2,827
Views
8
CrossRef citations to date
0
Altmetric
Articles

Meta-information censorship and the creation of the Chinanet Bubble

, ORCID Icon, &
Pages 2064-2080 | Received 14 Oct 2019, Accepted 14 Feb 2020, Published online: 29 Feb 2020

References

  • Akbari, A., & Gabdulhakov, R. (2019). Platform surveillance and resistance in Iran and Russia: The case of Telegram. Surveillance & Society, 17(1/2), 223–231. doi: 10.24908/ss.v17i1/2.12928
  • Bamman, D., O’Connor, B., & Smith, N. A. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17, 3–5. doi: 10.5210/fm.v17i3.3943
  • Brady, A.-M. (2012). We are all part of the same family: China’s ethnic propaganda. Journal of Current Chinese Affairs, 41(4), 159–181. doi: 10.1177/186810261204100406
  • Brizzo, L. (2019, June 2). The definite guide to Baidu SEO (2019 Update). Retrieved from https://www.aicy-create.com/the-definite-guide-baidu-seo-2019-update/
  • Bunn, M. (2015). Reimagining repression: New censorship theory and after. History and Theory, 54(1), 25–44. doi: 10.1111/hith.10739
  • Central Cyberspace Affairs Commission. (2019, September 10). 网络生态治理规定(征求意见稿) [Cyber ecology governance regulations (draft for comment)]. Retrieved from https://tech.sina.com.cn/i/2019-09-10/doc-iicezzrq4866232.shtml
  • Chu, N. (2018, December 4). How do Baidu search algorithms work and how do they differ from Google’s? [Q&A reply]. Retrieved from https://www.quora.com/How-do-Baidu-search-algorithms-work-and-how-do-they-differ-from-Googles
  • Courtois, C., Slechten, L., & Coenen, L. (2018). Challenging Google search filter bubbles in social and political information: Disconforming evidence from a digital methods case study. Telematics and Informatics, 35(7), 2006–2015. doi: 10.1016/j.tele.2018.07.004
  • Creemers, R. (2017). Cyber China: Upgrading propaganda, public opinion work and social management for the twenty-first century. Journal of Contemporary China, 26(103), 85–100. doi: 10.1080/10670564.2016.1206281
  • Cyberspace Administration of China. (2016, December 27). ⟪国家网络空间安全战略⟫全文 [The full text of the National Cyberspace Security Strategy]. Xinhua News Agency. Retrieved from http://www.xinhuanet.com/politics/2016-12/27/c_1120196479.htm
  • de Baets, A. (2011). Taxonomy of concepts related to the censorship of history. In S. Maret (Ed.), Government secrecy (pp. 53–65). Bingley, UK: Emerald.
  • Deibert, R. (2019). The road to digital unfreedom: Three painful truths about social media. Journal of Democracy, 30(1), 25–39. doi: 10.1353/jod.2019.0002
  • Diamond, L. (2019). The road to digital unfreedom: The threat of postmodern totalitarianism. Journal of Democracy, 30(1), 20–24. doi: 10.1353/jod.2019.0001
  • Dillahunt, T. R., Brooks, C. A., & Gulati, S. (2015, April). Detecting and visualizing filter bubbles in Google and bing. In CHI EA ‘15 Proceedings of the 33rd annual ACM conference extended abstracts on human factors in computing systems (pp. 1851–1856). New York, NY: ACM.
  • Dutton, W. H., Reisdorf, B. C., Dubois, E., & Blank, G. (2017, March). Social shaping of the politics of internet search and networking: Moving beyond filter bubbles, echo chambers, and fake news (Quello Center Working Paper No. 2944191). East Lansing, MI: Michigan State University.
  • Economy, E. C. (2018). The third revolution: Xi Jinping and the New Chinese state. New York, NY: Oxford University Press.
  • Epstein, R., & Robertson, R. E. (2015). The search engine manipulation effect (SEME) and its possible impact on the outcomes of elections. Proceedings of the National Academy of Sciences, 112(33), E4512–E4521. doi: 10.1073/pnas.1419828112
  • Feng, G. C., & Guo, S. Z. (2013). Tracing the route of China’s internet censorship: An empirical study. Telematics and Informatics, 30(4), 335–345. doi: 10.1016/j.tele.2012.09.002
  • Festinger, L. (1957). A theory of cognitive dissonance. Stanford, CA: Stanford University Press.
  • Geschke, D., Lorenz, J., & Holtz, P. (2019). The triple-filter bubble: Using agent-based modelling to test a meta-theoretical framework for the emergence of filter bubbles and echo chambers. British Journal of Social Psychology, 58(1), 129–149. doi: 10.1111/bjso.12286
  • Göbel, C. (2013). The information dilemma: How ICT strengthen or weaken authoritarian rule. Statsvetenskaplig Tidskrift, 115(4), 385–402.
  • Granka, LA. (2010). The Politics of Search: A Decade Retrospective. The Information Society. An International Journal, 26(5), 364–374.
  • Guessabi, F. (2019). Translation and censorship. Translation Journal, 22(1). Retrieved from https://www.translationjournal.net/January-2019/translation-and-censorship.html
  • Heilmann, S. (Ed.). (2018). China’s political system. London: Rowman & Littlefield.
  • Hildebrandt, M. (2016). New animism in policing: Re-animating the rule of law? In B. Bradford, B. Jauregui, I. Loader, & J. Steinberg (Eds.), The sage handbook of global policing (pp. 406–428). London: SAGE Publications.
  • Hunt, E. (2016, March 24). Tay, Microsoft's AI chatbot, gets a crash course in racism from Twitter. The Guardian. Retrieved from https://www.theguardian.com/technology/2016/mar/24/tay-microsoftsai-chatbot-gets-a-crash-course-in-racism-from-twitte
  • Huysmans, J. (2006). Politics of insecurity: Fear, migration and asylum in the EU. London: Routledge.
  • Information Office of the People’s Republic of China. (2012). The internet in China (June 2010). In White papers of the Chinese government (2009–2011) (pp. 227–248). Beijing: Foreign Languages Press.
  • Jiang, M. (2014). The business and politics of search engines: A comparative study of Baidu and Google’s search results of internet events in China. New Media & Society, 16(2), 212–233. doi: 10.1177/1461444813481196
  • Jones, H. (2014, January 2). The B2B marketer’s guide to Baidu SEO. Retrieved from https://searchengineland.com/the-b2b-marketers-guide-to-baidu-seo-180658
  • Kammerer, Y., & Gerjets, P. (2014). The role of search result position and source trustworthiness in the selection of web search results when using a list or a grid interface. International Journal of Human-Computer Interaction, 30(3), 177–191. doi: 10.1080/10447318.2013.846790
  • Kaufmann, M., Egbert, S., & Leese, M. (2019). Predictive policing and the politics of patterns. The British Journal of Criminology, 59(3), 674–692. doi: 10.1093/bjc/azy060
  • Kaufmann, M., & Jeandesboz, J. (2017). Politics and ‘the digital’. European Journal of Social Theory, 20(3), 309–328. doi: 10.1177/1368431016677976
  • Kelly, J., & François, C. (2018, August). This is what filter bubbles actually look like. MIT Technology Review. Retrieved from https://www.technologyreview.com/
  • King, G., Pan, J., & Roberts, M. E. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 107(2), 326–343. doi: 10.1017/S0003055413000014
  • King, G., Pan, J., & Roberts, M. E. (2017). How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American Political Science Review, 111(3), 484–501. doi: 10.1017/S0003055417000144
  • Knobloch-Westerwick, S., & Meng, J. (2009). Looking the other way. Communication Research, 36(3), 426–448. doi: 10.1177/0093650209333030
  • Knockel, J., Crete-Nishihata, M., Ng, J. Q., Senft, A., & Crandall, J. R. (2015, August). Every rose has its thorn: censorship and surveillance on social video platforms in China. Paper presented at the USENIX Workshop on Free and Open Communications on the Internet, Washington, DC.
  • Kuhiwczak, P. (2011). Translation and censorship [Forum contribution]. Translation Studies, 4(3), 358–373. doi: 10.1080/14781700.2011.589657
  • Kurowska, X., & Reshetnikov, A. (2018). Neutrollization: Industrialized trolling as a pro-Kremlin strategy of desecuritization. Security Dialogue, 49(5), 345–363. doi: 10.1177/0967010618785102
  • Landis, J. R., & Koch, G. G. (1977). The measurement of observer agreement for categorical data. Biometrics, 33(1), 159–174. doi: 10.2307/2529310
  • Li, L. (2018). 网络安全审查制度研究 [A study on cyber security inspection system]. Secrecy Science and Technology, 7(2018), 33–36.
  • Müller, B. (2004). Censorship and cultural regulation: Mapping the territory. In B. Müller (Ed.), Censorship & cultural regulation in the modern age (pp. 1–32). Amsterdam: Rodopi.
  • Nechushtai, E., & Lewis, S. C. (2019). What kind of news gatekeepers do we want machines to be? Filter bubbles, fragmentation, and the normative dimensions of algorithmic recommendations. Computers in Human Behavior, 90, 298–307. doi: 10.1016/j.chb.2018.07.043
  • Nguyen, C. (2018). Echo chambers and epistemic bubbles. Episteme; Rivista Critica Di Storia Delle Scienze Mediche E Biologiche. doi: 10.1017/epi.2018.32
  • Ørmen, J. (2016). Googling the news. Digital Journalism, 4(1), 107–124. doi: 10.1080/21670811.2015.1093272
  • Paltemaa, L., & Vuori, J. A. (2009). Regime transition and the Chinese politics of technology: From mass science to the controlled internet. Asian Journal of Political Science, 17(1), 1–23. doi: 10.1080/02185370902767557
  • Pariser, E. (2011). The filter bubble: What the internet is hiding from you. London: Viking.
  • Pentzek, M. (2017, May 4). Postcards from China: Mysteries of the East – Busting 10 Myths about Baidu and SEO in China. Retrieved from https://blog.searchmetrics.com/us/baidu-seo-mythbusting/
  • Qiang, X. (2019). The road to digital unfreedom: President Xi's surveillance state. Journal of Democracy, 30(1), 53–67. doi: 10.1353/jod.2019.0004
  • Rouvroy, A., & Berns, T. (2013). Gouvernementalité algorithmique et perspectives d'émancipation Réseaux, 177(1), 163–196.
  • Ruan, L., Knockel, J., & Crete-Nishihata, M. (2017, April 13). We (can’t) chat: “709 crackdown” discussions blocked on Weibo and WeChat. Retrieved from https://citizenlab.ca/2017/04/we-cant-chat-709-crackdown-discussions-blocked-on-weibo-and-wechat/
  • Ruan, L., Knockel, J., Ng, J. Q., & Crete-Nishihata, M. (2016, November 30). One app, two systems: how WeChat uses one censorship policy in China and another internationally. Retrieved from https://citizenlab.ca/2016/11/wechat-china-censorship-one-app-two-systems/
  • Schneider, F. (2018). China’s digital Nationalism. Oxford: Oxford University Press.
  • State Council of the People's Republic of China. (1989, July 18). 全国人民代表大会常务委员会关于制止动乱和平息反革命暴乱的决议 [Resolution of the Standing Committee of the National People's Congress on Stopping Unrest and Putting down the Counter-Revolutionary Riot] [State Council bulletin no. 11]. Retrieved from http://www.gov.cn/gongbao/shuju/1989/gwyb198911.pdf
  • Sude, D. J., Knobloch-Westerwick, S., Robinson, M., & Westerwick, A. (2019). “Pick and choose” opinion climate: How browsing of political messages shapes public opinion perceptions and attitudes. Communication Monographs, 86(4), 457–478. doi: 10.1080/03637751.2019.1612528
  • Sunstein, C. R. (2018). #Republic: Divided democracy in the age of social media. Princeton, NJ: Princeton University Press.
  • Taneja, H., & Wu, A. X. (2014). Does the great firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior. The Information Society, 30(5), 297–309. doi: 10.1080/01972243.2014.944728
  • Thomas, N., & Martina, M. (2015, December 16). China tightens rules on maps amid territorial disputes. Reuters. Retrieved from https://www.reuters.com
  • United Nations. (2018, August 13). Committee on the elimination of racial discrimination reviews the report of China [Press release]. Retrieved from https://www.ohchr.org/
  • Vuori, J. A. (2003). Security as justification: An analysis of Deng Xiaoping’s speech to the martial law troops in Beijing on the ninth of june 1989. Politologiske Studier, 6(2), 105–118.
  • Vuori, J. A. (2014). Critical security and Chinese politics: The Anti-Falungong campaign. London: Routledge.
  • Vuori, J. A., & Andersen, R. S. (Eds.). (2018). Visual security studies: Sights and spectacles of insecurity and war. London: Routledge.
  • Vuori, J. A., & Paltemaa, L. (2015). The Lexicon of fear: Chinese internet control practice in Sina Weibo microblog censorship. Surveillance & Society, 13(3/4), 400–421. doi: 10.24908/ss.v13i3/4.5404
  • Xi, J. (2014, November 19). 习近平致首届世界互联网大会贺词全文 [Greetings by Xi Jinping to the First World Internet Conference]. Retrieved from https://www.chinacourt.org/article/detail/2014/11/id/1488230.shtml
  • Zhao, R. Y., & Yu, B. (2018). 网络信息安全研究进展与问题探析 [ Research on the development and problems of network information security]. Journal of Modern Information, 38(11), 116–122.
  • Zuboff, S. (2019). The Age of surveillance capitalism: The fight for human future at the new frontier of power. London: Profile Books.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.