626
Views
0
CrossRef citations to date
0
Altmetric
Articles

Citizen engagement and the illusion of secrecy: exploring commenter characteristics in censored online news articles

ORCID Icon & ORCID Icon
Pages 1620-1638 | Received 31 Oct 2016, Accepted 20 Jun 2017, Published online: 14 Jul 2017

References

  • Barber, B. R. (1997). The new telecommunications technology: Endless frontier or the end of democracy? Constellations, 4(2), 208–228. doi: 10.1111/1467-8675.00050
  • Baum, I. (2014). Media law in Israel. New York, NY: Wolters Kluwer Law & Business.
  • Birchall, C. (2011a). Introduction to “secrecy and transparency” the politics of opacity and openness. Theory, Culture & Society, 28(7–8), 7–25. doi: 10.1177/0263276411427744
  • Birchall, C. (2011b). Questioning the moral attachment to transparency. In Paper delivered at first transparency research conference. Newark: Rutgers University. Retrieved from https://spaa.newark.rutgers.edu/sites/default/files/files/Transparency_Research_Conference/Papers/Birchall_Clare.pdf
  • Birchall, C. (2016). Managing secrecy. International Journal of Communication, 10, 152–163.
  • Borgatti, S. P., Jones, C., & Everett, M. G. (1998). Network measures of social capital. Connections, 21(2), 27–36.
  • boyd, d., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230. doi: 10.1111/j.1083-6101.2007.00393.x
  • boyd, d., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8), Retrieved from http://firstmonday.org/ojs/index.php/fm/article/viewArticle/3086 doi: 10.5210/fm.v15i8.3086
  • Bratich, J. (2006). Public secrecy and immanent security: A strategic analysis. Cultural Studies, 20(4–5), 493–511. doi: 10.1080/09502380600708937
  • Brooks, B., Welser, H. T., Hogan, B., & Titsworth, S. (2011). Socioeconomic status updates. Information, Communication & Society, 14(4), 529–549. doi: 10.1080/1369118X.2011.562221
  • Buccafurri, F., Lax, G., Nicolazzo, S., & Nocera, A. (2015). Comparing twitter and facebook user behavior: Privacy and other aspects. Computers in Human Behavior, 52, 87–95. doi: 10.1016/j.chb.2015.05.045
  • Cascavilla, G., Conti, M., Schwartz, D. G., & Yahav, I. (2015). Revealing censored information through comments and commenters in online social networks. In The 2015 IEEE/ACM international conference on advances in social networks analysis and mining. Paris: IEEE/ACM.
  • Chen, W. (2013). Internet use, online communication, and ties in Americans’ networks. Social Science Computer Review, 31(4), 404–423. doi: 10.1177/0894439313480345
  • Coe, K., Kenski, K., & Rains, S. A. (2014). Online and uncivil? Patterns and determinants of incivility in newspaper website comments. Journal of Communication, 64(4), 658–679. doi: 10.1111/jcom.12104
  • Dahlberg, L. (2001a). Computer-mediated communication and the public sphere: A critical analysis. Journal of Computer-Mediated Communication, 7(1). doi: 10.1111/j.1083-6101.2001.tb00137.x
  • Dahlberg, L. (2001b). Democracy via cyberspace mapping the rhetorics and practices of three prominent camps. New Media & Society, 3(2), 157–177. doi: 10.1177/14614440122226038
  • Dahlberg, L. (2011). Re-constructing digital democracy: An outline of four “positions. New Media & Society, 13, 855–872. doi: 10.1177/1461444810389569
  • Davidov, D., Tsur, O., & Rappoport, A. (2010). Proceedings of the fourteenth conference on computational natural language learning (pp. 107–116). Uppsala, Sweden: Association for Computational Linguistics.
  • Davis, R. T. (2009). The US army and the media in the 20th century (Vol. 31). Fort Leavenworth, KS: Combat Studies Institute Press, US Army Combined Arms Center.
  • Dewey, J. (1927). The public and its problems: An essay in political inquiry. New York, NY: Henry Holt & Co.
  • Diakopoulos, N., & Naaman, M. (2011). Proceedings of the ACM 2011 conference on computer supported cooperative work (pp. 133–142). Hangzhou, China: ACM.
  • Domingo, D., Quandt, T., Heinonen, A., Paulussen, S., Singer, J. B., & Vujnovic, M. (2008). Participatory journalism practices in the media and beyond: An international comparative study of initiatives in online newspapers. Journalism Practice, 2(3), 326–342. doi: 10.1080/17512780802281065
  • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168. doi: 10.1111/j.1083-6101.2007.00367.x
  • Facebook Inc. (2015). Facebook reports third quarter 2015 results. Menlo Park, CA. Retrieved from http://investor.fb.com/releasedetail.cfm?ReleaseID=940609
  • Flyverbom, M., Leonardi, P., Stohl, C., & Stohl, M. (2016). Digital age| the management of visibilities in the digital age—introduction. International Journal of Communication, 10(12), 98–109.
  • Giannopoulos, G., Weber, I., Jaimes, A., & Sellis, T. (2012). Web information systems engineering (pp. 100–113). Berlin, Heidelberg: Springer.
  • Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer-Mediated Communication, 17(3), 319–336. doi: 10.1111/j.1083-6101.2012.01574.x
  • Gil de Zúñiga, H., & Valenzuela, S. (2011). The mediating path to a stronger citizenship: Online and offline networks, weak ties, and civic engagement. Communication Research, 38(3), 397–421. doi: 10.1177/0093650210384984
  • Glaser, M. (2011, March 2). Facebook pushes comments upgrade, but will publishers bite? | Mediashift | PBS. Retrieved June 29, 2014, from http://www.pbs.org/mediashift/2011/03/facebook-pushes-comments-upgrade-but-will-publishers-bite061
  • Graham, T. (2013). Talking back but is anyone listening? Journalism and comment fields. In C. Peters & M. Broersma (Eds.), Rethinking journalism: Trust and participation in a transformed news landscape (pp. 114–127). London: Routledge.
  • Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–1380. doi: 10.1086/225469
  • Hachten, W. A., & Scotton, J. F. (2015). The world news prism: Digital, social and interactive (pp. 138–158). Chichester, UK: John Wiley.
  • Hasson, F., Keeney, S., & McKenna, H. (2000). Research guidelines for the Delphi survey technique. Journal of Advanced Nursing, 32(4), 1008–1015. doi: 10.1046/j.1365-2648.2000.t01-1-01567.x
  • Horn, E. (2011). Logics of political secrecy. Theory, Culture & Society, 28(7–8), 103–122. doi: 10.1177/0263276411424583
  • Hsu, C.-C., & Sandford, B. A. (2007). The Delphi technique: Making sense of consensus. Practical Assessment, Research & Evaluation, 12(10), 1–8.
  • Ieng-Fat, L., Kuan-Ta, C., & Ling-Jyh, C. (2008). Involuntary information leakage in social network services. In Advances in information and computer security (pp. 167–183). Berlin: Springer.
  • Ihlebæk, K. A., & Krumsvik, A. H. (2014). Editorial power and public participation in online newspapers. Journalism, 1–18. doi: 10.1177/1464884913520200
  • Irani, D., Webb, S., Li, K., & Pu, C. (2011). Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Computing, 15(3), 13–19. doi: 10.1109/MIC.2011.25
  • Johnson, M. (1999). Of public interest: How courts handle rape victims’ privacy suits. Communication Law and Policy, 4(2), 201–242. doi: 10.1080/10811689909368675
  • Jones, J. J., Settle, J. E., Bond, R. M., Fariss, C. J., Marlow, C., Fowler, J. H., & Lambiotte, R. (2013). Inferring tie strength from online directed behavior. PloS One, 8(1), e52168. doi: 10.1371/journal.pone.0052168
  • Kamrava, M. (2000). Military professionalization and civil-military relations in the middle east. Political Science Quarterly, 115(1), 67–92. doi: 10.2307/2658034
  • Kantarcioglu, M., & Heatherly, R. (2009). Inferring private information using social network data. In Proceedings of the 18th International Conference on World Wide Web.
  • Külcü, Ö, & Henkoğlu, T. (2014). Privacy in social networks: An analysis of Facebook. International Journal of Information Management, 34(6), 761–769. doi: 10.1016/j.ijinfomgt.2014.07.006
  • Krishnamurthy, B., & Wills, C. E. (2010). On the leakage of personally identifiable information via online social networks. ACM SIGCOMM Computer Communication Review, 40(1), 112. doi: 10.1145/1672308.1672328
  • Lessig, L. (2009). Against transparency. New Republic, 240(19), 37–44.
  • Loader, B. D., & Mercea, D. (2011). Networking democracy? Social media innovations and participatory politics. Information, Communication & Society, 14(6), 757–769. doi: 10.1080/1369118X.2011.592648
  • Madejski, M., Johnson, M., & Bellovin, S. M. (2012). Pervasive computing and communications workshops (PERCOM Workshops), 2012 IEEE international conference on (pp. 340–345). Lugano, Switzerland: IEEE.
  • Mvungi, B., & Iwaihara, M. (2015). Associations between privacy, risk awareness, and interactive motivations of social networking service users, and motivation prediction from observable features. Computers in Human Behavior, 44, 20–34. doi: 10.1016/j.chb.2014.11.023
  • Nisbet, E. C., & Stoycheff, E. (2013). Let the people speak a multilevel model of supply and demand for press freedom. Communication Research, 40(5), 720–741. doi: 10.1177/0093650211429117
  • Nossek, H., & Limor, Y. (2001). Fifty years in a “marriage of convenience”: News media and military censorship in Israel. Communication Law and Policy, 6(1), 1–35. doi: 10.1207/S15326926CLP0601_01
  • Nossek, H., & Limor, Y. (2011). The Israeli paradox: The military censorship as a protector of the freedom of the press. In S. Maret (Ed.), Government secrecy (Vol. 19, pp. 103–130). Bingley, West Yorkshire: Emerald Group Publishing Limited.
  • Peleg, I. (1993). Patterns of censorship around the world. Boulder, CO: Westview Press.
  • Phillips, J. W. P. (2011). Secrecy and transparency an interview with Samuel weber. Theory, Culture & Society, 28(7–8), 158–172. doi: 10.1177/0263276411428339
  • Post, R. (1998). Censorship and silencing: Practices of cultural regulation. Los Angeles, CA: Getty.
  • Purcell, K., Rainie, L., Mitchell, A., Rosenstiel, T., & Olmstead, K. (2010). Understanding the participatory news consumer. Pew Internet and American Life Project, 1, 19–21.
  • Reich, Z. (2011). User comments: The transformation of participatory space. In J. B. Singer, A. Hermida, & D. Domingo (Eds.), Participatory journalism: Guarding open gates at online newspapers (pp. 96–117). Chichester, West Sussex: Wiley-Blackwell.
  • Roberts, A. (2012). WikiLeaks: The illusion of transparency. International Review of Administrative Sciences, 78(1), 116–133. doi: 10.1177/0020852311429428
  • Ruiz, C., Domingo, D., Micó, J. L., Díaz-Noci, J., Masip, P., & Meso, K. (2011). Public sphere 2.0? The democratic qualities of citizen debates in online newspapers. The International Journal of Press/Politics, 16(4), 463–487. doi: 10.1177/1940161211415849
  • Schumm, J. M. (2007). No names, please: The virtual victimization of children, crime victims, the mentally Ill, and others in appellate court opinions. Georgia Law Review, 42(1), 471–524.
  • Schwartz, D. G., Yahav, I., & Silverman, G. (2017). News censorship in online social networks: A study of circumvention in the commentsphere. Journal of the Association for Information Science and Technology, 68(3), 569–582. doi: 10.1002/asi.23698
  • Seginer, R. (2006). Beyond the call of duty: The service of Israeli youth in military and civic contexts. In M. Yates & J. Youniss (Eds.), Roots of civic identity: International perspectives on community service and activism in youth (pp. 205–224). Cambridge, United Kingdom: Cambridge University Press.
  • Shanahan, M. (2013, July 16). More news organizations try civilizing online comments with the help of social media. Retrieved June 29, 2014, from http://www.poynter.org/latest-news/top-stories/218284/more-news-organizations-try-civilizing-online-comments-with-the-help-of-social-media/
  • Springer, N., Engelmann, I., & Pfaffinger, C. (2015). User comments: Motives and inhibitors to write and read. Information, Communication & Society, 18(7), 798–815. doi: 10.1080/1369118X.2014.997268
  • Suau, J., & Garcia, A. (2015). Assessment of media legislation in Israel (MedMedia) (pp. 1–21). European Union. Retrieved from http://www.med-media.eu/wp-content/uploads/2015/09/MEDMEDIA_ISRAEL.pdf
  • Tallarida, R. J., & Murray, R. B. (1987). Manual of pharmacologic calculations (pp. 149–153). New York, NY: Springer.
  • Tang, G., & Lee, F. L. F. (2013). Facebook use and political participation the impact of exposure to shared political information, connections with public political actors, and network structural heterogeneity. Social Science Computer Review, 31(6), 763–773. doi: 10.1177/0894439313490625
  • Tucker, C. E. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5), 546–562. doi: 10.1509/jmr.10.0355
  • Vaknin-Gil, S. (2015). The censor in Israel: Adapting the censorship model to acceptable norms in Israel (HaTsenzura BeYisrael: Hatamat Model HaTsenzura laNora Hanoheget beYisrael). IDF Law Review, 21(1), 69–156.
  • Valenzuela, S., Kim, Y., & Gil de Zúñiga, H. (2012). Social networks that matter: Exploring the role of political discussion for online political participation. International Journal of Public Opinion Research, 24(2), 163–184. doi: 10.1093/ijpor/edr037
  • Weber, P. (2014). Discussions in the comments section: Factors influencing participation and interactivity in online newspapers’ reader comments. New Media & Society, 16(6), 941–957. doi: 10.1177/1461444813495165
  • Weinraub, A. (2009). The evolution of Israeli civil-military relations domestic enablers and the quest for security. Monterey, CA: Naval Postgraduate School. Retrieved from http://calhoun.nps.edu/handle/10945/4328
  • Yang, F. (2014). Rethinking China’s Internet censorship: The practice of recoding and the politics of visibility. New Media & Society, doi: 10.1177/1461444814555951

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.