427
Views
3
CrossRef citations to date
0
Altmetric
Research

A critical discourse analysis of the human flesh search engine

Pages 18-34 | Received 08 Jan 2016, Accepted 29 May 2018, Published online: 27 Jun 2019

References

  • Andrejevic, M. (2006). The work of watching one another: Lateral surveillance, risk, and governance. Surveillance & Society, 2(4): 479–497.
  • Bradsher, K. (2012, December 28). China toughens its restrictions on use of the internet. New York Times. Retrieved January 14, 2013 from http://www.nytimes.com/2012/12/29/world/asia/china-toughens-restrictions-on-internet-use.html
  • Bensinger, K., & Chan, A. (2013, April 20). Boston bombings: Social media spirals out of control. Los Angeles Times. Retrieved October 18, 2013 from http://articles.latimes.com/2013/apr/20/business/la-fi-boston-bombings-media-20130420
  • Chao, C. H. (2011, July). Reconceptualizing the mechanism of Internet human flesh search: A review of the literature. Paper presented at the 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan.
  • Cascio, J. (2005). The rise of the participatory panopticon. Posted, 4, 178–201.
  • Chen, R., & Sharma, S. K. (2011). Human flesh search—Facts and issues. Journal of Information Privacy & Security, 7(1), 50–72. doi:10.1080/15536548.2011.10855905
  • Chen, Y., Shen, L., & Zhu, J. (2011). National interest and international news reporting: How differently do China Daily and the New York Times report the 2009 Copenhagen climate change conference? Asia – Pacific Science and Culture Journal, 1(2), 1–13.
  • Cheong, P. H., & Gong, J. (2010). Cyber vigilantism, transmedia collective intelligence, and civic participation. Chinese Journal of Communication, 3(4), 471–487. doi:10.1080/17544750.2010.516580
  • Cheung, A. S. Y. (2009). China internet going wild: Cyber-hunting versus privacy protection. Computer Law & Security Review: The International Journal of Technology and Practice, 25(3), 275–279. doi:10.1016/j.clsr.2009.03.007
  • Cheung. A. S. Y. (2009). A study of cyber-violence and Internet service providers liability: Lessons from China. Pacific Rim Law & Policy Journal, 18, 323–346.
  • China Daily. (2009, January 22). Ban human flesh search. Retrieved July 15, 2012, from the Access World News database.
  • China Daily. (2010a, May 12). Anonymity does not just feed malice. Human flesh search could turn predatory. Retrieved July 15, 2012, from the Access World News database.
  • China Daily. (2010b, May 4). Human flesh search could turn predatory. Retrieved July 15, 2012, from the Access World News database.
  • Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: global concerns and local responses. New Media and Society, 11(3), 395–416. doi:10.1177/1461444808101618
  • Cohen, J. (2012). Configuring the networked self: Law, code, and the play of everyday practice. New Haven, CT: Yale University.
  • Downey, T. (2010, March 7). Cyberposse. The International Herald Tribune, p. 38. Retrieved April 15, 2012 from the Lexis Nexis Academic Database.
  • Esarey, A., & Qiang, X. (2011). Digital communication and political change in China. International Journal of Communication, 5, 298–319.
  • Fairclough, N. (1993). Critical discourse analysis and marketization of public discourse: the universities. Discourse & Society, 4(2), 133–159. doi:10.1177/0957926593004002002
  • Fairclough, N. (1995). Media discourse. London: Edward Arnold.
  • Fairclough, N., & Wodak, R. (1997). Critical discourse analysis. In T. Van Dijk (Ed.), Discourse as social interaction (pp. 258–284). London: Sage.
  • Foucault, M. (1980). Power/knowledge: Selected interviews and other writings. New York: Pantheon.
  • Herold, D. K. (2011). Human flesh search engine: Carnivalesque riots as components of a “Chinese Democracy.” In D. K. Herold & P. Marolt (Eds.), Online society in China: Creating, celebrating, and instrumentalising the online carnival (pp. 127–145). Abingdon, Oxon: Routledge.
  • Jingchun, C. (2005). Protecting the right to privacy in China. Victoria University of Wellington Law Review, 36, 645–664.
  • Lee, C. C. (2002). Established pluralism: U.S. Elite media discourse about China policy. Journalism Studies, 3, 383–397.
  • Lee, F. L. F, Lee, C. C., & Li, N. L. (2011). Chinese peasants in the process of economic reform: An analysis of New York Times’ and Washington Post’s opinion discourses, 1981–2008. Communication, Culture & Critique, 4(2), 164–183. doi:10.1111/j.1753-9137.2011.01097.x
  • Liu, F. (2011). Urban youth in China: Modernity, the internet and the self. New York, NY: Routledge.
  • Lü, Y. H. (2005). Privacy and data privacy issues in contemporary China. Ethics and Information Technology, 7, 7–15. doi:10.1007/s10676-005-0456-y
  • Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.
  • Maisog, M. E. (2009). Personal information protection in China. Beijing, China: Hunton & Williams LLP. Retrieved January 15, 2013 from http://www.huntonfiles.com/files/webupload/PrivacyLaw_Personal_Information_Protection_in_China.pdf
  • Mansell, R. (2004). Political economy, power and new media. New Media & Society, 6(1), 96–105. doi:10.1177/1461444804039910
  • Marx, G. (2006). Soft surveillance. In T. Monahan (Ed.), Surveillance and security (pp. 37–56). New York, NY: Routledge.
  • McDonald, M. (2008, December 20). China court takes aim at vigilantism on Internet; Bloggers had exposed unfaithful husband. The International Herald Tribune, p. 1. Retrieved April 15, 2012 from the Lexis Nexis Academic Database.
  • McDougall, B. (2004). Privacy in modern China. History Compass, 2, 1–8.
  • Morozov, E. (2011). The net delusion: The dark side of Internet freedom. New York, NY: Public Affairs.
  • Ong, R. (2012). Online vigilante justice Chinese style and privacy in China. Information & Communications Technology Law, 21(2), 127–145. doi:10.1080/13600834.2012.678653
  • Pan, X. (2010). Hunt by the crowd: An exploratory qualitative analysis on cyber surveillance in China. Global Media Journal 9(16), 1–19. Retrieved April 29 2012 from http://lass.purduecal.edu/cca/gmj/sp10/graduate/gmj-sp10-grad-article-pan.htm
  • Parenti, C. (2003). Soft cage: Surveillance in America from slavery to the war on terror. New York: Basic Books.
  • Peterson, A. (2013, September 16). Reddit bans subreddit dedicated to finding the Navy Yard shooters. The Washington Post. Retrieved October 18, 2013 from http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/16/reddit-bans-subreddit-for-finding-the-navy-yard-shooters/
  • United Nations. (1948). Universal Declaration of Human Rights. Retrieved Jan 28, 2013 from http://www.un.org/en/documents/udhr/index.shtml
  • Van Dijk, T. A. (1985). Introduction: The role of discourse analysis in society. In T. Van Dijk (Ed.), Handbook of discourse analysis (pp. 1–8). London: Academic Press.
  • Van Dijk, T. A. (1991). The interdisciplinary study of news as discourse. In N.W. Jankowski & K. B. Jensen (Eds.), A handbook of qualitative research methodologies (pp. 109–119). New York: Routledge.
  • Van Dijk, T. A. (1993). Principles of critical discourse analysis. Discourse & Society, 4(2), 249–283. doi:10.1177/0957926593004002006
  • Van Dijk, T.A. (1997). Discourse as interaction in society. In: T. A. Van Dijk (Ed.), Discourse as social interaction (pp. 1–37). London: Sage.
  • Wang, B., Hou, B. Yao, Y. & Laibin, Y. (2009). Human flesh search model: Incorporating network expansion and gossip with feedback. In Proceedings of the Distributed Simulation and Real Time Applications, Singapore, 82–88. doi:10.1109/DS-RT.2009.36
  • Wang, F. Y., Zeng, D., Hendler, J. A., Zhang, Q., Feng Z., Gao, Y., Wang, H. & Lai, G. (2010). A study of the human flesh search engine: Crowd-powered expansion of online knowledge. Computer (IEEE Computer Society), 43(8), 45–53. doi:10.1109/MC.2010.216
  • Wang, H. (2011). Protecting privacy in China. Berlin: Springer-Verlag.
  • Wang, H., & Yin, L. (2010). People-centered myth: Representation of the Wenchuan earthquake in China Daily. Discourse & Communication, 4(4), 383–398. doi:10.1177/1750481310381581
  • Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193. doi:10.2307/1321160
  • Whitman, J. Q. (2004). The two western cultures of privacy: Dignity versus liberty. The Yale Law Journal, 113, 1151. Retrieved Dec 26, 2012 from http://www.yalelawjournal.org/the-yale-law-journal/content-pages/the-two-western-cultures-of-privacy:-dignity-versus-liberty/ doi:10.2307/4135723
  • Wines, M. (2009, June 17). Civic-minded Chinese find a new and louder voice online. The International Herald Tribune, p. 6. Retrieved April 15, 2012 from the LexisNexis Academic Database.
  • Wood, D. (2005). Editorial: People watching people. Surveillance & Society, 2(4), 474–478.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.