{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T04:40:52Z","timestamp":1777437652644,"version":"3.51.4"},"publisher-location":"Cham","reference-count":95,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319677439","type":"print"},{"value":"9783319677446","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67744-6_25","type":"book-chapter","created":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T15:36:26Z","timestamp":1505835386000},"page":"377-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A Confucian Look at Internet Censorship in China"],"prefix":"10.1007","author":[{"given":"Yubo","family":"Kou","sequence":"first","affiliation":[]},{"given":"Bryan","family":"Semaan","sequence":"additional","affiliation":[]},{"given":"Bonnie","family":"Nardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,20]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Poller, A., Ilyes, P., Kramm, A., Kocksch, L.: Investigating OSN users\u2019 privacy strategies with in-situ observation. In: CSCW Companion 2014, pp. 217\u2013220. ACM Press (2014)","DOI":"10.1145\/2556420.2556508"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Semaan, B.C., Britton, L.M., Dosono, B.: Transition resilience with ICTs: \u201cIdentity Awareness\u201d in veteran re-integration. In: CHI 2016, pp. 2882\u20132894. ACM Press (2016)","DOI":"10.1145\/2858036.2858109"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn\u2019t: exploring self-censorship on facebook. In: CSCW 2013, pp. 793\u2013802. ACM Press (2013)","DOI":"10.1145\/2441776.2441865"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: CHI 2012, pp. 609\u2013618. ACM Press (2012)","DOI":"10.1145\/2207676.2207761"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1177\/1043986209350437","volume":"26","author":"B Liang","year":"2010","unstructured":"Liang, B., Lu, H.: Internet development, censorship, and cyber crimes in China. J. Contemp. Crim. Justice 26, 103\u2013120 (2010)","journal-title":"J. Contemp. Crim. Justice"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"MacKinnon, R.: China\u2019s \u201cNetworked Authoritarianism\u201d (2011)","DOI":"10.1353\/jod.2011.0033"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Kuutti, K., Bannon, L.J.: The turn to practice in HCI: Towards a research agenda. In: CHI 2014, pp. 3543\u20133552. ACM Press (2014)","DOI":"10.1145\/2556288.2557111"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Bamman, D., O\u2019Connor, B., Smith, N.: Censorship and deletion practices in Chinese social media. First Monday 17 (2012)","DOI":"10.5210\/fm.v17i3.3943"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"118","DOI":"10.2307\/20050069","volume":"80","author":"N Hachigian","year":"2001","unstructured":"Hachigian, N.: China\u2019s cyber-strategy. Foreign Aff. 80, 118 (2001)","journal-title":"Foreign Aff."},{"key":"25_CR10","unstructured":"Ng, J.Q., Landry, P.F.: The Political Hierarchy of Censorship: An Analysis of Keyword Blocking of CCP Officials\u2019 Names on Sina Weibo Before and After the 2012 National Congress (S)election (2013)"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1177\/0010414010394773","volume":"44","author":"D Stockmann","year":"2011","unstructured":"Stockmann, D., Gallagher, M.E.: Remote control: how the media sustain authoritarian rule in China. Comp. Polit. Stud. 44, 436\u2013467 (2011)","journal-title":"Comp. Polit. Stud."},{"key":"25_CR12","unstructured":"Givens, J.W., MacDonald, A.W.: The internet with chinese characteristics: democratizing discourse but not politics. In: APSA 2013 Annual Meeting, p. 19 (2013)"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17544750.2013.816753","volume":"7","author":"T Poell","year":"2013","unstructured":"Poell, T., de Kloet, J., Zeng, G.: Will the real weibo please stand up? Chinese online contention and actor-network theory. Chinese J. Commun. 7, 1\u201318 (2013)","journal-title":"Chinese J. Commun."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Rauchfleisch, A., Sch\u00e4fer, M.S.: Multiple public spheres of weibo: a typology of forms and potentials of online public spheres in China. Inf. Commun. Soc. 1\u201317 (2014)","DOI":"10.1080\/1369118X.2014.940364"},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1525\/as.2003.43.3.405","volume":"43","author":"G Yang","year":"2003","unstructured":"Yang, G.: The co-evolution of the internet and civil society in China. Asian Surv. 43, 405\u2013422 (2003)","journal-title":"Asian Surv."},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Shklovski, I., Kotamraju, N.: Online contribution practices in countries that engage in internet blocking and censorship. In: CHI 2011, pp. 1109\u20131118. ACM Press (2011)","DOI":"10.1145\/1978942.1979108"},{"key":"25_CR17","volume-title":"Records of the Grand Historian of China","author":"Q Sima","year":"1959","unstructured":"Sima, Q.: Records of the Grand Historian of China. Zhonghua Book Company, Beijing (1959)"},{"key":"25_CR18","volume-title":"The Religion of China, Confucianism and Taoism","author":"M Weber","year":"1953","unstructured":"Weber, M., Gerth, H.H.: The Religion of China, Confucianism and Taoism. MacMillan Publishing Company, New York (1953)"},{"key":"25_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2818997","volume":"22","author":"D Wang","year":"2015","unstructured":"Wang, D., Mark, G.: Internet censorship in China: Examining user awareness and attitudes. ACM Trans. Comput. Interact. 22, 1\u201322 (2015)","journal-title":"ACM Trans. Comput. Interact."},{"key":"25_CR20","volume-title":"The Luxuriant Dew of the Spring and Autumn Annals","author":"Z Dong","year":"2011","unstructured":"Dong, Z.: The Luxuriant Dew of the Spring and Autumn Annals. Zhonghua Book Company, Beijing (2011)"},{"key":"25_CR21","doi-asserted-by":"crossref","DOI":"10.1515\/9781400834822","volume-title":"China\u2019s New Confucianism: Politics and Everyday Life in a Changing Society","author":"DA Bell","year":"2010","unstructured":"Bell, D.A.: China\u2019s New Confucianism: Politics and Everyday Life in a Changing Society. Princeton University Press, Princeto (2010)"},{"key":"25_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1353\/dss.0.0114","volume":"57","author":"DA Bell","year":"2009","unstructured":"Bell, D.A.: Reconciling socialism and confucianism?: Reviving tradition in China. Dissent 57, 91\u201399 (2009)","journal-title":"Dissent"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Fukuyama, F.: Confucianism and democracy (1995)","DOI":"10.1353\/jod.1995.0029"},{"key":"25_CR24","unstructured":"Yum, J.O.: The impact of confucianism on interpersonal relationships and communication patterns in east Asia. Commun. Monogr. (2009)"},{"key":"25_CR25","unstructured":"Mencius: Mencius. Zhonghua Book Company, Beijing (2010)"},{"key":"25_CR26","unstructured":"Confucius: The Analects. Zhonghua Book Company, Beijing (2006)"},{"key":"25_CR27","unstructured":"Zhu, X.: The Analects of Confucius Variorum (1200)"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Xunzi: Xunzi: The Complete Text. Princeton University Press, Princeton (2014)","DOI":"10.1515\/9781400852550"},{"key":"25_CR29","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1353\/chn.2012.0007","volume":"10","author":"Z Wang","year":"2012","unstructured":"Wang, Z., Pavli\u0107evi\u0107, D.: Citizens and Democracy: Shi Tianjian\u2019s contribution to China studies and political science. China Int. J. 10, 125\u2013135 (2012)","journal-title":"China Int. J."},{"key":"25_CR30","doi-asserted-by":"publisher","first-page":"401","DOI":"10.2307\/422441","volume":"33","author":"T Shi","year":"2001","unstructured":"Shi, T.: Cultural values and political trust: A comparison of the people\u2019s Republic of China and Taiwan. Comp. Polit. 33, 401\u2013419 (2001)","journal-title":"Comp. Polit."},{"key":"25_CR31","volume-title":"Political Participation in Beijing","author":"T Shi","year":"1997","unstructured":"Shi, T.: Political Participation in Beijing. Harvard University Press, Cambridge (1997)"},{"key":"25_CR32","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1353\/jod.2010.0012","volume":"21","author":"T Shi","year":"2010","unstructured":"Shi, T., Lu, J.: The shadow of confucianism. J. Democr. 21, 123\u2013130 (2010)","journal-title":"J. Democr."},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Shi, T.: China: Democratic values supporting an authoritarian system. In: Chu, Y., Diamond, L., Nathan, A.J., Shin, D.C. (eds.) How East Asians View Democracy. Columbia University Press (2008)","DOI":"10.7312\/chu-14534-011"},{"key":"25_CR34","first-page":"95","volume":"122","author":"AJ Nathan","year":"1993","unstructured":"Nathan, A.J., Shi, T.: Cultural requisites for democracy in China: Findings from a survey. Daedalus 122, 95\u2013123 (1993)","journal-title":"Daedalus"},{"key":"25_CR35","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1177\/0163443709350098","volume":"32","author":"S Li","year":"2010","unstructured":"Li, S.: The online public space and popular ethos in China. Media Cult. Soc. 32, 63\u201383 (2010)","journal-title":"Media Cult. Soc."},{"key":"25_CR36","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1177\/0920203X0301700203","volume":"17","author":"L Tsui","year":"2003","unstructured":"Tsui, L.: The panopticon as the antithesis of a space of freedom: control and regulation of the internet in China. China Inf. 17, 65\u201382 (2003)","journal-title":"China Inf."},{"key":"25_CR37","unstructured":"Roberts, M.: Experiencing Censorship Emboldens Internet Users and Decreases Government Support in China (2015)"},{"key":"25_CR38","first-page":"1","volume":"38","author":"ASY Cheung","year":"2006","unstructured":"Cheung, A.S.Y.: The business of governance: China\u2019s legislation on content regulation in cyberspace. Int. Law Polit. 38, 1\u201337 (2006)","journal-title":"Int. Law Polit."},{"key":"25_CR39","unstructured":"Human Rights Watch: China: Nationwide Arrests of Activists, Critics Multiply. http:\/\/www.hrw.org\/news\/2013\/08\/30\/china-nationwide-arrests-activists-critics-multiply"},{"key":"25_CR40","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1017\/S0003055413000014","volume":"107","author":"G King","year":"2013","unstructured":"King, G., Pan, J., Roberts, M.: How censorship in China allows government criticism but silences collective expression. Am. Polit. Sci. Rev. 107, 326\u2013343 (2013)","journal-title":"Am. Polit. Sci. Rev."},{"key":"25_CR41","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1108\/10662249710799016","volume":"7","author":"G Ebbs","year":"1997","unstructured":"Ebbs, G., Rheingold, H.: Censorship on the information highway. Internet Res. 7, 59\u201380 (1997)","journal-title":"Internet Res."},{"key":"25_CR42","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1080\/09585170050045236","volume":"11","author":"T Lawson","year":"2000","unstructured":"Lawson, T., Comber, C.: Censorship, the Internet and schools: a new moral panic? Curric. J. 11, 273\u2013285 (2000)","journal-title":"Curric. J."},{"key":"25_CR43","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/228503.228520","volume":"39","author":"PH Ang","year":"1996","unstructured":"Ang, P.H., Nadarajan, B.: Censorship and the internet: a Singapore perspective. Commun. ACM 39, 72\u201378 (1996)","journal-title":"Commun. ACM"},{"key":"25_CR44","doi-asserted-by":"crossref","unstructured":"Bambauer, D.E.: Filtering in Oz: Australia\u2019s Foray into Internet Censorship. Univ. Pennsylvania J. Int. Law 31 (2009)","DOI":"10.2139\/ssrn.1319466"},{"key":"25_CR45","doi-asserted-by":"crossref","unstructured":"Pater, J.A., Haimson, O.L., Andalibi, N., Mynatt, E.D.: Hunger hurts but starving works: Characterizing the presentation of eating disorders online. In: CSCW 2016, pp. 1183\u20131198. ACM Press (2016)","DOI":"10.1145\/2818048.2820030"},{"key":"25_CR46","unstructured":"Gillespie, T.: Can an algorithm be wrong? Limn. 1 (2012)"},{"key":"25_CR47","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1108\/eb026702","volume":"37","author":"T Wilson","year":"1981","unstructured":"Wilson, T.: On user studies and information needs. J. Documentation 37, 3\u201315 (1981)","journal-title":"J. Documentation"},{"key":"25_CR48","first-page":"23","volume":"10","author":"G Behrouzian","year":"2016","unstructured":"Behrouzian, G., Nisbet, E.C., Dal, A., \u00c7arko\u011flu, A.: Resisting censorship: How citizens navigate closed media environments. Int. J. Commun. 10, 23 (2016)","journal-title":"Int. J. Commun."},{"key":"25_CR49","first-page":"591","volume":"69","author":"AC Gunther","year":"1992","unstructured":"Gunther, A.C., Snyder, L.B.: Reading international news in a censored press environment. J. Mass Commun. Q. 69, 591\u2013599 (1992)","journal-title":"J. Mass Commun. Q."},{"key":"25_CR50","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSPEC.2005.1437036","volume":"42","author":"S Cherry","year":"2005","unstructured":"Cherry, S.: The net effect: as China\u2019s Internet gets a much-needed makeover, will the new network promote freedom or curtail it? IEEE Spectr. 42, 38\u201344 (2005)","journal-title":"IEEE Spectr."},{"key":"25_CR51","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11127-007-9199-0","volume":"134","author":"R MacKinnon","year":"2007","unstructured":"MacKinnon, R.: Flatter world and thicker walls? Blogs, censorship and civic discourse in China. Public Choice 134, 31\u201346 (2007)","journal-title":"Public Choice"},{"key":"25_CR52","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1146\/annurev-anthro-102214-014226","volume":"44","author":"B Nardi","year":"2015","unstructured":"Nardi, B.: Virtuality. Annu. Rev. Anthropol. 44, 15\u201331 (2015)","journal-title":"Annu. Rev. Anthropol."},{"key":"25_CR53","doi-asserted-by":"crossref","unstructured":"Kou, Y., Kow, Y.M., Gui, X.: Resisting the censorship infrastructure in China. In: 2017 50th Hawaii International Conference on System Sciences, pp. 2332\u20132340 (2017)","DOI":"10.24251\/HICSS.2017.282"},{"key":"25_CR54","unstructured":"Jiang, M.: The Co-Evolution of the internet, (Un)Civil society & authoritarianism in China. In: The Internet, Social Media, and a Changing China. University of Pennsylvania Press, Philadelphia (2014)"},{"key":"25_CR55","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1177\/1470412914546576","volume":"13","author":"AX Mina","year":"2014","unstructured":"Mina, A.X.: Batman, pandaman and the blind man: a case study in social change memes and internet censorship in China. J. Vis. Cult. 13, 359\u2013375 (2014)","journal-title":"J. Vis. Cult."},{"key":"25_CR56","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1177\/1748048514568757","volume":"77","author":"G Yang","year":"2015","unstructured":"Yang, G., Jiang, M.: The networked practice of online political satire in China: Between ritual and resistance. Int. Commun. Gaz. 77, 215\u2013231 (2015)","journal-title":"Int. Commun. Gaz."},{"key":"25_CR57","unstructured":"Weibo: 2014 \u5e74\u5fae\u535a\u7528\u6237\u53d1\u5c55\u62a5\u544a. (2014)"},{"key":"25_CR58","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"J Corbin","year":"2007","unstructured":"Corbin, J., Strauss, A.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications, Thousand Oaks (2007)"},{"key":"25_CR59","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1177\/1461444814548994","volume":"18","author":"Y Mou","year":"2014","unstructured":"Mou, Y., Wu, K., Atkin, D.: Understanding the use of circumvention tools to bypass online censorship. New Media Soc. 18, 837\u2013856 (2014)","journal-title":"New Media Soc."},{"key":"25_CR60","doi-asserted-by":"crossref","unstructured":"Leibold, J.: Blogging alone: China, the internet, and the democratic illusion? (2011)","DOI":"10.1017\/S0021911811001550"},{"key":"25_CR61","unstructured":"La Rue, F.: Report of the special rapporteur on the promotion and protection of the right to freedom of opinion and expression (2011)"},{"key":"25_CR62","volume-title":"Neo-Confucianism in History","author":"PK Bol","year":"2010","unstructured":"Bol, P.K.: Neo-Confucianism in History. Harvard University Press, Cambridge (2010)"},{"key":"25_CR63","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-1542-4","volume-title":"The Renaissance of Confucianism in Contemporary China","author":"R Fan","year":"2011","unstructured":"Fan, R., Yu, E.: The Renaissance of Confucianism in Contemporary China. Springer, Heidelberg (2011)"},{"key":"25_CR64","unstructured":"Melvin, S.: Yu Dan and China\u2019s return to Confucius (2007)"},{"key":"25_CR65","doi-asserted-by":"crossref","unstructured":"Li, Y.: Smart censorship in China weibo: An industry and party-state double act. SSRN Electron. J. (2013)","DOI":"10.2139\/ssrn.2264996"},{"key":"25_CR66","unstructured":"Wang, W.Y.: Who\u2019s blocking the Chinese internet? The rise of cybercultures and the generational conflicts in China. In: Baumann, S. (ed.) Cybercultures: Cultures in Cyberspace Communities, pp. 145-166. Inter-Disciplinary Press (2012)"},{"key":"25_CR67","doi-asserted-by":"crossref","unstructured":"Irani, L., Vertesi, J., Dourish, P., Philip, K., Grinter, R.E.: Postcolonial computing: a lens on design and development. In: CHI 2010, pp. 1311\u20131320. ACM Press (2010)","DOI":"10.1145\/1753326.1753522"},{"key":"25_CR68","doi-asserted-by":"crossref","unstructured":"Khosrow-Pour, M.: Encyclopedia of Information Science and Technology, 3 edn. IGI Global (2014)","DOI":"10.4018\/978-1-4666-5888-2"},{"key":"25_CR69","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1925820.1925828","volume":"18","author":"B Nardi","year":"2011","unstructured":"Nardi, B., Vatrapu, R., Clemmensen, T.: Comparative informatics. Interactions 18, 28 (2011)","journal-title":"Interactions"},{"key":"25_CR70","doi-asserted-by":"crossref","unstructured":"Semaan, B., Faucett, H., Robertson, S.P., Maruyama, M., Douglas, S.: Designing political deliberation environments to support interactions in the public sphere. In: CHI 2015, pp. 3167\u20133176. ACM Press (2015)","DOI":"10.1145\/2702123.2702403"},{"key":"25_CR71","doi-asserted-by":"crossref","unstructured":"Boh\u00f8j, M., Borchorst, N.G., B\u00f8dker, S., Korn, M., Zander, P.-O.: Public deliberation in municipal planning: supporting action and reflection with mobile technology. In: C&T 2011, p. 88. ACM Press (2011)","DOI":"10.1145\/2103354.2103367"},{"key":"25_CR72","doi-asserted-by":"crossref","unstructured":"Semaan, B., Robertson, S., Douglas, S., Maruyama, M.: Social media supporting political deliberation across multiple public spheres: towards depolarization. In: CSCW 2014, pp. 1409\u20131421. ACM Press (2014)","DOI":"10.1145\/2531602.2531605"},{"key":"25_CR73","doi-asserted-by":"crossref","unstructured":"Crivellaro, C., Comber, R., Bowers, J., Wright, P.C., Olivier, P.: A pool of dreams: Facebook, politics and the emergence of a social movement. In: CHI 2014, pp. 3573\u20133582. ACM Press (2014)","DOI":"10.1145\/2556288.2557100"},{"key":"25_CR74","doi-asserted-by":"crossref","unstructured":"Dimond, J.P., Dye, M., Larose, D., Bruckman, A.S.: Hollaback!: the role of storytelling online in a social movement organization. In: CSCW 2013, pp. 477\u2013489. ACM Press (2013)","DOI":"10.1145\/2441776.2441831"},{"key":"25_CR75","unstructured":"Roeder, M.: Social movements using social media in a mined and censored world: examples in the United States and China (2013). http:\/\/via.library.depaul.edu\/etd\/156"},{"key":"25_CR76","doi-asserted-by":"crossref","unstructured":"Kow, Y.M., Kou, Y., Semaan, B., Cheng, W.: Mediating the undercurrents: Using social media to sustain a social movement. In: CHI 2016, pp. 3883\u20133894. ACM Press (2016)","DOI":"10.1145\/2858036.2858186"},{"key":"25_CR77","doi-asserted-by":"crossref","unstructured":"Le Dantec, C.A., Edwards, W.K.: Designs on dignity:perceptions of technology among the homeless. CHI \u201908. pp. 627\u2013636. ACM Press, New York, USA (2008)","DOI":"10.1145\/1357054.1357155"},{"key":"25_CR78","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1162\/desi.2009.25.1.48","volume":"25","author":"C DiSalvo","year":"2009","unstructured":"DiSalvo, C.: Design and the construction of publics. Des. Issues 25, 48\u201363 (2009)","journal-title":"Des. Issues"},{"key":"25_CR79","doi-asserted-by":"crossref","unstructured":"DiSalvo, C., Light, A., Hirsch, T., Le Dantec, C.A., Goodman, E., Hill, K.: HCI, communities and politics. In: CHI EA 2010, pp. 3151\u20133154. ACM Press (2010)","DOI":"10.1145\/1753846.1753940"},{"key":"25_CR80","doi-asserted-by":"crossref","unstructured":"Gordon, E., Baldwin-Philippi, J., Balestra, M.: Why we engage: how theories of human behavior contribute to our understanding of civic engagement in a digital era. SSRN Electron. J. (2013)","DOI":"10.2139\/ssrn.2343762"},{"key":"25_CR81","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.intcom.2004.10.006","volume":"17","author":"A Kavanaugh","year":"2005","unstructured":"Kavanaugh, A., Carroll, J.M., Rosson, M.B., Reese, D.D., Zin, T.T.: Participating in civil society: the case of networked communities. Interact. Comput. 17, 9\u201333 (2005)","journal-title":"Interact. Comput."},{"key":"25_CR82","doi-asserted-by":"crossref","unstructured":"Kavanaugh, A., Carroll, J.M., Rosson, M.B., Zin, T.T., Reese, D.D.: Community networks: where offline communities meet online. J. Comput. Commun. 10 (2005)","DOI":"10.1111\/j.1083-6101.2005.tb00266.x"},{"key":"25_CR83","doi-asserted-by":"crossref","unstructured":"Monroy-Hern\u00e1ndez, A., Boyd, D., Kiciman, E., De Choudhury, M., Counts, S.: The new war correspondents: the rise of civic media curation in urban warfare. In: CSCW 2013, pp. 1443\u20131452. ACM Press (2013)","DOI":"10.1145\/2441776.2441938"},{"key":"25_CR84","doi-asserted-by":"crossref","unstructured":"Wang, Y., Mark, G.: Trust in online news: comparing social media and official media use by Chinese citizens. In: CSCW 2012, pp. 599\u2013610. ACM Press (2013)","DOI":"10.1145\/2441776.2441843"},{"key":"25_CR85","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/2001269.2001297","volume":"54","author":"D Gayo-Avello","year":"2011","unstructured":"Gayo-Avello, D.: Don\u2019t turn social media into another \u201cLiterary Digest\u201d poll. Commun. ACM 54, 121\u2013128 (2011)","journal-title":"Commun. ACM"},{"key":"25_CR86","doi-asserted-by":"crossref","unstructured":"Kriplean, T., Morgan, J., Freelon, D., Borning, A., Bennett, L.: Supporting reflective public thought with considerit. In: CSCW 2012, pp. 265\u2013274. ACM Press (2012)","DOI":"10.1145\/2145204.2145249"},{"key":"25_CR87","doi-asserted-by":"crossref","unstructured":"Bardzell, S.: Feminist HCI: taking stock and outlining an agenda for design. In: CHI 2010, pp. 1301\u20131310. ACM Press (2010)","DOI":"10.1145\/1753326.1753521"},{"key":"25_CR88","doi-asserted-by":"crossref","unstructured":"Ekbia, H., Nardi, B.: Social inequality and HCI: The View from political economy. In: CHI 2016, pp. 4997\u20135002. ACM Press (2016)","DOI":"10.1145\/2858036.2858343"},{"key":"25_CR89","unstructured":"Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium, pp. 463\u2013468 (2010)"},{"key":"25_CR90","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-40956-4_9","volume-title":"Privacy Enhancing Technologies","author":"N Feamster","year":"2003","unstructured":"Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H., Karger, D.: Thwarting web censorship with untrusted messenger discovery. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 125\u2013140. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-40956-4_9"},{"key":"25_CR91","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-45748-8_11","volume-title":"Peer-to-Peer Systems","author":"A Serjantov","year":"2002","unstructured":"Serjantov, A.: Anonymizing censorship resistant systems. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 111\u2013120. Springer, Heidelberg (2002). doi:10.1007\/3-540-45748-8_11"},{"key":"25_CR92","doi-asserted-by":"crossref","unstructured":"Waldman, M., Mazi\u00e8res, D.: Tangler: a censorship-resistant publishing system based on document entanglements. In: CCS 2001, pp. 126\u2013135. ACM Press (2001)","DOI":"10.1145\/501983.502002"},{"key":"25_CR93","doi-asserted-by":"crossref","unstructured":"Baumer, E.P.S., Silberman, M.S.: When the implication is not to design (technology). In: CHI 2011, pp. 2271\u20132274. ACM Press (2011)","DOI":"10.1145\/1978942.1979275"},{"key":"25_CR94","doi-asserted-by":"crossref","unstructured":"Pierce, J.: Undesigning technology: considering the negation of design by design. In: CHI 2012, pp. 957\u2013966. ACM Press (2012)","DOI":"10.1145\/2207676.2208540"},{"key":"25_CR95","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik, Y.R., Pennebaker, J.W.: The psychological meaning of words: LIWC and computerized text analysis methods. J. Lang. Soc. Psychol. 29, 24\u201354 (2010)","journal-title":"J. Lang. Soc. Psychol."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction - INTERACT 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67744-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T02:19:30Z","timestamp":1719454770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67744-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319677439","9783319677446"],"references-count":95,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67744-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bombay","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}