{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:34:48Z","timestamp":1776440088994,"version":"3.51.2"},"reference-count":70,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1080\/01972243.2022.2137866","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T16:08:06Z","timestamp":1667578086000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":33,"title":["Governing Generation Z in China: Bilibili, bidirectional mediation, and online community governance"],"prefix":"10.1080","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-8246","authenticated-orcid":false,"given":"Zhaodi","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Sociology, Indiana University, Bloomington, Indiana, USA"}]},{"given":"Dali L.","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Political Science, University of Chicago, Chicago, Illinois, USA"}]}],"member":"301","published-online":{"date-parts":[[2022,11,4]]},"reference":[{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817729149"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1108\/9781787430914"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/17544750.2020.1761848"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.4324\/9780367086145"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1080\/10670564.2016.1206281"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/17544750.2019.1644008"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.659199"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12400.003.0002"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/1360083042000190634"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817731923"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1017\/S0305741021000345"},{"key":"CIT0014","unstructured":"Gan, N. 2019. China\u2019s Internet regulator orders online AI algorithms to promote \u201cmainstream values.\u201dSouth China Morning Post, September 11. Accessed March 18, 2022. https:\/\/www.scmp.com\/news\/china\/politics\/article\/3026784\/chinas-internet-regulator-orders-online-ai-algorithms-promote"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342738"},{"key":"CIT0016","first-page":"254","volume-title":"The SAGE handbook of social","author":"Gillespie T.","year":"2017"},{"key":"CIT0017","volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie T.","year":"2018"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1573914"},{"key":"CIT0019","volume-title":"The evolution of the Chinese Internet: Create visibility in the digital public","author":"Guo S.","year":"2021"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1177\/186810261504400205"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1017\/S0305741015001216"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.7312\/han-18474"},{"key":"CIT0023","first-page":"1966","volume":"12","author":"Han R.","year":"2018","journal-title":"The International Journal of Communication"},{"key":"CIT0026","first-page":"1486","volume":"11","author":"Hong Y.","year":"2017","journal-title":"International Journal of Communication"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819889959"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2021.1954973"},{"key":"CIT0030","unstructured":"Hunt, K., and C. Y. Xu. 2013. China \u201cemploys 2 million to police Internet.\u201dCNN.com, October 7. Accessed October 15, 2022. https:\/\/www.cnn.com\/2013\/10\/07\/world\/asia\/china-internet-monitors\/"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813481196"},{"key":"CIT0033","unstructured":"Jiang, M. 2012. Internet companies in China: Dancing between the party line and the bottom line. Accessed October 15, 2022. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1998976"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055413000014"},{"key":"CIT0035","first-page":"1599","volume":"131","author":"Klonick K.","year":"2017","journal-title":"Harvard Law Review"},{"key":"CIT0036","unstructured":"Knockel, J., M. Crete-Nishihata, J. Q. Ng, A. Senft, and J. R. Crandall. 2015. Every rose has its thorn: Censorship and surveillance on social video platforms in China. Accessed October 15, 2022. https:\/\/www.usenix.org\/system\/files\/conference\/foci15\/foci15-paper-knockel.pdf"},{"issue":"19","key":"CIT0037","first-page":"2628","volume":"6","author":"Lagerkvist J.","year":"2012","journal-title":"International Journal of Communication"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1515\/9781400887941"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2021.1983001"},{"key":"CIT0041","volume-title":"Our great firewall: Expression and governance in the era of the Internet (Women de fanghuoqiang: Wangluo shidai de biaoda yu jianguan)","author":"Li Y.","year":"2009"},{"key":"CIT0042","first-page":"1855","volume":"15","author":"Liang F.","year":"2021","journal-title":"International Journal of Communication"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1177\/1043986209350437"},{"key":"CIT0044","author":"Lin T.","year":"2018","journal-title":"Columbia"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1177\/2056305119883430"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.4324\/9780429447754-8"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2020.1765914"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v14i2.2378"},{"key":"CIT0049","volume-title":"Fostering freedom online: The roles of Internet intermediaries","author":"MacKinnon R.","year":"2014"},{"key":"CIT0050","unstructured":"Matias, J. N., A. Johnson, W. E. Boesel, B. Keegan, J. Friedman, and C. DeTar. 2015. Reporting, reviewing, and responding to harassment on Twitter. Accessed October 15, 2022. https:\/\/arxiv.org\/pdf\/1505.03359.pdf"},{"key":"CIT0052","unstructured":"Miller, B. 2018. Delegated dictatorship: Examining the state and market forces behind information control in China. Doctoral dissertation, University of Michigan."},{"key":"CIT0053","first-page":"134","volume-title":"China online: Locating society in online spaces,","author":"Pang C.","year":"2014"},{"key":"CIT0055","first-page":"147","volume-title":"The intersectional Internet: Race, sex, class and culture online,","author":"Roberts S. T.","year":"2016"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvhrcz0v"},{"key":"CIT0057","first-page":"1525","volume":"80","author":"Rosen J.","year":"2011","journal-title":"Fordham Law Review"},{"key":"CIT0058","unstructured":"Rosen, J. 2013. The delete squad: Google, Twitter, Facebook, and the new global battle over the future of free speech.The New Republic,April 29. Accessed October 15, 2022. https:\/\/newrepublic.com\/article\/113045\/free-speech-internet-silicon-valley-making-rules"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819875990"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190876791.001.0001"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1177\/20570473211048029"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818821316"},{"issue":"1","key":"CIT0063","first-page":"25","volume":"12","author":"Shan W.","year":"2021","journal-title":"International Journal of China Studies"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812472966"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1177\/00323292211013181"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.4324\/9781315438573"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1080\/17544750.2019.1584119"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1177\/0163443707080536"},{"key":"CIT0071","first-page":"175","volume-title":"China online: Locating society in online spaces","author":"Xia B.","year":"2014"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1007\/s41111-017-0059-x"},{"key":"CIT0073","volume-title":"The power of the Internet in China: Citizen activism online","author":"Yang G.","year":"2009"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1080\/17544750.2011.647744"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1177\/0920203X14539910"},{"key":"CIT0076","first-page":"1945","volume":"11","author":"Yang G.","year":"2018","journal-title":"International Journal of Communication"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2463-2.ch007"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1080\/17524032.2021.1941176"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1515\/9781503626812"},{"key":"CIT0080","doi-asserted-by":"crossref","first-page":"71","DOI":"10.7551\/mitpress\/8551.003.0010","volume-title":"Access controlled: The shaping of power, rights, and rule in cyberspace","author":"Zuckerman E.","year":"2010"},{"key":"CIT0500","doi-asserted-by":"crossref","unstructured":"Zysman, J., and M. Kenney. 2018. The next phase in the digital revolution: Intelligent tools, platforms, growth employment. Communications of the ACM 61 (2):54\u201363.","DOI":"10.1145\/3173550"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2022.2137866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T03:55:22Z","timestamp":1701316522000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2022.2137866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,4]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,1]]}},"alternative-id":["10.1080\/01972243.2022.2137866"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2022.2137866","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-28","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}