1,630
Views
31
CrossRef citations to date
0
Altmetric
Articles

Regional variation in Chinese internet filtering

Pages 121-141 | Received 31 Aug 2012, Accepted 30 Sep 2013, Published online: 05 Nov 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Houcai Wang, Li Xiong, Chengwen Wang & Nan Chen. (2022) Understanding Chinese mobile social media users’ communication behaviors during public health emergencies. Journal of Risk Research 25:7, pages 874-891.
Read now
Ying Miao. (2020) Managing digital contention in China. Journal of Cyber Policy 5:2, pages 218-238.
Read now
Stephanie Na Liu & Tsan-Kuo Chang. (2018) One Disaster, Three Institutional Responses. Journalism Studies 19:3, pages 392-414.
Read now
Joyce Y. M. Nip & King-wa Fu. (2016) Networked framing between source posts and their reposts: an analysis of public opinion on China's microblogs. Information, Communication & Society 19:8, pages 1127-1149.
Read now

Articles from other publishers (25)

Lisa-Maria Neudert. (2023) Regulatory capacity capture: the United Kingdom’s online safety regime. Internet Policy Review 12:4.
Crossref
WeiMing Ye & Luming Zhao. (2023) “I know it's sensitive”: Internet censorship, recoding, and the sensitive word culture in China. Discourse, Context & Media 51, pages 100666.
Crossref
Angela Xiao Wu & Luzhou Li. (2021) Localism in Internet governance: The rise of China's provincial web. China Information 36:2, pages 262-282.
Crossref
Yanan Cheng, Yali Liu, Chao Li, Zhaoxin Zhang, Ning Li & Yuejin Du. (2022) In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time. Electronics 11:8, pages 1276.
Crossref
Michael Collyer & Joss Wright. (2021) A Bayesian Analysis of Collective Action and Internet Shutdowns in India. A Bayesian Analysis of Collective Action and Internet Shutdowns in India.
Zachary Weinberg, Diogo Barradas & Nicolas Christin. (2021) Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China. Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China.
Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill & Michalis Polychronakis. (2020) Assessing the Privacy Benefits of Domain Name Encryption. Assessing the Privacy Benefits of Domain Name Encryption.
Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin & Phillipa Gill. (2020) ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform.
Daniela Stockmann. (2018) Toward Area-Smart Data Science: Critical Questions for Working With Big Data From China. Policy & Internet 10:4, pages 393-414.
Crossref
Joss Wright, Alexander Darer & Oliver Farnan. (2018) On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship. On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship.
Alexander Darer, Oliver Farnan & Joss Wright. (2018) Automated Discovery of Internet Censorship by Web Crawling. Automated Discovery of Internet Censorship by Web Crawling.
H. B. Acharya, Sambuddho Chakravarty & Devashish Gosain. (2017) Few Throats to Choke: On the Current Structure of the Internet. Few Throats to Choke: On the Current Structure of the Internet.
Rony Medaglia & Demi Zhu. (2017) Public deliberation on government-managed social media: A study on Weibo users in China. Government Information Quarterly 34:3, pages 533-544.
Crossref
Alexander Darer, Oliver Farnan & Joss Wright. (2017) FilteredWeb: A framework for the automated search-based discovery of blocked URLs. FilteredWeb: A framework for the automated search-based discovery of blocked URLs.
Zachary Weinberg, Mahmood Sharif, Janos Szurdi & Nicolas Christin. (2017) Topics of Controversy: An Empirical Analysis of Web Censorship Lists. Proceedings on Privacy Enhancing Technologies 2017:1, pages 42-61.
Crossref
Sebastian Hellmeier. (2016) The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes. Politics & Policy 44:6, pages 1158-1191.
Crossref
Oliver Farnan, Alexander Darer & Joss Wright. (2016) Poisoning the Well. Poisoning the Well.
Rony Medaglia & Demi Zhu. (2016) Paradoxes of Deliberative Interactions on Government-Managed Social Media. Paradoxes of Deliberative Interactions on Government-Managed Social Media.
Helen Margetts & Christopher Hood. 2016. Contemporary Approaches to Public Policy. Contemporary Approaches to Public Policy 133 154 .
Ruben Bloemgarten & Pascal Haakmat. (2015) Submission Summary ACM SigComm2015 - Workshop on Ethics in Networked Systems Research - Considerations from practical examples.. Submission Summary ACM SigComm2015 - Workshop on Ethics in Networked Systems Research - Considerations from practical examples..
Yudhistira Nugraha, Kautsarina & Ashwin Sasongko Sastrosubroto. (2015) Towards data sovereignty in cyberspace. Towards data sovereignty in cyberspace.
Terry Flew. 2015. The International Encyclopedia of Digital Communication and Society. The International Encyclopedia of Digital Communication and Society 1 10 .
Matthaus Wander, Christopher Boelmann, Lorenz Schwittmann & Torben Weis. (2014) Measurement of Globally Visible DNS Injection. IEEE Access 2, pages 526-536.
Crossref
Daniela Stockmann. (2016) Towards Area-Smart Data Science: Critical Questions for Working with Big Data from China. SSRN Electronic Journal.
Crossref
Yudhistira Nugraha, Kautsarina .Ashwin Sasongko Sastrosubroto. (2015) Towards Data Sovereignty in Cyberspace. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.