"key":"ref37","first-page":"70","article-title":"Security raid - KILL's 20 years of transformation","volume":"35","year":"2009","journal-title":"China Computer & Network"},{"key":"ref36","first-page":"19","article-title":"Who will practice as a computer &#x2018;doctor&#x2019;? An emerging business opportunity","volume":"7","author":"jin","year":"1999","journal-title":"China Quality Miles"},{"key":"ref31","first-page":"33","article-title":"Shutong Chafang [The Book Boy's Tea House]","volume":"14","author":"huang","year":"2011","journal-title":"Computer Fan"},{"key":"ref30","first-page":"25","article-title":"Young man overcomes computer virus","volume":"35","author":"huang","year":"1992","journal-title":"Beijing Review"},{"key":"ref33","author":"ping","year":"2000","journal-title":"Jisuanji Fanzui Wenti Yanjiu [Research On Computer Crime]"},{"key":"ref32","article-title":"A first look at computer security products","author":"jiang","year":"1998","journal-title":"Zhongguo Kexue Jishu Wenku [China Scince & Technology Archive]"},{"key":"ref39","first-page":"1450","article-title":"Chinese initiative in the software industry&#x2013;Quest to leap","volume":"83","author":"kharbanda","year":"2002","journal-title":"Curr Sci"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctt14btfb4","author":"johnston","year":"2009","journal-title":"Technological turf wars a case study of the computer antivirus industry"},{"key":"ref24","article-title":"Computer antivirus program and disinfection and immunization program","author":"gao","year":"1989","journal-title":"Ruanjianbao (Software Weekly)"},{"key":"ref23","author":"fei","year":"1991","journal-title":"Zhengwu Xinxi Kexue Gailun [Introduction to Government Information Science]"},{"key":"ref26","year":"1990","journal-title":"Information Technology Development and Policy"},{"key":"ref25","article-title":"Spyware vs. spyware: Software conflicts and user autonomy","volume":"16","author":"grimmelmann","year":"2020","journal-title":"Ohio State Law Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511605543"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262050937.001.0001"},{"key":"ref21","author":"edgerton","year":"2011","journal-title":"The Shock of the Old Technology and Global History since 1900"},{"key":"ref28","first-page":"206","article-title":"Regulation on and through software","author":"hu","year":"2013","journal-title":"Politics and Law Review"},{"key":"ref27","author":"hicks","year":"2018","journal-title":"Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1000-4254.2002.05.008"},{"key":"ref13","author":"chen","year":"2000","journal-title":"Jisuanji Bingdu Fangzhi Baishi Tong [The Computer Virus Protection and Prevention Know-it-All]"},{"key":"ref12","first-page":"17","article-title":"Reflections and prospects: The 30th anniversary of china's media reform","volume":"6","author":"chen","year":"2008","journal-title":"Chuanbo yu shehui xuekan (Commun Soc )"},{"key":"ref15","article-title":"The first statistical report on the development of the Internet in China","year":"1997"},{"key":"ref14","year":"1991","journal-title":"Statistics On Chinese Women 1949-1989 Di 1 Ban"},{"key":"ref97","first-page":"43","article-title":"Ruanjian chanpin de zhengdang fangwei [The justifiable Self-defense of software products]","volume":"4","author":"zhou","year":"1998","journal-title":"Chinese Lawyer"},{"key":"ref96","year":"2005","journal-title":"Regulations of the PRC For Safety Protection of Computer Information Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.1997.10018"},{"key":"ref99","article-title":"For antivirus, I have free Kaspersky","volume":"11","author":"zhu","year":"2006","journal-title":"Modern Computer"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4324\/9780203937419"},{"key":"ref98","author":"zhou","year":"1994","journal-title":"Zuixin PC Ji Shiyong Jichu Jiaocheng [Updated Practical Basic Tutorial for PC]"},{"key":"ref17","year":"2002","journal-title":"Dalian City Gazetteers Gazetteer of the Bureau of Statistic"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2008.71"},{"key":"ref19","article-title":"China's personal cyber security market will reach 1.22 billion yuan","volume":"9","author":"shangwu","year":"2007","journal-title":"Dianzi Shangwu"},{"key":"ref18","article-title":"State public security authorities confirm KV300L++ logic lock illegal","year":"1997"},{"key":"ref93","first-page":"15","article-title":"The only oasis that withstands piracy","volume":"3","author":"zhang","year":"2000","journal-title":"China Computerworld"},{"key":"ref92","article-title":"Encountering network psoriasis: The lack of basis for determining hooligan software","author":"zhang","year":"2006","journal-title":"PC Week China"},{"key":"ref95","first-page":"76","article-title":"1995-1996 annual reader report","volume":"17","year":"1996","journal-title":"Chinese Computer User"},{"key":"ref94","article-title":"Jisuanji daode chutan [A first look at computer ethics]","author":"zhang","year":"1990","journal-title":"Proc 5th Nat Comput Secur Technol Exchange Conf"},{"key":"ref91","first-page":"16","article-title":"Dirty and unhealthy: On the prevention of viruses","volume":"2","author":"yun","year":"1998","journal-title":"Comput Fan China"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2015.21"},{"key":"ref89","first-page":"42","article-title":"The march of IDES","volume":"38","author":"yost","year":"2016","journal-title":"IEEE Ann Hist Comput"},{"key":"ref86","article-title":"Issues to keep in mind when writing antivirus programs","author":"yang","year":"1992","journal-title":"Software Weekly"},{"key":"ref85","article-title":"Computer virus maker stands trial","year":"2007"},{"key":"ref88","author":"yin","year":"1994","journal-title":"Jisuanji Anquan Yu Bingdu Fangzhi [Computer Security and Virus Control]"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.19629\/j.cnki.34-1014\/f.1993.02.017"},{"key":"ref82","first-page":"210","article-title":"Kuaru gaokeji hangye de qianhou [Before and after entering the high-tech industry]","author":"wang","year":"1995","journal-title":"Zhifu Cultural and Historical Archives Vol 8 Scince & Technology"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.4324\/9781003070672"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2015.75"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.16791\/j.cnki.sjg.1994.04.024"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2011.38"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3072-7"},{"key":"ref78","article-title":"Individuals using the Internet (% of population) - China | data","year":"2021"},{"key":"ref75","article-title":"Jiangmin Wang and the KV300 phenomena","author":"song","year":"1997"},{"key":"ref74","article-title":"QQ li chuxian yisheng [A doctor in QQ]","year":"2006"},{"key":"ref77","article-title":"The battle of words reflects the transitioning business model","author":"tang","year":"2010","journal-title":"China Information World"},{"key":"ref102","author":"zuboff","year":"2019","journal-title":"The Age of Surveillance Capitalism The Fight for A Human Future at the New Frontier of Power"},{"key":"ref76","first-page":"138","article-title":"Black Friday, April 13th","author":"sun","year":"1990","journal-title":"Zhongguo Xinwen Jiang Zuopin Xuan 1990 Nian Shoujie [Selected Works of the First China Journalism Award 1990]"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226189666.001.0001"},{"key":"ref1","author":"abbate","year":"2017","journal-title":"Recoding Gender Women's Changing Participation in Computing"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1353\/tech.2018.0004"},{"key":"ref70","article-title":"Appendix iI","year":"1989","journal-title":"Software Weekly 1989 Collected Volume 250&#x2013;80"},{"key":"ref73","author":"simon","year":"1986","journal-title":"China's Evolving Computer Industry The Role of Foreign Technology Transfers"},{"key":"ref72","first-page":"4","article-title":"Liu Xu, the one who dance with viruses","volume":"8","author":"shan","year":"1999","journal-title":"Ruanjian [Software]"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1215\/08992363-2346250"},{"key":"ref67","article-title":"Suo de wuqu [The misconception of locks]","year":"1998"},{"key":"ref69","article-title":"KV300 hefa yonghu shenshou qihai [Legitimate users of KV300 are victimized]","author":"ruan","year":"1997"},{"key":"ref64","author":"qian","year":"2001","journal-title":"The Complete Book of Computer Network Crime Prevention and Punishment Practice"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.21236\/ADA399699"},{"key":"ref66","article-title":"An open letter to Tencent and Qihoo 360","year":"2010","journal-title":"Tianya BBS Forum"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1596\/978-0-8213-6720-9"},{"key":"ref60","author":"o","year":"2013","journal-title":"The Computer Age in Hong Kong Dynamic Past Hesitant Present What Next?"},{"key":"ref62","article-title":"Diannao bingdu e si le [Computer virus starved into death]","volume":"42","author":"week","year":"1999","journal-title":"PC Week China"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2015.22"}],"container-title":["IEEE Annals of the History of Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/85\/10076845\/9940569-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/85\/10076845\/09940569.pdf?arnumber=9940569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T16:55:36Z","timestamp":1728320136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9940569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":102,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mahc.2022.3220114","relation":{},"ISSN":["1058-6180","1934-1547"],"issn-type":[{"value":"1058-6180","type":"print"},{"value":"1934-1547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,1]]}}}