2,298
Views
15
CrossRef citations to date
0
Altmetric
Original Articles

Managing the micro-self: the governmentality of real name registration policy in Chinese microblogosphere

Pages 203-220 | Received 12 May 2014, Accepted 07 May 2015, Published online: 09 Jul 2015

References

  • Aichengxu.com. (2013). How to use real name registration on Sina or Tencent Weibo. Retrieved from http://is.gd/7S4hDu
  • Bamman, D., O'Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3). Retrieved from http://firstmonday.org/article/view/3943/3169
  • Braman, S., & Malaby, T. (2006). Preface to Special Issue #7: Command Lines: The emergence of governance in global cyberspace. First Monday. Retrieved from http://firstmonday.org/ojs/index.php/fm/rt/printerFriendly/1605/1520
  • Brown, C. (2008). China's second-generation national identity card: Merging culture, industry and technology. In C. Bennett & D. Lyon (Eds.), Playing the identity card: Surveillance, security and identification in global perspective (pp. 57–74). New York, NY: Routledge.
  • Chen, J. (2013). Middle class without democracy. Oxford: Oxford University Press.
  • China.com. (2012). Comment on article Ex-Minister of Industrial and Information: Most countries adopt real name registration policy. Retrieved from http://is.gd/knWtzx
  • China.com.cn. (2012, January 18). Wang Chen: Internet real name registration policy is based on laws, targeting microblogs. Retrieved from http://is.gd/PAK5bs
  • China Internet Network Information Center. (January, 2014). 33rd statistical survey report on the Internet development in China. Retrieved from http://is.gd/Aq8iMX
  • Dean, M. (1999). Governmentality: Power and rule in modern society. London: Sage.
  • Foucault, M. (1982). The subject and power. Critical Inquiry, 8(4), 777–795.
  • Foucault, M. (1988). The political technology of individuals. In L. Martin, H. Gutman & P. Hutton (Eds.), Technologies of the self: A seminar with Michel Foucault (pp. 145–162). Amherst, MA: University of Massachusetts Press.
  • Foucault, M. (1991). Governmentality. In G. Burchell, C. Gordon, & P. Miller (Eds.), The Foucault effect: Studies in governmentality (pp. 87–104). Chicago, IL: University of Chicago Press.
  • Foucault, M. (1993). About the beginning of the hermeneutics of the self (Transcription of two lectures in Dartmouth on Nov. 17 and 24, 1980). In M. Blasius (Ed.), Political Theory, 21(2), 198–227.
  • Fu, K. W., Chan, C. H., & Chau, M. (2013). Assessing censorship on microblogs in China: Discriminatory keyword analysis and impact evaluation of the ‘real name registration’ policy. IEEE Internet Computing, 17(3), 42–50.
  • Hockx, M. (2005). Virtual Chinese literature: A comparative case study of online poetry communities. China Quarterly, 183, 670–691.
  • Hu, Y. (2009). Rumor as a form of social protest. Communication & Society, 9, 67–94.
  • iResearch. (2014). Chinese weibo user behavior research report (2014). Retrieved from http://www.iresearch.com.cn/Report/2183.html
  • Jeffreys, E., & Sigley, G. (2009). Governmentality, governance and China. In E. Jeffreys (Ed.), China's governmentalities: Governing change, changing government (pp. 1–23). New York, NY: Routledge.
  • Jiang, M. (2010). Authoritarian deliberation on Chinese Internet. Electronic Journal of Communication, 20(3/4). Retrieved from http://is.gd/S3jINP
  • Jiang, M. (2012). Internet companies in China: Dancing between the party line and the bottom line. Asie Visions, p. 47. Retrieved from http://is.gd/NA6bMO
  • King, G., Pan, J., & Roberts, M. E. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 107(2), 326–343.
  • Kluver, R. (2005). The architecture of control: A Chinese strategy for e-governance. Journal of Public Policy, 25(1), 75–97.
  • Latham, K. (2013). New media and subjectivity in China. In E. Florence & P. Defraigne (Eds.), Towards a new development paradigm in twenty-first century China: Economy, society and politics (pp. 203–217). London: Routledge.
  • Lemke, T. (2007). An indigestible meal? Foucault, governmentality and state theory. Distinktion: Scandinavian Journal of Social Theory, 8(2), 43–64.
  • Ma, D. (2013). Chinese netizens’ stance. Southern Metropolitan. Retrieved from http://is.gd/58jaRr
  • Merced, M. (2014, April 17). Shares of Twitter-like Weibo surge on opening day, as China I.P.O. mounts. New York Times. Retrieved from http://is.gd/VS0XY2
  • Millward, S. (2013, January 22). Tencent Weibo, the ‘other weibo’ that nobody cares about, reaches 540 million users. TechAsia. Retrieved from http://is.gd/BNoqcQ
  • Mozur, P. (2013, March 12). How many people really use Sina Weibo? The Wall Street Journal. Retrieved from http://is.gd/J3O7Hk
  • Netease. (2012, March 9). Ex-Minister of industrial and information: Most countries adopt real name registration policy. Retrieved from http://is.gd/LKuF6X
  • NTD Chinese News. (2011, December 31). Commentary: Why did CCTV delete its own news? NTD Chinese News. Retrieved from http://is.gd/lMOq5S
  • People's Net. (2012). National People's Congress Decision on Strengthening Internet Information Protection. Retrieved from http://is.gd/dz5DNx
  • People's Net. (2015, April 11). Sina faces suspension over lack of censorship. Retrieved from http://en.people.cn/business/n/2015/0411/c90778–8876911.html
  • Reuters. (2012, March 12). Weibo, China's Twitter, estimates 60 percent of users verified by deadline. The Huffington Post. Retrieved from http://is.gd/3pW1JQ
  • Shirk, S. (2008). China: Fragile superpower. Oxford: Oxford University Press.
  • Sigley, G. (2006). Chinese governmentalities: Government, governance and the socialist market economy. Economy and Society, 35(4), 487–508.
  • Sina. (2007). 2007 International varsity debate. Sina News. Retrieved from http://is.gd/Md5cCS
  • Sohu. (2012, January 12). Ma Huateng rebukes real name registration on QQ: Should telecom operators be held responsible for prostitution? Retrieved from http://is.gd/tgxuG7
  • State Council of PRC. (2013). State Council's notice regarding implementing ‘State Council structure reform and function change plan’: State Council Decree No 22. Retrieved from http://is.gd/fdWGZf
  • Sun, L. (2011). Zou xiang jiji de shehui guanli (Towards proactive social management). Shehuixue yanjiu (Sociological Studies), 4, 22–32.
  • Sutter, J. (2009, June 2). Reports: China blocks web sites ahead of Tiananmen anniversary. CNN.com. Retrieved from http://is.gd/6Iueiu
  • Tsui, L. (2003). The panopticon as the antithesis of a space of freedom: Control and regulation of the Internet in China. China Information, 17(2), 65–82.
  • Wallis, C. (2013). Technomobility in China: Young migrant women and mobile phone. New York: NYU Press.
  • Wang, T. (2013). Talking to strangers: Chinese youth and social media (Doctoral dissertation). University of California, San Diego.
  • Xinhua Net. (2011, December 16). Some Beijing municipal provisions on microblog development and management. Retrieved from http://is.gd/UWeeGV
  • Xinhua Net. (2012, December 16). Spokesperson takes reporters’ questions regarding Beijing municipal provisions on microblog development and management. Retrieved from http://is.gd/eAlZUh
  • Xinhua Net. (2013, September 9). Severe penalties for defamatory retweets in China. Xinhua Net. Retrieved from http://news.xinhuanet.com/english/china/2013–09/09/c_132705863.htm
  • Yan, Y. (2009). The individualization of Chinese society. Oxford: Berg.
  • Yang, G. (2009). The power of the Internet in China: Citizen activism online. New York, NY: Columbia University Press.
  • Yuan, E. J., Feng, M., & Danowski, J. A. (2013). ‘Privacy’ in semantic networks on Chinese social media: The case of Sina Weibo. Journal of Communication, 63(6), 1011–1031.
  • Zheng, Y. (2007). Technological empowerment: The internet, state, and society in China. Stanford, CA: Stanford University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.