References
- Andrejevic, M. (2006). The work of watching one another: Lateral surveillance, risk, and governance. Surveillance & Society, 2(4): 479–497.
- Bradsher, K. (2012, December 28). China toughens its restrictions on use of the internet. New York Times. Retrieved January 14, 2013 from http://www.nytimes.com/2012/12/29/world/asia/china-toughens-restrictions-on-internet-use.html
- Bensinger, K., & Chan, A. (2013, April 20). Boston bombings: Social media spirals out of control. Los Angeles Times. Retrieved October 18, 2013 from http://articles.latimes.com/2013/apr/20/business/la-fi-boston-bombings-media-20130420
- Chao, C. H. (2011, July). Reconceptualizing the mechanism of Internet human flesh search: A review of the literature. Paper presented at the 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan.
- Cascio, J. (2005). The rise of the participatory panopticon. Posted, 4, 178–201.
- Chen, R., & Sharma, S. K. (2011). Human flesh search—Facts and issues. Journal of Information Privacy & Security, 7(1), 50–72. doi:10.1080/15536548.2011.10855905
- Chen, Y., Shen, L., & Zhu, J. (2011). National interest and international news reporting: How differently do China Daily and the New York Times report the 2009 Copenhagen climate change conference? Asia – Pacific Science and Culture Journal, 1(2), 1–13.
- Cheong, P. H., & Gong, J. (2010). Cyber vigilantism, transmedia collective intelligence, and civic participation. Chinese Journal of Communication, 3(4), 471–487. doi:10.1080/17544750.2010.516580
- Cheung, A. S. Y. (2009). China internet going wild: Cyber-hunting versus privacy protection. Computer Law & Security Review: The International Journal of Technology and Practice, 25(3), 275–279. doi:10.1016/j.clsr.2009.03.007
- Cheung. A. S. Y. (2009). A study of cyber-violence and Internet service providers liability: Lessons from China. Pacific Rim Law & Policy Journal, 18, 323–346.
- China Daily. (2009, January 22). Ban human flesh search. Retrieved July 15, 2012, from the Access World News database.
- China Daily. (2010a, May 12). Anonymity does not just feed malice. Human flesh search could turn predatory. Retrieved July 15, 2012, from the Access World News database.
- China Daily. (2010b, May 4). Human flesh search could turn predatory. Retrieved July 15, 2012, from the Access World News database.
- Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: global concerns and local responses. New Media and Society, 11(3), 395–416. doi:10.1177/1461444808101618
- Cohen, J. (2012). Configuring the networked self: Law, code, and the play of everyday practice. New Haven, CT: Yale University.
- Downey, T. (2010, March 7). Cyberposse. The International Herald Tribune, p. 38. Retrieved April 15, 2012 from the Lexis Nexis Academic Database.
- Esarey, A., & Qiang, X. (2011). Digital communication and political change in China. International Journal of Communication, 5, 298–319.
- Fairclough, N. (1993). Critical discourse analysis and marketization of public discourse: the universities. Discourse & Society, 4(2), 133–159. doi:10.1177/0957926593004002002
- Fairclough, N. (1995). Media discourse. London: Edward Arnold.
- Fairclough, N., & Wodak, R. (1997). Critical discourse analysis. In T. Van Dijk (Ed.), Discourse as social interaction (pp. 258–284). London: Sage.
- Foucault, M. (1980). Power/knowledge: Selected interviews and other writings. New York: Pantheon.
- Herold, D. K. (2011). Human flesh search engine: Carnivalesque riots as components of a “Chinese Democracy.” In D. K. Herold & P. Marolt (Eds.), Online society in China: Creating, celebrating, and instrumentalising the online carnival (pp. 127–145). Abingdon, Oxon: Routledge.
- Jingchun, C. (2005). Protecting the right to privacy in China. Victoria University of Wellington Law Review, 36, 645–664.
- Lee, C. C. (2002). Established pluralism: U.S. Elite media discourse about China policy. Journalism Studies, 3, 383–397.
- Lee, F. L. F, Lee, C. C., & Li, N. L. (2011). Chinese peasants in the process of economic reform: An analysis of New York Times’ and Washington Post’s opinion discourses, 1981–2008. Communication, Culture & Critique, 4(2), 164–183. doi:10.1111/j.1753-9137.2011.01097.x
- Liu, F. (2011). Urban youth in China: Modernity, the internet and the self. New York, NY: Routledge.
- Lü, Y. H. (2005). Privacy and data privacy issues in contemporary China. Ethics and Information Technology, 7, 7–15. doi:10.1007/s10676-005-0456-y
- Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.
- Maisog, M. E. (2009). Personal information protection in China. Beijing, China: Hunton & Williams LLP. Retrieved January 15, 2013 from http://www.huntonfiles.com/files/webupload/PrivacyLaw_Personal_Information_Protection_in_China.pdf
- Mansell, R. (2004). Political economy, power and new media. New Media & Society, 6(1), 96–105. doi:10.1177/1461444804039910
- Marx, G. (2006). Soft surveillance. In T. Monahan (Ed.), Surveillance and security (pp. 37–56). New York, NY: Routledge.
- McDonald, M. (2008, December 20). China court takes aim at vigilantism on Internet; Bloggers had exposed unfaithful husband. The International Herald Tribune, p. 1. Retrieved April 15, 2012 from the Lexis Nexis Academic Database.
- McDougall, B. (2004). Privacy in modern China. History Compass, 2, 1–8.
- Morozov, E. (2011). The net delusion: The dark side of Internet freedom. New York, NY: Public Affairs.
- Ong, R. (2012). Online vigilante justice Chinese style and privacy in China. Information & Communications Technology Law, 21(2), 127–145. doi:10.1080/13600834.2012.678653
- Pan, X. (2010). Hunt by the crowd: An exploratory qualitative analysis on cyber surveillance in China. Global Media Journal 9(16), 1–19. Retrieved April 29 2012 from http://lass.purduecal.edu/cca/gmj/sp10/graduate/gmj-sp10-grad-article-pan.htm
- Parenti, C. (2003). Soft cage: Surveillance in America from slavery to the war on terror. New York: Basic Books.
- Peterson, A. (2013, September 16). Reddit bans subreddit dedicated to finding the Navy Yard shooters. The Washington Post. Retrieved October 18, 2013 from http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/16/reddit-bans-subreddit-for-finding-the-navy-yard-shooters/
- United Nations. (1948). Universal Declaration of Human Rights. Retrieved Jan 28, 2013 from http://www.un.org/en/documents/udhr/index.shtml
- Van Dijk, T. A. (1985). Introduction: The role of discourse analysis in society. In T. Van Dijk (Ed.), Handbook of discourse analysis (pp. 1–8). London: Academic Press.
- Van Dijk, T. A. (1991). The interdisciplinary study of news as discourse. In N.W. Jankowski & K. B. Jensen (Eds.), A handbook of qualitative research methodologies (pp. 109–119). New York: Routledge.
- Van Dijk, T. A. (1993). Principles of critical discourse analysis. Discourse & Society, 4(2), 249–283. doi:10.1177/0957926593004002006
- Van Dijk, T.A. (1997). Discourse as interaction in society. In: T. A. Van Dijk (Ed.), Discourse as social interaction (pp. 1–37). London: Sage.
- Wang, B., Hou, B. Yao, Y. & Laibin, Y. (2009). Human flesh search model: Incorporating network expansion and gossip with feedback. In Proceedings of the Distributed Simulation and Real Time Applications, Singapore, 82–88. doi:10.1109/DS-RT.2009.36
- Wang, F. Y., Zeng, D., Hendler, J. A., Zhang, Q., Feng Z., Gao, Y., Wang, H. & Lai, G. (2010). A study of the human flesh search engine: Crowd-powered expansion of online knowledge. Computer (IEEE Computer Society), 43(8), 45–53. doi:10.1109/MC.2010.216
- Wang, H. (2011). Protecting privacy in China. Berlin: Springer-Verlag.
- Wang, H., & Yin, L. (2010). People-centered myth: Representation of the Wenchuan earthquake in China Daily. Discourse & Communication, 4(4), 383–398. doi:10.1177/1750481310381581
- Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193. doi:10.2307/1321160
- Whitman, J. Q. (2004). The two western cultures of privacy: Dignity versus liberty. The Yale Law Journal, 113, 1151. Retrieved Dec 26, 2012 from http://www.yalelawjournal.org/the-yale-law-journal/content-pages/the-two-western-cultures-of-privacy:-dignity-versus-liberty/ doi:10.2307/4135723
- Wines, M. (2009, June 17). Civic-minded Chinese find a new and louder voice online. The International Herald Tribune, p. 6. Retrieved April 15, 2012 from the LexisNexis Academic Database.
- Wood, D. (2005). Editorial: People watching people. Surveillance & Society, 2(4), 474–478.